From 525d096ba8bab6607327eb8623eaf62e7313a626 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 8 Jan 2025 19:03:45 +0000 Subject: [PATCH] Auto-Update: 2025-01-08T19:00:22.213675+00:00 --- CVE-2018/CVE-2018-43xx/CVE-2018-4301.json | 43 +- CVE-2021/CVE-2021-469xx/CVE-2021-46965.json | 114 +++- CVE-2021/CVE-2021-469xx/CVE-2021-46969.json | 80 ++- CVE-2021/CVE-2021-469xx/CVE-2021-46970.json | 97 ++- CVE-2021/CVE-2021-469xx/CVE-2021-46971.json | 131 +++- CVE-2021/CVE-2021-469xx/CVE-2021-46972.json | 114 +++- CVE-2021/CVE-2021-469xx/CVE-2021-46977.json | 119 +++- CVE-2021/CVE-2021-469xx/CVE-2021-46999.json | 148 +++- CVE-2021/CVE-2021-470xx/CVE-2021-47001.json | 114 +++- CVE-2021/CVE-2021-470xx/CVE-2021-47004.json | 114 +++- CVE-2021/CVE-2021-470xx/CVE-2021-47007.json | 114 +++- CVE-2021/CVE-2021-470xx/CVE-2021-47011.json | 114 +++- CVE-2021/CVE-2021-470xx/CVE-2021-47014.json | 80 ++- CVE-2021/CVE-2021-470xx/CVE-2021-47015.json | 131 +++- CVE-2021/CVE-2021-470xx/CVE-2021-47019.json | 80 ++- CVE-2022/CVE-2022-433xx/CVE-2022-43384.json | 88 ++- CVE-2022/CVE-2022-435xx/CVE-2022-43575.json | 88 ++- CVE-2022/CVE-2022-438xx/CVE-2022-43841.json | 118 +++- CVE-2022/CVE-2022-451xx/CVE-2022-45185.json | 47 +- CVE-2022/CVE-2022-460xx/CVE-2022-46088.json | 71 +- CVE-2022/CVE-2022-49xx/CVE-2022-4946.json | 34 +- CVE-2023/CVE-2023-01xx/CVE-2023-0152.json | 34 +- CVE-2023/CVE-2023-05xx/CVE-2023-0545.json | 22 +- CVE-2023/CVE-2023-09xx/CVE-2023-0900.json | 22 +- CVE-2023/CVE-2023-23xx/CVE-2023-2337.json | 22 +- CVE-2023/CVE-2023-24xx/CVE-2023-2488.json | 22 +- CVE-2023/CVE-2023-24xx/CVE-2023-2489.json | 22 +- CVE-2023/CVE-2023-25xx/CVE-2023-2503.json | 22 +- CVE-2023/CVE-2023-25xx/CVE-2023-2572.json | 22 +- CVE-2023/CVE-2023-26xx/CVE-2023-2634.json | 22 +- CVE-2023/CVE-2023-30xx/CVE-2023-3027.json | 36 +- CVE-2023/CVE-2023-30xx/CVE-2023-3079.json | 32 +- CVE-2023/CVE-2023-334xx/CVE-2023-33460.json | 32 +- CVE-2023/CVE-2023-335xx/CVE-2023-33569.json | 32 +- CVE-2023/CVE-2023-336xx/CVE-2023-33613.json | 32 +- CVE-2023/CVE-2023-336xx/CVE-2023-33651.json | 32 +- CVE-2023/CVE-2023-344xx/CVE-2023-34407.json | 32 +- CVE-2023/CVE-2023-344xx/CVE-2023-34410.json | 32 +- CVE-2023/CVE-2023-344xx/CVE-2023-34411.json | 32 +- CVE-2023/CVE-2023-356xx/CVE-2023-35685.json | 21 + CVE-2023/CVE-2023-439xx/CVE-2023-43902.json | 12 +- CVE-2023/CVE-2023-458xx/CVE-2023-45878.json | 12 +- CVE-2023/CVE-2023-522xx/CVE-2023-52226.json | 52 +- CVE-2023/CVE-2023-65xx/CVE-2023-6525.json | 84 ++- CVE-2024/CVE-2024-03xx/CVE-2024-0326.json | 84 ++- CVE-2024/CVE-2024-03xx/CVE-2024-0385.json | 54 +- CVE-2024/CVE-2024-04xx/CVE-2024-0442.json | 84 ++- CVE-2024/CVE-2024-05xx/CVE-2024-0512.json | 54 +- CVE-2024/CVE-2024-05xx/CVE-2024-0513.json | 54 +- CVE-2024/CVE-2024-05xx/CVE-2024-0514.json | 54 +- CVE-2024/CVE-2024-07xx/CVE-2024-0766.json | 54 +- CVE-2024/CVE-2024-07xx/CVE-2024-0767.json | 54 +- CVE-2024/CVE-2024-07xx/CVE-2024-0768.json | 54 +- CVE-2024/CVE-2024-10xx/CVE-2024-1095.json | 54 +- CVE-2024/CVE-2024-11xx/CVE-2024-1178.json | 56 +- CVE-2024/CVE-2024-128xx/CVE-2024-12898.json | 79 ++- CVE-2024/CVE-2024-128xx/CVE-2024-12899.json | 79 ++- CVE-2024/CVE-2024-12xx/CVE-2024-1242.json | 54 +- CVE-2024/CVE-2024-12xx/CVE-2024-1276.json | 64 +- CVE-2024/CVE-2024-12xx/CVE-2024-1285.json | 54 +- CVE-2024/CVE-2024-131xx/CVE-2024-13187.json | 141 ++++ CVE-2024/CVE-2024-13xx/CVE-2024-1398.json | 64 +- CVE-2024/CVE-2024-14xx/CVE-2024-1448.json | 64 +- CVE-2024/CVE-2024-14xx/CVE-2024-1478.json | 54 +- CVE-2024/CVE-2024-15xx/CVE-2024-1500.json | 74 +- CVE-2024/CVE-2024-15xx/CVE-2024-1536.json | 54 +- CVE-2024/CVE-2024-16xx/CVE-2024-1625.json | 79 ++- CVE-2024/CVE-2024-17xx/CVE-2024-1731.json | 54 +- CVE-2024/CVE-2024-19xx/CVE-2024-1943.json | 74 +- CVE-2024/CVE-2024-217xx/CVE-2024-21749.json | 52 +- CVE-2024/CVE-2024-21xx/CVE-2024-2110.json | 54 +- CVE-2024/CVE-2024-21xx/CVE-2024-2111.json | 74 +- CVE-2024/CVE-2024-21xx/CVE-2024-2115.json | 54 +- CVE-2024/CVE-2024-21xx/CVE-2024-2149.json | 73 +- CVE-2024/CVE-2024-233xx/CVE-2024-23328.json | 91 ++- CVE-2024/CVE-2024-235xx/CVE-2024-23519.json | 52 +- CVE-2024/CVE-2024-247xx/CVE-2024-24701.json | 52 +- CVE-2024/CVE-2024-248xx/CVE-2024-24833.json | 52 +- CVE-2024/CVE-2024-259xx/CVE-2024-25930.json | 52 +- CVE-2024/CVE-2024-279xx/CVE-2024-27915.json | 82 ++- CVE-2024/CVE-2024-27xx/CVE-2024-2733.json | 74 +- CVE-2024/CVE-2024-27xx/CVE-2024-2734.json | 74 +- CVE-2024/CVE-2024-27xx/CVE-2024-2735.json | 74 +- CVE-2024/CVE-2024-27xx/CVE-2024-2736.json | 74 +- CVE-2024/CVE-2024-288xx/CVE-2024-28855.json | 185 ++++- CVE-2024/CVE-2024-289xx/CVE-2024-28916.json | 42 +- CVE-2024/CVE-2024-290xx/CVE-2024-29059.json | 434 +++++++++++- CVE-2024/CVE-2024-298xx/CVE-2024-29891.json | 174 ++++- CVE-2024/CVE-2024-298xx/CVE-2024-29892.json | 174 ++++- CVE-2024/CVE-2024-29xx/CVE-2024-2925.json | 84 ++- CVE-2024/CVE-2024-300xx/CVE-2024-30042.json | 72 +- CVE-2024/CVE-2024-300xx/CVE-2024-30043.json | 72 +- CVE-2024/CVE-2024-300xx/CVE-2024-30044.json | 52 +- CVE-2024/CVE-2024-300xx/CVE-2024-30045.json | 90 ++- CVE-2024/CVE-2024-300xx/CVE-2024-30046.json | 78 ++- CVE-2024/CVE-2024-300xx/CVE-2024-30047.json | 62 +- CVE-2024/CVE-2024-300xx/CVE-2024-30048.json | 62 +- CVE-2024/CVE-2024-300xx/CVE-2024-30049.json | 134 +++- CVE-2024/CVE-2024-300xx/CVE-2024-30050.json | 140 +++- CVE-2024/CVE-2024-300xx/CVE-2024-30053.json | 62 +- CVE-2024/CVE-2024-300xx/CVE-2024-30054.json | 42 +- CVE-2024/CVE-2024-300xx/CVE-2024-30059.json | 62 +- CVE-2024/CVE-2024-318xx/CVE-2024-31889.json | 66 +- CVE-2024/CVE-2024-319xx/CVE-2024-31907.json | 66 +- CVE-2024/CVE-2024-319xx/CVE-2024-31908.json | 66 +- CVE-2024/CVE-2024-328xx/CVE-2024-32868.json | 72 +- CVE-2024/CVE-2024-329xx/CVE-2024-32967.json | 167 ++++- CVE-2024/CVE-2024-32xx/CVE-2024-3266.json | 74 +- CVE-2024/CVE-2024-32xx/CVE-2024-3267.json | 74 +- CVE-2024/CVE-2024-35xx/CVE-2024-3560.json | 74 +- CVE-2024/CVE-2024-35xx/CVE-2024-3598.json | 74 +- CVE-2024/CVE-2024-396xx/CVE-2024-39683.json | 172 ++++- CVE-2024/CVE-2024-39xx/CVE-2024-3923.json | 84 ++- CVE-2024/CVE-2024-419xx/CVE-2024-41952.json | 159 ++++- CVE-2024/CVE-2024-419xx/CVE-2024-41953.json | 176 ++++- CVE-2024/CVE-2024-44xx/CVE-2024-4430.json | 84 ++- CVE-2024/CVE-2024-514xx/CVE-2024-51442.json | 33 + CVE-2024/CVE-2024-539xx/CVE-2024-53933.json | 31 +- CVE-2024/CVE-2024-539xx/CVE-2024-53934.json | 43 +- CVE-2024/CVE-2024-539xx/CVE-2024-53936.json | 31 +- CVE-2024/CVE-2024-544xx/CVE-2024-54491.json | 59 +- CVE-2024/CVE-2024-554xx/CVE-2024-55459.json | 72 ++ CVE-2024/CVE-2024-565xx/CVE-2024-56536.json | 82 ++- CVE-2024/CVE-2024-565xx/CVE-2024-56578.json | 106 ++- CVE-2024/CVE-2024-565xx/CVE-2024-56579.json | 94 ++- CVE-2024/CVE-2024-566xx/CVE-2024-56608.json | 69 +- CVE-2024/CVE-2024-566xx/CVE-2024-56614.json | 111 ++- CVE-2024/CVE-2024-566xx/CVE-2024-56688.json | 142 +++- CVE-2024/CVE-2024-566xx/CVE-2024-56694.json | 125 +++- CVE-2024/CVE-2024-567xx/CVE-2024-56708.json | 118 +++- CVE-2024/CVE-2024-567xx/CVE-2024-56770.json | 45 ++ CVE-2024/CVE-2024-567xx/CVE-2024-56771.json | 25 + CVE-2024/CVE-2024-567xx/CVE-2024-56772.json | 25 + CVE-2024/CVE-2024-567xx/CVE-2024-56773.json | 25 + CVE-2024/CVE-2024-567xx/CVE-2024-56774.json | 37 + CVE-2024/CVE-2024-567xx/CVE-2024-56775.json | 25 + CVE-2024/CVE-2024-567xx/CVE-2024-56776.json | 37 + CVE-2024/CVE-2024-567xx/CVE-2024-56777.json | 37 + CVE-2024/CVE-2024-567xx/CVE-2024-56778.json | 37 + CVE-2024/CVE-2024-567xx/CVE-2024-56779.json | 45 ++ CVE-2024/CVE-2024-567xx/CVE-2024-56780.json | 45 ++ CVE-2024/CVE-2024-567xx/CVE-2024-56781.json | 45 ++ CVE-2024/CVE-2024-567xx/CVE-2024-56782.json | 25 + CVE-2024/CVE-2024-567xx/CVE-2024-56783.json | 33 + CVE-2024/CVE-2024-567xx/CVE-2024-56784.json | 25 + CVE-2024/CVE-2024-567xx/CVE-2024-56785.json | 41 ++ CVE-2024/CVE-2024-567xx/CVE-2024-56786.json | 29 + CVE-2024/CVE-2024-567xx/CVE-2024-56787.json | 37 + CVE-2024/CVE-2024-63xx/CVE-2024-6350.json | 60 ++ CVE-2025/CVE-2025-02xx/CVE-2025-0238.json | 43 +- CVE-2025/CVE-2025-02xx/CVE-2025-0239.json | 43 +- CVE-2025/CVE-2025-02xx/CVE-2025-0240.json | 43 +- CVE-2025/CVE-2025-02xx/CVE-2025-0242.json | 43 +- CVE-2025/CVE-2025-02xx/CVE-2025-0243.json | 31 +- CVE-2025/CVE-2025-201xx/CVE-2025-20166.json | 60 ++ CVE-2025/CVE-2025-201xx/CVE-2025-20167.json | 60 ++ CVE-2025/CVE-2025-201xx/CVE-2025-20168.json | 60 ++ CVE-2025/CVE-2025-211xx/CVE-2025-21111.json | 56 ++ README.md | 94 +-- _state.csv | 709 ++++++++++---------- 160 files changed, 10633 insertions(+), 1182 deletions(-) create mode 100644 CVE-2023/CVE-2023-356xx/CVE-2023-35685.json create mode 100644 CVE-2024/CVE-2024-131xx/CVE-2024-13187.json create mode 100644 CVE-2024/CVE-2024-514xx/CVE-2024-51442.json create mode 100644 CVE-2024/CVE-2024-554xx/CVE-2024-55459.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56770.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56771.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56772.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56773.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56774.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56775.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56776.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56777.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56778.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56779.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56780.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56781.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56782.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56783.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56784.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56785.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56786.json create mode 100644 CVE-2024/CVE-2024-567xx/CVE-2024-56787.json create mode 100644 CVE-2024/CVE-2024-63xx/CVE-2024-6350.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20166.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20167.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20168.json create mode 100644 CVE-2025/CVE-2025-211xx/CVE-2025-21111.json diff --git a/CVE-2018/CVE-2018-43xx/CVE-2018-4301.json b/CVE-2018/CVE-2018-43xx/CVE-2018-4301.json index 7567c6b9d0c..fb896bbd216 100644 --- a/CVE-2018/CVE-2018-43xx/CVE-2018-4301.json +++ b/CVE-2018/CVE-2018-43xx/CVE-2018-4301.json @@ -2,16 +2,55 @@ "id": "CVE-2018-4301", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-08T00:15:24.030", - "lastModified": "2025-01-08T00:15:24.030", + "lastModified": "2025-01-08T18:15:12.493", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue is fixed in SCSSU-201801. A potential stack based buffer overflow existed in GemaltoKeyHandle.cpp." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 en SCSSU-201801. Exist\u00eda un posible desbordamiento de b\u00fafer basado en pila en GemaltoKeyHandle.cpp." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://smartcardservices.github.io/security/", diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46965.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46965.json index f4190107503..0d65558c31d 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46965.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46965.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46965", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-27T19:04:07.087", - "lastModified": "2024-11-21T06:35:02.837", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:16:07.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mtd: physmap: physmap-bt1-rom: corrige el acceso involuntario a la pila. Transmite &data a (char *) para evitar el acceso involuntario a la pila. Tenga en cuenta que los datos son de tipo u32, por lo que cualquier incremento en &data ser\u00e1 del orden de fragmentos de 4 bytes, y este fragmento de c\u00f3digo en realidad est\u00e1 destinado a ser un desplazamiento de bytes. Direcciones-Coverity-ID: 1497765 (\"Acceso fuera de l\u00edmites\")" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.10.36", + "matchCriteriaId": "A3C0C655-F217-444C-9131-45D82FAF3CFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.20", + "matchCriteriaId": "EEC03413-9760-46D4-AC1D-EB084A1D4111" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.3", + "matchCriteriaId": "F9D6B2DE-7E4A-4B3B-9AEE-3A2C5F23DA32" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/34ec706bf0b7c4ca249a729c1bcb91f706c7a7be", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4d786870e3262ec098a3b4ed10b895176bc66ecb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4e4ebb827bf09311469ffd9d0c14ed40ed9747aa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/683313993dbe1651c7aa00bb42a041d70e914925", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/34ec706bf0b7c4ca249a729c1bcb91f706c7a7be", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4d786870e3262ec098a3b4ed10b895176bc66ecb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4e4ebb827bf09311469ffd9d0c14ed40ed9747aa", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/683313993dbe1651c7aa00bb42a041d70e914925", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46969.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46969.json index 425d639800b..f9fddbe626d 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46969.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46969.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46969", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-27T19:04:07.260", - "lastModified": "2024-11-21T06:35:04.420", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:19:50.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,89 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bus: mhi: core: corrige el error no v\u00e1lido que regresa en mhi_queue mhi_queue devuelve un error cuando no se puede acceder al timbre en el estado actual. Esto puede suceder cuando el dispositivo no est\u00e1 en un estado M0, como M3, y es necesario activarlo antes de llamar a la base de datos. Este caso se gestiona anteriormente activando una salida asincr\u00f3nica de M3 a trav\u00e9s de devoluciones de llamada de reanudaci\u00f3n/suspensi\u00f3n del controlador, que a su vez provocar\u00e1 la transici\u00f3n de M0 y la actualizaci\u00f3n de la base de datos. Entonces, dado que no es un error sino simplemente un retraso en la actualizaci\u00f3n del timbre, no hay raz\u00f3n para devolver un error. Esto tambi\u00e9n corrige un error de uso despu\u00e9s de la liberaci\u00f3n para el caso de skb; de hecho, una persona que llama al skb en cola intentar\u00e1 liberar el skb si la cola falla, pero en ese caso la cola ya se realiz\u00f3." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.3", + "matchCriteriaId": "F9D6B2DE-7E4A-4B3B-9AEE-3A2C5F23DA32" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0ecc1c70dcd32c0f081b173a1a5d89952686f271", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a99b661c3187365f81026d89b1133a76cd2652b3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0ecc1c70dcd32c0f081b173a1a5d89952686f271", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a99b661c3187365f81026d89b1133a76cd2652b3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46970.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46970.json index c31de2a6bfb..a8887bb9980 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46970.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46970.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46970", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-27T19:04:07.303", - "lastModified": "2024-11-21T06:35:04.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:22:48.013", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,110 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bus: mhi: pci_generic: Eliminar el indicador WQ_MEM_RECLAIM de la cola de trabajo de estado Un cambio reciente cre\u00f3 una cola de trabajo dedicada para el trabajo de cambio de estado con los indicadores WQ_HIGHPRI (sin ninguna raz\u00f3n importante para ello) y WQ_MEM_RECLAIM. pero el trabajo de cambio de estado (mhi_pm_st_worker) no garantiza el progreso hacia adelante bajo presi\u00f3n de la memoria, e incluso esperar\u00e1 varias asignaciones de memoria cuando, por ejemplo, se crean dispositivos, se carga firmware, etc... El trabajo entonces no forma parte de una ruta de recuperaci\u00f3n de memoria. .. Adem\u00e1s, esto provoca una advertencia en check_flush_dependency() ya que terminamos en un c\u00f3digo que vac\u00eda una cola de trabajo que no es de recuperaci\u00f3n: [ 40.969601] cola de trabajo: WQ_MEM_RECLAIM mhi_hiprio_wq:mhi_pm_st_worker [mhi] est\u00e1 descargando !WQ_MEM_RECLAIM events_highpri:flush_backlog [ 40.969612] ADVERTENCIA : CPU: 4 PID: 158 en kernel/workqueue.c:2607 check_flush_dependency+0x11c/0x140 [40.969733] Seguimiento de llamadas: [40.969740] __flush_work+0x97/0x1d0 [40.969745]? proceso_despertador+0x15/0x20 [40.969749]? insertar_trabajo+0x70/0x80 [40.969750]? __queue_work+0x14a/0x3e0 [ 40.969753] Flush_work+0x10/0x20 [ 40.969756] rollback_registered_many+0x1c9/0x510 [ 40.969759] unregister_netdevice_queue+0x94/0x120 [ 40.969761] anular el registro _netdev+0x1d/0x30 [ 40.969765] mhi_net_remove+0x1a/0x40 [mhi_net] [ 40.969770 ] mhi_driver_remove+0x124/0x250 [mhi] [ 40.969776] dispositivo_release_driver_internal+0xf0/0x1d0 [ 40.969778] dispositivo_release_driver+0x12/0x20 [ 40.969782] bus_remove_device+0xe1/0x150 [ 40.9 69786] dispositivo_del+0x17b/0x3e0 [ 40.969791] mhi_destroy_device+0x9a/0x100 [ mhi] [40.969796]? mhi_unmap_single_use_bb+0x50/0x50 [mhi] [ 40.969799] dispositivo_para_cada_ni\u00f1o+0x5e/0xa0 [ 40.969804] mhi_pm_st_worker+0x921/0xf50 [mhi]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.20", + "matchCriteriaId": "EEC03413-9760-46D4-AC1D-EB084A1D4111" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.3", + "matchCriteriaId": "F9D6B2DE-7E4A-4B3B-9AEE-3A2C5F23DA32" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0fccbf0a3b690b162f53b13ed8bc442ea33437dc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/abd1510c08a13c88d24b622a83c82e87ff1d3135", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ed541cff35cbdb695f0c98ef506dd7218883fc07", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0fccbf0a3b690b162f53b13ed8bc442ea33437dc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/abd1510c08a13c88d24b622a83c82e87ff1d3135", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ed541cff35cbdb695f0c98ef506dd7218883fc07", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46971.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46971.json index 5256e9f5605..b3fd999f987 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46971.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46971.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46971", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-27T19:04:07.343", - "lastModified": "2024-11-21T06:35:04.757", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:26:07.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,152 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: perf/core: corrige la llamada incondicional a security_locked_down() Actualmente, el estado de bloqueo se consulta incondicionalmente, aunque su resultado se usa solo si el bit PERF_SAMPLE_REGS_INTR est\u00e1 establecido en attr.sample_type. Si bien eso no importa en el caso del Lockdown LSM, causa problemas con la implementaci\u00f3n del gancho de bloqueo de SELinux. SELinux implementa el gancho lock_down comprobando si el tipo de tarea actual tiene el correspondiente permiso de clase de \"bloqueo\" (\"integridad\" o \"confidencialidad\") permitido en la pol\u00edtica. Esto significa que llamar al enlace cuando se ignorar\u00eda la decisi\u00f3n de control de acceso genera una verificaci\u00f3n de permisos y un registro de auditor\u00eda falsos. Solucione este problema verificando sample_type primero y solo llamando al gancho cuando se respete su resultado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4", + "versionEndExcluding": "5.4.117", + "matchCriteriaId": "4363F793-1288-4880-BF20-479612C7CA60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.35", + "matchCriteriaId": "4CF5C6B5-56F0-4FA4-8D35-E62F982951FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.19", + "matchCriteriaId": "491D6D53-3D80-40F9-8458-A0B83CCE0F64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.2", + "matchCriteriaId": "CD9444EF-C1C3-4896-897A-2F3A4C436567" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/08ef1af4de5fe7de9c6d69f1e22e51b66e385d9b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4348d3b5027bc3ff6336368b6c60605d4ef8e1ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b246759284d6a2bc5b6f1009caeeb3abce2ec9ff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c7b0208ee370b89d20486fae71cd9abb759819c1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f5809ca4c311b71bfaba6d13f4e39eab0557895e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/08ef1af4de5fe7de9c6d69f1e22e51b66e385d9b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4348d3b5027bc3ff6336368b6c60605d4ef8e1ce", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b246759284d6a2bc5b6f1009caeeb3abce2ec9ff", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c7b0208ee370b89d20486fae71cd9abb759819c1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f5809ca4c311b71bfaba6d13f4e39eab0557895e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46972.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46972.json index b9fd912a9a6..35912bc84ea 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46972.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46972.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46972", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-27T19:04:07.403", - "lastModified": "2024-11-21T06:35:04.997", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:30:28.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ovl: corrige la dentry filtrada Desde el commit 6815f479ca90 (\"ovl: usa solo el estado de metacopia superior en ovl_lookup()\"), overlayfs no coloca la dentry temporal cuando hay un error de metacopia, lo que conduce a fugas de dentry al cerrar el superbloque relacionado: overlayfs: se niega a seguir el origen de la metacopia para (/file0)... ERROR: Dentry (____ptrval____){i=3f33,n=file3} todav\u00eda est\u00e1 en uso (1) [desmontaje de superposici\u00f3n superpuesta]... ADVERTENCIA: CPU: 1 PID: 432 en umount_check.cold+0x107/0x14d CPU: 1 PID: 432 Comm: unmount-overlay No contaminado 5.12.0-rc5 #1... RIP: 0010:umount_check .cold+0x107/0x14d... Seguimiento de llamadas: d_walk+0x28c/0x950 ? dentry_lru_isolate+0x2b0/0x2b0? __kasan_slab_free+0x12/0x20 do_one_tree+0x33/0x60 encogimiento_dcache_for_umount+0x78/0x1d0 generic_shutdown_super+0x70/0x440 kill_anon_super+0x3e/0x70 deactivate_locked_super+0xc4/0x160 deactivate_super+0xfa/0x140 clean up_mnt+0x22e/0x370 __cleanup_mnt+0x1a/0x30 task_work_run+0x139/0x210 do_exit+0xb0c/0x2820? __kasan_check_read+0x1d/0x30 ? find_held_lock+0x35/0x160? lock_release+0x1b6/0x660? mm_update_next_owner+0xa20/0xa20? \u00bfreaquirir_held_locks+0x3f0/0x3f0? __sanitizer_cov_trace_const_cmp4+0x22/0x30 do_group_exit+0x135/0x380 __do_sys_exit_group.isra.0+0x20/0x20 __x64_sys_exit_group+0x3c/0x50 do_syscall_64+0x45/0x70 entrada_SYSCALL_64 _after_hwframe+0x44/0xae... VFS: Inodos ocupados despu\u00e9s de desmontar la superposici\u00f3n. Autodestrucci\u00f3n en 5 segundos. Que tengas un buen d\u00eda... Esta soluci\u00f3n ha sido probada con un reproductor syzkaller." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.8", + "versionEndExcluding": "5.10.35", + "matchCriteriaId": "460C9D63-8799-4FD7-B512-6CE6409FED25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.19", + "matchCriteriaId": "491D6D53-3D80-40F9-8458-A0B83CCE0F64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.2", + "matchCriteriaId": "CD9444EF-C1C3-4896-897A-2F3A4C436567" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/71d58457a8afc650da5d3292a7f7029317654d95", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cf3e3330bc5719fa9d658e3e2f596bde89344a94", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d587cfaef72b1b6f4b2774827123bce91f497cc8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eaab1d45cdb4bb0c846bd23c3d666d5b90af7b41", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/71d58457a8afc650da5d3292a7f7029317654d95", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cf3e3330bc5719fa9d658e3e2f596bde89344a94", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d587cfaef72b1b6f4b2774827123bce91f497cc8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eaab1d45cdb4bb0c846bd23c3d666d5b90af7b41", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46977.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46977.json index 939b86b0aa9..eda06f12020 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46977.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46977.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46977", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:37.140", - "lastModified": "2024-11-21T06:35:05.900", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:34:32.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,136 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: KVM: VMX: deshabilite la preferencia al sondear los MSR devueltos por el usuario. Deshabilite la preferencia al sondear el MSR devuelto por un usuario a trav\u00e9s de RDSMR/WRMSR. Si MSR tiene un valor diferente por CPU l\u00f3gica, WRMSR podr\u00eda da\u00f1ar el valor del host si KVM se adelanta entre RDMSR y WRMSR y luego se reprograma en una CPU diferente. De manera oportunista, coloque el asistente en x86 com\u00fan, SVM usar\u00e1 el asistente en una confirmaci\u00f3n futura." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.38", + "matchCriteriaId": "2BB4E5E8-4AAD-475A-A1B9-F287254C7D72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.22", + "matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.5", + "matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/31f29749ee970c251b3a7e5b914108425940d089", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5104d7ffcf24749939bea7fdb5378d186473f890", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5adcdeb57007ccf8ab7ac20bf787ffb6fafb1a94", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e3ea1895df719c4ef87862501bb10d95f4177bed", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/31f29749ee970c251b3a7e5b914108425940d089", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5104d7ffcf24749939bea7fdb5378d186473f890", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5adcdeb57007ccf8ab7ac20bf787ffb6fafb1a94", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e3ea1895df719c4ef87862501bb10d95f4177bed", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46999.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46999.json index 45ef7c5eb85..28c1b256504 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46999.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46999.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46999", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:38.130", - "lastModified": "2024-11-21T06:35:09.490", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:36:29.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,55 +15,173 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sctp: haga una actualizaci\u00f3n anterior en sctp_sf_do_dupcook_a Hay un p\u00e1nico que ocurre en algunos de los entornos, el seguimiento de la llamada es el siguiente: [] falla de protecci\u00f3n general, ... 0x29acd70f1000a: 0000 [#1] SMP PTI [] RIP: 0010:sctp_ulpevent_notify_peer_addr_change+0x4b/0x1fa [sctp] [] sctp_assoc_control_transport+0x1b9/0x210 [sctp] [] sctp_do_8_2_transport_strike.isra.16+0x15c/0x220 [sctp] [] sctp_cmd_interpreter.isra. 21+0x1231/0x1a10 [sctp] [] sctp_do_sm+0xc3/0x2a0 [sctp] [] sctp_generate_timeout_event+0x81/0xf0 [sctp] Esto se debe a un problema de use-after-free del transporte. Al procesar un fragmento COOKIE-ECHO duplicado en sctp_sf_do_dupcook_a(), tanto los fragmentos COOKIE-ACK como SHUTDOWN se asignan con el transort del nuevo asoc. Sin embargo, m\u00e1s adelante en la m\u00e1quina de efectos secundarios, el antiguo asoc se utiliza para enviarlos y el Shutdown_last_sent_to del antiguo asoc se configura en el transporte al que se adjunt\u00f3 el fragmento SHUTDOWN en sctp_cmd_setup_t2(), que en realidad pertenece al nuevo asoc. Despu\u00e9s de que se libera el new_asoc y se agota el tiempo de espera T2 del antiguo asoc, se acceder\u00e1 al Shutdown_last_sent_to del antiguo asoc que ya est\u00e1 liberado en sctp_sf_t2_timer_expire(). Gracias Alexander y Jere por ayudarnos a profundizar en este problema. Para solucionarlo, este parche consiste en realizar primero la actualizaci\u00f3n de asoc y luego asignar los fragmentos COOKIE-ACK y SHUTDOWN con el antiguo asoc 'actualizado'. Esto tendr\u00eda m\u00e1s sentido, ya que un fragmento de una asoc no deber\u00eda enviarse con otra asoc. Hemos solucionado bastantes problemas causados por esto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.123", + "versionEndExcluding": "4.19.191", + "matchCriteriaId": "D20BDA16-5AB8-4904-BD6D-95AA2838AC18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.41", + "versionEndExcluding": "5.4.120", + "matchCriteriaId": "D251349F-754D-42A1-9056-739E6B415320" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.7", + "versionEndExcluding": "5.10.38", + "matchCriteriaId": "4EC70BEE-8480-4726-B12A-17BED681CD70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.22", + "matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.5", + "matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0bfd913c2121b3d553bfd52810fe6061d542d625", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/35b4f24415c854cd718ccdf38dbea6297f010aae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/61b877bad9bb0d82b7d8841be50872557090a704", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b1b31948c0af44628e43353828453461bb74098f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d624f2991b977821375fbd56c91b0c91d456a697", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f01988ecf3654f805282dce2d3bb9afe68d2691e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0bfd913c2121b3d553bfd52810fe6061d542d625", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/35b4f24415c854cd718ccdf38dbea6297f010aae", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/61b877bad9bb0d82b7d8841be50872557090a704", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b1b31948c0af44628e43353828453461bb74098f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d624f2991b977821375fbd56c91b0c91d456a697", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f01988ecf3654f805282dce2d3bb9afe68d2691e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47001.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47001.json index d496f7887bd..0edf4c370e7 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47001.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47001.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47001", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:38.213", - "lastModified": "2024-11-21T06:35:09.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:38:47.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,131 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: xprtrdma: corrige el orden de actualizaci\u00f3n de cwnd Despu\u00e9s de una reconexi\u00f3n, el controlador de respuesta abre cwnd (y as\u00ed permite que se env\u00eden m\u00e1s llamadas RPC) /antes/ rpcrdma_post_recvs() puede publicar suficiente recepci\u00f3n WR para recibir sus respuestas. Esto provoca un RNR y la nueva conexi\u00f3n se pierde inmediatamente. La ejecuci\u00f3n se expone m\u00e1s claramente cuando KASAN y la inyecci\u00f3n de desconexi\u00f3n est\u00e1n habilitados. Esto ralentiza rpcrdma_rep_create() lo suficiente como para permitir que el lado de env\u00edo publique un mont\u00f3n de llamadas RPC antes de que el controlador de finalizaci\u00f3n de recepci\u00f3n pueda invocar ib_post_recv()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.38", + "matchCriteriaId": "2BB4E5E8-4AAD-475A-A1B9-F287254C7D72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.22", + "matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.5", + "matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/19b5fa9489b5706bc878c3a522a7f771079e2fa0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/35d8b10a25884050bb3b0149b62c3818ec59f77c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8834ecb5df22b7ff3c9b0deba7726579bb613f95", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eddae8be7944096419c2ae29477a45f767d0fcd4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/19b5fa9489b5706bc878c3a522a7f771079e2fa0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/35d8b10a25884050bb3b0149b62c3818ec59f77c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8834ecb5df22b7ff3c9b0deba7726579bb613f95", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eddae8be7944096419c2ae29477a45f767d0fcd4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47004.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47004.json index 75b59ce1b00..6eed711a310 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47004.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47004.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47004", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:38.353", - "lastModified": "2024-11-21T06:35:10.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:43:50.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: correcci\u00f3n para evitar tocar datos con puntos de control en get_victim() En el modo de desactivaci\u00f3n de CP, hay dos problemas al usar LFS o SSR | Modo AT_SSR para seleccionar a la v\u00edctima: 1. LFS est\u00e1 configurado para buscar la secci\u00f3n de origen durante la GC, la v\u00edctima no debe tener datos de puntos de control, ya que despu\u00e9s de la GC, la secci\u00f3n no se puede liberar para su reutilizaci\u00f3n. Anteriormente, solo verific\u00e1bamos los bloques chpt v\u00e1lidos en el segmento actual en lugar de en la secci\u00f3n, lo arreglamos. 2. RSS | AT_SSR est\u00e1 configurado para encontrar un segmento de destino para escrituras que se puede llenar completamente con bloques reci\u00e9n escritos y con puntos de control. Nunca debemos seleccionar dicho segmento; de lo contrario, puede causar p\u00e1nico o corrupci\u00f3n de datos durante la asignaci\u00f3n. El caso potencial se describe a continuaci\u00f3n: a) segmento de destino tiene 'n' (n < 512) ckpt bloques v\u00e1lidos b) GC migra 'n' bloques v\u00e1lidos a otro segmento (el segmento todav\u00eda est\u00e1 en la lista sucia) c) GC migra '512 - n' bloques al segmento objetivo (el segmento tiene 'n ' cp_vblocks y '512 - n' vblocks) d) Si GC selecciona el segmento de destino mediante el asignador {AT,}SSR, sin embargo, no hay espacio libre en el segmento de destino." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.10.38", + "matchCriteriaId": "7B942F1E-8607-4DB5-90A9-F497E0DCFF88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.22", + "matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.5", + "matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/105155a8146ddb54c119d8318964eef3859d109d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1e116f87825f01a6380286472196882746b16f63", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/211372b2571520e394b56b431a0705586013b3ff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/61461fc921b756ae16e64243f72af2bfc2e620db", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/105155a8146ddb54c119d8318964eef3859d109d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1e116f87825f01a6380286472196882746b16f63", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/211372b2571520e394b56b431a0705586013b3ff", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/61461fc921b756ae16e64243f72af2bfc2e620db", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47007.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47007.json index 584cf11f655..c03c58fdb6e 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47007.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47007.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47007", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:38.507", - "lastModified": "2024-11-21T06:35:10.633", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:58:51.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: corrige el p\u00e1nico durante f2fs_resize_fs() f2fs_resize_fs() se bloquea en la pila de llamadas debajo con el caso de prueba: - imagen mkfs de 16 GB y montaje de imagen - dd archivo A de 8 GB - agrega archivo B de 8 GB - sincronizaci\u00f3n - archivo rm A - sincronizaci\u00f3n - cambiar el tama\u00f1o del sistema de archivos al kernel de 8 GB \u00a1ERROR en segment.c:2484! Seguimiento de llamadas: allocate_segment_by_default+0x92/0xf0 [f2fs] f2fs_allocate_data_block+0x44b/0x7e0 [f2fs] do_write_page+0x5a/0x110 [f2fs] f2fs_outplace_write_data+0x55/0x100 [f2fs] f2fs_do_write_data_page +0x392/0x850 [f2fs] mover_p\u00e1gina_datos+0x233/0x320 [f2fs] ] do_garbage_collect+0x14d9/0x1660 [f2fs] free_segment_range+0x1f7/0x310 [f2fs] f2fs_resize_fs+0x118/0x330 [f2fs] __f2fs_ioctl+0x487/0x3680 [f2fs] __x64_sys_ioct l+0x8e/0xd0 do_syscall_64+0x33/0x80 Entry_SYSCALL_64_after_hwframe+0x44/0xa9 La ra\u00edz Porque olvidamos verificar si tenemos suficiente espacio en el sistema de archivos redimensionado para almacenar todos los bloques v\u00e1lidos en el sistema de archivos antes de cambiar el tama\u00f1o, entonces el asignador se quedar\u00e1 sin espacio durante la migraci\u00f3n de bloques en free_segment_range()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.8", + "versionEndExcluding": "5.10.38", + "matchCriteriaId": "48EEEAD2-D08A-422C-8830-6CCF86E89E64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.22", + "matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.5", + "matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1c20a4896409f5ca1c770e1880c33d0a28a8b10f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3ab0598e6d860ef49d029943ba80f627c15c15d6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/822054e5026c43b1dd60cf387dd999e95ee2ecc2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/860afd680d9cc1dabd61cda3cd246f60aa1eb705", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1c20a4896409f5ca1c770e1880c33d0a28a8b10f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3ab0598e6d860ef49d029943ba80f627c15c15d6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/822054e5026c43b1dd60cf387dd999e95ee2ecc2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/860afd680d9cc1dabd61cda3cd246f60aa1eb705", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47011.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47011.json index 195e927a5d5..f5671074b52 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47011.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47011.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47011", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:38.703", - "lastModified": "2024-11-21T06:35:11.193", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:02:38.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: memcontrol: slab: fix obtener una referencia a una serie de parches de liberaci\u00f3n de memcg \"Utilice las API de obj_cgroup para cargar p\u00e1ginas kmem\", v5. Desde que se aplic\u00f3 la serie de Roman \"El nuevo controlador de memoria losa de cgroup\". Todos los objetos de losa se cargan con las nuevas API de obj_cgroup. Las nuevas API introducen una estructura obj_cgroup para cargar objetos de losa. Evita que los objetos de larga duraci\u00f3n fijen el grupo de memoria original en la memoria. Pero todav\u00eda hay algunos objetos de esquina (por ejemplo, asignaciones mayores que la p\u00e1gina de pedido 1 en SLUB) que no se cargan con las nuevas API. Esos objetos (incluidas las p\u00e1ginas que se asignan directamente desde el asignador de amigos) se cargan como p\u00e1ginas kmem que a\u00fan contienen una referencia al grupo de memoria. Por ejemplo, sabemos que la pila del kernel se carga como p\u00e1ginas kmem porque el tama\u00f1o de la pila del kernel puede ser mayor que 2 p\u00e1ginas (por ejemplo, 16 KB en x86_64 o arm64). Si creamos un subproceso (supongamos que la pila de subprocesos se carga en el grupo c de memoria A) y luego lo movemos del grupo c de memoria A al grupo c de memoria B. Porque la pila del n\u00facleo del subproceso contiene una referencia al grupo c de memoria A. El hilo puede anclar la memoria cgroup A en la memoria incluso si eliminamos el cgroup A. Si queremos ver este escenario usando el siguiente script. Podemos ver que el sistema ha agregado 500 cgroups moribundos (esto no es un problema del mundo real, solo un script para mostrar que los kmallocs grandes se cargan como p\u00e1ginas kmem que pueden fijar el cgroup de memoria en la memoria). #!/bin/bash cat /proc/cgroups | grep memoria cd /sys/fs/cgroup/memory echo 1 > memoria.move_charge_at_immigrate para i en el rango{1..500} hacer mkdir kmem_test echo $$ > kmem_test/cgroup.procs sleep 3600 & echo $$ > cgroup.procs echo `cat kmem_test/cgroup.procs` > cgroup.procs rmdir kmem_test hecho cat /proc/cgroups | grep memoria Este conjunto de parches tiene como objetivo hacer que esas p\u00e1ginas kmem eliminen la referencia a la memoria cgroup mediante el uso de las API de obj_cgroup. Finalmente, podemos ver que el n\u00famero de cgroups moribundos no aumentar\u00e1 si ejecutamos el script de prueba anterior. Este parche (de 7): rcu_read_lock/unlock solo puede garantizar que el memcg no se libere, pero no puede garantizar el \u00e9xito de css_get (que est\u00e1 en refill_stock cuando se cambia el memcg en cach\u00e9) a memcg. rcu_read_lock() memcg = obj_cgroup_memcg(old) __memcg_kmem_uncharge(memcg) refill_stock(memcg) if (stock->cached != memcg) // css_get puede cambiar el contador de referencia de 0 a 1. css_get(&memcg->css) rcu_read_unlock( ) Esta soluci\u00f3n es muy parecida a el commit: eefbfa7fd678 (\"mm: memcg/slab: fix use after free in obj_cgroup_charge\") Solucione este problema manteniendo una referencia al memcg que se pasa a __memcg_kmem_uncharge() antes de llamar a __memcg_kmem_uncharge()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.11", + "versionEndExcluding": "5.10.37", + "matchCriteriaId": "EDC4144D-717D-43A1-8F8D-FE6FC95AF795" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.21", + "matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.4", + "matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/31df8bc4d3feca9f9c6b2cd06fd64a111ae1a0e6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/89b1ed358e01e1b0417f5d3b0082359a23355552", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9f38f03ae8d5f57371b71aa6b4275765b65454fd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c3ae6a3f3ca4f02f6ccddf213c027302586580d0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/31df8bc4d3feca9f9c6b2cd06fd64a111ae1a0e6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/89b1ed358e01e1b0417f5d3b0082359a23355552", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9f38f03ae8d5f57371b71aa6b4275765b65454fd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c3ae6a3f3ca4f02f6ccddf213c027302586580d0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47014.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47014.json index c2bbdf5cf58..5884216dc4e 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47014.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47014.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47014", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:38.860", - "lastModified": "2024-11-21T06:35:11.560", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:08:16.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/sched: act_ct: corrige el acceso salvaje a la memoria al borrar fragmentos mientras se prueba el reensamblaje/refragmentaci\u00f3n usando act_ct, es posible observar un bloqueo como el siguiente: KASAN: tal vez acceso a memoria salvaje en el rango [0x0001000000000448-0x000100000000044f] CPU: 50 PID: 0 Comunicaciones: swapper/50 Tainted: GS 5.12.0-rc7+ #424 Nombre de hardware: Dell Inc. PowerEdge R730/072T6D, BIOS 2.4.3 01 /17/2017 RIP: 0010:inet_frag_rbtree_purge+0x50/0xc0 C\u00f3digo: 00 fc ff df 48 89 c3 31 ed 48 89 df e8 a9 7a 38 ff 4c 89 fe 48 89 df 49 89 c6 e8 5b 3a 38 ff 48 8d 7b 40 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 75 59 48 8d bb d0 00 00 00 4c 8b 6b 40 48 89 f8 48 RSP: 0018:ffff888c31449db8 EFLAGS: 00010203 RAX: 00 00200000000089 RBX: 000100000000040e RCX: ffffffff989eb960 RDX: 0000000000000140 RSI: ffffffff97cfb977 RDI: 000100000000044e RBP: 0000000000000900 R08: 00000000000000000 R09: ffffed1186289350 R10: 00000000 00000003 R11: ffffed1186289350 R12: dffffc0000000000 R13: 000100000000040e R14: 00000000000000000 R15: ffff888155e02160 FS: 00000000000000000 (0000) GS:ffff888c31440000(0000) knlGS:0000000000000000 CS : 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005600cb70a5b8 CR3: 0000000a2c014005 CR4: 00000000003706e0 DR0: 0000000000000000 DR1: 0 000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 00000000000000400 Seguimiento de llamadas: inet_frag_destroy+0xa9/0x150 call_timer_fn +0x2d/0x180 run_timer_softirq+0x4fe/0xe70 __do_softirq+0x197/0x5a0 irq_exit_rcu+0x1de/0x200 sysvec_apic_timer_interrupt+0x6b/0x80 cuando act_ct almacena temporalmente un fragmento de IP, la restauraci\u00f3n de skb qdisc cb da como resultado la colocaci\u00f3n de datos aleatorios en FR AG_CB() , y esto provoca esos accesos a la memoria \"salvajes\" m\u00e1s adelante, cuando se purga el rbtree. Nunca sobrescriba el skb cb en caso de que tcf_ct_handle_fragments() devuelva -EINPROGRESS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.8", + "versionEndExcluding": "5.12.4", + "matchCriteriaId": "B83B558B-3437-4078-802C-F4C861C91D63" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0648941f4c8bbf8b4b6c0b270889ae7aa769b921", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f77bd544a6bbe69aa50d9ed09f13494cf36ff806", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0648941f4c8bbf8b4b6c0b270889ae7aa769b921", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f77bd544a6bbe69aa50d9ed09f13494cf36ff806", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47015.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47015.json index edfb171d69b..86185c4bc7a 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47015.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47015.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47015", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:38.913", - "lastModified": "2024-11-21T06:35:11.660", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:12:23.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,152 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bnxt_en: corrige la l\u00f3gica del \u00edndice del consumidor RX en la ruta del error. En bnxt_rx_pkt(), se espera que los buffers RX se completen en orden. Si el \u00edndice del consumidor RX indica que el b\u00fafer est\u00e1 fuera de servicio, significa que estamos sufriendo un error de hardware y el controlador cancelar\u00e1 todos los paquetes RX restantes y restablecer\u00e1 el anillo RX. El \u00edndice de consumidores RX que pasamos a bnxt_discard_rx() no es correcto. Deber\u00edamos pasar el \u00edndice actual (tmp_raw_cons) en lugar del \u00edndice anterior (raw_cons). Este error puede hacer que estemos en el \u00edndice incorrecto al intentar abortar el siguiente paquete RX. Puede fallar as\u00ed: #0 [ffff9bbcdf5c39a8] machine_kexec en ffffffff9b05e007 #1 [ffff9bbcdf5c3a00] __crash_kexec en ffffffff9b111232 #2 [ffff9bbcdf5c3ad0] p\u00e1nico en ffffffff9b07d61e #3 [ffff9bbcdf5c3b50 ] oops_end en ffffffff9b030978 #4 [ffff9bbcdf5c3b78] no_context en ffffffff9b06aaf0 #5 [ffff9bbcdf5c3bd8 ] __bad_area_nosemaphore en ffffffff9b06ae2e #6 [ffff9bbcdf5c3c28] bad_area_nosemaphore en ffffffff9b06af24 #7 [ffff9bbcdf5c3c38] __do_page_fault en ffffffff9b06b67e #8 [ffff9bbcdf5c3cb0] do_page_fault en ffffffff9b06bb12 #9 [ffff9bbcdf5c3ce0] page_fault en ffffffff9bc015c5 [excepci\u00f3n RIP: bnxt_rx_pkt+237] RIP: ffffffffc0259cdd RSP: ffff9bbcdf5c3d98 RFLAGS: 00010213 RAX: 000000005dd8097f RBX: ffff9ba4cb11b7e0 RCX: ffffa923cf6e9000 RDX: 0000000000000fff RSI: 0000000000000627 RDI: 0000000000000100 0 RBP: ffff9bbcdf5c3e60 R8: 0000000000420003 R9: 000000000000020d R10: ffffa923cf6ec138 R11: ffff9bbcdf5c3e83 R12: ffff9ba4d6f928c0 R13: ffff9ba4cac28080 R14: ffff9ba4cb11b7f0 R15: ffff9ba4d5a30000 ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "5.4.119", + "matchCriteriaId": "3CAD77FE-8526-497E-BC33-C8E0B087BFB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.37", + "matchCriteriaId": "7A4CF5D6-ACBA-4980-ABFD-3D7A53B5BB4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.21", + "matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.4", + "matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3fbc5bc651d688fbea2a59cdc91520a2f5334d0a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4fcaad2b7dac3f16704f8118c7e481024ddbd3ed", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b1523e4ba293b2a32d9fabaf70c1dcaa6e3e2847", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bbd6f0a948139970f4a615dff189d9a503681a39", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e187ef83c04a5d23e68d39cfdff1a1931e29890c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3fbc5bc651d688fbea2a59cdc91520a2f5334d0a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4fcaad2b7dac3f16704f8118c7e481024ddbd3ed", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b1523e4ba293b2a32d9fabaf70c1dcaa6e3e2847", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bbd6f0a948139970f4a615dff189d9a503681a39", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e187ef83c04a5d23e68d39cfdff1a1931e29890c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47019.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47019.json index f9c92642c6f..72ef39d3f40 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47019.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47019.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47019", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:39.053", - "lastModified": "2024-11-21T06:35:12.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:01:03.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mt76: mt7921: corrige un posible acceso no v\u00e1lido al registro. Deshabilite la interrupci\u00f3n y la sincronizaci\u00f3n de los controladores irq pendientes para garantizar que el tasklet irq no se programe despu\u00e9s de la suspensi\u00f3n para evitar el posible acceso no v\u00e1lido al registro. act\u00faa cuando el controlador pcie del host est\u00e1 suspendido. [17932.910534] mt7921e 0000:01:00.0: pci_pm_suspend+0x0/0x22c devolvi\u00f3 0 despu\u00e9s de 21375 usos [17932.910590] pcieport 0000:00:00.0: llamando a pci_pm_suspend+0x0/0x22c @ 18565, padre: pci0000:00 [17932.910602] pcieport 0000: 00:00.0: pci_pm_suspend+0x0/0x22c devolvi\u00f3 0 despu\u00e9s de 8 usos [17932.910671] mtk-pcie 11230000.pcie: llamando a platform_pm_suspend+0x0/0x60 @ 22783, padre: soc [17932.910674] mtk-pcie 11230 000.pcie: plataforma_pm_suspend+0x0/ 0x60 devolvi\u00f3 0 despu\u00e9s de 0 usos... 17933.615352] x1: 00000000000d4200 x0: ffffff8269ca2300 [17933.620666] Rastreo de llamadas: [17933.623127] mt76_mmio_rr+0x28/0xf0 [mt76] [1 7933.627234] mt7921_rr+0x38/0x44 [mt7921e] [17933.631339] mt7921_irq_tasklet+ 0x54/0x1d8 [mt7921e] [17933.636309] tasklet_action_common+0x12c/0x16c [17933.640754] tasklet_action+0x24/0x2c [17933.644418] __do_softirq+0x16c/0x344 [17933.648 082] irq_exit+0xa8/0xac [17933.651224] planificador_ipi+0xd4/0x148 [17933.654890] handle_IPI +0x164/0x2d4 [17933.658379] gic_handle_irq+0x140/0x178 [17933.662216] el1_irq+0xb8/0x180 [17933.665361] cpuidle_enter_state+0xf8/0x204 [17933.669544] c puidle_enter+0x38/0x4c [17933.673122] do_idle+0x1a4/0x2a8 [17933.676352] cpu_startup_entry+0x24 /0x28 [17933.680276] rest_init+0xd4/0xe0 [17933.683508] arch_call_rest_init+0x10/0x18 [17933.687606] start_kernel+0x340/0x3b4 [17933.691279] C\u00f3digo: aa0003f5 d5032 01f f953eaa8 8b344108 (b9400113) [17933.697373] ---[ final de seguimiento a24b8e26ffbda3c5 ]- -- [17933.767846] P\u00e1nico del kernel: no se sincroniza: excepci\u00f3n fatal en la interrupci\u00f3n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.4", + "matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/b13cbc536990ff609afa878b6211cd6f6265ba60", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe3fccde8870764ba3e60610774bd7bc9f8faeff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b13cbc536990ff609afa878b6211cd6f6265ba60", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe3fccde8870764ba3e60610774bd7bc9f8faeff", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-433xx/CVE-2022-43384.json b/CVE-2022/CVE-2022-433xx/CVE-2022-43384.json index 1b5aa9cb4e4..74ced6e16b2 100644 --- a/CVE-2022/CVE-2022-433xx/CVE-2022-43384.json +++ b/CVE-2022/CVE-2022-433xx/CVE-2022-43384.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43384", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-05-30T12:15:09.420", - "lastModified": "2024-11-21T07:26:22.690", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:25:10.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,22 +71,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.4.0", + "versionEndIncluding": "3.4.2", + "matchCriteriaId": "5E704943-929C-470A-AD69-3A652C4CCD99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_1:*:*:*:*:*:*", + "matchCriteriaId": "04A1A613-67C4-4980-A707-D43638F9108D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_2:*:*:*:*:*:*", + "matchCriteriaId": "00824D6B-F2FD-4E2B-A8E9-9552883D190C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_3:*:*:*:*:*:*", + "matchCriteriaId": "C0D15741-C6AD-45A9-A6C8-1848A51FC630" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_4:*:*:*:*:*:*", + "matchCriteriaId": "833812B2-9142-437C-8EF7-8B27D0AC4D39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_5:*:*:*:*:*:*", + "matchCriteriaId": "E6F2E6AB-3865-4CCD-96C6-55A0C9065EB8" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/238645", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7155215", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/238645", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7155215", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-435xx/CVE-2022-43575.json b/CVE-2022/CVE-2022-435xx/CVE-2022-43575.json index 449b21e5f78..75527b004ce 100644 --- a/CVE-2022/CVE-2022-435xx/CVE-2022-43575.json +++ b/CVE-2022/CVE-2022-435xx/CVE-2022-43575.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43575", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-05-30T12:15:09.750", - "lastModified": "2024-11-21T07:26:49.163", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:22:30.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,22 +71,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.4.0", + "versionEndIncluding": "3.4.2", + "matchCriteriaId": "5E704943-929C-470A-AD69-3A652C4CCD99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_1:*:*:*:*:*:*", + "matchCriteriaId": "04A1A613-67C4-4980-A707-D43638F9108D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_2:*:*:*:*:*:*", + "matchCriteriaId": "00824D6B-F2FD-4E2B-A8E9-9552883D190C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_3:*:*:*:*:*:*", + "matchCriteriaId": "C0D15741-C6AD-45A9-A6C8-1848A51FC630" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_4:*:*:*:*:*:*", + "matchCriteriaId": "833812B2-9142-437C-8EF7-8B27D0AC4D39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_5:*:*:*:*:*:*", + "matchCriteriaId": "E6F2E6AB-3865-4CCD-96C6-55A0C9065EB8" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/238680", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7155215", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/238680", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7155215", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-438xx/CVE-2022-43841.json b/CVE-2022/CVE-2022-438xx/CVE-2022-43841.json index 2dbc0c04221..acbc38718ef 100644 --- a/CVE-2022/CVE-2022-438xx/CVE-2022-43841.json +++ b/CVE-2022/CVE-2022-438xx/CVE-2022-43841.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43841", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-05-30T12:15:10.000", - "lastModified": "2024-11-21T07:27:15.813", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:13:14.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, @@ -49,24 +69,110 @@ "value": "CWE-525" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.4.0", + "versionEndIncluding": "3.4.2", + "matchCriteriaId": "5E704943-929C-470A-AD69-3A652C4CCD99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_1:*:*:*:*:*:*", + "matchCriteriaId": "04A1A613-67C4-4980-A707-D43638F9108D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_2:*:*:*:*:*:*", + "matchCriteriaId": "00824D6B-F2FD-4E2B-A8E9-9552883D190C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_3:*:*:*:*:*:*", + "matchCriteriaId": "C0D15741-C6AD-45A9-A6C8-1848A51FC630" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_4:*:*:*:*:*:*", + "matchCriteriaId": "833812B2-9142-437C-8EF7-8B27D0AC4D39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_5:*:*:*:*:*:*", + "matchCriteriaId": "E6F2E6AB-3865-4CCD-96C6-55A0C9065EB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_6:*:*:*:*:*:*", + "matchCriteriaId": "D16849BE-F970-45E9-AF1D-C60125D19AA1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_7:*:*:*:*:*:*", + "matchCriteriaId": "77AE8E47-A401-4461-9642-B02310DB425D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_8:*:*:*:*:*:*", + "matchCriteriaId": "84E045D4-E23B-4EB1-A5B1-D4AEEE109F2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_9:*:*:*:*:*:*", + "matchCriteriaId": "4880764E-A954-4EC6-8710-30212C60B609" + } + ] + } + ] } ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/239078", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7155202", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/239078", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7155202", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45185.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45185.json index e602a27552d..63ba20fb269 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45185.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45185.json @@ -2,16 +2,55 @@ "id": "CVE-2022-45185", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T20:15:28.173", - "lastModified": "2025-01-07T20:15:28.173", + "lastModified": "2025-01-08T18:15:13.847", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in SuiteCRM 7.12.7. Authenticated users can use CRM functions to upload malicious files. Then, deserialization can be used to achieve code execution." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en SuiteCRM 7.12.7. Los usuarios autenticados pueden usar funciones de CRM para cargar archivos maliciosos. Luego, se puede usar la deserializaci\u00f3n para lograr la ejecuci\u00f3n del c\u00f3digo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://docs.suitecrm.com/admin/releases/7.12.x/", @@ -24,6 +63,10 @@ { "url": "https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_SuiteCRM.py", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_SuiteCRM.py", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-460xx/CVE-2022-46088.json b/CVE-2022/CVE-2022-460xx/CVE-2022-46088.json index cfaa68c1c1f..777d9427548 100644 --- a/CVE-2022/CVE-2022-460xx/CVE-2022-46088.json +++ b/CVE-2022/CVE-2022-460xx/CVE-2022-46088.json @@ -2,8 +2,8 @@ "id": "CVE-2022-46088", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T16:15:49.190", - "lastModified": "2024-11-21T07:30:06.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:53:10.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_flight_booking_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9A53A76E-CE64-49FA-BA89-A008711B8044" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2022-46088/blob/main/CVE-36", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://packetstormsecurity.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/ASR511-OO7/CVE-2022-46088/blob/main/CVE-36", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://packetstormsecurity.com", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4946.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4946.json index 236b29da03d..24f20cd6552 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4946.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4946.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4946", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-05T14:15:09.577", - "lastModified": "2024-11-21T07:36:18.467", + "lastModified": "2025-01-08T17:15:07.773", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,9 +32,41 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0152.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0152.json index 2786cab5b7f..d95d9e7a0cd 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0152.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0152.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0152", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-05T14:15:09.660", - "lastModified": "2024-11-21T07:36:39.110", + "lastModified": "2025-01-08T17:15:10.267", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,9 +32,41 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0545.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0545.json index 8f865c3c596..52b4c57e46f 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0545.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0545.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0545", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-05T14:15:09.727", - "lastModified": "2024-11-21T07:37:22.757", + "lastModified": "2025-01-08T17:15:10.463", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0900.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0900.json index 5febaae3157..d1656e41c2b 100644 --- a/CVE-2023/CVE-2023-09xx/CVE-2023-0900.json +++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0900.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0900", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-05T14:15:09.793", - "lastModified": "2024-11-21T07:38:03.610", + "lastModified": "2025-01-08T17:15:10.747", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2337.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2337.json index 01a616b0ffd..779839f672b 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2337.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2337.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2337", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-05T14:15:10.040", - "lastModified": "2024-11-21T07:58:24.733", + "lastModified": "2025-01-08T17:15:11.033", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2488.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2488.json index 791fff1b11f..cb1fcb4ea02 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2488.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2488.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2488", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-05T14:15:10.173", - "lastModified": "2024-11-21T07:58:42.703", + "lastModified": "2025-01-08T17:15:11.237", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2489.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2489.json index 7062e9e4a69..078ccf47956 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2489.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2489.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2489", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-05T14:15:10.243", - "lastModified": "2024-11-21T07:58:42.803", + "lastModified": "2025-01-08T17:15:11.450", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2503.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2503.json index 8656ef6a11d..e14ed908784 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2503.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2503.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2503", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-05T14:15:10.300", - "lastModified": "2024-11-21T07:58:44.210", + "lastModified": "2025-01-08T18:15:14.640", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2572.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2572.json index 5083455cc51..5c9483b8dc7 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2572.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2572.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2572", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-05T14:15:10.423", - "lastModified": "2024-11-21T07:58:51.363", + "lastModified": "2025-01-08T17:15:11.603", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2634.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2634.json index 54a4cf370fe..1b05fb2cd41 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2634.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2634.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2634", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-05T14:15:10.483", - "lastModified": "2024-11-21T07:58:58.397", + "lastModified": "2025-01-08T17:15:11.783", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3027.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3027.json index d494d2a8bb8..6a4b8c110ce 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3027.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3027.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3027", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-05T22:15:12.293", - "lastModified": "2024-11-21T08:16:16.473", + "lastModified": "2025-01-08T17:15:13.653", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,13 +32,33 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -48,13 +68,23 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3079.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3079.json index f9d5577e8a5..da4219ae342 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3079.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3079.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3079", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-06-05T22:15:12.383", - "lastModified": "2024-11-21T08:16:23.833", + "lastModified": "2025-01-08T18:15:15.897", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-334xx/CVE-2023-33460.json b/CVE-2023/CVE-2023-334xx/CVE-2023-33460.json index 3764df1a71f..0d25df486c8 100644 --- a/CVE-2023/CVE-2023-334xx/CVE-2023-33460.json +++ b/CVE-2023/CVE-2023-334xx/CVE-2023-33460.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33460", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-06T12:15:09.447", - "lastModified": "2024-11-21T08:05:35.557", + "lastModified": "2025-01-08T17:15:12.020", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-401" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33569.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33569.json index 3126b4e6b1c..5b4ba1f1776 100644 --- a/CVE-2023/CVE-2023-335xx/CVE-2023-33569.json +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33569.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33569", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-06T20:15:14.050", - "lastModified": "2024-11-21T08:05:44.253", + "lastModified": "2025-01-08T17:15:12.283", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-336xx/CVE-2023-33613.json b/CVE-2023/CVE-2023-336xx/CVE-2023-33613.json index 301e6fd83e4..3e49c311239 100644 --- a/CVE-2023/CVE-2023-336xx/CVE-2023-33613.json +++ b/CVE-2023/CVE-2023-336xx/CVE-2023-33613.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33613", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-06T18:15:11.357", - "lastModified": "2024-11-21T08:05:45.750", + "lastModified": "2025-01-08T17:15:12.537", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-336xx/CVE-2023-33651.json b/CVE-2023/CVE-2023-336xx/CVE-2023-33651.json index df2ceea6bb3..cfa00fcce8e 100644 --- a/CVE-2023/CVE-2023-336xx/CVE-2023-33651.json +++ b/CVE-2023/CVE-2023-336xx/CVE-2023-33651.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33651", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-06T19:15:12.103", - "lastModified": "2024-11-21T08:05:49.143", + "lastModified": "2025-01-08T17:15:12.777", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34407.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34407.json index e145bb08aee..889e72a6f21 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34407.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34407.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34407", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-05T02:15:09.407", - "lastModified": "2024-11-21T08:07:10.453", + "lastModified": "2025-01-08T17:15:13.003", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34410.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34410.json index 3b31d00107b..e1270d2a2ae 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34410.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34410.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34410", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-05T03:15:09.390", - "lastModified": "2024-11-21T08:07:10.897", + "lastModified": "2025-01-08T17:15:13.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-295" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34411.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34411.json index 133a6ebc11f..adc3333c9f0 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34411.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34411.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34411", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-05T04:15:11.153", - "lastModified": "2024-11-21T08:07:11.063", + "lastModified": "2025-01-08T17:15:13.440", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35685.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35685.json new file mode 100644 index 00000000000..e4a5d876e0a --- /dev/null +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35685.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2023-35685", + "sourceIdentifier": "security@android.com", + "published": "2025-01-08T18:15:15.033", + "lastModified": "2025-01-08T18:15:15.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In DevmemIntMapPages of devicemem_server.c, there is a possible physical\u00a0page uaf due to a logic error in the code. This could lead to local\u00a0escalation of privilege in the kernel with no additional execution\u00a0privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://issuetracker.google.com/issues/42420027", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-439xx/CVE-2023-43902.json b/CVE-2023/CVE-2023-439xx/CVE-2023-43902.json index 3784caf7cb9..6d032fdf191 100644 --- a/CVE-2023/CVE-2023-439xx/CVE-2023-43902.json +++ b/CVE-2023/CVE-2023-439xx/CVE-2023-43902.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43902", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-14T05:15:08.833", - "lastModified": "2024-11-21T08:24:59.313", + "lastModified": "2025-01-08T17:15:14.070", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45878.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45878.json index f9d6420678f..d7f9166102c 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45878.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45878.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45878", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-14T06:15:29.040", - "lastModified": "2024-11-21T08:27:32.643", + "lastModified": "2025-01-08T17:15:14.387", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52226.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52226.json index 2a0c179b9fb..7f261c51499 100644 --- a/CVE-2023/CVE-2023-522xx/CVE-2023-52226.json +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52226.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52226", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-28T17:15:08.150", - "lastModified": "2024-11-21T08:39:26.327", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:01:20.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bluecoral:advanced-flamingo:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "CCBAE548-C024-4028-AC8A-963AF74F9755" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/advanced-flamingo/wordpress-advanced-flamingo-plugin-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/advanced-flamingo/wordpress-advanced-flamingo-plugin-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6525.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6525.json index 0426e1a4dfb..c6dc74b653e 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6525.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6525.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6525", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-16T03:15:06.730", - "lastModified": "2024-11-21T08:44:01.810", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:14:29.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmet:elementskit_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.0.4", + "matchCriteriaId": "AE5BF211-C0AC-4C88-BEA3-A6AC61FDB878" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/elementskit-lite/tags/3.0.3/widgets/progressbar/progressbar.php#L535", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3011323/elementskit-lite/trunk/widgets/progressbar/progressbar.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e724394d-97aa-42e4-b36e-6e49bfefa2f6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/elementskit-lite/tags/3.0.3/widgets/progressbar/progressbar.php#L535", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3011323/elementskit-lite/trunk/widgets/progressbar/progressbar.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e724394d-97aa-42e4-b36e-6e49bfefa2f6?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0326.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0326.json index f61efdc4fed..139b7ed26c3 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0326.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0326.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0326", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:10.410", - "lastModified": "2024-11-21T08:46:19.863", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:33:51.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,46 +39,106 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.10.18", + "matchCriteriaId": "E7B3E45C-917D-4845-A0F1-03CAD242489C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/trunk/includes/class-premium-template-tags.php#L1638", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/trunk/modules/premium-wrapper-link/module.php#L173", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/trunk/widgets/premium-button.php#L1709", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3022824/premium-addons-for-elementor/trunk/modules/premium-wrapper-link/module.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22ba0eaf-f514-420a-9680-8126f6dcdde9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/trunk/includes/class-premium-template-tags.php#L1638", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/trunk/modules/premium-wrapper-link/module.php#L173", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/trunk/widgets/premium-button.php#L1709", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3022824/premium-addons-for-elementor/trunk/modules/premium-wrapper-link/module.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22ba0eaf-f514-420a-9680-8126f6dcdde9?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0385.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0385.json index 5e425d2d1b4..1b762d67cc3 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0385.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0385.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0385", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:11.293", - "lastModified": "2024-11-21T08:46:28.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:32:52.073", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:frenify:categorify:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.7.5", + "matchCriteriaId": "7553E2C6-8DE2-4518-8C3F-53B95EE0BAF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3034410/categorify", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c7c74cf-a109-4f77-a740-5a43ccd4e96a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3034410/categorify", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c7c74cf-a109-4f77-a740-5a43ccd4e96a?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0442.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0442.json index f4be5d54959..cc47a7eb4fc 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0442.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0442.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0442", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:12.037", - "lastModified": "2024-11-21T08:46:35.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:48:34.583", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,46 +39,106 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.88", + "matchCriteriaId": "93085B8A-2E52-4B61-A114-D7DD96727501" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3032004/royal-elementor-addons/tags/1.3.88/modules/advanced-slider/widgets/wpr-advanced-slider.php?old=3026824&old_path=royal-elementor-addons%2Ftags%2F1.3.87%2Fmodules%2Fadvanced-slider%2Fwidgets%2Fwpr-advanced-slider.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3032004/royal-elementor-addons/tags/1.3.88/modules/dual-button/widgets/wpr-dual-button.php?old=3026824&old_path=royal-elementor-addons%2Ftags%2F1.3.87%2Fmodules%2Fdual-button%2Fwidgets%2Fwpr-dual-button.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3032004/royal-elementor-addons/tags/1.3.88/modules/pricing-table/widgets/pricing-table.php?old=3026824&old_path=royal-elementor-addons%2Ftags%2F1.3.87%2Fmodules%2Fpricing-table%2Fwidgets%2Fpricing-table.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?old_path=/royal-elementor-addons/tags/1.3.87&new_path=/royal-elementor-addons/tags/1.3.88&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/256b4818-290b-4660-8e83-c18b068a8959?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3032004/royal-elementor-addons/tags/1.3.88/modules/advanced-slider/widgets/wpr-advanced-slider.php?old=3026824&old_path=royal-elementor-addons%2Ftags%2F1.3.87%2Fmodules%2Fadvanced-slider%2Fwidgets%2Fwpr-advanced-slider.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3032004/royal-elementor-addons/tags/1.3.88/modules/dual-button/widgets/wpr-dual-button.php?old=3026824&old_path=royal-elementor-addons%2Ftags%2F1.3.87%2Fmodules%2Fdual-button%2Fwidgets%2Fwpr-dual-button.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3032004/royal-elementor-addons/tags/1.3.88/modules/pricing-table/widgets/pricing-table.php?old=3026824&old_path=royal-elementor-addons%2Ftags%2F1.3.87%2Fmodules%2Fpricing-table%2Fwidgets%2Fpricing-table.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?old_path=/royal-elementor-addons/tags/1.3.87&new_path=/royal-elementor-addons/tags/1.3.88&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/256b4818-290b-4660-8e83-c18b068a8959?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0512.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0512.json index 7b96d6dcc1a..66d1b2277a5 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0512.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0512.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0512", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:17.710", - "lastModified": "2024-11-21T08:46:45.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:52:15.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.88", + "matchCriteriaId": "93085B8A-2E52-4B61-A114-D7DD96727501" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3026824%40royal-elementor-addons%2Ftags%2F1.3.87&new=3032004%40royal-elementor-addons%2Ftags%2F1.3.88", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b2ff2954-f494-4cd7-9f29-ee0e8551e339?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3026824%40royal-elementor-addons%2Ftags%2F1.3.87&new=3032004%40royal-elementor-addons%2Ftags%2F1.3.88", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b2ff2954-f494-4cd7-9f29-ee0e8551e339?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0513.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0513.json index bb05fd804e7..f7840a66fa2 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0513.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0513.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0513", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:17.860", - "lastModified": "2024-11-21T08:46:45.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:58:49.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.88", + "matchCriteriaId": "93085B8A-2E52-4B61-A114-D7DD96727501" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3026824%40royal-elementor-addons%2Ftags%2F1.3.87&new=3032004%40royal-elementor-addons%2Ftags%2F1.3.88", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3d3516e7-cce4-4def-be38-d16be3110d59?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3026824%40royal-elementor-addons%2Ftags%2F1.3.87&new=3032004%40royal-elementor-addons%2Ftags%2F1.3.88", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3d3516e7-cce4-4def-be38-d16be3110d59?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0514.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0514.json index 7933b61ba5a..fb9e54ef02f 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0514.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0514.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0514", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:18.027", - "lastModified": "2024-11-21T08:46:46.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:59:31.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.88", + "matchCriteriaId": "93085B8A-2E52-4B61-A114-D7DD96727501" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3026824%40royal-elementor-addons%2Ftags%2F1.3.87&new=3032004%40royal-elementor-addons%2Ftags%2F1.3.88", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b0955689-43a0-442c-974b-5db5e4171f6a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3026824%40royal-elementor-addons%2Ftags%2F1.3.87&new=3032004%40royal-elementor-addons%2Ftags%2F1.3.88", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b0955689-43a0-442c-974b-5db5e4171f6a?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0766.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0766.json index cb7056b55b3..8fad54aac2e 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0766.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0766.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0766", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-28T09:15:41.740", - "lastModified": "2024-11-21T08:47:19.503", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:43:16.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envothemes:envo\\'s_elementor_templates_\\&_widgets_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4.5", + "matchCriteriaId": "7CFA40B6-7D65-4E40-BE98-733FEAC2D0DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/envo-elementor-for-woocommerce/trunk/includes/admin/include/template-library.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/996c7433-dd82-4216-86b9-005f43c06c3a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/envo-elementor-for-woocommerce/trunk/includes/admin/include/template-library.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/996c7433-dd82-4216-86b9-005f43c06c3a?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0767.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0767.json index 113c8528ed0..0a81b5c03e6 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0767.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0767.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0767", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-28T09:15:41.903", - "lastModified": "2024-11-21T08:47:19.623", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:42:46.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envothemes:envo\\'s_elementor_templates_\\&_widgets_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4.5", + "matchCriteriaId": "7CFA40B6-7D65-4E40-BE98-733FEAC2D0DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/envo-elementor-for-woocommerce/trunk/includes/admin/include/template-library.php#L332", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cca71257-05dc-43d5-8de6-faf0a2feab2e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/envo-elementor-for-woocommerce/trunk/includes/admin/include/template-library.php#L332", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cca71257-05dc-43d5-8de6-faf0a2feab2e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0768.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0768.json index 2458fa7ce85..2c700f70332 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0768.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0768.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0768", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-28T09:15:42.063", - "lastModified": "2024-11-21T08:47:19.743", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:42:05.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envothemes:envo\\'s_elementor_templates_\\&_widgets_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4.5", + "matchCriteriaId": "7CFA40B6-7D65-4E40-BE98-733FEAC2D0DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/envo-elementor-for-woocommerce/trunk/includes/admin/include/template-library.php#L367", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6504ae5c-a36d-495e-aa93-40a3753857c6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/envo-elementor-for-woocommerce/trunk/includes/admin/include/template-library.php#L367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6504ae5c-a36d-495e-aa93-40a3753857c6?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1095.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1095.json index 0e459863829..94d918717ec 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1095.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1095.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1095", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-05T02:15:26.130", - "lastModified": "2024-11-21T08:49:47.093", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:05:01.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeperch:build_\\&_control_block_pattern:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.5.4", + "matchCriteriaId": "14745584-E914-4C7B-9BCA-9E08253939C4" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/control-block-patterns/trunk/classes/Settings/SettingsPage.php#L166", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/38f09a45-2b11-47c7-af16-c7f9c3a46e0e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/control-block-patterns/trunk/classes/Settings/SettingsPage.php#L166", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/38f09a45-2b11-47c7-af16-c7f9c3a46e0e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1178.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1178.json index a871401199e..4c55b31a616 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1178.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1178.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1178", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-05T02:15:26.290", - "lastModified": "2024-11-21T08:49:58.357", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:16:27.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,66 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeboy:sportspress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.18", + "matchCriteriaId": "DBC50606-3BF7-4BEF-803E-E049971FB859" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3043889%40sportspress&new=3043889%40sportspress&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/098dfee2-ba0b-420f-89ed-8ad1e41faec4?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3043889%40sportspress&new=3043889%40sportspress&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/098dfee2-ba0b-420f-89ed-8ad1e41faec4?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12898.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12898.json index f2f2799c56e..b07945a006a 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12898.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12898.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12898", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-23T01:15:06.840", - "lastModified": "2024-12-23T01:15:06.840", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:48:06.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,71 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:attendance_tracking_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "108AEB9D-CD44-4A0D-8CB6-82EA6162A0B4" + } + ] + } + ] } ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/onupset/CVE/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289168", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.289168", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.467424", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12899.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12899.json index 96ac962b855..fbb8eef1771 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12899.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12899.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12899", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-23T01:15:07.020", - "lastModified": "2024-12-23T01:15:07.020", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:47:51.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,71 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:attendance_tracking_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "108AEB9D-CD44-4A0D-8CB6-82EA6162A0B4" + } + ] + } + ] } ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Murrayzed/CVE/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289169", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.289169", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.467628", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1242.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1242.json index 790a210f8f4..b8c250777cb 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1242.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1242.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1242", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:44.673", - "lastModified": "2024-11-21T08:50:08.620", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:36:55.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.10.19", + "matchCriteriaId": "6D6ECA8B-93B1-4F6E-AECE-F783FE31BDA3" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3035504%40premium-addons-for-elementor%2Ftrunk&old=3025571%40premium-addons-for-elementor%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1026b753-e82b-4fa3-9023-c36ab9863b29?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3035504%40premium-addons-for-elementor%2Ftrunk&old=3025571%40premium-addons-for-elementor%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1026b753-e82b-4fa3-9023-c36ab9863b29?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1276.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1276.json index 440e1851464..836b7b5b5a5 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1276.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1276.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1276", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:46.490", - "lastModified": "2024-11-21T08:50:13.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:37:36.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "5.9.9", + "matchCriteriaId": "B1DB6564-07FC-44EF-B4CD-54000424D5DD" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/essential-addons-for-elementor-lite/tags/5.9.8/includes/Elements/Content_Ticker.php#L815", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3034127%40essential-addons-for-elementor-lite%2Ftrunk&old=3029928%40essential-addons-for-elementor-lite%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/af8bee01-15bc-485e-8b01-8b68b199b34d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/essential-addons-for-elementor-lite/tags/5.9.8/includes/Elements/Content_Ticker.php#L815", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3034127%40essential-addons-for-elementor-lite%2Ftrunk&old=3029928%40essential-addons-for-elementor-lite%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/af8bee01-15bc-485e-8b01-8b68b199b34d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1285.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1285.json index 9c2a013a4c9..34235f7de96 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1285.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1285.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1285", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-05T02:15:26.447", - "lastModified": "2024-11-21T08:50:13.903", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:13:54.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pagebuildersandwich:page_builder_sandwich:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "5.1.0", + "matchCriteriaId": "D3BFF465-28EE-4E56-9C04-984E790DD567" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/page-builder-sandwich/tags/5.1.0/class-page-builder-sandwich.php#L958", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/69d3d66c-5557-4fb4-8bd7-05d76d6b86ab?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/page-builder-sandwich/tags/5.1.0/class-page-builder-sandwich.php#L958", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/69d3d66c-5557-4fb4-8bd7-05d76d6b86ab?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13187.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13187.json new file mode 100644 index 00000000000..c227f68ce00 --- /dev/null +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13187.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-13187", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-08T17:15:15.410", + "lastModified": "2025-01-08T17:15:15.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Kingsoft WPS Office 6.14.0 on macOS. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component TCC Handler. The manipulation leads to code injection. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 4.3, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Rsec-1/wps", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.290779", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.290779", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.468013", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1398.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1398.json index 7b3a39ca41e..0ca48abce04 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1398.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1398.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1398", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-02T13:15:06.890", - "lastModified": "2024-11-21T08:50:29.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:39:21.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:g5plus:ultimate_bootstrap_elements_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.7", + "matchCriteriaId": "7D8B37EA-AB15-4031-9316-1B027B7752CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ultimate-bootstrap-elements-for-elementor/tags/1.3.6/templates/elements/heading.php#L50", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-bootstrap-elements-for-elementor/tags/1.3.6/templates/elements/heading.php#L61", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ed191380-6037-4d59-8db7-cb33136a304e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-bootstrap-elements-for-elementor/tags/1.3.6/templates/elements/heading.php#L50", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-bootstrap-elements-for-elementor/tags/1.3.6/templates/elements/heading.php#L61", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ed191380-6037-4d59-8db7-cb33136a304e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1448.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1448.json index d72fee4c832..66749cf358b 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1448.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1448.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1448", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:51.147", - "lastModified": "2024-11-21T08:50:36.353", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:38:49.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:heateor:sassy_social_share:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.3.56", + "matchCriteriaId": "07847694-BC38-41DB-B499-CED35003FE66" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/tags/3.3.56/includes/class-sassy-social-share-shortcodes.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3038227%40sassy-social-share%2Ftrunk&old=2996153%40sassy-social-share%2Ftrunk&sfp_email=&sfph_mail=#file8", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c2f4b74-2568-4e5a-b55f-0130096bc19f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/tags/3.3.56/includes/class-sassy-social-share-shortcodes.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3038227%40sassy-social-share%2Ftrunk&old=2996153%40sassy-social-share%2Ftrunk&sfp_email=&sfph_mail=#file8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c2f4b74-2568-4e5a-b55f-0130096bc19f?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1478.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1478.json index 03b631e5542..9c6fbf4052d 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1478.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1478.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1478", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-05T02:15:26.773", - "lastModified": "2024-11-21T08:50:40.173", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:07:21.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:helderk:maintenance_mode:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.0.2", + "matchCriteriaId": "00F9028B-CA76-43F5-A0FC-752B9F1D4D05" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/hkdev-maintenance-mode/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/36def628-e09e-4da0-ab14-35aefcb67f73?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wordpress.org/plugins/hkdev-maintenance-mode/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/36def628-e09e-4da0-ab14-35aefcb67f73?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1500.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1500.json index 697a3e35eae..10863814d7e 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1500.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1500.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1500", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T06:15:50.460", - "lastModified": "2024-11-21T08:50:42.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:34:33.033", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,38 +39,92 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.92", + "matchCriteriaId": "90A97511-FFB8-4D5B-8271-27E9D38BF789" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/logo/widgets/wpr-logo.php#L644", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/logo/widgets/wpr-logo.php#L664", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3037411%40royal-elementor-addons%2Ftags%2F1.3.91&new=3038353%40royal-elementor-addons%2Ftags%2F1.3.92", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8619c999-5cf7-4888-bdb2-815238411303?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/logo/widgets/wpr-logo.php#L644", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/logo/widgets/wpr-logo.php#L664", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3037411%40royal-elementor-addons%2Ftags%2F1.3.91&new=3038353%40royal-elementor-addons%2Ftags%2F1.3.92", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8619c999-5cf7-4888-bdb2-815238411303?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1536.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1536.json index d44e21d5426..c13612c47d0 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1536.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1536.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1536", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:24.270", - "lastModified": "2024-11-21T08:50:46.770", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:32:08.960", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "5.9.10", + "matchCriteriaId": "782C2137-4E65-42D7-8075-56AFC7F5C400" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3037755/essential-addons-for-elementor-lite/tags/5.9.10/includes/Elements/Event_Calendar.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/12dc9e63-17bb-4755-be3c-ae8b26edd3cd?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3037755/essential-addons-for-elementor-lite/tags/5.9.10/includes/Elements/Event_Calendar.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/12dc9e63-17bb-4755-be3c-ae8b26edd3cd?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1625.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1625.json index 77704a711c7..78217d9d239 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1625.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1625.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1625", "sourceIdentifier": "security@huntr.dev", "published": "2024-04-10T17:15:52.727", - "lastModified": "2024-11-21T08:50:57.063", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:58:39.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -49,24 +71,69 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lunary:lunary:0.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "28E0EFA7-B041-4D28-82F5-F7415CEA91E8" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/lunary-ai/lunary/commit/88f98e29f19da9d1f5de45c5b163fd5b48e0bcec", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/cf6dd625-e6c9-44df-a072-13686816de21", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] }, { "url": "https://github.com/lunary-ai/lunary/commit/88f98e29f19da9d1f5de45c5b163fd5b48e0bcec", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/cf6dd625-e6c9-44df-a072-13686816de21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1731.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1731.json index 5f23e8a2216..03f02a7ad6a 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1731.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1731.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1731", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-05T02:15:26.937", - "lastModified": "2024-11-21T08:51:11.123", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:02:59.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rymera:auto_refresh_single_page:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1", + "matchCriteriaId": "73B0BE79-BF20-4EA4-8AAC-AFA6AB4BCFDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/auto-refresh-single-page/trunk/auto-refresh-single-page.php#L42", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f8f8d46-d7e7-4b07-9b10-15e579973474?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/auto-refresh-single-page/trunk/auto-refresh-single-page.php#L42", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f8f8d46-d7e7-4b07-9b10-15e579973474?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1943.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1943.json index bfe1e6fed1a..3f52096e220 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1943.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1943.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1943", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-28T07:15:09.150", - "lastModified": "2024-11-21T08:51:39.290", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:47:34.333", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmoose:yuki:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.14", + "matchCriteriaId": "3CEF55FA-63AE-491D-98BA-02D31D6BEF37" + } + ] + } + ] + } + ], "references": [ { "url": "https://themes.trac.wordpress.org/changeset/218603/yuki/1.3.15/inc/extensions/class-reset-extension.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dfb760fb-f281-4649-9bd3-92f8e281f07e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://themes.trac.wordpress.org/changeset/218603/yuki/1.3.15/inc/extensions/class-reset-extension.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dfb760fb-f281-4649-9bd3-92f8e281f07e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21749.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21749.json index 720a5808cfd..9292c1432b0 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21749.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21749.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21749", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-28T17:15:08.543", - "lastModified": "2024-11-21T08:54:56.303", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:03:30.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atakanau:click_disable_all:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.1", + "matchCriteriaId": "C0CBA50B-A4F0-4C68-8C85-F5638272ED37" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/first-graders-toolbox/wordpress-1-click-disable-all-plugin-1-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/first-graders-toolbox/wordpress-1-click-disable-all-plugin-1-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2110.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2110.json index fcfbc22b615..c3983cbe9fa 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2110.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2110.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2110", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-28T02:15:09.990", - "lastModified": "2024-11-21T09:09:03.200", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:20:25.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.4.7.2", + "matchCriteriaId": "6AB8AF29-713D-4DAB-947A-5F55D1774FFC" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3054883/events-manager/trunk/classes/em-bookings-table.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c0538999-0a09-4d24-a530-a32fb5b4e5e6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3054883/events-manager/trunk/classes/em-bookings-table.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c0538999-0a09-4d24-a530-a32fb5b4e5e6?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2111.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2111.json index d6da4b603e7..f0de6c82fcc 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2111.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2111.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2111", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-28T02:15:10.397", - "lastModified": "2024-11-21T09:09:03.313", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:23:37.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.4.7.2", + "matchCriteriaId": "6AB8AF29-713D-4DAB-947A-5F55D1774FFC" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3054883%40events-manager&new=3054883%40events-manager&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/95ded4bf-9964-4bb3-b6e5-5ad37360f87d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3054883%40events-manager&new=3054883%40events-manager&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/95ded4bf-9964-4bb3-b6e5-5ad37360f87d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2115.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2115.json index e3ad3f7659a..30480590b81 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2115.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2115.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2115", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-05T08:15:07.470", - "lastModified": "2024-11-21T09:09:03.650", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T18:02:33.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.0.1", + "matchCriteriaId": "DB2DA696-332A-4762-BDED-A6587675DC7C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3061953/learnpress/tags/4.0.1/inc/admin/class-lp-admin.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/342a4482-f5d3-4cc9-a998-e3abac7142cf?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3061953/learnpress/tags/4.0.1/inc/admin/class-lp-admin.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/342a4482-f5d3-4cc9-a998-e3abac7142cf?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2149.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2149.json index 8a16121cd10..8194f9ebd31 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2149.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2149.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2149", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-03T18:15:10.723", - "lastModified": "2024-11-21T09:09:08.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:09:38.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codeastro:membership_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3A341555-1CAF-480B-978A-9AE299540FA3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/JiaDongGao1/CVE_Hunter/blob/main/SQLi-2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255502", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255502", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/JiaDongGao1/CVE_Hunter/blob/main/SQLi-2.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255502", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.255502", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23328.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23328.json index 3852fb5c3f5..7c7a94d83c4 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23328.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23328.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23328", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-29T01:44:08.483", - "lastModified": "2024-11-21T08:57:31.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:52:16.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -49,32 +69,87 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.18.15", + "matchCriteriaId": "F4D9FEA5-987A-4605-9998-BEB7C22702C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.3.0", + "matchCriteriaId": "5260CE59-BCBB-4015-8FCC-AB4BBE4CB15B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/dataease/dataease/commit/4128adf5fc4592b55fa1722a53b178967545d46a", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dataease/dataease/commit/bb540e6dc83df106ac3253f331066129a7487d1a", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dataease/dataease/security/advisories/GHSA-8x8q-p622-jf25", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/dataease/dataease/commit/4128adf5fc4592b55fa1722a53b178967545d46a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dataease/dataease/commit/bb540e6dc83df106ac3253f331066129a7487d1a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dataease/dataease/security/advisories/GHSA-8x8q-p622-jf25", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23519.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23519.json index 7a28bbf24df..b098ca0d811 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23519.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23519.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23519", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-29T01:44:09.110", - "lastModified": "2024-11-21T08:57:52.640", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:10:44.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mandsconsulting:email_before_download:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "6.9.7", + "matchCriteriaId": "A34B976C-1033-49BC-B692-5600D999C305" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/email-before-download/wordpress-email-before-download-plugin-6-9-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/email-before-download/wordpress-email-before-download-plugin-6-9-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24701.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24701.json index d82c8db15ee..e04ba8234d9 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24701.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24701.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24701", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-29T01:44:12.680", - "lastModified": "2024-11-21T08:59:32.317", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:11:18.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tiny:setka_workflow:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.1.20", + "matchCriteriaId": "C20082BB-1FB4-4DC3-89B8-7950A13C8033" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/setka-editor/wordpress-setka-editor-plugin-2-1-20-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/setka-editor/wordpress-setka-editor-plugin-2-1-20-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24833.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24833.json index 4cfabfb8171..f20be4ff18f 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24833.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24833.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24833", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-08T14:15:07.730", - "lastModified": "2024-11-21T08:59:48.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:14:47.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.10.1", + "matchCriteriaId": "1A44FF86-0054-47D5-8B93-E11DA0E7023E" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/happy-elementor-addons/wordpress-happy-addons-for-elementor-plugin-3-10-1-broken-access-control-on-post-clone-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/happy-elementor-addons/wordpress-happy-addons-for-elementor-plugin-3-10-1-broken-access-control-on-post-clone-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25930.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25930.json index 173f89852af..70b42fbeff9 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25930.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25930.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25930", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-29T01:44:17.050", - "lastModified": "2024-11-21T09:01:35.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:11:38.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nuggethon:custom_order_status_manager_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.5.2", + "matchCriteriaId": "67A30BFB-B677-430D-8625-EDCDA9A0E11B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/custom-order-statuses-for-woocommerce/wordpress-custom-order-statuses-for-woocommerce-plugin-1-5-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/custom-order-statuses-for-woocommerce/wordpress-custom-order-statuses-for-woocommerce-plugin-1-5-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27915.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27915.json index 85220e5e5c7..34a307f57b3 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27915.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27915.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27915", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-06T20:15:47.930", - "lastModified": "2024-11-21T09:05:24.810", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:37:37.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,24 +69,74 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.2.0", + "versionEndExcluding": "2.4.17", + "matchCriteriaId": "552E4458-5771-4AF7-B8CB-D742280EF855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.5.0", + "versionEndExcluding": "2.5.13", + "matchCriteriaId": "9A934DEB-DB97-4461-8542-588A268F9060" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/sulu/sulu/commit/ec9c3f99e15336dc4f6877f512300f231c17c6da", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/sulu/sulu/security/advisories/GHSA-jr83-m233-gg6p", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://github.com/sulu/sulu/commit/ec9c3f99e15336dc4f6877f512300f231c17c6da", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/sulu/sulu/security/advisories/GHSA-jr83-m233-gg6p", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2733.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2733.json index b83999fbd9c..f6421983112 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2733.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2733.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2733", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-10T04:15:09.630", - "lastModified": "2024-11-21T09:10:23.930", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:52:18.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.8.9", + "matchCriteriaId": "FC6F8754-2DCF-47CC-9602-6F37E9596D11" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3064413/bold-page-builder/trunk/content_elements/bt_bb_separator/bt_bb_separator.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2db39ae2-6c44-4a4c-84de-9b7041bece37?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3064413/bold-page-builder/trunk/content_elements/bt_bb_separator/bt_bb_separator.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2db39ae2-6c44-4a4c-84de-9b7041bece37?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2734.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2734.json index 22cfa053579..f14d3ee9641 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2734.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2734.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2734", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-10T05:15:49.127", - "lastModified": "2024-11-21T09:10:24.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:52:29.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.8.9", + "matchCriteriaId": "FC6F8754-2DCF-47CC-9602-6F37E9596D11" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3064413%40bold-page-builder&new=3064413%40bold-page-builder&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/650b5677-7c70-415f-81bf-12514393e4c9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3064413%40bold-page-builder&new=3064413%40bold-page-builder&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/650b5677-7c70-415f-81bf-12514393e4c9?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2735.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2735.json index 644c2522e77..55798e9b754 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2735.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2735.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2735", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-10T05:15:49.427", - "lastModified": "2024-11-21T09:10:24.170", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:52:42.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.8.9", + "matchCriteriaId": "FC6F8754-2DCF-47CC-9602-6F37E9596D11" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3064413/bold-page-builder/trunk/bold-builder.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6cc4a67b-81fa-4ef6-9167-eab5cb9002ec?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3064413/bold-page-builder/trunk/bold-builder.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6cc4a67b-81fa-4ef6-9167-eab5cb9002ec?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2736.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2736.json index ffea8cb48a6..c2f8ed667e1 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2736.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2736.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2736", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-10T05:15:49.640", - "lastModified": "2024-11-21T09:10:24.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:24:59.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.8.9", + "matchCriteriaId": "FC6F8754-2DCF-47CC-9602-6F37E9596D11" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3064413/bold-page-builder/trunk/content_elements/bt_bb_headline/bt_bb_headline.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/86cf664f-5de1-4692-96b3-2fd8ae35110b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3064413/bold-page-builder/trunk/content_elements/bt_bb_headline/bt_bb_headline.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/86cf664f-5de1-4692-96b3-2fd8ae35110b?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28855.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28855.json index 899af1279b8..78f32478fee 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28855.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28855.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28855", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-18T22:15:08.963", - "lastModified": "2024-11-21T09:07:03.350", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:14:28.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,72 +69,201 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.41.15", + "matchCriteriaId": "FFD391D1-3498-46AB-B74F-5EAB21A2E33C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.42.0", + "versionEndExcluding": "2.42.15", + "matchCriteriaId": "A9A5738D-E435-4BC1-8B95-50C8DCE2A82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.43.0", + "versionEndExcluding": "2.43.9", + "matchCriteriaId": "6A5FC2D7-DF8A-48ED-98B3-48B85DD5FE18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.44.0", + "versionEndExcluding": "2.44.3", + "matchCriteriaId": "44939A24-65F7-4D03-805E-585F2AEC7A31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.47.0", + "versionEndExcluding": "2.47.4", + "matchCriteriaId": "345DE50B-483E-4B0F-A391-E68BEF04AF2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:2.45.0:-:*:*:*:*:*:*", + "matchCriteriaId": "CDF0C992-982C-4963-BFE4-1592B681D69E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:2.45.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "BDA3827B-80DF-4A2A-A103-97FE37352090" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:2.46.0:-:*:*:*:*:*:*", + "matchCriteriaId": "B3FE712E-6B93-4374-A2A8-8A6C51007F1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:2.46.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "CCEA9592-45E4-4C4A-906F-62732495B2D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:2.46.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "D5C0396B-7FFB-4700-BBFF-AC7D2748B00A" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.41.15", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.42.15", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.43.9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.44.3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.45.1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.46.1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.47.3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-hfrg-4jwr-jfpj", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.41.15", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.42.15", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.43.9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.44.3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.45.1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.46.1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.47.3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-hfrg-4jwr-jfpj", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28916.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28916.json index 0d3722f1a59..554041de73b 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28916.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28916.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28916", "sourceIdentifier": "secure@microsoft.com", "published": "2024-03-21T00:15:09.533", - "lastModified": "2024-11-21T09:07:11.097", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:35:14.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,50 @@ "value": "CWE-59" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:xbox_gaming_services:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.87.13001.0", + "matchCriteriaId": "F6DE7E4E-9F52-4492-BFBE-6B65EEDC26FD" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28916", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28916", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29059.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29059.json index 7fbfa16cb58..e483d202692 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29059.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29059.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29059", "sourceIdentifier": "secure@microsoft.com", "published": "2024-03-23T00:15:09.150", - "lastModified": "2024-11-21T09:07:28.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:33:02.303", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,442 @@ "value": "CWE-209" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "2D3F18AF-84ED-473B-A8DF-65EB23C475AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F513002-D8C1-4D3A-9F79-4B52498F67E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB4AE761-6FAC-4000-A63D-42CE3FAB8412" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8EDC4407-7E92-4E60-82F0-0C87D1860D3A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*", + "matchCriteriaId": "42A6DF09-B8E1-414D-97E7-453566055279" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*", + "matchCriteriaId": "D400E856-2B2E-4CEA-8CA5-309FDF371CEA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*", + "matchCriteriaId": "280FE663-23BE-45D2-9B31-5F577E390B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "23317443-1968-4791-9F20-AD3B308A83D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "934D4E46-12C1-41DC-A28C-A2C430E965E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F513002-D8C1-4D3A-9F79-4B52498F67E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB4AE761-6FAC-4000-A63D-42CE3FAB8412" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4793BFB-2E4E-4067-87A5-4B8749025CA3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42D329B2-432D-4029-87EB-4C3C5F55CD95" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75CCACE6-A0EE-4A6F-BD5A-7AA504B02717" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*", + "matchCriteriaId": "734112B3-1383-4BE3-8721-C0F84566B764" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "36B0E40A-84EF-4099-A395-75D6B8CDA196" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "2D3F18AF-84ED-473B-A8DF-65EB23C475AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29059", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29059", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29891.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29891.json index e435682848e..d13bafcaebf 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29891.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29891.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29891", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-27T20:15:07.780", - "lastModified": "2024-11-21T09:08:33.593", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:16:59.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.8 } ] }, @@ -49,72 +69,190 @@ "value": "CWE-434" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.42.17", + "matchCriteriaId": "220712AC-B9A7-4C02-972F-F69A3C93EA5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.43.0", + "versionEndExcluding": "2.43.11", + "matchCriteriaId": "E63D00B9-2C3C-48BA-9C87-DA3B3895DDCB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.44.0", + "versionEndExcluding": "2.44.7", + "matchCriteriaId": "B72E7A77-7537-4872-8038-A92E68A1451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.45.0", + "versionEndExcluding": "2.45.5", + "matchCriteriaId": "A0B9428D-76F8-4121-809B-AEC937D6419A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.46.0", + "versionEndExcluding": "2.46.5", + "matchCriteriaId": "5829B90F-DCE0-44DB-AC75-9BC923774CD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.47.0", + "versionEndExcluding": "2.47.8", + "matchCriteriaId": "0C29110B-3ADA-4388-A9AF-773574F03094" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.48.0", + "versionEndExcluding": "2.48.3", + "matchCriteriaId": "63C71265-8561-48A6-9D9F-1A94A89A64D8" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.42.17", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.43.11", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.44.7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.45.5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.46.5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.47.8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.48.3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-hr5w-cwwq-2v4m", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.42.17", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.43.11", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.44.7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.45.5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.46.5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.47.8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.48.3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-hr5w-cwwq-2v4m", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29892.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29892.json index 39915e458b9..a5fe6efa5f8 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29892.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29892.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29892", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-27T20:15:08.303", - "lastModified": "2024-11-21T09:08:33.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:20:34.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -49,72 +69,190 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.42.17", + "matchCriteriaId": "220712AC-B9A7-4C02-972F-F69A3C93EA5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.43.0", + "versionEndExcluding": "2.43.11", + "matchCriteriaId": "E63D00B9-2C3C-48BA-9C87-DA3B3895DDCB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.44.0", + "versionEndExcluding": "2.44.7", + "matchCriteriaId": "B72E7A77-7537-4872-8038-A92E68A1451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.45.0", + "versionEndExcluding": "2.45.5", + "matchCriteriaId": "A0B9428D-76F8-4121-809B-AEC937D6419A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.46.0", + "versionEndExcluding": "2.46.5", + "matchCriteriaId": "5829B90F-DCE0-44DB-AC75-9BC923774CD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.47.0", + "versionEndExcluding": "2.47.8", + "matchCriteriaId": "0C29110B-3ADA-4388-A9AF-773574F03094" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.48.0", + "versionEndExcluding": "2.48.3", + "matchCriteriaId": "63C71265-8561-48A6-9D9F-1A94A89A64D8" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.42.17", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.43.11", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.44.7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.45.5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.46.5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.47.8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.48.3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-gp8g-f42f-95q2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.42.17", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.43.11", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.44.7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.45.5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.46.5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.47.8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.48.3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-gp8g-f42f-95q2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2925.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2925.json index eba16eda427..c3ebc70ee13 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2925.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2925.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2925", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-02T07:16:13.470", - "lastModified": "2024-11-21T09:10:51.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:28:36.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fastlinemedia:beaver_builder:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "2.8.0.7", + "matchCriteriaId": "0FF56C6B-F345-4234-BF72-A9F9CA7E82F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/beaver-builder-lite-version/tags/2.8.0.4/modules/button/includes/frontend.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3062187/beaver-builder-lite-version/trunk/modules/button/includes/frontend.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d311170c-db2b-4c23-aa43-98d7e92839bb?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/beaver-builder-lite-version/tags/2.8.0.4/modules/button/includes/frontend.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3062187/beaver-builder-lite-version/trunk/modules/button/includes/frontend.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d311170c-db2b-4c23-aa43-98d7e92839bb?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30042.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30042.json index 154b84a4271..c1382d391a8 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30042.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30042.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30042", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:17:14.283", - "lastModified": "2024-11-21T09:11:07.643", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:59:45.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,80 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "09BF0981-749E-470B-A7AC-95AD087797EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:*:*", + "matchCriteriaId": "6C9D7C93-E8CB-4A8A-BA15-093B03ACC62F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*", + "matchCriteriaId": "BF0E8112-5B6F-4E55-8E40-38ADCF6FC654" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_online_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.0.10410.20003", + "matchCriteriaId": "80D9A0D3-5662-433E-8CA9-B036D9114895" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_online_server:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "C6C0BD17-4324-4DFF-9804-1825C4C182A1" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30042", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30042", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30043.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30043.json index e5a537a433c..68a17016acc 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30043.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30043.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30043", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:17:15.180", - "lastModified": "2024-11-21T09:11:07.770", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:56:55.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,60 @@ "value": "CWE-611" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*", + "versionEndExcluding": "16.0.17328.20292", + "matchCriteriaId": "E86449BF-E013-44C2-B9E7-E98CF0185B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "F815EF1D-7B60-47BE-9AC2-2548F99F10E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "6122D014-5BF1-4AF4-8B4D-80205ED7785E" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30043", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30043", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30044.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30044.json index 8e896c0e85e..d29624b2b7b 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30044.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30044.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30044", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:17:16.107", - "lastModified": "2024-11-21T09:11:07.893", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:50:31.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,60 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*", + "versionEndExcluding": "16.0.17328.20292", + "matchCriteriaId": "E86449BF-E013-44C2-B9E7-E98CF0185B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "F815EF1D-7B60-47BE-9AC2-2548F99F10E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "6122D014-5BF1-4AF4-8B4D-80205ED7785E" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30044", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30044", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30045.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30045.json index 64eed24c0dd..9d8097c119e 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30045.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30045.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30045", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:17:17.023", - "lastModified": "2024-11-22T12:15:18.707", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:36:30.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,20 +49,100 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.19", + "matchCriteriaId": "98AEF40E-333C-4B7C-A1A7-522459C01F90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.0.5", + "matchCriteriaId": "19A6ED34-B810-42BF-9256-8632F965EBED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4", + "versionEndExcluding": "7.4.3", + "matchCriteriaId": "7D708FAC-81E3-4E60-B9D9-7C7AA614A503" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.4.0", + "versionEndExcluding": "17.4.19", + "matchCriteriaId": "A8851D8F-C0FC-4957-846E-BEF69B88B9D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.6.0", + "versionEndExcluding": "17.6.15", + "matchCriteriaId": "24B799F3-962A-4366-9B5C-2F60E2098B7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.8.0", + "versionEndExcluding": "17.8.10", + "matchCriteriaId": "55C50579-44BA-4C6A-9CD5-A71D3D80F4E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.9.0", + "versionEndExcluding": "17.9.7", + "matchCriteriaId": "DA2D642F-B4D4-4B84-ACCA-653201079267" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30045", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20241122-0001/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30046.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30046.json index c312c671ac5..740553d29fd 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30046.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30046.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30046", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:17:17.880", - "lastModified": "2024-11-21T09:11:08.140", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:29:04.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,86 @@ "value": "CWE-362" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.19", + "matchCriteriaId": "98AEF40E-333C-4B7C-A1A7-522459C01F90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.0.5", + "matchCriteriaId": "19A6ED34-B810-42BF-9256-8632F965EBED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.4.0", + "versionEndExcluding": "17.4.19", + "matchCriteriaId": "A8851D8F-C0FC-4957-846E-BEF69B88B9D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.6.0", + "versionEndExcluding": "17.6.15", + "matchCriteriaId": "24B799F3-962A-4366-9B5C-2F60E2098B7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.8.0", + "versionEndExcluding": "17.8.10", + "matchCriteriaId": "55C50579-44BA-4C6A-9CD5-A71D3D80F4E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.9.0", + "versionEndExcluding": "17.9.7", + "matchCriteriaId": "DA2D642F-B4D4-4B84-ACCA-653201079267" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30046", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30046", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30047.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30047.json index 39b4a47ffc7..56af151e028 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30047.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30047.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30047", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:17:18.830", - "lastModified": "2024-11-21T09:11:08.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:28:16.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:dynamics_365_customer_insights:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.38813.80", + "matchCriteriaId": "138D73EF-1626-43D5-8FF6-660E688A8029" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30047", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30047", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30048.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30048.json index 884fc308607..5a390a008de 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30048.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30048.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30048", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:17:19.713", - "lastModified": "2024-11-21T09:11:08.380", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:20:38.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:dynamics_365_customer_insights:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.38813.80", + "matchCriteriaId": "138D73EF-1626-43D5-8FF6-660E688A8029" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30048", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30048", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30049.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30049.json index bab22e0d18c..017612a5798 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30049.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30049.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30049", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:17:20.603", - "lastModified": "2024-11-21T09:11:08.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:18:56.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,142 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20651", + "matchCriteriaId": "3CAB1AF9-3205-47E7-9F73-B4F29CB7499E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20651", + "matchCriteriaId": "17FA38AD-A8CD-4141-A555-0756F05C69B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "208A4966-0B4A-44BD-A94E-D432529D4A7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "D0993DA2-43E8-4E09-A8FE-9D4EC48A881D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "7CA2824B-BEA1-438D-A606-65BF5C85AF19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4412", + "matchCriteriaId": "64DEDA09-D9D3-4974-A4C1-36D2A7C27916" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2960", + "matchCriteriaId": "8C65169A-BEF8-4C27-8F3C-F30401DFDB71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3593", + "matchCriteriaId": "D96D1BF2-D11D-4355-A9E8-7F89485772D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3593", + "matchCriteriaId": "44D7840D-388C-46D8-9782-A49FE9D54704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "7B922822-E4BC-4538-9E88-EDA645062A44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "4A3B72F9-A2EA-4C74-98B5-3543A98B9098" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2461", + "matchCriteriaId": "64742A11-4335-4D12-9112-B94B6FF44F41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.887", + "matchCriteriaId": "7510F630-1C49-4F21-A814-2406F94CA5C7" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30049", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30049", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30050.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30050.json index 27f6fddad8e..47bfcbc7754 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30050.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30050.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30050", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:17:21.443", - "lastModified": "2024-11-21T09:11:08.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:13:48.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,148 @@ "value": "CWE-693" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20651", + "matchCriteriaId": "3CAB1AF9-3205-47E7-9F73-B4F29CB7499E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20651", + "matchCriteriaId": "17FA38AD-A8CD-4141-A555-0756F05C69B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "208A4966-0B4A-44BD-A94E-D432529D4A7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "D0993DA2-43E8-4E09-A8FE-9D4EC48A881D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "7CA2824B-BEA1-438D-A606-65BF5C85AF19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4412", + "matchCriteriaId": "64DEDA09-D9D3-4974-A4C1-36D2A7C27916" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4412", + "matchCriteriaId": "1EAF4860-124C-4A1B-AF4B-12C676E545DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2960", + "matchCriteriaId": "8C65169A-BEF8-4C27-8F3C-F30401DFDB71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3593", + "matchCriteriaId": "D96D1BF2-D11D-4355-A9E8-7F89485772D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3593", + "matchCriteriaId": "44D7840D-388C-46D8-9782-A49FE9D54704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6981", + "matchCriteriaId": "7B922822-E4BC-4538-9E88-EDA645062A44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5820", + "matchCriteriaId": "4A3B72F9-A2EA-4C74-98B5-3543A98B9098" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2461", + "matchCriteriaId": "64742A11-4335-4D12-9112-B94B6FF44F41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.887", + "matchCriteriaId": "7510F630-1C49-4F21-A814-2406F94CA5C7" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30050", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30050", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30053.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30053.json index 01522e8c737..109c25d9bdf 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30053.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30053.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30053", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:17:22.243", - "lastModified": "2024-11-21T09:11:09.060", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:09:06.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_migrate:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.294.1008", + "matchCriteriaId": "32611809-CAE6-4195-BE27-013B6E90C805" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30053", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30053", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30054.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30054.json index 69c1b3e23e9..4a28e1d27ad 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30054.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30054.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30054", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:17:22.680", - "lastModified": "2024-11-21T09:11:09.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:57:54.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,50 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:powerbi-javascript:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.23.1", + "matchCriteriaId": "8C4CBE81-E1B3-46EB-BFE2-212BEB1995D5" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30054", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30054", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30059.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30059.json index 5a63590497b..a176a63ada5 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30059.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30059.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30059", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:17:23.210", - "lastModified": "2024-11-21T09:11:09.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:33:36.930", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:intune_mobile_application_management:*:*:*:*:*:android:*:*", + "versionEndExcluding": "5.0.6215.0", + "matchCriteriaId": "24F9C880-F5AB-4FFF-B489-0CEF04CC403A" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30059", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30059", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31889.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31889.json index 3b766b9b120..97da5418ba4 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31889.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31889.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31889", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-05-31T13:15:09.407", - "lastModified": "2024-11-21T09:14:05.393", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:10:40.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,22 +71,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E647C68C-3438-4635-BEBA-D6F5076DA50F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4ACFEF51-41FE-43CF-A0A4-0D2C355E2E3F" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/288136", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7151122", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/288136", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7151122", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31907.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31907.json index 9153ddacbc7..a35dda6d372 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31907.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31907.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31907", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-05-31T13:15:09.637", - "lastModified": "2024-11-21T09:14:06.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:06:40.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,22 +71,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E647C68C-3438-4635-BEBA-D6F5076DA50F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4ACFEF51-41FE-43CF-A0A4-0D2C355E2E3F" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/289889", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7151122", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/289889", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7151122", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31908.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31908.json index cd4d308a558..70d6c39231b 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31908.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31908.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31908", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-05-31T13:15:09.853", - "lastModified": "2024-11-21T09:14:06.937", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T17:02:59.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,22 +71,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E647C68C-3438-4635-BEBA-D6F5076DA50F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:planning_analytics_local:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4ACFEF51-41FE-43CF-A0A4-0D2C355E2E3F" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/289890", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7151122", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/289890", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7151122", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32868.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32868.json index 70ef5cc45f1..8217625199d 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32868.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32868.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32868", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-26T00:15:08.753", - "lastModified": "2024-11-21T09:15:53.900", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:21:50.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -53,24 +73,64 @@ "value": "CWE-307" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.50.0", + "matchCriteriaId": "8A197D8E-D7FE-4179-9801-3098A9734003" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.50.0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-7j7j-66cv-m239", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.50.0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-7j7j-66cv-m239", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32967.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32967.json index d8e7c65241b..0c08ba5b5bf 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32967.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32967.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32967", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-01T07:15:40.537", - "lastModified": "2024-11-21T09:16:07.900", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:30:33.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,72 +69,183 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.45.7", + "matchCriteriaId": "15D019CD-D79D-4B81-9C28-802373CA2B17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.46.0", + "versionEndExcluding": "2.46.7", + "matchCriteriaId": "4BFB7830-9DF5-4FF5-A6E8-A976B96396E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.47.0", + "versionEndExcluding": "2.47.10", + "matchCriteriaId": "98F0456B-00F0-484D-9F05-9DB92F1F3784" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.48.0", + "versionEndExcluding": "2.48.5", + "matchCriteriaId": "D2512D91-605E-483E-BDA4-957BE71D0386" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.49.0", + "versionEndExcluding": "2.49.5", + "matchCriteriaId": "6FC417F4-B0D4-4C2E-823B-B746AA58236E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.50.0", + "versionEndExcluding": "2.50.3", + "matchCriteriaId": "07BB6554-4F98-4458-932E-F456C00B17D9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/zitadel/zitadel/commit/b918603b576d156a08b90917c14c2d019c82ffc6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.45.7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.46.7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.47.10", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.48.5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.49.5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.50.3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-q5qj-x2h5-3945", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/b918603b576d156a08b90917c14c2d019c82ffc6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.45.7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.46.7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.47.10", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.48.5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.49.5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.50.3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-q5qj-x2h5-3945", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3266.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3266.json index 32618961902..440fea25b86 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3266.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3266.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3266", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:40.727", - "lastModified": "2024-11-21T09:29:16.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:10:17.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.8.9", + "matchCriteriaId": "FC6F8754-2DCF-47CC-9602-6F37E9596D11" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3064413/bold-page-builder", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/21fed5a3-1bb2-4581-95b4-badff98bed42?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3064413/bold-page-builder", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/21fed5a3-1bb2-4581-95b4-badff98bed42?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3267.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3267.json index 1dda5ebbeb5..6680abfebc3 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3267.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3267.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3267", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:40.897", - "lastModified": "2024-11-21T09:29:16.917", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:10:33.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.8.9", + "matchCriteriaId": "FC6F8754-2DCF-47CC-9602-6F37E9596D11" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3064413/bold-page-builder", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eed667d2-e53e-47b9-8012-2b9b46022f3a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3064413/bold-page-builder", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eed667d2-e53e-47b9-8012-2b9b46022f3a?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3560.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3560.json index 5b2119718c8..0c212ecfc4c 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3560.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3560.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3560", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-19T02:15:10.913", - "lastModified": "2024-11-21T09:29:52.617", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:25:20.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.2.6.5", + "matchCriteriaId": "AFAA7262-B40F-4E38-9F3B-0C9A42C44CF7" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3072233%40learnpress&new=3072233%40learnpress&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea002da-bf37-4c6d-a46e-4f0e7f8968ad?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3072233%40learnpress&new=3072233%40learnpress&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ea002da-bf37-4c6d-a46e-4f0e7f8968ad?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3598.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3598.json index 3b342036ceb..84b6a6bac77 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3598.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3598.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3598", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-19T02:15:11.083", - "lastModified": "2024-11-21T09:29:57.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:26:13.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "3.6.1", + "matchCriteriaId": "47CE311A-7EE4-405F-984B-AC3A71E177CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpmet.com/plugin/elementskit/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a9e4b14f-0f55-47bc-8e40-19b262e50561?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wpmet.com/plugin/elementskit/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a9e4b14f-0f55-47bc-8e40-19b262e50561?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39683.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39683.json index b17561e653d..f2238449fa2 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39683.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39683.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39683", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-03T20:15:04.840", - "lastModified": "2024-11-21T09:28:12.830", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:24:07.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,88 +69,196 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.53.0", + "versionEndExcluding": "2.53.8", + "matchCriteriaId": "5976968D-F1B6-4FE8-8E2B-98BD1013BB3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.54.0", + "versionEndExcluding": "2.54.5", + "matchCriteriaId": "6E5CFD42-7A8B-414C-AB09-257C1116E42B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:2.55.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A4ED9439-D16E-4F3E-B75D-EE7379A35207" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:2.55.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "D365EF32-0A70-4E98-B4A6-D46CB25A4644" + } + ] + } + ] } ], "references": [ { "url": "https://discord.com/channels/927474939156643850/1254096852937347153", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Permissions Required", + "URL Repurposed" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/4a262e42abac2208b02fefaf68ba1a5121649f04", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/c2093ce01507ca8fc811609ff5d391693360c3da", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/d04f208486a418a45b884b9ca8433e5ad9790d73", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/issues/8213", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/zitadel/zitadel/pull/8231", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.53.8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.54.5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.55.1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-cvw9-c57h-3397", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://discord.com/channels/927474939156643850/1254096852937347153", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "URL Repurposed" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/4a262e42abac2208b02fefaf68ba1a5121649f04", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/c2093ce01507ca8fc811609ff5d391693360c3da", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/d04f208486a418a45b884b9ca8433e5ad9790d73", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/issues/8213", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/pull/8231", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.53.8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.54.5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.55.1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-cvw9-c57h-3397", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3923.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3923.json index d7a94d655a8..64649e53904 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3923.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3923.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3923", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:42:35.600", - "lastModified": "2024-11-21T09:30:42.610", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:43:59.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fastlinemedia:beaver_builder:*:*:*:*:lite:wordpress:*:*", + "versionEndIncluding": "2.8.1.2", + "matchCriteriaId": "E9190A10-8CE3-4924-B9A9-EFE78960D855" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/beaver-builder-lite-version/tags/2.8.0.7/modules/button/includes/frontend.php#L14", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3078825%40beaver-builder-lite-version%2Ftrunk&old=3062187%40beaver-builder-lite-version%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/99960ff7-62e1-4c44-ae8e-ebda3e075781?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/beaver-builder-lite-version/tags/2.8.0.7/modules/button/includes/frontend.php#L14", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3078825%40beaver-builder-lite-version%2Ftrunk&old=3062187%40beaver-builder-lite-version%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/99960ff7-62e1-4c44-ae8e-ebda3e075781?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41952.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41952.json index d9559dda1b4..507446881ec 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41952.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41952.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41952", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T17:15:10.597", - "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:27:21.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,60 +69,169 @@ "value": "CWE-203" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.53.0", + "versionEndExcluding": "2.53.9", + "matchCriteriaId": "0FEB64E1-AA7A-44A6-97EA-D82646DA5D07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.54.0", + "versionEndExcluding": "2.54.8", + "matchCriteriaId": "F42BFC4E-33C3-48F0-9CAB-72D2EEFEF163" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.55.0", + "versionEndExcluding": "2.55.5", + "matchCriteriaId": "C81EA150-B7C8-4682-9D33-B04DB4075205" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.56.0", + "versionEndExcluding": "2.56.2", + "matchCriteriaId": "7675309A-22D1-4A64-9CB6-F36A496C421F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:2.57.0:-:*:*:*:*:*:*", + "matchCriteriaId": "CAA9A765-F2B2-46B8-BEA8-F9CEA81BEFA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:2.57.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "4863B756-9DE4-4171-8035-E6965D55D578" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:2.57.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "C2FEB539-0344-44F4-9595-9C35033FBF14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:2.58.0:*:*:*:*:*:*:*", + "matchCriteriaId": "02DB4060-6B1F-4FDB-9B50-6C47B613B8B1" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/zitadel/zitadel/commit/0ab0c645ef914298c343fa39cccb1290aba48bf6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/3c7d12834e32426416235b9e3374be0f4b9380b8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/5c2526c98aafd1ba206be2fa4291b1d24c384f6d", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/8565d24fd8df5bd35294313cfbfcc2e15aea20e9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/b0e71a81ef39667ce2a149ce037c1ca0edbe059d", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/fc1d415b8db5b8d481bb65206ce3fc944c0eecea", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.53.9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.54.8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.55.5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.56.2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.57.1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.58.1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-567v-6hmg-6qg7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41953.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41953.json index 66863b00741..b15246624d5 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41953.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41953.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41953", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T17:15:10.850", - "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:29:25.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,68 +69,190 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.52.0", + "versionEndExcluding": "2.52.3", + "matchCriteriaId": "D5175425-BCED-488C-8786-E093C1D5E561" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.53.0", + "versionEndExcluding": "2.53.9", + "matchCriteriaId": "0FEB64E1-AA7A-44A6-97EA-D82646DA5D07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.54.0", + "versionEndExcluding": "2.54.8", + "matchCriteriaId": "F42BFC4E-33C3-48F0-9CAB-72D2EEFEF163" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.55.0", + "versionEndExcluding": "2.55.5", + "matchCriteriaId": "C81EA150-B7C8-4682-9D33-B04DB4075205" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.56.0", + "versionEndExcluding": "2.56.2", + "matchCriteriaId": "7675309A-22D1-4A64-9CB6-F36A496C421F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:2.57.0:-:*:*:*:*:*:*", + "matchCriteriaId": "CAA9A765-F2B2-46B8-BEA8-F9CEA81BEFA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:2.57.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "4863B756-9DE4-4171-8035-E6965D55D578" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:2.57.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "C2FEB539-0344-44F4-9595-9C35033FBF14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:2.58.0:*:*:*:*:*:*:*", + "matchCriteriaId": "02DB4060-6B1F-4FDB-9B50-6C47B613B8B1" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/zitadel/zitadel/commit/0e1f99e987b5851caec45a72660fe9f67e425747", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/38da602ee1cfc35c0d7918c298fbfc3f3674133b", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/4b59cac67bb89c1f3f84a2041dd273d11151d29f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/c1a3fc72dde16e987d8a09aa291e7c2edfc928f7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/c353f82f89c6982c0888c6763363296cf4263cb2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/d04ac6df8f2f0243e649b802a8bfa6176cef0923", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/commit/f846616a3f022e88e3ea8cea05d3254ad86f1615", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.52.3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.53.9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.54.8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.55.5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.56.2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.57.1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/releases/tag/v2.58.1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-v333-7h2p-5fhv", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4430.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4430.json index b043d169a16..d2c3eb0c9a2 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4430.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4430.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4430", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:43:43.260", - "lastModified": "2024-11-21T09:42:48.940", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:43:41.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fastlinemedia:beaver_builder:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "2.8.1.3", + "matchCriteriaId": "91C8230E-08B3-455F-A13E-F4D15023F8DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3083534%40beaver-builder-lite-version%2Ftrunk&old=3078825%40beaver-builder-lite-version%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cd6ed285-f215-44d3-9db9-9b2bfffee60a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wpbeaverbuilder.com/change-logs/?utm_medium=bb-lite&utm_source=repo-readme&utm_campaign=repo-changelog-page", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3083534%40beaver-builder-lite-version%2Ftrunk&old=3078825%40beaver-builder-lite-version%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cd6ed285-f215-44d3-9db9-9b2bfffee60a?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wpbeaverbuilder.com/change-logs/?utm_medium=bb-lite&utm_source=repo-readme&utm_campaign=repo-changelog-page", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51442.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51442.json new file mode 100644 index 00000000000..e869a383d1d --- /dev/null +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51442.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-51442", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-08T18:15:16.650", + "lastModified": "2025-01-08T18:15:16.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Command Injection in Minidlna version v1.3.3 and before allows an attacker to execute arbitrary OS commands via a specially crafted minidlna.conf configuration file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/mselbrede/CVE-2024-51442", + "source": "cve@mitre.org" + }, + { + "url": "https://sourceforge.net/p/minidlna/bugs/364/", + "source": "cve@mitre.org" + }, + { + "url": "https://sourceforge.net/p/minidlna/git/ci/master/tree/minidlna.c", + "source": "cve@mitre.org" + }, + { + "url": "https://sourceforge.net/projects/minidlna/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53933.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53933.json index 43995566e57..85a57b1f7d6 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53933.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53933.json @@ -2,16 +2,43 @@ "id": "CVE-2024-53933", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:10.293", - "lastModified": "2025-01-06T22:15:10.293", + "lastModified": "2025-01-08T18:15:16.830", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The com.callerscreen.colorphone.themes.callflash (aka Color Call Theme & Call Screen) application through 1.0.7 for Android enables any application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.android.call.color.app.activities.DialerActivity component." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n com.callerscreen.colorphone.themes.callflash (tambi\u00e9n conocida como Color Call Theme & Call Screen) hasta la versi\u00f3n 1.0.7 para Android permite que cualquier aplicaci\u00f3n (sin permisos) realice llamadas telef\u00f3nicas sin interacci\u00f3n del usuario enviando una intenci\u00f3n manipulada a trav\u00e9s del componente com.android.call.color.app.activities.DialerActivity." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://github.com/actuator/com.callerscreen.colorphone.themes.callflash", diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53934.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53934.json index b46e087cf65..064dcf4fc8a 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53934.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53934.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53934", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:10.410", - "lastModified": "2025-01-06T22:15:10.410", + "lastModified": "2025-01-08T17:15:15.630", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The com.windymob.callscreen.ringtone.callcolor.colorphone (aka Color Phone Call Screen Themes) application through 1.1.2 for Android enables any application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.frovis.androidbase.call.DialerActivity component." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n com.windymob.callscreen.ringtone.callcolor.colorphone (tambi\u00e9n conocida como Color Phone Call Screen Themes) hasta la versi\u00f3n 1.1.2 para Android permite que cualquier aplicaci\u00f3n (sin permisos) realice llamadas telef\u00f3nicas sin interacci\u00f3n del usuario enviando una intenci\u00f3n manipulada a trav\u00e9s del componente com.frovis.androidbase.call.DialerActivity." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/actuator/com.windymob.callscreen.ringtone.callcolor.colorphone", diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53936.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53936.json index aa42a7cd380..c0672bf16f5 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53936.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53936.json @@ -2,16 +2,43 @@ "id": "CVE-2024-53936", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:10.630", - "lastModified": "2025-01-06T22:15:10.630", + "lastModified": "2025-01-08T18:15:17.067", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The com.asianmobile.callcolor (aka Color Phone Call Screen App) application through 24 for Android enables any application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.asianmobile.callcolor.ui.component.call.CallActivity component." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n com.asianmobile.callcolor (tambi\u00e9n conocida como Color Phone Call Screen App) de 24 para Android permite que cualquier aplicaci\u00f3n (sin permisos) realice llamadas telef\u00f3nicas sin interacci\u00f3n del usuario enviando una intenci\u00f3n manipulada a trav\u00e9s del componente com.asianmobile.callcolor.ui.component.call.CallActivity." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://github.com/actuator/com.asianmobile.callcolor", diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54491.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54491.json index d4ebe0d67d2..d1d0604e5d2 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54491.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54491.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54491", "sourceIdentifier": "product-security@apple.com", "published": "2024-12-12T02:15:30.270", - "lastModified": "2024-12-20T19:15:08.100", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-08T18:06:21.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.2", + "matchCriteriaId": "3750AD63-B023-44CE-B44D-A90F98E3A8C0" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121839", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55459.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55459.json new file mode 100644 index 00000000000..0a0a1c5cafa --- /dev/null +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55459.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-55459", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-08T17:15:15.817", + "lastModified": "2025-01-08T18:15:17.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in keras 3.7.0 allows attackers to write arbitrary files to the user's machine via downloading a crafted tar file through the get_file function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/keras-team/keras", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/mselbrede/CVE-2024-51442", + "source": "cve@mitre.org" + }, + { + "url": "https://keras.io", + "source": "cve@mitre.org" + }, + { + "url": "https://river-bicycle-f1e.notion.site/Arbitrary-File-Write-Vulnerability-in-get_file-function-11888e31952580179224e50892976d32", + "source": "cve@mitre.org" + }, + { + "url": "https://river-bicycle-f1e.notion.site/Arbitrary-File-Write-Vulnerability-in-get_file-function-11888e31952580179224e50892976d32", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56536.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56536.json index 4341caff74e..cd74e5915a2 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56536.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56536.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56536", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:33.173", - "lastModified": "2024-12-27T14:15:33.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:08:05.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: cw1200: Se corrige una posible desreferencia NULL. Se identific\u00f3 una refactorizaci\u00f3n reciente mediante un an\u00e1lisis est\u00e1tico que provoca una posible desreferencia NULL. \u00a1Corrija esto!" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "DA52CE66-8AE3-4BFA-82D0-77FBA8B09503" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0ec90ac5f7bd9dd573bd5d964cbdc3beaa93a33e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2b94751626a6d49bbe42a19cc1503bd391016bd5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/67c914f2d64b28409796a6b9036c131e93f8af6c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56578.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56578.json index a86a085497d..d456ea9dca5 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56578.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56578.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56578", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:16.873", - "lastModified": "2024-12-27T15:15:16.873", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:08:24.730", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: imx-jpeg: Establecer video drvdata antes de registrar el dispositivo de video. El video drvdata debe configurarse antes de que se registre el dispositivo de video; de lo contrario, video_drvdata() puede devolver NULL en las operaciones de archivo open() y generar un error." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.13", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "98AAB746-8653-4FD8-9B39-61F09957759F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.4", + "matchCriteriaId": "04756810-D093-4B43-B1D9-CF5035968061" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5ade59d28eade49194eb09765afdeb0ba717c39a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/68efeff2f7fccdfedc55f92e92be32997127d16e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b88556e82dc18cb708744d062770853a2d5095b2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d2b7ecc26bd5406d5ba927be1748aa99c568696c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f68bb1210fbea252552d97242757f69a219e942b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56579.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56579.json index 096a3658525..e5b59c49a89 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56579.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56579.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56579", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:16.983", - "lastModified": "2024-12-27T15:15:16.983", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:08:40.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: amphion: Establecer video drvdata antes de registrar el dispositivo de video. El video drvdata debe establecerse antes de que se registre el dispositivo de video; de lo contrario, video_drvdata() puede devolver NULL en las operaciones de archivo open() y generar un error." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "4EB97A09-F7D3-4B32-8BA0-E85161566B20" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.4", + "matchCriteriaId": "04756810-D093-4B43-B1D9-CF5035968061" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/182b9edc02c4cbb6fe6b97105c23c7047a3340d2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8cbb1a7bd5973b57898b26eb804fe44af440bb63", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/988cc10ddbdee0369fe1f193d389da38ad760492", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cfe96c7c3382293179e291f66644d789e39e99f3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56608.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56608.json index 2c6d31ce168..5201e77495d 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56608.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56608.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56608", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:20.283", - "lastModified": "2024-12-27T15:15:20.283", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:10:01.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Se corrige el acceso fuera de los l\u00edmites en 'dcn21_link_encoder_create' Se identific\u00f3 un problema en la funci\u00f3n dcn21_link_encoder_create donde podr\u00eda ocurrir un acceso fuera de los l\u00edmites cuando se us\u00f3 el \u00edndice hpd_source para hacer referencia a la matriz link_enc_hpd_regs. Esta matriz tiene un tama\u00f1o fijo y el \u00edndice no se estaba verificando con los l\u00edmites de la matriz antes de acceder a ella. Esta correcci\u00f3n agrega una verificaci\u00f3n condicional para garantizar que el \u00edndice hpd_source est\u00e9 dentro del rango v\u00e1lido de la matriz link_enc_hpd_regs. Si el \u00edndice est\u00e1 fuera de los l\u00edmites, la funci\u00f3n ahora devuelve NULL para evitar un comportamiento indefinido. Referencias: [ 65.920507] ------------[ cortar aqu\u00ed ]------------ [ 65.920510] UBSAN: array-index-out-of-bounds en drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn21/dcn21_resource.c:1312:29 [ 65.920519] el \u00edndice 7 est\u00e1 fuera de rango para el tipo 'dcn10_link_enc_hpd_registers [5]' [ 65.920523] CPU: 3 PID: 1178 Comm: modprobe Tainted: G OE 6.8.0-cleanershaderfeatureresetasdntipmi200nv2132 #13 [ 65.920525] Nombre del hardware: AMD Majolica-RN/Majolica-RN, BIOS WMJ0429N_Semanal_20_04_2 29/04/2020 [ 65.920527] Seguimiento de llamadas: [ 65.920529] [ 65.920532] dump_stack_lvl+0x48/0x70 [ 65.920541] dump_stack+0x10/0x20 [ 65.920543] __ubsan_handle_out_of_bounds+0xa2/0xe0 [ 65.920549] dcn21_link_encoder_create+0xd9/0x140 [amdgpu] [ 65.921009] link_create+0x6d3/0xed0 [amdgpu] [ 65.921355] dmi_matches+0xa0/0x220 [65.922004] amdgpu_dm_init+0x2b6/0x2c90 [amdgpu] [65.922342] ? console_unlock+0x77/0x120 [65.922348] ? dev_printk_emit+0x86/0xb0 [ 65.922354] dm_hw_init+0x15/0x40 [amdgpu] [ 65.922686] amdgpu_device_init+0x26a8/0x33a0 [amdgpu] [ 65.922921] amdgpu_driver_load_kms+0x1b/0xa0 [amdgpu] [ 65.923087] amdgpu_pci_probe+0x1b7/0x630 [amdgpu] [ 65.923087] local_pci_probe+0x4b/0xb0 [ 65.923087] pci_device_probe+0xc8/0x280 [ 65.923087] realmente_probe+0x187/0x300 [ 65.923087] __driver_probe_device+0x85/0x130 [ 65.923087] driver_probe_device+0x24/0x110 [ 65.923087] __driver_attach+0xac/0x1d0 [ 65.923087] ? __pfx___driver_attach+0x10/0x10 [ 65.923087] bus_para_cada_dispositivo+0x7d/0xd0 [ 65.923087] driver_attach+0x1e/0x30 [ 65.923087] bus_add_driver+0xf2/0x200 [ 65.923087] driver_register+0x64/0x130 [ 65.923087] ? __pfx_amdgpu_init+0x10/0x10 [amdgpu] [ 65.923087] __pci_register_driver+0x61/0x70 [ 65.923087] amdgpu_init+0x7d/0xff0 [amdgpu] [ 65.923087] hacer_una_llamada_init+0x49/0x310 [ 65.923087] ? kmalloc_trace+0x136/0x360 [ 65.923087] hacer_init_module+0x6a/0x270 [ 65.923087] cargar_m\u00f3dulo+0x1fce/0x23a0 [ 65.923087] iniciar_m\u00f3dulo_desde_archivo+0x9c/0xe0 [ 65.923087] ? m\u00f3dulo_de_inicio_desde_archivo+0x9c/0xe0 [ 65.923087] m\u00f3dulo_de_inicio_idempotente+0x179/0x230 [ 65.923087] m\u00f3dulo_de_finici\u00f3n_del_sistema_x64+0x5d/0xa0 [ 65.923087] llamada_al_sistema_64+0x76/0x120 [ 65.923087] llamada_al_sistema_64_despu\u00e9s_de_hwframe+0x6e/0x76 [ 65.923087] RIP: 0033:0x7f2d80f1e88d [ 65.923087] C\u00f3digo: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 b5 0f 00 f7 d8 64 89 01 48 [ 65.923087] RSP: 002b:00007ffc7bc1aa78 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 [ 65.923087] RAX: ffffffffffffffda RBX: 0000564c9c1db130 RCX: 00007f2d80f1e88d [ 65.923087] RDX: 0000000000000000 RSI: 0000564c9c1e5480 RDI: 000000000000000f [ 65.923087] RBP: 0000000000040000 R08: 0000000000000000 R09: 0000000000000002 [ 65.923087] R10: 000000000000000f R11: 0000000000000246 R12: 0000564c9c1e5480 [ 65.923087] R13: 0000564c9c1db260 R14: 0000000000000000 R15: 0000564c9c1e54b0 [ 65.923087] [ 65.923927] ---[ fin del seguimiento ]---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.12.5", + "matchCriteriaId": "75E05E0A-C898-433A-8E50-6D9EC8646A64" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/63de35a8fcfca59ae8750d469a7eb220c7557baf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f01ddd589e162979421e6914b1c74018633f01e0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56614.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56614.json index 69fec36184a..654a9449ae0 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56614.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56614.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56614", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:20.897", - "lastModified": "2024-12-27T15:15:20.897", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:10:39.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,122 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xsk: se corrige la escritura en mapas OOB al eliminar elementos Jordy dice: \"En la funci\u00f3n xsk_map_delete_elem, un entero sin signo (map->max_entries) se compara con un entero con signo controlado por el usuario (k). Debido a la conversi\u00f3n de tipo impl\u00edcita, un valor sin signo grande para map->max_entries puede eludir la comprobaci\u00f3n de los l\u00edmites prevista: if (k >= map->max_entries) return -EINVAL; Esto permite que k contenga un valor negativo (entre -2147483648 y -2), que luego se utiliza como un \u00edndice de matriz en m->xsk_map[k], lo que da como resultado un acceso fuera de los l\u00edmites. spin_lock_bh(&m->lock); map_entry = &m->xsk_map[k]; // Entrada de mapa fuera de los l\u00edmites old_xs = unrcu_pointer(xchg(map_entry, NULL)); // Oob write if (old_xs) xsk_map_sock_delete(old_xs, map_entry); spin_unlock_bh(&m->lock); La operaci\u00f3n xchg se puede utilizar para provocar una escritura fuera de los l\u00edmites. Adem\u00e1s, la map_entry no v\u00e1lida pasada a xsk_map_sock_delete puede provocar una mayor corrupci\u00f3n de la memoria. \" De hecho, da como resultado el siguiente error: [76612.897343] ERROR: no se puede gestionar la falla de p\u00e1gina para la direcci\u00f3n: ffffc8fc2e461108 [76612.904330] #PF: acceso de escritura del supervisor en modo kernel [76612.909639] #PF: error_code(0x0002) - p\u00e1gina no presente [76612.914855] PGD 0 P4D 0 [76612.917431] Ups: Ups: 0002 [#1] PREEMPT SMP [76612.921859] CPU: 11 UID: 0 PID: 10318 Comm: a.out No contaminado 6.12.0-rc1+ #470 [76612.929189] Nombre del hardware: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 19/03/2019 [76612.939781] RIP: 0010:xsk_map_delete_elem+0x2d/0x60 [76612.944738] C\u00f3digo: 00 00 41 54 55 53 48 63 2e 3b 6f 24 73 38 4c 8d a7 f8 00 00 00 48 89 fb 4c 89 e7 e8 2d bf 05 00 48 8d b4 eb 00 01 00 00 31 y siguientes <48> 87 3e 48 85 y siguientes 74 05 e8 16 y siguientes y siguientes y siguientes 4c 89 e7 e8 3e bc 05 00 31 [76612.963774] RSP: 0018:ffffc9002e407df8 EFLAGS: 00010246 [76612.969079] RAX: 0000000000000000 RBX: ffffc9002e461000 RCX: 0000000000000000 [76612.976323] RDX: 0000000000000001 RSI: ffffc8fc2e461108 RDI: 00000000000000000 [76612.983569] RBP: ffffffff80000001 R08: 0000000000000000 R09: 0000000000000007 [76612.990812] R10: ffffc9002e407e18 R11: ffff888108a38858 R12: ffffc9002e4610f8 [76612.998060] R13: ffff888108a38858 R14: 00007ffd1ae0ac78 R15: ffffc9002e4610c0 [76613.005303] FS: 00007f80b6f59740(0000) GS:ffff8897e0ec0000(0000) knlGS:0000000000000000 [76613.013517] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [76613.019349] CR2: ffffc8fc2e461108 CR3: 000000011e3ef001 CR4: 00000000007726f0 [76613.026595] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 000000000000000 [76613.033841] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [76613.041086] PKRU: 55555554 [76613.043842] Seguimiento de llamadas: [76613.046331] [76613.048468] ? __die+0x20/0x60 [76613.051581] ? error_de_p\u00e1gina_oops+0x15a/0x450 [76613.055747] ? b\u00fasqueda_extable+0x22/0x30 [76613.059649] ? b\u00fasqueda_bpf_extables+0x5f/0x80 [76613.063988] ? error_de_p\u00e1gina_exc+0xa9/0x140 [76613.067975] ? error_de_p\u00e1gina_exc+0x22/0x30 [76613.072229] ? \u00bfxsk_map_delete_elem+0x2d/0x60 [76613.076573] ? xsk_map_delete_elem+0x23/0x60 [76613.080914] __sys_bpf+0x19b7/0x23c0 [76613.084555] __x64_sys_bpf+0x1a/0x20 [76613.088194] hacer_syscall_64+0x37/0xb0 [76613.091832] entrada_SYSCALL_64_after_hwframe+0x4b/0x53 [76613.096962] RIP: 0033:0x7f80b6d1e88d [76613.100592] C\u00f3digo: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 b5 0f 00 f7 d8 64 89 01 48 [76613.119631] RSP: 002b:00007ffd1ae0ac68 EFLAGS: 00000206 ORIG_RAX: 0000000000000141 [76613.131330] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f80b6d1e88d [76613.142632] RDX: 000000000000000098 RSI: 00007ffd1ae0ad20 RDI: 0000000000000003 [76613.153967] ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.18", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "A8151951-069A-4828-9C8E-5430FD2D7D67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.66", + "matchCriteriaId": "29A976AD-B9AB-4A95-9F08-7669F8847EB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.5", + "matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/32cd3db7de97c0c7a018756ce66244342fd583f0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4d03f705e9d7aabebc6bfa5810f8aab6d176cbb7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d486b5741d987d3e0e6be4ac22cafdf94e6d1a47", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ed08c93d5a9801cc8f224a046411fd603c538d07", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f8abd03f83d5fe81e76eb93e2c4373eb9f75fd8a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56688.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56688.json index 6ad90dd9f85..6b999a96229 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56688.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56688.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56688", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-28T10:15:12.643", - "lastModified": "2024-12-28T10:15:12.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:11:05.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,159 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sunrpc: borrar XPRT_SOCK_UPD_TIMEOUT al reiniciar el transporte Dado que transport->sock se ha establecido en NULL durante el reinicio del transporte, tambi\u00e9n es necesario borrar XPRT_SOCK_UPD_TIMEOUT. De lo contrario, xs_tcp_set_socket_timeouts() puede activarse en xs_tcp_send_request() para desreferenciar el transport->sock que se ha establecido en NULL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.11", + "versionEndExcluding": "5.4.287", + "matchCriteriaId": "5F182E41-B51C-4700-AC27-E092FB0ACC21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.231", + "matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3811172e8c98ceebd12fe526ca6cb37a1263c964", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4db9ad82a6c823094da27de4825af693a3475d51", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/638a8fa5a7e641f9401346c57e236f02379a0c40", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/66d11ca91bf5100ae2e6b5efad97e58d8448843a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/86a1f9fa24804cd7f9d7dd3f24af84fc7f8ec02e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/87a95ee34a48dfad198a2002e4966e1d63d53f2b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc91d59d34ff6a6fee1c0b48612081a451e05e9a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe6cbf0b2ac3cf4e21824a44eaa336564ed5e960", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56694.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56694.json index 6d8b597c1c1..d70b7279367 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56694.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56694.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56694", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-28T10:15:15.203", - "lastModified": "2024-12-28T10:15:15.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:11:31.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,138 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: se corrige el bloqueo recursivo cuando el programa de veredicto devuelve SK_PASS Cuando el programa stream_verdict devuelve SK_PASS, coloca el skb recibido en su propia cola de recepci\u00f3n, pero finalmente se produce un bloqueo recursivo que provoca un bloqueo del sistema operativo. Este problema ha estado presente desde la versi\u00f3n v6.9. ''' sk_psock_strp_data_ready write_lock_bh(&sk->sk_callback_lock) strp_data_ready strp_read_sock read_sock -> tcp_read_sock strp_recv cb.rcv_msg -> sk_psock_strp_read # ahora stream_verdict devuelve SK_PASS sin asignaci\u00f3n de sock de pares __SK_PASS = sk_psock_map_verd(SK_PASS, NULL) sk_psock_verdict_apply sk_psock_skb_ingress_self sk_psock_skb_ingress_enqueue sk_psock_data_ready read_lock_bh(&sk->sk_callback_lock) <= bloqueo muerto ''' Este tema se ha discutido antes, pero no se ha solucionado. Discusi\u00f3n anterior: https://lore.kernel.org/all/6684a5864ec86_403d20898@john.notmuch" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.223", + "versionEndExcluding": "5.11", + "matchCriteriaId": "CA30912E-AC28-4CAA-B0BF-82A5ABF6555D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.159", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "AE68EECA-B500-4C8F-BA03-6297422D3BE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.91", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "D7525FB8-F6DA-4FBF-A1B7-66F009E2F1FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.31", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "C14BE86F-46F8-45CE-942E-3CB49D3AAB95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8.10", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "DC02F628-9D7C-48E7-93BD-4A25BD2C74CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/01f1b88acfd79103da0610b45471f6c88ea98d72", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/386efa339e08563dd33e83bc951aea5d407fe578", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6694f7acd625ed854bf6342926e771d65dad7f69", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8ca2a1eeadf09862190b2810697702d803ceef2d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/da2bc8a0c8f3ac66fdf980fc59936f851a083561", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f84c5ef6ca23cc2f72f3b830d74f67944684bb05", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56708.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56708.json index 6dfe3cf5819..7322e91b40e 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56708.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56708.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56708", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-28T10:15:20.397", - "lastModified": "2024-12-28T10:15:20.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-08T17:11:50.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: EDAC/igen6: Evitar fallo de segmentaci\u00f3n al descargar el m\u00f3dulo El fallo de segmentaci\u00f3n ocurre porque: Durante modprobe: 1. En igen6_probe(), igen6_pvt se asignar\u00e1 con kzalloc() 2. En igen6_register_mci(), mci->pvt_info apuntar\u00e1 a &igen6_pvt->imc[mc] Durante rmmod: 1. En mci_release() en edac_mc.c, kfree(mci->pvt_info) 2. En igen6_remove(), kfree(igen6_pvt); Solucione este problema configurando mci->pvt_info en NULL para evitar el kfree doble." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/029ac07bb92d2f7502d47a4916f197a8445d83bf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a80e710bbc088a2511c159ee4d910456c5f0832", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/830cabb61113d92a425dd3038ccedbdfb3c8d079", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/db60326f2c47b079e36785ace621eb3002db2088", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e5c7052664b61f9e2f896702d20552707d0ef60a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fefaae90398d38a1100ccd73b46ab55ff4610fba", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56770.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56770.json new file mode 100644 index 00000000000..d4d8acb0620 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56770.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-56770", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T17:15:15.957", + "lastModified": "2025-01-08T17:15:15.957", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: netem: account for backlog updates from child qdisc\n\nIn general, 'qlen' of any classful qdisc should keep track of the\nnumber of packets that the qdisc itself and all of its children holds.\nIn case of netem, 'qlen' only accounts for the packets in its internal\ntfifo. When netem is used with a child qdisc, the child qdisc can use\n'qdisc_tree_reduce_backlog' to inform its parent, netem, about created\nor dropped SKBs. This function updates 'qlen' and the backlog statistics\nof netem, but netem does not account for changes made by a child qdisc.\n'qlen' then indicates the wrong number of packets in the tfifo.\nIf a child qdisc creates new SKBs during enqueue and informs its parent\nabout this, netem's 'qlen' value is increased. When netem dequeues the\nnewly created SKBs from the child, the 'qlen' in netem is not updated.\nIf 'qlen' reaches the configured sch->limit, the enqueue function stops\nworking, even though the tfifo is not full.\n\nReproduce the bug:\nEnsure that the sender machine has GSO enabled. Configure netem as root\nqdisc and tbf as its child on the outgoing interface of the machine\nas follows:\n$ tc qdisc add dev root handle 1: netem delay 100ms limit 100\n$ tc qdisc add dev parent 1:0 tbf rate 50Mbit burst 1542 latency 50ms\n\nSend bulk TCP traffic out via this interface, e.g., by running an iPerf3\nclient on the machine. Check the qdisc statistics:\n$ tc -s qdisc show dev \n\nStatistics after 10s of iPerf3 TCP test before the fix (note that\nnetem's backlog > limit, netem stopped accepting packets):\nqdisc netem 1: root refcnt 2 limit 1000 delay 100ms\n Sent 2767766 bytes 1848 pkt (dropped 652, overlimits 0 requeues 0)\n backlog 4294528236b 1155p requeues 0\nqdisc tbf 10: parent 1:1 rate 50Mbit burst 1537b lat 50ms\n Sent 2767766 bytes 1848 pkt (dropped 327, overlimits 7601 requeues 0)\n backlog 0b 0p requeues 0\n\nStatistics after the fix:\nqdisc netem 1: root refcnt 2 limit 1000 delay 100ms\n Sent 37766372 bytes 24974 pkt (dropped 9, overlimits 0 requeues 0)\n backlog 0b 0p requeues 0\nqdisc tbf 10: parent 1:1 rate 50Mbit burst 1537b lat 50ms\n Sent 37766372 bytes 24974 pkt (dropped 327, overlimits 96017 requeues 0)\n backlog 0b 0p requeues 0\n\ntbf segments the GSO SKBs (tbf_segment) and updates the netem's 'qlen'.\nThe interface fully stops transferring packets and \"locks\". In this case,\nthe child qdisc and tfifo are empty, but 'qlen' indicates the tfifo is at\nits limit and no more packets are accepted.\n\nThis patch adds a counter for the entries in the tfifo. Netem's 'qlen' is\nonly decreased when a packet is returned by its dequeue function, and not\nduring enqueuing into the child qdisc. External updates to 'qlen' are thus\naccounted for and only the behavior of the backlog statistics changes. As\nin other qdiscs, 'qlen' then keeps track of how many packets are held in\nnetem and all of its children. As before, sch->limit remains as the\nmaximum number of packets in the tfifo. The same applies to netem's\nbacklog statistics." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/10df49cfca73dfbbdb6c4150d859f7e8926ae427", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/216509dda290f6db92c816dd54b83c1df9da9e76", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/356078a5c55ec8d2061fcc009fb8599f5b0527f9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/3824c5fad18eeb7abe0c4fc966f29959552dca3e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/83c6ab12f08dcc09d4c5ac86fdb89736b28f1d31", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c2047b0e216c8edce227d7c42f99ac2877dad0e4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f8d4bc455047cf3903cd6f85f49978987dbb3027", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56771.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56771.json new file mode 100644 index 00000000000..25ca9599eec --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56771.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-56771", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T18:15:17.777", + "lastModified": "2025-01-08T18:15:17.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: spinand: winbond: Fix 512GW, 01GW, 01JW and 02JW ECC information\n\nThese four chips:\n* W25N512GW\n* W25N01GW\n* W25N01JW\n* W25N02JW\nall require a single bit of ECC strength and thus feature an on-die\nHamming-like ECC engine. There is no point in filling a ->get_status()\ncallback for them because the main ECC status bytes are located in\nstandard places, and retrieving the number of bitflips in case of\ncorrected chunk is both useless and unsupported (if there are bitflips,\nthen there is 1 at most, so no need to query the chip for that).\n\nWithout this change, a kernel warning triggers every time a bit flips." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/234d5f75c3ae911b52c5e4442b8a87fbbd129836", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/fee9b240916df82a8b07aef0fdfe96785417a164", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56772.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56772.json new file mode 100644 index 00000000000..3b0c38d3a6c --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56772.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-56772", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T18:15:17.897", + "lastModified": "2025-01-08T18:15:17.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nkunit: string-stream: Fix a UAF bug in kunit_init_suite()\n\nIn kunit_debugfs_create_suite(), if alloc_string_stream() fails in the\nkunit_suite_for_each_test_case() loop, the \"suite->log = stream\"\nhas assigned before, and the error path only free the suite->log's stream\nmemory but not set it to NULL, so the later string_stream_clear() of\nsuite->log in kunit_init_suite() will cause below UAF bug.\n\nSet stream pointer to NULL after free to fix it.\n\n\tUnable to handle kernel paging request at virtual address 006440150000030d\n\tMem abort info:\n\t ESR = 0x0000000096000004\n\t EC = 0x25: DABT (current EL), IL = 32 bits\n\t SET = 0, FnV = 0\n\t EA = 0, S1PTW = 0\n\t FSC = 0x04: level 0 translation fault\n\tData abort info:\n\t ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n\t CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n\t GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\t[006440150000030d] address between user and kernel address ranges\n\tInternal error: Oops: 0000000096000004 [#1] PREEMPT SMP\n\tDumping ftrace buffer:\n\t (ftrace buffer empty)\n\tModules linked in: iio_test_gts industrialio_gts_helper cfg80211 rfkill ipv6 [last unloaded: iio_test_gts]\n\tCPU: 5 UID: 0 PID: 6253 Comm: modprobe Tainted: G B W N 6.12.0-rc4+ #458\n\tTainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST\n\tHardware name: linux,dummy-virt (DT)\n\tpstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n\tpc : string_stream_clear+0x54/0x1ac\n\tlr : string_stream_clear+0x1a8/0x1ac\n\tsp : ffffffc080b47410\n\tx29: ffffffc080b47410 x28: 006440550000030d x27: ffffff80c96b5e98\n\tx26: ffffff80c96b5e80 x25: ffffffe461b3f6c0 x24: 0000000000000003\n\tx23: ffffff80c96b5e88 x22: 1ffffff019cdf4fc x21: dfffffc000000000\n\tx20: ffffff80ce6fa7e0 x19: 032202a80000186d x18: 0000000000001840\n\tx17: 0000000000000000 x16: 0000000000000000 x15: ffffffe45c355cb4\n\tx14: ffffffe45c35589c x13: ffffffe45c03da78 x12: ffffffb810168e75\n\tx11: 1ffffff810168e74 x10: ffffffb810168e74 x9 : dfffffc000000000\n\tx8 : 0000000000000004 x7 : 0000000000000003 x6 : 0000000000000001\n\tx5 : ffffffc080b473a0 x4 : 0000000000000000 x3 : 0000000000000000\n\tx2 : 0000000000000001 x1 : ffffffe462fbf620 x0 : dfffffc000000000\n\tCall trace:\n\t string_stream_clear+0x54/0x1ac\n\t __kunit_test_suites_init+0x108/0x1d8\n\t kunit_exec_run_tests+0xb8/0x100\n\t kunit_module_notify+0x400/0x55c\n\t notifier_call_chain+0xfc/0x3b4\n\t blocking_notifier_call_chain+0x68/0x9c\n\t do_init_module+0x24c/0x5c8\n\t load_module+0x4acc/0x4e90\n\t init_module_from_file+0xd4/0x128\n\t idempotent_init_module+0x2d4/0x57c\n\t __arm64_sys_finit_module+0xac/0x100\n\t invoke_syscall+0x6c/0x258\n\t el0_svc_common.constprop.0+0x160/0x22c\n\t do_el0_svc+0x44/0x5c\n\t el0_svc+0x48/0xb8\n\t el0t_64_sync_handler+0x13c/0x158\n\t el0t_64_sync+0x190/0x194\n\tCode: f9400753 d2dff800 f2fbffe0 d343fe7c (38e06b80)\n\t---[ end trace 0000000000000000 ]---\n\tKernel panic - not syncing: Oops: Fatal exception" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/3213b92754b94dec6836e8b4d6ec7d224a805b61", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/39e21403c978862846fa68b7f6d06f9cca235194", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56773.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56773.json new file mode 100644 index 00000000000..9ed3146dbca --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56773.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-56773", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T18:15:18.087", + "lastModified": "2025-01-08T18:15:18.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nkunit: Fix potential null dereference in kunit_device_driver_test()\n\nkunit_kzalloc() may return a NULL pointer, dereferencing it without\nNULL check may lead to NULL dereference.\nAdd a NULL check for test_state." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/435c20eed572a95709b1536ff78832836b2f91b1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5d28fac59369b5d3c48cdf09e50275a61ff91202", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56774.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56774.json new file mode 100644 index 00000000000..aefe38890dd --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56774.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-56774", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T18:15:18.213", + "lastModified": "2025-01-08T18:15:18.213", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: add a sanity check for btrfs root in btrfs_search_slot()\n\nSyzbot reports a null-ptr-deref in btrfs_search_slot().\n\nThe reproducer is using rescue=ibadroots, and the extent tree root is\ncorrupted thus the extent tree is NULL.\n\nWhen scrub tries to search the extent tree to gather the needed extent\ninfo, btrfs_search_slot() doesn't check if the target root is NULL or\nnot, resulting the null-ptr-deref.\n\nAdd sanity check for btrfs root before using it in btrfs_search_slot()." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/3ed51857a50f530ac7a1482e069dfbd1298558d4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/757171d1369b3b47f36932d40a05a0715496dcab", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/93992c3d9629b02dccf6849238559d5c24f2dece", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c71d114ef68c95da5a82ec85a721ab31f5bd905b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/db66fb87c21e8ae724886e6a464dcbac562a64c6", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56775.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56775.json new file mode 100644 index 00000000000..f5bd75d9f24 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56775.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-56775", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T18:15:18.333", + "lastModified": "2025-01-08T18:15:18.333", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix handling of plane refcount\n\n[Why]\nThe mechanism to backup and restore plane states doesn't maintain\nrefcount, which can cause issues if the refcount of the plane changes\nin between backup and restore operations, such as memory leaks if the\nrefcount was supposed to go down, or double frees / invalid memory\naccesses if the refcount was supposed to go up.\n\n[How]\nCache and re-apply current refcount when restoring plane states." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/27227a234c1487cb7a684615f0749c455218833a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8cb2f6793845f135b28361ba8e96901cae3e5790", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56776.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56776.json new file mode 100644 index 00000000000..803e0e35db2 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56776.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-56776", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T18:15:18.447", + "lastModified": "2025-01-08T18:15:18.447", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sti: avoid potential dereference of error pointers\n\nThe return value of drm_atomic_get_crtc_state() needs to be\nchecked. To avoid use of error pointer 'crtc_state' in case\nof the failure." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/40725c5fabee804fecce41d4d5c5bae80c45e1c4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/831214f77037de02afc287eae93ce97f218d8c04", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8ab73ac97c0fa528f66eeccd9bb53eb6eb7d20dc", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e98ff67f5a68114804607de549c2350d27628fc7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f67786293193cf01ebcc6fdbcbd1587b24f52679", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56777.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56777.json new file mode 100644 index 00000000000..7597fa44413 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56777.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-56777", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T18:15:18.560", + "lastModified": "2025-01-08T18:15:18.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check\n\nThe return value of drm_atomic_get_crtc_state() needs to be\nchecked. To avoid use of error pointer 'crtc_state' in case\nof the failure." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/3cf2e7c448e246f7e700c7aa47450d1e27579559", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/997b64c3f4c1827c5cfda8ae7f5d13f78d28b541", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b79612ed6bc1a184c45427105c851b5b2d4342ca", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e965e771b069421c233d674c3c8cd8c7f7245f42", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f5804567cf9605d6e5ec46c0bb786f7d50f18c13", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56778.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56778.json new file mode 100644 index 00000000000..5c79464c4ed --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56778.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-56778", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T18:15:18.683", + "lastModified": "2025-01-08T18:15:18.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check\n\nThe return value of drm_atomic_get_crtc_state() needs to be\nchecked. To avoid use of error pointer 'crtc_state' in case\nof the failure." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/31c857e7496d34e5a32a6f75bc024d0b06fd646a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6b0d0d6e9d3c26697230bf7dc9e6b52bdb24086f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/82a5312f874fb18f045d9658e9bd290e3b0621c0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/837eb99ad3340c7a9febf454f41c8e3edb68ac1e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c1ab40a1fdfee732c7e6ff2fb8253760293e47e8", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56779.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56779.json new file mode 100644 index 00000000000..a3ae4667ad8 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56779.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-56779", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T18:15:18.793", + "lastModified": "2025-01-08T18:15:18.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur\n\nThe action force umount(umount -f) will attempt to kill all rpc_task even\numount operation may ultimately fail if some files remain open.\nConsequently, if an action attempts to open a file, it can potentially\nsend two rpc_task to nfs server.\n\n NFS CLIENT\nthread1 thread2\nopen(\"file\")\n...\nnfs4_do_open\n _nfs4_do_open\n _nfs4_open_and_get_state\n _nfs4_proc_open\n nfs4_run_open_task\n /* rpc_task1 */\n rpc_run_task\n rpc_wait_for_completion_task\n\n umount -f\n nfs_umount_begin\n rpc_killall_tasks\n rpc_signal_task\n rpc_task1 been wakeup\n and return -512\n _nfs4_do_open // while loop\n ...\n nfs4_run_open_task\n /* rpc_task2 */\n rpc_run_task\n rpc_wait_for_completion_task\n\nWhile processing an open request, nfsd will first attempt to find or\nallocate an nfs4_openowner. If it finds an nfs4_openowner that is not\nmarked as NFS4_OO_CONFIRMED, this nfs4_openowner will released. Since\ntwo rpc_task can attempt to open the same file simultaneously from the\nclient to server, and because two instances of nfsd can run\nconcurrently, this situation can lead to lots of memory leak.\nAdditionally, when we echo 0 to /proc/fs/nfsd/threads, warning will be\ntriggered.\n\n NFS SERVER\nnfsd1 nfsd2 echo 0 > /proc/fs/nfsd/threads\n\nnfsd4_open\n nfsd4_process_open1\n find_or_alloc_open_stateowner\n // alloc oo1, stateid1\n nfsd4_open\n nfsd4_process_open1\n find_or_alloc_open_stateowner\n // find oo1, without NFS4_OO_CONFIRMED\n release_openowner\n unhash_openowner_locked\n list_del_init(&oo->oo_perclient)\n // cannot find this oo\n // from client, LEAK!!!\n alloc_stateowner // alloc oo2\n\n nfsd4_process_open2\n init_open_stateid\n // associate oo1\n // with stateid1, stateid1 LEAK!!!\n nfs4_get_vfs_file\n // alloc nfsd_file1 and nfsd_file_mark1\n // all LEAK!!!\n\n nfsd4_process_open2\n ...\n\n write_threads\n ...\n nfsd_destroy_serv\n nfsd_shutdown_net\n nfs4_state_shutdown_net\n nfs4_state_destroy_net\n destroy_client\n __destroy_client\n // won't find oo1!!!\n nfsd_shutdown_generic\n nfsd_file_cache_shutdown\n kmem_cache_destroy\n for nfsd_file_slab\n and nfsd_file_mark_slab\n // bark since nfsd_file1\n // and nfsd_file_mark1\n // still alive\n\n=======================================================================\nBUG nfsd_file (Not tainted): Objects remaining in nfsd_file on\n__kmem_cache_shutdown()\n-----------------------------------------------------------------------\n\nSlab 0xffd4000004438a80 objects=34 used=1 fp=0xff11000110e2ad28\nflags=0x17ffffc0000240(workingset|head|node=0|zone=2|lastcpupid=0x1fffff)\nCPU: 4 UID: 0 PID: 757 Comm: sh Not tainted 6.12.0-rc6+ #19\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.1-2.fc37 04/01/2014\nCall Trace:\n \n dum\n---truncated---" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0ab0a3ad24e970e894abcac58f85c332d1726749", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/2d505a801e57428057563762f67a5a62009b2600", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/37dfc81266d3a32294524bfadd3396614f8633ee", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/45abb68c941ebc9a35c6d3a7b08196712093c636", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6f73f920b7ad0084373e46121d7ac34117aed652", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/98100e88dd8865999dc6379a3356cd799795fe7b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a85364f0d30dee01c5d5b4afa55a9629a8f36d8e", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56780.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56780.json new file mode 100644 index 00000000000..046ad07d81f --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56780.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-56780", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T18:15:18.910", + "lastModified": "2025-01-08T18:15:18.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nquota: flush quota_release_work upon quota writeback\n\nOne of the paths quota writeback is called from is:\n\nfreeze_super()\n sync_filesystem()\n ext4_sync_fs()\n dquot_writeback_dquots()\n\nSince we currently don't always flush the quota_release_work queue in\nthis path, we can end up with the following race:\n\n 1. dquot are added to releasing_dquots list during regular operations.\n 2. FS Freeze starts, however, this does not flush the quota_release_work queue.\n 3. Freeze completes.\n 4. Kernel eventually tries to flush the workqueue while FS is frozen which\n hits a WARN_ON since transaction gets started during frozen state:\n\n ext4_journal_check_start+0x28/0x110 [ext4] (unreliable)\n __ext4_journal_start_sb+0x64/0x1c0 [ext4]\n ext4_release_dquot+0x90/0x1d0 [ext4]\n quota_release_workfn+0x43c/0x4d0\n\nWhich is the following line:\n\n WARN_ON(sb->s_writers.frozen == SB_FREEZE_COMPLETE);\n\nWhich ultimately results in generic/390 failing due to dmesg\nnoise. This was detected on powerpc machine 15 cores.\n\nTo avoid this, make sure to flush the workqueue during\ndquot_writeback_dquots() so we dont have any pending workitems after\nfreeze." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/3e6ff207cd5bd924ad94cd1a7c633bcdac0ba1cb", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6f3821acd7c3143145999248087de5fb4b48cf26", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8ea87e34792258825d290f4dc5216276e91cb224", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a5abba5e0e586e258ded3e798fe5f69c66fec198", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ab6cfcf8ed2c7496f55d020b65b1d8cd55d9a2cb", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ac6f420291b3fee1113f21d612fa88b628afab5b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/bcacb52a985f1b6d280f698a470b873dfe52728a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56781.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56781.json new file mode 100644 index 00000000000..1bad78f184b --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56781.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-56781", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T18:15:19.030", + "lastModified": "2025-01-08T18:15:19.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/prom_init: Fixup missing powermac #size-cells\n\nOn some powermacs `escc` nodes are missing `#size-cells` properties,\nwhich is deprecated and now triggers a warning at boot since commit\n045b14ca5c36 (\"of: WARN on deprecated #address-cells/#size-cells\nhandling\").\n\nFor example:\n\n Missing '#size-cells' in /pci@f2000000/mac-io@c/escc@13000\n WARNING: CPU: 0 PID: 0 at drivers/of/base.c:133 of_bus_n_size_cells+0x98/0x108\n Hardware name: PowerMac3,1 7400 0xc0209 PowerMac\n ...\n Call Trace:\n of_bus_n_size_cells+0x98/0x108 (unreliable)\n of_bus_default_count_cells+0x40/0x60\n __of_get_address+0xc8/0x21c\n __of_address_to_resource+0x5c/0x228\n pmz_init_port+0x5c/0x2ec\n pmz_probe.isra.0+0x144/0x1e4\n pmz_console_init+0x10/0x48\n console_init+0xcc/0x138\n start_kernel+0x5c4/0x694\n\nAs powermacs boot via prom_init it's possible to add the missing\nproperties to the device tree during boot, avoiding the warning. Note\nthat `escc-legacy` nodes are also missing `#size-cells` properties, but\nthey are skipped by the macio driver, so leave them alone.\n\nDepends-on: 045b14ca5c36 (\"of: WARN on deprecated #address-cells/#size-cells handling\")" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/0b94d838018fb0a824e0cd3149034928c99fb1b7", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/296a109fa77110ba5267fe0e90a26005eecc2726", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/691284c2cd33ffaa0b35ce53b3286b90621e9dc9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6d5f0453a2228607333bff0c85238a3cb495d194", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a79a7e3c03ae2a07f68b5f24d5ed549f9799ec89", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/cf89c9434af122f28a3552e6f9cc5158c33ce50a", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ee68554d2c03e32077f7b984e5289fdb005036d2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56782.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56782.json new file mode 100644 index 00000000000..40e1ccbeb23 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56782.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-56782", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T18:15:19.147", + "lastModified": "2025-01-08T18:15:19.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: x86: Add adev NULL check to acpi_quirk_skip_serdev_enumeration()\n\nacpi_dev_hid_match() does not check for adev == NULL, dereferencing\nit unconditional.\n\nAdd a check for adev being NULL before calling acpi_dev_hid_match().\n\nAt the moment acpi_quirk_skip_serdev_enumeration() is never called with\na controller_parent without an ACPI companion, but better safe than sorry." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/4a49194f587a62d972b602e3e1a2c3cfe6567966", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e173bce05f7032a8b4964cfef82a4b7668f5f3af", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56783.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56783.json new file mode 100644 index 00000000000..fb246deff06 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56783.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-56783", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T18:15:19.247", + "lastModified": "2025-01-08T18:15:19.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_socket: remove WARN_ON_ONCE on maximum cgroup level\n\ncgroup maximum depth is INT_MAX by default, there is a cgroup toggle to\nrestrict this maximum depth to a more reasonable value not to harm\nperformance. Remove unnecessary WARN_ON_ONCE which is reachable from\nuserspace." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2f9bec0a749eb646b384fde0c7b7c24687b2ffae", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/7064a6daa4a700a298fe3aee11dea296bfe59fc4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b7529880cb961d515642ce63f9d7570869bbbdc3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e227c042580ab065edc610c9ddc9bea691e6fc4d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56784.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56784.json new file mode 100644 index 00000000000..fb4e625c7d2 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56784.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-56784", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T18:15:19.357", + "lastModified": "2025-01-08T18:15:19.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Adding array index check to prevent memory corruption\n\n[Why & How]\nArray indices out of bound caused memory corruption. Adding checks to\nensure that array index stays in bound." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2c437d9a0b496168e1a1defd17b531f0a526dbe9", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/dff526dc3e27f5484f5ba11471b9fbbe681467f2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56785.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56785.json new file mode 100644 index 00000000000..25b9d623db3 --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56785.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2024-56785", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T18:15:19.487", + "lastModified": "2025-01-08T18:15:19.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nMIPS: Loongson64: DTS: Really fix PCIe port nodes for ls7a\n\nFix the dtc warnings:\n\n arch/mips/boot/dts/loongson/ls7a-pch.dtsi:68.16-416.5: Warning (interrupt_provider): /bus@10000000/pci@1a000000: '#interrupt-cells' found, but node is not an interrupt provider\n arch/mips/boot/dts/loongson/ls7a-pch.dtsi:68.16-416.5: Warning (interrupt_provider): /bus@10000000/pci@1a000000: '#interrupt-cells' found, but node is not an interrupt provider\n arch/mips/boot/dts/loongson/loongson64g_4core_ls7a.dtb: Warning (interrupt_map): Failed prerequisite 'interrupt_provider'\n\nAnd a runtime warning introduced in commit 045b14ca5c36 (\"of: WARN on\ndeprecated #address-cells/#size-cells handling\"):\n\n WARNING: CPU: 0 PID: 1 at drivers/of/base.c:106 of_bus_n_addr_cells+0x9c/0xe0\n Missing '#address-cells' in /bus@10000000/pci@1a000000/pci_bridge@9,0\n\nThe fix is similar to commit d89a415ff8d5 (\"MIPS: Loongson64: DTS: Fix PCIe\nport nodes for ls7a\"), which has fixed the issue for ls2k (despite its\nsubject mentions ls7a)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/01575f2ff8ba578a3436f230668bd056dc2eb823", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/4fbd66d8254cedfd1218393f39d83b6c07a01917", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5a2eaa3ad2b803c7ea442c6db7379466ee73c024", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/8ef9ea1503d0a129cc6f5cf48fb63633efa5d766", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/a7fd78075031871bc68fc56fdaa6e7a3934064b1", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/c8ee41fc3522c6659e324d90bc2ccd3b6310d7fc", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56786.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56786.json new file mode 100644 index 00000000000..3ebc9c0cf9d --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56786.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-56786", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T18:15:19.633", + "lastModified": "2025-01-08T18:15:19.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: put bpf_link's program when link is safe to be deallocated\n\nIn general, BPF link's underlying BPF program should be considered to be\nreachable through attach hook -> link -> prog chain, and, pessimistically,\nwe have to assume that as long as link's memory is not safe to free,\nattach hook's code might hold a pointer to BPF program and use it.\n\nAs such, it's not (generally) correct to put link's program early before\nwaiting for RCU GPs to go through. More eager bpf_prog_put() that we\ncurrently do is mostly correct due to BPF program's release code doing\nsimilar RCU GP waiting, but as will be shown in the following patches,\nBPF program can be non-sleepable (and, thus, reliant on only \"classic\"\nRCU GP), while BPF link's attach hook can have sleepable semantics and\nneeds to be protected by RCU Tasks Trace, and for such cases BPF link\nhas to go through RCU Tasks Trace + \"classic\" RCU GPs before being\ndeallocated. And so, if we put BPF program early, we might free BPF\nprogram before we free BPF link, leading to use-after-free situation.\n\nSo, this patch defers bpf_prog_put() until we are ready to perform\nbpf_link's deallocation. At worst, this delays BPF program freeing by\none extra RCU GP, but that seems completely acceptable. Alternatively,\nwe'd need more elaborate ways to determine BPF hook, BPF link, and BPF\nprogram lifetimes, and how they relate to each other, which seems like\nan unnecessary complication.\n\nNote, for most BPF links we still will perform eager bpf_prog_put() and\nlink dealloc, so for those BPF links there are no observable changes\nwhatsoever. Only BPF links that use deferred dealloc might notice\nslightly delayed freeing of BPF programs.\n\nAlso, to reduce code and logic duplication, extract program put + link\ndealloc logic into bpf_link_dealloc() helper." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2fcb921c2799c49ac5e365cf4110f94a64ae4885", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5fe23c57abadfd46a7a66e81f3536e4757252a0b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f44ec8733a8469143fde1984b5e6931b2e2f6f3f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56787.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56787.json new file mode 100644 index 00000000000..302f1f4718f --- /dev/null +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56787.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-56787", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-01-08T18:15:19.763", + "lastModified": "2025-01-08T18:15:19.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: imx8m: Probe the SoC driver as platform driver\n\nWith driver_async_probe=* on kernel command line, the following trace is\nproduced because on i.MX8M Plus hardware because the soc-imx8m.c driver\ncalls of_clk_get_by_name() which returns -EPROBE_DEFER because the clock\ndriver is not yet probed. This was not detected during regular testing\nwithout driver_async_probe.\n\nConvert the SoC code to platform driver and instantiate a platform device\nin its current device_initcall() to probe the platform driver. Rework\n.soc_revision callback to always return valid error code and return SoC\nrevision via parameter. This way, if anything in the .soc_revision callback\nreturn -EPROBE_DEFER, it gets propagated to .probe and the .probe will get\nretried later.\n\n\"\n------------[ cut here ]------------\nWARNING: CPU: 1 PID: 1 at drivers/soc/imx/soc-imx8m.c:115 imx8mm_soc_revision+0xdc/0x180\nCPU: 1 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.11.0-next-20240924-00002-g2062bb554dea #603\nHardware name: DH electronics i.MX8M Plus DHCOM Premium Developer Kit (3) (DT)\npstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : imx8mm_soc_revision+0xdc/0x180\nlr : imx8mm_soc_revision+0xd0/0x180\nsp : ffff8000821fbcc0\nx29: ffff8000821fbce0 x28: 0000000000000000 x27: ffff800081810120\nx26: ffff8000818a9970 x25: 0000000000000006 x24: 0000000000824311\nx23: ffff8000817f42c8 x22: ffff0000df8be210 x21: fffffffffffffdfb\nx20: ffff800082780000 x19: 0000000000000001 x18: ffffffffffffffff\nx17: ffff800081fff418 x16: ffff8000823e1000 x15: ffff0000c03b65e8\nx14: ffff0000c00051b0 x13: ffff800082790000 x12: 0000000000000801\nx11: ffff80008278ffff x10: ffff80008209d3a6 x9 : ffff80008062e95c\nx8 : ffff8000821fb9a0 x7 : 0000000000000000 x6 : 00000000000080e3\nx5 : ffff0000df8c03d8 x4 : 0000000000000000 x3 : 0000000000000000\nx2 : 0000000000000000 x1 : fffffffffffffdfb x0 : fffffffffffffdfb\nCall trace:\n imx8mm_soc_revision+0xdc/0x180\n imx8_soc_init+0xb0/0x1e0\n do_one_initcall+0x94/0x1a8\n kernel_init_freeable+0x240/0x2a8\n kernel_init+0x28/0x140\n ret_from_fork+0x10/0x20\n---[ end trace 0000000000000000 ]---\nSoC: i.MX8MP revision 1.1\n\"" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/2129f6faa5dfe8c6b87aad11720bf75edd77d3e4", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/997a3c04d7fa3d1d385c14691350d096fada648c", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/9cc832d37799dbea950c4c8a34721b02b8b5a8ff", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e497edb8f31ec2c2b6f4ce930e175aa2da8be334", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/ea2ff66feb5f9b183f9e2f9d06c21340bd88de12", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6350.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6350.json new file mode 100644 index 00000000000..f34f7c44dba --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6350.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-6350", + "sourceIdentifier": "product-security@silabs.com", + "published": "2025-01-08T18:15:19.880", + "lastModified": "2025-01-08T18:15:19.880", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A malformed 802.15.4 packet causes a buffer overflow to occur leading to an assert and a denial of service. A watchdog reset clears the error condition automatically." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://community.silabs.com/069Vm00000HtvDgIAJ", + "source": "product-security@silabs.com" + }, + { + "url": "https://github.com/SiliconLabs/simplicity_sdk/releases", + "source": "product-security@silabs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0238.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0238.json index 750228f48ae..9a767e472e3 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0238.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0238.json @@ -2,16 +2,55 @@ "id": "CVE-2025-0238", "sourceIdentifier": "security@mozilla.org", "published": "2025-01-07T16:15:38.470", - "lastModified": "2025-01-07T16:15:38.470", + "lastModified": "2025-01-08T17:15:16.070", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, and Firefox ESR < 115.19." + }, + { + "lang": "es", + "value": "Suponiendo que se haya producido una asignaci\u00f3n de memoria fallida y controlada, un atacante podr\u00eda haber provocado un error de use-after-free, lo que habr\u00eda provocado un bloqueo potencialmente explotable. Esta vulnerabilidad afecta a Firefox < 134, Firefox ESR < 128.6 y Firefox ESR < 115.19." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1915535", diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0239.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0239.json index 16b2b7ceeb2..534ef24e138 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0239.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0239.json @@ -2,16 +2,55 @@ "id": "CVE-2025-0239", "sourceIdentifier": "security@mozilla.org", "published": "2025-01-07T16:15:38.563", - "lastModified": "2025-01-07T16:15:38.563", + "lastModified": "2025-01-08T17:15:16.240", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6." + }, + { + "lang": "es", + "value": "Al utilizar Alt-Svc, ALPN no valid\u00f3 correctamente los certificados cuando el servidor original redireccionaba a un sitio inseguro. Esta vulnerabilidad afecta a Firefox < 134 y Firefox ESR < 128.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1929156", diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0240.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0240.json index ffba73e951d..4ec4cfa53da 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0240.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0240.json @@ -2,16 +2,55 @@ "id": "CVE-2025-0240", "sourceIdentifier": "security@mozilla.org", "published": "2025-01-07T16:15:38.663", - "lastModified": "2025-01-07T16:15:38.663", + "lastModified": "2025-01-08T17:15:16.403", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Parsing a JavaScript module as JSON could, under some circumstances, cause cross-compartment access, which may result in a use-after-free. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6." + }, + { + "lang": "es", + "value": "Analizar un m\u00f3dulo de JavaScript como JSON podr\u00eda, en algunas circunstancias, provocar un acceso entre compartimentos, lo que puede dar lugar a use-after-free. Esta vulnerabilidad afecta a Firefox < 134 y Firefox ESR < 128.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1929623", diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0242.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0242.json index d57ebbb097a..4adfbf6288b 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0242.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0242.json @@ -2,16 +2,55 @@ "id": "CVE-2025-0242", "sourceIdentifier": "security@mozilla.org", "published": "2025-01-07T16:15:38.860", - "lastModified": "2025-01-07T16:15:38.860", + "lastModified": "2025-01-08T17:15:16.563", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, and Firefox ESR < 115.19." + }, + { + "lang": "es", + "value": "Se han detectado errores de seguridad de memoria en Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18 y Thunderbird 128.5. Algunos de estos errores mostraban evidencia de corrupci\u00f3n de memoria y suponemos que, con el suficiente esfuerzo, algunos de ellos podr\u00edan haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 134, Firefox ESR < 128.6 y Firefox ESR < 115.19." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1874523%2C1926454%2C1931873%2C1932169", diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0243.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0243.json index 32df55d5757..9d2c423df65 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0243.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0243.json @@ -2,16 +2,43 @@ "id": "CVE-2025-0243", "sourceIdentifier": "security@mozilla.org", "published": "2025-01-07T16:15:38.973", - "lastModified": "2025-01-07T16:15:38.973", + "lastModified": "2025-01-08T17:15:16.723", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6." + }, + { + "lang": "es", + "value": "Se han detectado errores de seguridad de memoria en Firefox 133, Thunderbird 133, Firefox ESR 128.5 y Thunderbird 128.5. Algunos de estos errores mostraban evidencia de corrupci\u00f3n de memoria y suponemos que, con el suficiente esfuerzo, algunos de ellos podr\u00edan haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 134 y Firefox ESR < 128.6." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1827142%2C1932783", diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20166.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20166.json new file mode 100644 index 00000000000..1367be55cdc --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20166.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-20166", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2025-01-08T17:15:16.990", + "lastModified": "2025-01-08T17:15:16.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.\r\nCisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-86" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-xss-CDOJZyH", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20167.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20167.json new file mode 100644 index 00000000000..2cce23c44da --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20167.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-20167", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2025-01-08T17:15:17.163", + "lastModified": "2025-01-08T17:15:17.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.\r\nCisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-86" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-xss-CDOJZyH", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20168.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20168.json new file mode 100644 index 00000000000..cd1c3a8644b --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20168.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-20168", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2025-01-08T17:15:17.323", + "lastModified": "2025-01-08T17:15:17.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.\r\nCisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-86" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-xss-CDOJZyH", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21111.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21111.json new file mode 100644 index 00000000000..2b495affa10 --- /dev/null +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21111.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-21111", + "sourceIdentifier": "security_alert@emc.com", + "published": "2025-01-08T18:15:20.157", + "lastModified": "2025-01-08T18:15:20.157", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell VxRail, versions 8.0.000 through 8.0.311, contain(s) a Plaintext Storage of a Password vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-256" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000269958/dsa-2025-025-security-update-for-dell-vxrail-for-multiple-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ee5518d0b72..3c442950937 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-08T17:00:31.234757+00:00 +2025-01-08T19:00:22.213675+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-08T16:59:14.453000+00:00 +2025-01-08T18:59:45.373000+00:00 ``` ### Last Data Feed Release @@ -33,53 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -276292 +276319 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `27` -- [CVE-2024-51480](CVE-2024/CVE-2024-514xx/CVE-2024-51480.json) (`2025-01-08T16:15:34.993`) -- [CVE-2024-51737](CVE-2024/CVE-2024-517xx/CVE-2024-51737.json) (`2025-01-08T16:15:35.170`) -- [CVE-2024-55517](CVE-2024/CVE-2024-555xx/CVE-2024-55517.json) (`2025-01-08T16:15:36.080`) -- [CVE-2024-55656](CVE-2024/CVE-2024-556xx/CVE-2024-55656.json) (`2025-01-08T16:15:36.213`) -- [CVE-2025-20123](CVE-2025/CVE-2025-201xx/CVE-2025-20123.json) (`2025-01-08T16:15:38.150`) -- [CVE-2025-20126](CVE-2025/CVE-2025-201xx/CVE-2025-20126.json) (`2025-01-08T16:15:38.357`) -- [CVE-2025-22130](CVE-2025/CVE-2025-221xx/CVE-2025-22130.json) (`2025-01-08T16:15:38.543`) -- [CVE-2025-22136](CVE-2025/CVE-2025-221xx/CVE-2025-22136.json) (`2025-01-08T16:15:38.770`) -- [CVE-2025-22137](CVE-2025/CVE-2025-221xx/CVE-2025-22137.json) (`2025-01-08T16:15:38.920`) +- [CVE-2024-51442](CVE-2024/CVE-2024-514xx/CVE-2024-51442.json) (`2025-01-08T18:15:16.650`) +- [CVE-2024-55459](CVE-2024/CVE-2024-554xx/CVE-2024-55459.json) (`2025-01-08T17:15:15.817`) +- [CVE-2024-56770](CVE-2024/CVE-2024-567xx/CVE-2024-56770.json) (`2025-01-08T17:15:15.957`) +- [CVE-2024-56771](CVE-2024/CVE-2024-567xx/CVE-2024-56771.json) (`2025-01-08T18:15:17.777`) +- [CVE-2024-56772](CVE-2024/CVE-2024-567xx/CVE-2024-56772.json) (`2025-01-08T18:15:17.897`) +- [CVE-2024-56773](CVE-2024/CVE-2024-567xx/CVE-2024-56773.json) (`2025-01-08T18:15:18.087`) +- [CVE-2024-56774](CVE-2024/CVE-2024-567xx/CVE-2024-56774.json) (`2025-01-08T18:15:18.213`) +- [CVE-2024-56775](CVE-2024/CVE-2024-567xx/CVE-2024-56775.json) (`2025-01-08T18:15:18.333`) +- [CVE-2024-56776](CVE-2024/CVE-2024-567xx/CVE-2024-56776.json) (`2025-01-08T18:15:18.447`) +- [CVE-2024-56777](CVE-2024/CVE-2024-567xx/CVE-2024-56777.json) (`2025-01-08T18:15:18.560`) +- [CVE-2024-56778](CVE-2024/CVE-2024-567xx/CVE-2024-56778.json) (`2025-01-08T18:15:18.683`) +- [CVE-2024-56779](CVE-2024/CVE-2024-567xx/CVE-2024-56779.json) (`2025-01-08T18:15:18.793`) +- [CVE-2024-56780](CVE-2024/CVE-2024-567xx/CVE-2024-56780.json) (`2025-01-08T18:15:18.910`) +- [CVE-2024-56781](CVE-2024/CVE-2024-567xx/CVE-2024-56781.json) (`2025-01-08T18:15:19.030`) +- [CVE-2024-56782](CVE-2024/CVE-2024-567xx/CVE-2024-56782.json) (`2025-01-08T18:15:19.147`) +- [CVE-2024-56783](CVE-2024/CVE-2024-567xx/CVE-2024-56783.json) (`2025-01-08T18:15:19.247`) +- [CVE-2024-56784](CVE-2024/CVE-2024-567xx/CVE-2024-56784.json) (`2025-01-08T18:15:19.357`) +- [CVE-2024-56785](CVE-2024/CVE-2024-567xx/CVE-2024-56785.json) (`2025-01-08T18:15:19.487`) +- [CVE-2024-56786](CVE-2024/CVE-2024-567xx/CVE-2024-56786.json) (`2025-01-08T18:15:19.633`) +- [CVE-2024-56787](CVE-2024/CVE-2024-567xx/CVE-2024-56787.json) (`2025-01-08T18:15:19.763`) +- [CVE-2024-6350](CVE-2024/CVE-2024-63xx/CVE-2024-6350.json) (`2025-01-08T18:15:19.880`) +- [CVE-2025-20166](CVE-2025/CVE-2025-201xx/CVE-2025-20166.json) (`2025-01-08T17:15:16.990`) +- [CVE-2025-20167](CVE-2025/CVE-2025-201xx/CVE-2025-20167.json) (`2025-01-08T17:15:17.163`) +- [CVE-2025-20168](CVE-2025/CVE-2025-201xx/CVE-2025-20168.json) (`2025-01-08T17:15:17.323`) +- [CVE-2025-21111](CVE-2025/CVE-2025-211xx/CVE-2025-21111.json) (`2025-01-08T18:15:20.157`) ### CVEs modified in the last Commit -Recently modified CVEs: `201` +Recently modified CVEs: `131` -- [CVE-2024-55412](CVE-2024/CVE-2024-554xx/CVE-2024-55412.json) (`2025-01-08T16:15:35.527`) -- [CVE-2024-55413](CVE-2024/CVE-2024-554xx/CVE-2024-55413.json) (`2025-01-08T16:15:35.717`) -- [CVE-2024-55414](CVE-2024/CVE-2024-554xx/CVE-2024-55414.json) (`2025-01-08T16:15:35.883`) -- [CVE-2024-56201](CVE-2024/CVE-2024-562xx/CVE-2024-56201.json) (`2025-01-08T16:15:36.387`) -- [CVE-2024-56535](CVE-2024/CVE-2024-565xx/CVE-2024-56535.json) (`2025-01-08T16:43:06.310`) -- [CVE-2024-56549](CVE-2024/CVE-2024-565xx/CVE-2024-56549.json) (`2025-01-08T16:43:25.180`) -- [CVE-2024-56580](CVE-2024/CVE-2024-565xx/CVE-2024-56580.json) (`2025-01-08T16:43:44.460`) -- [CVE-2024-56593](CVE-2024/CVE-2024-565xx/CVE-2024-56593.json) (`2025-01-08T16:44:02.073`) -- [CVE-2024-56612](CVE-2024/CVE-2024-566xx/CVE-2024-56612.json) (`2025-01-08T16:44:20.777`) -- [CVE-2024-56613](CVE-2024/CVE-2024-566xx/CVE-2024-56613.json) (`2025-01-08T16:51:18.680`) -- [CVE-2024-56620](CVE-2024/CVE-2024-566xx/CVE-2024-56620.json) (`2025-01-08T16:09:56.403`) -- [CVE-2024-56621](CVE-2024/CVE-2024-566xx/CVE-2024-56621.json) (`2025-01-08T16:44:53.720`) -- [CVE-2024-56634](CVE-2024/CVE-2024-566xx/CVE-2024-56634.json) (`2025-01-08T16:45:10.040`) -- [CVE-2024-56689](CVE-2024/CVE-2024-566xx/CVE-2024-56689.json) (`2025-01-08T16:45:25.490`) -- [CVE-2024-56696](CVE-2024/CVE-2024-566xx/CVE-2024-56696.json) (`2025-01-08T16:45:40.197`) -- [CVE-2024-56697](CVE-2024/CVE-2024-566xx/CVE-2024-56697.json) (`2025-01-08T16:45:54.327`) -- [CVE-2024-56711](CVE-2024/CVE-2024-567xx/CVE-2024-56711.json) (`2025-01-08T16:46:10.493`) -- [CVE-2025-0237](CVE-2025/CVE-2025-02xx/CVE-2025-0237.json) (`2025-01-08T16:15:37.330`) -- [CVE-2025-0244](CVE-2025/CVE-2025-02xx/CVE-2025-0244.json) (`2025-01-08T16:15:37.520`) -- [CVE-2025-0245](CVE-2025/CVE-2025-02xx/CVE-2025-0245.json) (`2025-01-08T16:15:37.693`) -- [CVE-2025-0246](CVE-2025/CVE-2025-02xx/CVE-2025-0246.json) (`2025-01-08T16:15:37.880`) -- [CVE-2025-0247](CVE-2025/CVE-2025-02xx/CVE-2025-0247.json) (`2025-01-08T15:15:21.033`) -- [CVE-2025-21603](CVE-2025/CVE-2025-216xx/CVE-2025-21603.json) (`2025-01-08T15:15:21.320`) -- [CVE-2025-22133](CVE-2025/CVE-2025-221xx/CVE-2025-22133.json) (`2025-01-08T15:15:21.727`) -- [CVE-2025-22215](CVE-2025/CVE-2025-222xx/CVE-2025-22215.json) (`2025-01-08T15:15:21.927`) +- [CVE-2024-32967](CVE-2024/CVE-2024-329xx/CVE-2024-32967.json) (`2025-01-08T18:30:33.600`) +- [CVE-2024-3560](CVE-2024/CVE-2024-35xx/CVE-2024-3560.json) (`2025-01-08T17:25:20.823`) +- [CVE-2024-3598](CVE-2024/CVE-2024-35xx/CVE-2024-3598.json) (`2025-01-08T17:26:13.300`) +- [CVE-2024-3923](CVE-2024/CVE-2024-39xx/CVE-2024-3923.json) (`2025-01-08T18:43:59.440`) +- [CVE-2024-39683](CVE-2024/CVE-2024-396xx/CVE-2024-39683.json) (`2025-01-08T18:24:07.627`) +- [CVE-2024-41952](CVE-2024/CVE-2024-419xx/CVE-2024-41952.json) (`2025-01-08T18:27:21.500`) +- [CVE-2024-41953](CVE-2024/CVE-2024-419xx/CVE-2024-41953.json) (`2025-01-08T18:29:25.370`) +- [CVE-2024-4430](CVE-2024/CVE-2024-44xx/CVE-2024-4430.json) (`2025-01-08T18:43:41.327`) +- [CVE-2024-53933](CVE-2024/CVE-2024-539xx/CVE-2024-53933.json) (`2025-01-08T18:15:16.830`) +- [CVE-2024-53934](CVE-2024/CVE-2024-539xx/CVE-2024-53934.json) (`2025-01-08T17:15:15.630`) +- [CVE-2024-53936](CVE-2024/CVE-2024-539xx/CVE-2024-53936.json) (`2025-01-08T18:15:17.067`) +- [CVE-2024-54491](CVE-2024/CVE-2024-544xx/CVE-2024-54491.json) (`2025-01-08T18:06:21.337`) +- [CVE-2024-56536](CVE-2024/CVE-2024-565xx/CVE-2024-56536.json) (`2025-01-08T17:08:05.557`) +- [CVE-2024-56578](CVE-2024/CVE-2024-565xx/CVE-2024-56578.json) (`2025-01-08T17:08:24.730`) +- [CVE-2024-56579](CVE-2024/CVE-2024-565xx/CVE-2024-56579.json) (`2025-01-08T17:08:40.187`) +- [CVE-2024-56608](CVE-2024/CVE-2024-566xx/CVE-2024-56608.json) (`2025-01-08T17:10:01.233`) +- [CVE-2024-56614](CVE-2024/CVE-2024-566xx/CVE-2024-56614.json) (`2025-01-08T17:10:39.210`) +- [CVE-2024-56688](CVE-2024/CVE-2024-566xx/CVE-2024-56688.json) (`2025-01-08T17:11:05.457`) +- [CVE-2024-56694](CVE-2024/CVE-2024-566xx/CVE-2024-56694.json) (`2025-01-08T17:11:31.067`) +- [CVE-2024-56708](CVE-2024/CVE-2024-567xx/CVE-2024-56708.json) (`2025-01-08T17:11:50.683`) +- [CVE-2025-0238](CVE-2025/CVE-2025-02xx/CVE-2025-0238.json) (`2025-01-08T17:15:16.070`) +- [CVE-2025-0239](CVE-2025/CVE-2025-02xx/CVE-2025-0239.json) (`2025-01-08T17:15:16.240`) +- [CVE-2025-0240](CVE-2025/CVE-2025-02xx/CVE-2025-0240.json) (`2025-01-08T17:15:16.403`) +- [CVE-2025-0242](CVE-2025/CVE-2025-02xx/CVE-2025-0242.json) (`2025-01-08T17:15:16.563`) +- [CVE-2025-0243](CVE-2025/CVE-2025-02xx/CVE-2025-0243.json) (`2025-01-08T17:15:16.723`) ## Download and Usage diff --git a/_state.csv b/_state.csv index c9600242558..429a12ec791 100644 --- a/_state.csv +++ b/_state.csv @@ -122856,7 +122856,7 @@ CVE-2018-4296,0,0,290bf618fbeee80f7c7e65fa32cbf0b9dfc19a5048f3b55b3ef1c5193a2ca5 CVE-2018-4298,0,0,007162c812763de89784475274b0213bd5f3b3445aa20eda4840d113b63f9252,2024-11-21T04:07:08.840000 CVE-2018-4299,0,0,42b23e7eda66a0b308a029c6815c510458bbff6006ff36345af771ef91431c9a,2024-11-21T04:07:08.960000 CVE-2018-4300,0,0,584e6a13a646a6130b68caf2fc8a3da27299adc088b83cbbbed5c31e133b577b,2024-11-21T04:07:09.083000 -CVE-2018-4301,0,0,dace4cb5d20f376da24da5e35816d6ace5eb523be8ae7a81e1a8c6d1c94e128e,2025-01-08T00:15:24.030000 +CVE-2018-4301,0,1,d630b9abbad0fba2321ad28dd93f3a43e251a56bea48d2f87f61094fa8344ff6,2025-01-08T18:15:12.493000 CVE-2018-4302,0,0,6b424f7b74924555e5de84fc0bd1e5707973310f2c3c8c50261acb5429d57bb0,2024-11-21T04:07:09.207000 CVE-2018-4303,0,0,425eef900cf525324087140efd91b482b05d558c5f55446f554414b49feac51d,2024-11-21T04:07:09.337000 CVE-2018-4304,0,0,77755b866f9faaa6cdecfbe90d4be8e19b9e687a2e08e6cb5f94b189e29ba89e,2024-11-21T04:07:09.457000 @@ -187155,20 +187155,20 @@ CVE-2021-46960,0,0,93adc63857297399bb3e172923626740b3a2251d6d6684f265fbff125aa50 CVE-2021-46961,0,0,5cd831cd809d2fe0046a1637f020f49a679577e4a0a98dad8858b62bb6faf1ce,2024-12-11T14:49:59.620000 CVE-2021-46962,0,0,c2add0fa35a2b624472b36db248d8d830acc6f42ffa2bcf78c3542a48bf06b43,2024-12-11T14:56:40.457000 CVE-2021-46963,0,0,ec8fabbc70acf64eba9170005213b4522a9618d5878bd9963ccd2795e26c8570,2024-12-11T16:12:08.920000 -CVE-2021-46964,0,1,7e65f81e6ae35c0ad7a3c0657a4969c8da6e4a129b3744fcfbd3e3a30ec08c3d,2025-01-08T16:23:53.553000 -CVE-2021-46965,0,0,b46915ce2a81dd117323c8c6bb7b33e42c3c3992924bab30d16a37675e4afe55,2024-11-21T06:35:02.837000 +CVE-2021-46964,0,0,7e65f81e6ae35c0ad7a3c0657a4969c8da6e4a129b3744fcfbd3e3a30ec08c3d,2025-01-08T16:23:53.553000 +CVE-2021-46965,0,1,744aef5b743e466015bb10986ab20ca09a7fd5164f7328c1c662feceb6567725,2025-01-08T17:16:07.213000 CVE-2021-46966,0,0,97fed527abc8c179af4ef0cded9357d2e989b82f53f8292e5a23e469eb8ca4e1,2024-12-06T17:55:15.673000 CVE-2021-46967,0,0,0d10ab6c120f6067de586d730b5ff32613097e1f26ae10084ef35df2124ba25e,2024-12-06T17:55:35.723000 -CVE-2021-46968,0,1,b21d72801b6e02a0c2f2540c75be9fd590212799d74d80890e77b1c44d8b7bce,2025-01-08T16:50:33.063000 -CVE-2021-46969,0,0,7f278c66b41ef1023fda39abfac1fb0381e9c57a92515c327f592a2121418079,2024-11-21T06:35:04.420000 -CVE-2021-46970,0,0,0a17b71104303ed4bf6da7c61577e09080351652e1e864d6d3dff58f019849d8,2024-11-21T06:35:04.563000 -CVE-2021-46971,0,0,102353dbb2c1a1c1d0796927e247b83a3e592fcf74bb77fc7ca37b61534a2acf,2024-11-21T06:35:04.757000 -CVE-2021-46972,0,0,ee6787a612d18318ef61f98e78b1902c44adcf34e1efbc43d41ae715a62d69cc,2024-11-21T06:35:04.997000 +CVE-2021-46968,0,0,b21d72801b6e02a0c2f2540c75be9fd590212799d74d80890e77b1c44d8b7bce,2025-01-08T16:50:33.063000 +CVE-2021-46969,0,1,eb8ad7b9d69df603a70b91d216a6fec8e05d123def2bb90794b6aa26c3d20c16,2025-01-08T17:19:50.777000 +CVE-2021-46970,0,1,c23c5cb83b84430d150f611567d3e72323bcb9362042ce1e780ad58464423893,2025-01-08T17:22:48.013000 +CVE-2021-46971,0,1,718b8f31acefc18354a6a9ad36400f079af7061ecf6db955dff16cfe0b2de9a9,2025-01-08T17:26:07.483000 +CVE-2021-46972,0,1,d54f1e379c0936501bbcf2a007e41febc77de908653b48c0bf790a47c993ceb8,2025-01-08T17:30:28.093000 CVE-2021-46973,0,0,772c1c53f3e4cc24986ccd57ccf0ec094a68fe4cfeeafc7ec535f83ca45ff8d1,2024-11-21T06:35:05.160000 CVE-2021-46974,0,0,24636693a8220644896349bb6d223dd9af87da8d199355177564a8672ce6b6e1,2024-11-21T06:35:05.540000 CVE-2021-46975,0,0,379ee4cd812bfdbb2fdb73351c9c5db9b3f393ba3702c95ca5be896799b9eeec,2024-03-19T14:15:07.467000 CVE-2021-46976,0,0,e1a10dcaf0ca218c08f2f984000603635b5a62d77a616e1c0588f5d4012ca1ec,2024-11-21T06:35:05.727000 -CVE-2021-46977,0,0,abaefec21bb41f64086d5f605340075c6e9256ac541d13045f609ae6a6ea143f,2024-11-21T06:35:05.900000 +CVE-2021-46977,0,1,fb7e65a2ee2cfc4c782b464ed66dffaf2c1e2b947534eaa9d639009c14c56121,2025-01-08T17:34:32.217000 CVE-2021-46978,0,0,7632bd72af74ec52ab23e8393618f1c9e0bd62aa29238b1cbf24fe508f87bc32,2024-11-21T06:35:06.053000 CVE-2021-46979,0,0,05df5f108a7023926f84cc70e853c6e15ebcff4fd26aafd819986e545f0e2bb9,2024-12-31T16:02:49.137000 CVE-2021-46980,0,0,29ac8bbf5f73a90878471644d925c41e8453bf7f55274777895600ed9f7abcdc,2024-12-31T16:06:11.213000 @@ -187190,27 +187190,27 @@ CVE-2021-46995,0,0,04279b80c7aa4fa88f6ee3921cc621493bb5af4103005f0ffdf207d8a3153 CVE-2021-46996,0,0,452e5f54c471438a622b93c6c092100d01f800bbb0e695a93e2c585fff40203f,2024-12-06T14:55:54.497000 CVE-2021-46997,0,0,61d6b9618d306a93c2e7646f6f7b951e35e5d58e6d33870c7bac1e1668d0d48a,2024-12-24T14:42:47.170000 CVE-2021-46998,0,0,ff4906a7e8c07b0c23bb35c4e304cafbec2df7e7b473dfe12365d5e630a6c30d,2024-12-06T14:56:48.477000 -CVE-2021-46999,0,0,51831d9c39f3cb89a8b291d8ff015c1f88bbf8af6cb6470705314f8e84c43809,2024-11-21T06:35:09.490000 +CVE-2021-46999,0,1,980ecb9f4488ce581dd74aeca4f83c1c93371b4b195d76d75ff8d709b4a24a07,2025-01-08T17:36:29.443000 CVE-2021-47000,0,0,3002e6f38616a18026c7e04e06bcce3007305ba819808a406d0baa5378bf5d3b,2024-11-21T06:35:09.613000 -CVE-2021-47001,0,0,d92aff406e85fa2ff8000c04dda3152b7d464f03c3c71d580d5cece26a1020b6,2024-11-21T06:35:09.803000 +CVE-2021-47001,0,1,640f917a09a4db07c4b69874f56bdd6deef9728f1e859c4473ff956109d9dfc5,2025-01-08T17:38:47.230000 CVE-2021-47002,0,0,8e2e69dd823954645422556b82a8f561e637a960eb547819ec3f275f452f36a9,2024-12-09T18:25:24.200000 CVE-2021-47003,0,0,d04fc40119c75046b1674e0b1232d9883e95a4b2b8d484d76d0bd053931c6730,2024-12-09T18:25:35.537000 -CVE-2021-47004,0,0,17d968a7cf8f17dbc4acfb14e05ddc65ee33a172f9d985a74559fa5f0896e603,2024-11-21T06:35:10.143000 +CVE-2021-47004,0,1,18a085cc6c26085c72758be28fd43705328b7a300fb84b0333d9916289e05638,2025-01-08T17:43:50.870000 CVE-2021-47005,0,0,3fbd5c5ade061cd7cb91f258c837f64317568fee512c60e0acf3a8e8df4b123d,2024-12-09T18:23:57.377000 CVE-2021-47006,0,0,f918923c1438f63323d78c01b1632043cbbf07a22c40bb73d1f03f7b42828875,2024-11-21T06:35:10.380000 -CVE-2021-47007,0,0,7bfdfc36787d426b9c21557fd1799a5ac4fe3ff574194898d1ec34f70a0d8bfe,2024-11-21T06:35:10.633000 +CVE-2021-47007,0,1,49fb8d6dc96a504a0d60085eaad9189d435cf6c6248575e653fa2c523ed518c4,2025-01-08T17:58:51.337000 CVE-2021-47008,0,0,424b2b46b9ee1112b21b12d194f2ab759ab5ded3180361e3ca8f70ab9520ff7b,2024-12-09T18:24:06.900000 CVE-2021-47009,0,0,5d51ef0833cdc3833bbaef02872b579b5eeb6431b56ac636d07b9c088ca5b5ca,2024-12-09T18:24:16.137000 CVE-2021-47010,0,0,235af084fd2c5444a50c1e5c37283625e99504dc8a1f0cecb93ba28199234916,2024-11-21T06:35:10.970000 -CVE-2021-47011,0,0,68f7a7f0e5ba376432d2a7eca97d5fbd2ef8afcd7237a8cff4d4a0800e418e31,2024-11-21T06:35:11.193000 +CVE-2021-47011,0,1,2fd7f8ee3f8132e06d16c7f7e84a74a26c345ebf965e01b73d67f860bfe4af03,2025-01-08T18:02:38.837000 CVE-2021-47012,0,0,fba655f6ffef7b71f41f61a977b48443c129f69088c655d479bc638b63d7faf1,2024-12-09T18:24:59.420000 CVE-2021-47013,0,0,555035b190f7c450c0069a1d3068ca4aa9da1bda58826deedee5b5b2d27047fa,2024-12-09T17:59:07.173000 -CVE-2021-47014,0,0,ef2bf3fe877b92a2252f97e111f65381140809d85f14bd44bab90ce1274b5477,2024-11-21T06:35:11.560000 -CVE-2021-47015,0,0,80cdc90b83fc3ac03f66f4dd2e20cc2d017d6baeb49c458f203abcbe4886fb36,2024-11-21T06:35:11.660000 +CVE-2021-47014,0,1,c3cadc4efa25f8d4ffb825925023e2dedd42437c760103c927cbf06c0e06e30d,2025-01-08T18:08:16.180000 +CVE-2021-47015,0,1,0c6c7026744adbfdde0d54d1a712aa8001007dc4d4d956fa887c1c8950b69435,2025-01-08T18:12:23.737000 CVE-2021-47016,0,0,ef63df8aacfe0aac043235af5f65625db0ccac9f31d3b00ead028b31e2134d28,2024-11-21T06:35:11.787000 CVE-2021-47017,0,0,94509a9e3fc8c3a8d66eaa81dcba64f1b5bfe5be436ea76331be590779455880,2024-12-09T17:59:26.630000 -CVE-2021-47018,0,1,9846ebab7979fe712118dcc07a592ff738b61694ac9c16172481ecd4b7f9bccc,2025-01-08T16:53:56.173000 -CVE-2021-47019,0,0,f5f18a65a734328fc58436102735aa7be9165336e91e61e5583bce78c9f3421a,2024-11-21T06:35:12.143000 +CVE-2021-47018,0,0,9846ebab7979fe712118dcc07a592ff738b61694ac9c16172481ecd4b7f9bccc,2025-01-08T16:53:56.173000 +CVE-2021-47019,0,1,acfd5259b4996bcf1ff283c76a685d05e09a6cfbca17e944110d48ff612282c6,2025-01-08T17:01:03.423000 CVE-2021-47020,0,0,a37cb1431656b9e2f4cc4bb49c2b11225ea4a8cc7cd0317dc8017102c9ed0577,2024-12-10T17:03:24.697000 CVE-2021-47021,0,0,1a858617f9dd136a6b01cec5532b87bc6ed50c9bb3c6d33f9f5664bfb54943ba,2024-12-09T17:59:41.990000 CVE-2021-47022,0,0,18bd31d392a5c02945109dddde06693773e37865cf00c7d42b9e3940dc4b3d4f,2024-12-09T18:09:01.507000 @@ -207555,8 +207555,8 @@ CVE-2022-41568,0,0,6205fdde5e39bc36de73db4dcd6211c4ac286d5b081b138486c1c05c18b4e CVE-2022-4157,0,0,662b08d19a468f391d3afa6bd0cb88ad7c569aafdca4fb8c2cd984f331979391,2024-11-21T07:34:41.270000 CVE-2022-41570,0,0,68d8e3713c67a900ebaccd270512214f137c6b2444cfced04a663beebd955153,2024-11-21T07:23:24.863000 CVE-2022-41571,0,0,d21192f5b84bd2e0d8b3b7685c8fa13d81d53fbe0d3de64478a1014c88f8f353,2024-11-21T07:23:25 -CVE-2022-41572,0,1,b0dc6ad7d1b67857938cfca4e4b20eba7e81e5e0165572ea9bcf51d7cfda69f1,2025-01-08T15:15:09.427000 -CVE-2022-41573,0,1,a94e75bd02f03aa45bd2ac9b3fa3cf466ed18f3c4cdd1e841cb8938f64873b3b,2025-01-08T15:15:09.840000 +CVE-2022-41572,0,0,b0dc6ad7d1b67857938cfca4e4b20eba7e81e5e0165572ea9bcf51d7cfda69f1,2025-01-08T15:15:09.427000 +CVE-2022-41573,0,0,a94e75bd02f03aa45bd2ac9b3fa3cf466ed18f3c4cdd1e841cb8938f64873b3b,2025-01-08T15:15:09.840000 CVE-2022-41574,0,0,21e917fa5154deb6e3b8d21ad116ef9dde7c875c812d3df1ee5d78c46dfa6a1a,2024-11-21T07:23:25.140000 CVE-2022-41575,0,0,8334a25c2009fcf3e6c0edb09d3dd5a6ab1272c7f22935bf5852c90ba12a2139,2024-11-21T07:23:25.287000 CVE-2022-41576,0,0,f5bafe8f1c17d8fad2ba21f970ed4ca48d42f1479d46600aad0cea7bb4120781,2024-11-21T07:23:25.433000 @@ -208966,7 +208966,7 @@ CVE-2022-4338,0,0,a8cae0b6d01e7aa6c058fde379fb824047445211774badc0ee96d7bac7ed91 CVE-2022-43380,0,0,5b4763c995b26c9ab4d318988066bd30137698e2b69b5113794421fed6b587fa,2024-11-21T07:26:22.223000 CVE-2022-43381,0,0,e4db58732f5fd7b3201073366f6025129cda3812c23a7fff28aed1fc832495fb,2024-11-21T07:26:22.370000 CVE-2022-43382,0,0,917681c7c3eb765b85e8234a66671f7e3d63b6c316884600a1beb67016bb1dad,2024-11-21T07:26:22.540000 -CVE-2022-43384,0,0,584db91615753faff6aa8db292c2af0d8b11789d5848c6a2f420ecb9ba5583e0,2024-11-21T07:26:22.690000 +CVE-2022-43384,0,1,87ff900f1ca81f06b95e62412823a9e11e6e36ff55ae5d958d0c178477125979,2025-01-08T17:25:10.063000 CVE-2022-43389,0,0,df187357338532ced25057e2914cf7d7bf72c0a7445750dd7d42b917a0a8cac8,2024-11-21T07:26:22.850000 CVE-2022-4339,0,0,820fcca59f9c7ed14fad95b2181874284062813a94ebc34d6672103294900f54,2023-11-07T03:57:34.717000 CVE-2022-43390,0,0,3b35476bbd120925abcd37b9ac7c39710bcf1c429b4f77e477384773c0c67f1f,2024-11-21T07:26:23.043000 @@ -209152,7 +209152,7 @@ CVE-2022-43571,0,0,326d22435711b9b43d3083d6593721447281eea175c475ca68f07c1590e2e CVE-2022-43572,0,0,8fce5318402f93cc6953b2257fb7ff75b41bae14478fb0b652c9f623ab5890e2,2024-11-21T07:26:48.760000 CVE-2022-43573,0,0,82a8644fff0c8c13d25ed34338b343f124776e5603e05bd8dc12ee6bf3707673,2024-11-21T07:26:48.887000 CVE-2022-43574,0,0,bbd789a54ff5658ca5b06be0c86db6be6609d0c1d6d54c991f01581051655bcb,2024-11-21T07:26:49.037000 -CVE-2022-43575,0,0,bbd24919cbb9987578b948dc1811d94ae7e529d41c76e801115f06f0a28252ab,2024-11-21T07:26:49.163000 +CVE-2022-43575,0,1,ddf50b560bc8d21efc12dd3a5cf5a6698546dbe0accdfeffd3b94a634c0634a2,2025-01-08T17:22:30.183000 CVE-2022-43578,0,0,77074406681387570215d7bbc90d2a8ba5762b830d489ee8cb23182ee4b9bb3d,2024-11-21T07:26:49.303000 CVE-2022-43579,0,0,9c937caf26607739455cafee4fd7c918f02c9d0ac118e878317547b2c78a5971,2024-11-21T07:26:49.463000 CVE-2022-4358,0,0,7ae52c6df107206a5124bd89308111ff56946ba0480dd57a29fe1eed91484a78,2024-11-21T07:35:07.647000 @@ -209396,7 +209396,7 @@ CVE-2022-4383,0,0,cff7d58f063f8efad3ff5e5ab97ada5162e5b38f73a3b3e215fb02ee410c4c CVE-2022-43830,0,0,2f64150b363b8e69222f4767b2a962c4259c9aa91848800fda8ecd6f999d6183,2023-11-15T07:15:14.527000 CVE-2022-43831,0,0,4b824d13f4654134bfaa17c7c5acf538260c76da9795c9bb806d1640e5487247,2024-11-21T07:27:15.673000 CVE-2022-4384,0,0,25f24049ccb5584ac2286059b580466c788619146479cad249f1b9e96586286f,2024-11-21T07:35:10.520000 -CVE-2022-43841,0,0,454f34a2e83fdec2b5d648ad243f0957531999d624ac0c436c110b346e2f94b1,2024-11-21T07:27:15.813000 +CVE-2022-43841,0,1,6dac3a6012885404339a039f533cfe4b8c4ab64fc90a590d1b6f4c9d270c1163,2025-01-08T17:13:14.077000 CVE-2022-43842,0,0,6e561483c3801b15ff00dd2bfb39984ef10bf648e6925ca1d605d91b8d4bb1e3,2024-12-31T15:32:22.737000 CVE-2022-43843,0,0,aa4e8920b27430c0e020c56337aaf572b7590d86ac4b80d6e5ec6ab868ab7eb7,2024-11-21T07:27:16.070000 CVE-2022-43844,0,0,12fe96ea4e7f35e34da57a23786e8679400ecf390c193dcfa13dea7351d25cce,2024-11-21T07:27:16.227000 @@ -210255,8 +210255,8 @@ CVE-2022-45180,0,0,c3040cfe413949900a60ea83b3e98e1e8732363bd29ebf48fee6449f220d6 CVE-2022-45182,0,0,5ce5fd3aa8778337f722afc8524f8be33eca4a37a3b49427434ef8a1f42497ed,2024-11-21T07:28:55.140000 CVE-2022-45183,0,0,17c24bcc8ff5f83b3692890867f1b0390aceb5de23aec693bc352190eaa3a4c7,2024-11-21T07:28:55.287000 CVE-2022-45184,0,0,3d0fcb0285b7ec260e08c96917c32aa853ace4307fda2ec9ee77dd573c819440,2024-11-21T07:28:55.440000 -CVE-2022-45185,0,0,16d2233a18969fa33cb7529ccf2b16d6901990a16b8ca89ae75ef2569e19f35a,2025-01-07T20:15:28.173000 -CVE-2022-45186,0,1,64a4b00a8b229e3e97b7b7d060922d9a52051a5c5b63a0d2d5c2608e5126d79b,2025-01-08T16:15:26.787000 +CVE-2022-45185,0,1,b6c4846ae35e9fe36f5d1ad4643521400ec3f7b52d3df90ca6bd8ae3e9eb7d4e,2025-01-08T18:15:13.847000 +CVE-2022-45186,0,0,64a4b00a8b229e3e97b7b7d060922d9a52051a5c5b63a0d2d5c2608e5126d79b,2025-01-08T16:15:26.787000 CVE-2022-45188,0,0,897fe5d1be1d67bd18e0e84eecbd7aca5e96a3d426012bdcc62fcf1d224f7bf1,2024-11-21T07:28:55.583000 CVE-2022-4519,0,0,7e1b44f974b691b3ba99a7d6700f057355f3a483598f1d23e777976a85d319f9,2024-11-21T07:35:25.163000 CVE-2022-45190,0,0,f89ea31ba0ad427a758e6e41fdbb51266db819bb50b4347855d75db4180bf5f5,2024-11-21T07:28:55.763000 @@ -210854,7 +210854,7 @@ CVE-2022-4608,0,0,be843af6d4396743b51db58c72f2505739c01d27b14e0bce118248260ba2d9 CVE-2022-46080,0,0,68b2b59d09c84516563c3e52ea8ae348c5f72254930a31286339a3a247d9946b,2024-11-21T07:30:06.260000 CVE-2022-46081,0,0,8e27a6a05f54b38f7bc644f5917dc3bad23b46b85a0b29c2cb6a829c10deba7d,2024-11-21T07:30:06.430000 CVE-2022-46087,0,0,a739745513abaf7f2211850e9542f59106ca6aca5c242a056a8e32098bc80a91,2024-11-21T07:30:06.580000 -CVE-2022-46088,0,0,da1d9931c7b7b56d482488c67c522a0156e266a164c5c3c479f18959a8529e90,2024-11-21T07:30:06.777000 +CVE-2022-46088,0,1,fbec400ca51475ba9421a27e08dc711219d99cd09b17d81ab0a9e79792af5963,2025-01-08T18:53:10.857000 CVE-2022-46089,0,0,f19d133bf817c152dc8d9fb5b26b88d76b7110e1c6b600d64f973b4f5a22fb0a,2024-11-21T07:30:07.007000 CVE-2022-4609,0,0,ef6b610a9ab8c4c8cd37a74de4ddd025ba4ec8b5e1e4a1d2ed469fc695c8ae18,2024-11-21T07:35:35.517000 CVE-2022-46091,0,0,2d6b052a4fdbe2dafe7780a31ea006caa44558f35255d85dd695a2b3d7896fbf,2024-11-21T07:30:07.243000 @@ -212422,8 +212422,8 @@ CVE-2022-48388,0,0,13c757f93b0eef3b01e33ed39a736bad6d77d2a3105a2c7f4342f90b9f1fe CVE-2022-48389,0,0,eb063ff8dfa13e2a555c12156bbbd8338c343d47ca77d7533f59bc8ad443a959,2024-11-21T07:33:18.530000 CVE-2022-4839,0,0,71e9ea09316157b1d161766da1ca86a6c0636a9e403561b03ca92cbf29b77453,2024-11-21T07:36:02.903000 CVE-2022-48390,0,0,2118f140d5a464f1e6eb994741768b9d34b16134f7a115aa13be1e0c15719039,2025-01-07T21:15:07.953000 -CVE-2022-48391,0,1,f0df4ac89a14bd04b2e3255027b9378110b488fdd508ecb0d7b41f885e40b677,2025-01-08T16:15:27.090000 -CVE-2022-48392,0,1,b9fe3ba20fbbdfc5d1b9633d462e670d9b83c0269326581c320b3af6ba985f83,2025-01-08T16:15:27.267000 +CVE-2022-48391,0,0,f0df4ac89a14bd04b2e3255027b9378110b488fdd508ecb0d7b41f885e40b677,2025-01-08T16:15:27.090000 +CVE-2022-48392,0,0,b9fe3ba20fbbdfc5d1b9633d462e670d9b83c0269326581c320b3af6ba985f83,2025-01-08T16:15:27.267000 CVE-2022-4840,0,0,8593d435f1bfe4de06d5751803d143b53df092b88164a311eec3d96d433c7a2a,2024-11-21T07:36:03.047000 CVE-2022-4841,0,0,aa0be02bc0f514a14ceab97461cd0599b9d6992ea08fddafb73f57498c188781,2024-11-21T07:36:03.167000 CVE-2022-4842,0,0,5f968fb2edae3fdba3ae88b74baa37078b628e670ae5d2f7c0c597f4c2874591,2024-11-21T07:36:03.287000 @@ -212452,9 +212452,9 @@ CVE-2022-48442,0,0,d36a83d31e2b2754d833291552bce7be87a9cf43f9024c349a5f366fda062 CVE-2022-48443,0,0,ede0a966ec363c9aa77ae45de82f64c7a4fa2ce6bfb2197a737f0138a1ce43c3,2025-01-07T21:15:09.697000 CVE-2022-48444,0,0,80dd0e8f471992a8c1ed2d9a802b8b1afebf5a5dc5e78a467453e6eda63da9a2,2025-01-07T21:15:09.883000 CVE-2022-48445,0,0,63a0ea938ebf45b316f1c1a9997a08b535f3c06a17da269e04cc3f84ec90d2e0,2025-01-07T21:15:10.060000 -CVE-2022-48446,0,1,5037e9e7776ce4851d13020a2b58ccffb9db7668d5ae3b26b6c261b563c69fa7,2025-01-08T16:15:27.450000 -CVE-2022-48447,0,1,b9c031bd42741e2588cae61435faf9d454dfa2f5a024ebab2e197d4b62623635,2025-01-08T16:15:27.627000 -CVE-2022-48448,0,1,ac0113b9371244bdd027fcad3909086203247e71cb6c6cf5790c53b68b08f062,2025-01-08T16:15:27.810000 +CVE-2022-48446,0,0,5037e9e7776ce4851d13020a2b58ccffb9db7668d5ae3b26b6c261b563c69fa7,2025-01-08T16:15:27.450000 +CVE-2022-48447,0,0,b9c031bd42741e2588cae61435faf9d454dfa2f5a024ebab2e197d4b62623635,2025-01-08T16:15:27.627000 +CVE-2022-48448,0,0,ac0113b9371244bdd027fcad3909086203247e71cb6c6cf5790c53b68b08f062,2025-01-08T16:15:27.810000 CVE-2022-4845,0,0,16fdbc9737942df7f8183e3a4e7bf70a11498d3a5e5d53604615c161990c5a21,2024-11-21T07:36:03.653000 CVE-2022-48450,0,0,3917c4e01e0124bf8e3602238060dcd7b833ba63faac877190322b8e6ec193d8,2024-11-21T07:33:22.127000 CVE-2022-48451,0,0,e3decd816201f3272def1dd89853b3904fe4077f7978f7d8c728880c0cbda907,2024-11-21T07:33:22.233000 @@ -213088,7 +213088,7 @@ CVE-2022-4942,0,0,4bfd31c9d3683237fc0f66ee6838a8e9abe03973c1dc054d19973ecd2181f1 CVE-2022-4943,0,0,fbd7d57d4d1dd683863251f5fce13ef18de52df2a34c1f64d948aac8a5b8e404,2024-11-21T07:36:18.063000 CVE-2022-4944,0,0,4f9cb06fff170c9f36034ff3c0e0d5a7fddec2b4f0eb92639847dd2d54218639,2024-11-21T07:36:18.190000 CVE-2022-4945,0,0,20784b9d1103172e5d46b8cc80ea749a5a202a1d8d741e78d1464bc851f0caeb,2024-11-21T07:36:18.330000 -CVE-2022-4946,0,0,e409c5a79929ae7cd526af7d4344f08cb63d1b89740ccb44199d9e9d066ba9f9,2024-11-21T07:36:18.467000 +CVE-2022-4946,0,1,41fd8dc7f83b35220687a8d1d330ae53710d4c60699555a4ab3f45165abf6e79,2025-01-08T17:15:07.773000 CVE-2022-4948,0,0,3f06e3662375e23afad4aa4576d0c4fd807f6f0a60e20fd1d377539f48f1a48c,2024-11-21T07:36:18.570000 CVE-2022-4949,0,0,20ecd66c665d4a7df211e25b3128a2f7367a36b316ae054ac00474cadd4e5062,2024-11-21T07:36:18.687000 CVE-2022-4950,0,0,553f8616c590a48d9a934a6dc8477b16541d05a5e26a41275fd32eff9d48e9d2,2024-11-21T07:36:18.810000 @@ -213262,7 +213262,7 @@ CVE-2023-0148,0,0,8a62d15c710261b523921c8b171ae869903e790230fa7ca37f5da65332c3be CVE-2023-0149,0,0,9584b22b450545deaced1f59125ea9ffab74a534a3188a26f6e6d900b4530da5,2024-11-21T07:36:38.827000 CVE-2023-0150,0,0,2b80c48ae5038be6112b7fc7211478a2a6bbc3ab3c77195ec636caa269357cc8,2024-11-21T07:36:38.923000 CVE-2023-0151,0,0,102b522ae60586e4e2d1194a9341fff9b52acb502f519c1335df3d563929f7dc,2024-11-21T07:36:39.017000 -CVE-2023-0152,0,0,53014f54ae8eb999edf1389720bd2634c868d64c5f2ccc4eeb2368817145d1b7,2024-11-21T07:36:39.110000 +CVE-2023-0152,0,1,77ec5c20bbece612a8adbb99b65af89acc6dc54b03c6683d2cfe11d77c000b54,2025-01-08T17:15:10.267000 CVE-2023-0153,0,0,231f1dcb411de8f4ba9d57bd44d25b22896721c74867b2b916671bef8dd0bdde,2024-11-21T07:36:39.207000 CVE-2023-0154,0,0,53f8b0c361734ff6a70fa699144a8d756c19176b50031d9ef4ed1b20a257db71,2024-11-21T07:36:39.303000 CVE-2023-0155,0,0,317ad537de9d4713c8c5a7a72ff81169070410b9a09eba2e714ba46f93e23815,2024-11-21T07:36:39.400000 @@ -213638,7 +213638,7 @@ CVE-2023-0541,0,0,8866871e625b24e0151a49d74242e6c1e8dca48d30dc17af749d0248fe8e21 CVE-2023-0542,0,0,899089e10a2f2ac375bcbcae9ef43f4800bfb0de0e944cf423cc7e8b5b808e5e,2024-11-21T07:37:22.490000 CVE-2023-0543,0,0,875bea7c3e2020c0be9fc84e165abaf6c81d74aac982c759f7f4c46f960f948d,2024-11-21T07:37:22.583000 CVE-2023-0544,0,0,574b0c3977db6cc6752e6a2c2235836557bb5b6346992841309bc3d797454634,2024-11-21T07:37:22.670000 -CVE-2023-0545,0,0,4f253a84a4dc761f2f823ddcbc172649974ad9b413357beded3846aa027c6e5f,2024-11-21T07:37:22.757000 +CVE-2023-0545,0,1,9a00641837b7d164ad8476424933e523d526dc5597557da2fce461330bb0a3db,2025-01-08T17:15:10.463000 CVE-2023-0546,0,0,f73f242c9eb9c1686925858a54188cde156051b2f59abbad70c3cf227d450bb7,2024-11-21T07:37:22.843000 CVE-2023-0547,0,0,41d4cb5853c1827e37cb45f54fb6e1f708021a3f6b7cea65d419518df79df9fa,2024-11-21T07:37:22.930000 CVE-2023-0548,0,0,b840cd28d5b972022a251fd0e8d2c953bed712cbed3262f9f67dd5c876ba974c,2024-11-21T07:37:23.020000 @@ -213979,7 +213979,7 @@ CVE-2023-0896,0,0,9d141618c5ae49e0b2fce0cc35f19724865d32c54c0af7e92a799a3eda9cc2 CVE-2023-0897,0,0,4488412bab13a91906f7ce2227a72a4a67c2733f6e72f5b034956e9882b86681,2024-11-21T07:38:03.260000 CVE-2023-0898,0,0,61c6fe1f6f07583ed9f86faf44bce469795966b828fc3bbdb3114e34c60ef317,2024-11-21T07:38:03.390000 CVE-2023-0899,0,0,b4751369359daf9ce01cf9e352adf44a149726d62de43d55ebab2ab1b3ecdc03,2024-11-21T07:38:03.507000 -CVE-2023-0900,0,0,bfb43ca8dbbe2df07f68870893960c3491129cefaacc2efb53a5798d128b177d,2024-11-21T07:38:03.610000 +CVE-2023-0900,0,1,bad5aa03687b3a1bf1b7113e61e020bc3fef6dd022d179e6a228178919d960c4,2025-01-08T17:15:10.747000 CVE-2023-0901,0,0,2c6e4f3eb93ed3c392c2c25f961861a102eff72e085d6f08be0df6677f1949f1,2024-11-21T07:38:03.710000 CVE-2023-0902,0,0,db670d3424cf550cfd168167efb9e082779cfd7e2f51fb25732fa27ac8dd3c92,2024-11-21T07:38:03.830000 CVE-2023-0903,0,0,03d1382fefb6c0f51f60a99b3d4d45f626798051e128bade2ae6eaf5263499b8,2024-11-21T07:38:03.967000 @@ -215527,16 +215527,16 @@ CVE-2023-20723,0,0,9d0686f907129b6919ada24bf4f11d306c0e127a565ad2d2e14861ae5024a CVE-2023-20724,0,0,987f1a6ebac7796ad97470c40868ad4c190da72715630d9002692d9f05c5b7e0,2024-11-21T07:41:25.307000 CVE-2023-20725,0,0,f09278808328dfcfcad9a9453e6e7f164215557bbd6c9f4188e9f9b639210912,2025-01-07T21:15:10.227000 CVE-2023-20726,0,0,0839a4ee0c7a4b353253d289124d14c8c0a8623790680626ad23a3507d551e11,2024-11-21T07:41:25.530000 -CVE-2023-20727,0,1,12b8e73d1738786379705578d5b084abe724825ea42c8abd1e84732d69f07547,2025-01-08T15:15:10.070000 +CVE-2023-20727,0,0,12b8e73d1738786379705578d5b084abe724825ea42c8abd1e84732d69f07547,2025-01-08T15:15:10.070000 CVE-2023-20728,0,0,a92d83daff0e8454efbc72619861f5e9876e5beba7cfa77f65738746f6788e6d,2025-01-07T21:15:10.397000 -CVE-2023-20729,0,1,f84aa0f145a810d5b9d4006033a907e85d272d4f717361c7926bd179f76d2bd7,2025-01-08T15:15:10.470000 +CVE-2023-20729,0,0,f84aa0f145a810d5b9d4006033a907e85d272d4f717361c7926bd179f76d2bd7,2025-01-08T15:15:10.470000 CVE-2023-2073,0,0,96898ca4843b2e00caae369ccfc8a05e2eb3212aba8406e285b4a550c82c8d6c,2024-11-21T07:57:53.033000 -CVE-2023-20730,0,1,9eba9cd2ea22c4225c42dcf1a7a6a69da4b2e3f00a3fe484178376748dd37074,2025-01-08T15:15:10.713000 -CVE-2023-20731,0,1,16ee12776f4c0af3fc629dd79827c45e942a9ee8059842ff8bf8eb1c4434e50e,2025-01-08T15:15:10.950000 -CVE-2023-20732,0,1,6d865cc1fcc1a18ca910034ad8cc7cf25b8663c19d4fec573519b271d1ea0d26,2025-01-08T15:15:11.213000 -CVE-2023-20733,0,1,5d19eae1428e0245aa9747a41ff00c1866e76b7548477310398ca2f15af1514e,2025-01-08T15:15:11.497000 -CVE-2023-20734,0,1,355e076832f9c2bc40d00e86fb841ba8ac2f9e999b0bca7114170ab3b6ead126,2025-01-08T15:15:11.760000 -CVE-2023-20735,0,1,1e1a44a8f6778b155ad25c6dcfae627665ae155e2516a57ccf9c03be01fc7240,2025-01-08T15:15:11.980000 +CVE-2023-20730,0,0,9eba9cd2ea22c4225c42dcf1a7a6a69da4b2e3f00a3fe484178376748dd37074,2025-01-08T15:15:10.713000 +CVE-2023-20731,0,0,16ee12776f4c0af3fc629dd79827c45e942a9ee8059842ff8bf8eb1c4434e50e,2025-01-08T15:15:10.950000 +CVE-2023-20732,0,0,6d865cc1fcc1a18ca910034ad8cc7cf25b8663c19d4fec573519b271d1ea0d26,2025-01-08T15:15:11.213000 +CVE-2023-20733,0,0,5d19eae1428e0245aa9747a41ff00c1866e76b7548477310398ca2f15af1514e,2025-01-08T15:15:11.497000 +CVE-2023-20734,0,0,355e076832f9c2bc40d00e86fb841ba8ac2f9e999b0bca7114170ab3b6ead126,2025-01-08T15:15:11.760000 +CVE-2023-20735,0,0,1e1a44a8f6778b155ad25c6dcfae627665ae155e2516a57ccf9c03be01fc7240,2025-01-08T15:15:11.980000 CVE-2023-20736,0,0,26b81593811b831870ef407b06774afbafd1125e84c5fc0fd9ce51c1f7c1d41d,2025-01-07T22:15:27.733000 CVE-2023-20737,0,0,1ab002369cec3db0ce7099072764da36218b02beee38e464302d20f9c6feb57a,2025-01-07T22:15:28.423000 CVE-2023-20738,0,0,cde8215494ffae4a3905fb8d6625d49af5a9ed7229e8854b086538f13216fbdb,2025-01-07T22:15:28.617000 @@ -217000,7 +217000,7 @@ CVE-2023-22236,0,0,48fda2ee7a9928a0020a9a760d2f0171d4118146ff105e37520fa3865e59e CVE-2023-22237,0,0,7b1c5441ca4e5edd1cd3c953bf4224e1fcf91beb80a9172f2b5ef67611d6b916,2024-11-21T07:44:22.747000 CVE-2023-22238,0,0,c843468f8bbd2c1a769d7194162845a8931d846f460e51410e29d1f2a4be6dfa,2024-11-21T07:44:22.867000 CVE-2023-22239,0,0,fda4add25f1e2c921bdd1a8cfc12a771529a8b904b53a3f5fb53f8c7ff48dc34,2024-11-21T07:44:22.977000 -CVE-2023-2224,0,1,4f7de22236bcb463a9dd9aef34cceefe9ad0fce580513673ee2601d2a488a2f2,2025-01-08T16:15:28.417000 +CVE-2023-2224,0,0,4f7de22236bcb463a9dd9aef34cceefe9ad0fce580513673ee2601d2a488a2f2,2025-01-08T16:15:28.417000 CVE-2023-22240,0,0,816e86c481139ca7a401905d0df27ff1a1411c83bab1c292a646467fab440dc3,2024-11-21T07:44:23.087000 CVE-2023-22241,0,0,28289a670ed0ff9a78f5c7a1170e3151ab145a84b50221b35dbd8c684c4091e0,2024-11-21T07:44:23.193000 CVE-2023-22242,0,0,d0ac454489e1faad0928c868111d6e0667de2a24f46c1234e67185f964da5b21,2024-11-21T07:44:23.303000 @@ -217827,7 +217827,7 @@ CVE-2023-23366,0,0,ae02b91b6e3f6ce474e90aee58249f74dbafc5b810b91fccadbd3001bf821 CVE-2023-23367,0,0,47aeff4d68dd37ec2b5676344b30727b3ba36587f3f0663be3c4cdcfb0cd580b,2024-11-21T07:46:02.490000 CVE-2023-23368,0,0,a4cfe6246b67889cd101f9da085f1027733a888add4e92f1ff51cd351e535c77,2024-11-21T07:46:02.677000 CVE-2023-23369,0,0,dc29d7eaa0412209beb89f44e891d6c8ca4af5b405e7f5cffba8cb6f90cffa53,2024-11-21T07:46:02.830000 -CVE-2023-2337,0,0,baa45dd895ea452cae22fe3a6a2f43671fa6fd285b8a618a18f637df1a414c59,2024-11-21T07:58:24.733000 +CVE-2023-2337,0,1,490ee73fcb0e8b5ebc1a64ef95485f68101a04be30eec33b3dc5e6e6fa8ed147,2025-01-08T17:15:11.033000 CVE-2023-23370,0,0,e80e28dfc847d90ddfcc4f53271fde3578641b23254bda402ad324d1d97c8909,2024-11-21T07:46:03.010000 CVE-2023-23371,0,0,9e9dc0873136ff23b429c4a427bcabcab6948e079c09d937802f774a61b89c28,2024-11-21T07:46:03.173000 CVE-2023-23372,0,0,7eee6bdae6e08d9f320d57c1bfbaf83ec9cb5285cf090233cc4f43506a603f2b,2024-11-21T07:46:03.323000 @@ -218991,7 +218991,7 @@ CVE-2023-24690,0,0,4a886557e7972f5cd8c25c4dbefa1709e606bb4f8e1655252ab71ad743088 CVE-2023-24698,0,0,8a71bb3d4252fa1f8e10718f3c8321b9999af666b0940e32d3ffe947a86d831d,2024-11-21T07:48:19.297000 CVE-2023-2470,0,0,c8a7f42e930bf02305802e3439ef541ade07b0ea258171638b24ef6a55b670b3,2024-11-21T07:58:40.883000 CVE-2023-24709,0,0,95724b3cdd469490b5d656e22c325de29d60ac897a910128b841653f99d55032,2024-11-21T07:48:19.463000 -CVE-2023-2472,0,1,5b068f2698671e693c1ba4453c6de14a4f23024ba22de1ed71b24f9a54d16713,2025-01-08T16:15:28.610000 +CVE-2023-2472,0,0,5b068f2698671e693c1ba4453c6de14a4f23024ba22de1ed71b24f9a54d16713,2025-01-08T16:15:28.610000 CVE-2023-24720,0,0,d8207ef038149d5621fb38b9b00ffb2377fa5b379bf3571bd39879aff951975f,2024-11-21T07:48:19.610000 CVE-2023-24721,0,0,55a5724eb1f20dec28ab5283db4d5d704229cb6d4b817881104e271c00adfb7e,2024-11-21T07:48:19.750000 CVE-2023-24724,0,0,25b2f3661e924d48bc1909de4c38b51b3f69798503f675a779ee4c18e399a64f,2024-11-21T07:48:19.893000 @@ -219121,7 +219121,7 @@ CVE-2023-24871,0,0,c316268b6c8117f618bd2da8a83169044e4c90ae174af0ff2a24da3f1643f CVE-2023-24872,0,0,7a85cc881baf96177e88d060a0a196055522f4fd219461d23c21c02bd6d88397,2024-11-21T07:48:41.693000 CVE-2023-24876,0,0,ce9d4e35a36c71d1e199e2c85c097a6dae2875edfec4961459c6ebda45706fd2,2024-11-21T07:48:41.827000 CVE-2023-24879,0,0,50f96bee85af3c52e5023966fd9e747a8595f8b7d5884dc966d7fb926d620def,2024-11-21T07:48:41.960000 -CVE-2023-2488,0,0,11c2eee56de8cd97c4cf9f3b4071ff27a0a087f8a40c4b70bfcdd33e51cef966,2024-11-21T07:58:42.703000 +CVE-2023-2488,0,1,1ff030b9a9cc358926f2f31f1cebcdc10263b6fd1a8f39d3ff95a9e9e914dd17,2025-01-08T17:15:11.237000 CVE-2023-24880,0,0,979166593d7eda8b024552f0eb36771e4323fa2bd76c007faad39d1d077223cc,2024-11-21T07:48:42.067000 CVE-2023-24881,0,0,9309c40952e29646b3e986b6b73d3384ef98206aa56a7d872f76589472eb5f6e,2024-11-21T07:48:42.197000 CVE-2023-24882,0,0,b9a6b265648d5a4c47b3a2f5c8243cef068fa5d84244abca120c82b497ae74ee,2024-11-21T07:48:42.310000 @@ -219130,7 +219130,7 @@ CVE-2023-24884,0,0,60e5a6b0b3573670377d54c2fff1dbeb70110f95e7c3722a99d2d3d41d978 CVE-2023-24885,0,0,9662d94e242ea3b0e8333672deb3193424405f26d0206b6d719c84bf8f41bb99,2024-11-21T07:48:42.673000 CVE-2023-24886,0,0,9b4390d88c6062609e6f2f231300d240908d833654a62f9283d65a8b40391f0f,2024-11-21T07:48:42.810000 CVE-2023-24887,0,0,1fa3f5996ae51b40e8ef126b7800ea35d8fad303b2337b9e81b066421b8756cc,2024-11-21T07:48:42.937000 -CVE-2023-2489,0,0,0ce22b17951082b0233fda8cb762843c9d517104878bb4ab2e680036b56b1550,2024-11-21T07:58:42.803000 +CVE-2023-2489,0,1,5a424baee54accf15cb35e970432f5c16b21b4a2d25b4c6512fb478e634bdc3a,2025-01-08T17:15:11.450000 CVE-2023-24890,0,0,e2ae22af124c90f24a70ba451ffa99356cdf86f9205d7329b5cf2b69bbc3e413,2024-11-21T07:48:43.077000 CVE-2023-24891,0,0,e11ee3ba86a5fb03e6c6db0a26d307cf540786366fc1a47ebc7854a48b591c01,2024-11-21T07:48:43.183000 CVE-2023-24892,0,0,f6596eec952d734ef3f6f80f1050e5bc03324a4af4641a8eddf5728d24e0f371,2024-11-21T07:48:43.293000 @@ -219265,7 +219265,7 @@ CVE-2023-25026,0,0,bef0a150c94966eb73b04028cf8c6669980bb0435bfc1fa9b54eb38f1233f CVE-2023-25027,0,0,59f80057e41a39fc027f53cef97834556b80013e57a4e4c90c6031b4973fc715,2024-11-21T07:48:57.517000 CVE-2023-25028,0,0,e53d282b9be5e693bf45b809df80a2fafa216860ea5ea55859fbec38ff73fbb6,2024-11-21T07:48:57.640000 CVE-2023-25029,0,0,9f236dc137a012bca0364259831b1657d09e2e6e4be76165332cfa96fe62d99a,2024-11-21T07:48:57.763000 -CVE-2023-2503,0,0,e330c81f7e27c56a7fda6165dd6ffd0661bf20126ebabb4d2e5f6aef01ac7d0b,2024-11-21T07:58:44.210000 +CVE-2023-2503,0,1,d4756d1624bbb85d10720fcfd22b04d3d7134591d6d6b262b289ec04605f83b9,2025-01-08T18:15:14.640000 CVE-2023-25030,0,0,e4eda7118501ff8741fdfd285f9bcc5fbad1caee91ae7299855d848228ca1048,2024-11-21T07:48:57.900000 CVE-2023-25031,0,0,8388e6ef883e14506d30396f3941fb63967de5c7b787ca3345db6fa0ec708736,2024-11-21T07:48:58.040000 CVE-2023-25032,0,0,c356e9b8c607608217b42644392de0832bf848395485102bc5ce4920fd79f2e0,2024-11-21T07:48:58.157000 @@ -219814,7 +219814,7 @@ CVE-2023-25706,0,0,b5351d6b91bc086a84ffea9777995a1bd98a34656e30777b78fda81036c18 CVE-2023-25707,0,0,eaf79ded6195061db68b98185dbea0c77b64aa231a0d482a577beb57b2216635,2024-11-21T07:49:58.680000 CVE-2023-25708,0,0,bb244a6aec8a17987ebc2da66715860ee6aa39c52a6277d5aad5e4f2cdb506d2,2024-11-21T07:49:58.797000 CVE-2023-25709,0,0,5e403e9cbb35a7e0fb6cc18efe329e333f62a7cb8eab818f107914575367e972,2024-11-21T07:49:58.910000 -CVE-2023-2571,0,1,7132f61c6df2c0829919592452f1982a5a65fd2097f6ff20bd9aa6919a6117c9,2025-01-08T16:15:28.780000 +CVE-2023-2571,0,0,7132f61c6df2c0829919592452f1982a5a65fd2097f6ff20bd9aa6919a6117c9,2025-01-08T16:15:28.780000 CVE-2023-25710,0,0,f0f39208945c07b8debdfbcad6039dc7e144d4d78e369bb69c2ca22d80fe2f98,2024-11-21T07:49:59.020000 CVE-2023-25711,0,0,b536ab9b5d14b97e3964a140a1593990f965054ffa8fb6da1bd23ecbe52ec44d,2024-11-21T07:49:59.150000 CVE-2023-25712,0,0,911dd85ef7fabed1c2aa0a3c60a0158dcefea94382e1973d9b0fc3ce496c39aa,2024-11-21T07:49:59.263000 @@ -219825,7 +219825,7 @@ CVE-2023-25716,0,0,6a68a371fb70c98c3f42445bc57863f0a9fc317dbcca5e2cf2d7a9605735c CVE-2023-25717,0,0,e74d1eee0b5325b9355e668aec0a2894d959be2124ebcddfb4c6513e788921d1,2024-11-21T07:49:59.737000 CVE-2023-25718,0,0,f5451b83d0d2d17afcf3aeff2ebb8c713d359ad1eb925213a0b2737a383e0c42,2024-11-21T07:49:59.913000 CVE-2023-25719,0,0,af067eb4bbeaa87ff5bd0003d5bd5bc28035789641dd59be0ad1c17fd3a0687e,2024-11-21T07:50:00.107000 -CVE-2023-2572,0,0,a63cea4ecff6e150738bde04891de03da17f6647f86bdfb77d7db37c5c528f5e,2024-11-21T07:58:51.363000 +CVE-2023-2572,0,1,ed886a16c7f1007ac7399c56e87342873576f715bc1e7094b3db9028c0821f2a,2025-01-08T17:15:11.603000 CVE-2023-25721,0,0,55cfd25a051ecf165f722f167312e1dd2e7291883e9d0f27c9f2b6bdb2eeb2b7,2024-11-21T07:50:00.257000 CVE-2023-25722,0,0,7e416ce84d5f4c31085981a4472687d4385879c2df11191e9cf4c378334454cc,2024-11-21T07:50:00.540000 CVE-2023-25723,0,0,20f2fc6614c9059512665f8d3df6c3e29f15e7937ee834ebb89d345e1d0306c8,2023-11-07T04:09:09.190000 @@ -220371,7 +220371,7 @@ CVE-2023-26336,0,0,4c0ec465bdd0594e1b95ffed0970d03dd50ffb1071458fd0a14a4105e012e CVE-2023-26337,0,0,0e083c028fcf3f1705375c765fdc1f0d8650d7c1430809a5fe9dfae23b5d5a2c,2024-11-21T07:51:09.330000 CVE-2023-26338,0,0,0075fce54e77f354313035546dccc52ac7ace22e247ca326a04a53757063e06e,2024-11-21T07:51:09.453000 CVE-2023-26339,0,0,3e6bf290907746be6e92c0a366a469f942a13e9685bea8ad06dc104ed9d26e4c,2024-11-21T07:51:09.573000 -CVE-2023-2634,0,0,8b9438fddeca71196c511a1310407d570f9bf87d16aaadb2e979c3da114ec879,2024-11-21T07:58:58.397000 +CVE-2023-2634,0,1,4ba255619c56c2a11a8d3eec8ce00d5bf34cb53cfab7a3041711c41994e9dee7,2025-01-08T17:15:11.783000 CVE-2023-26340,0,0,fc8b3149edc0ac0e919b5989a1801d2a6a97a256f0f21a33aeaffd84b8881d9a,2024-11-21T07:51:09.697000 CVE-2023-26341,0,0,6c42dc97333bee99d441d862042b723b2fe1a87aebe7807756afc38e6cb26ffc,2024-11-21T07:51:09.817000 CVE-2023-26342,0,0,41f6a301b3e688a48c01fef53f4dd1ab43bbee3f5f603a4c31e1107eb33a8e18,2024-11-21T07:51:09.937000 @@ -220900,7 +220900,7 @@ CVE-2023-27117,0,0,1b564ab1213c636ed1bcb1211fbe55d3326a995724dbdd798730a6c18bee8 CVE-2023-27119,0,0,51fb3235aa7b5f301532d8ee70768c14a0f27923234589bfe8f3e8db5027a9ac,2024-11-21T07:52:21.940000 CVE-2023-2712,0,0,e56ce1c9e62a88b0c3da5dfc4f135f7688b65e74fffe6119e6fdda9f915cfd6b,2024-11-21T07:59:08.977000 CVE-2023-27121,0,0,af045596d8f6ca5455dc424bc9c25c07b7fe2d491f8715ab4033cd0f1876e18f,2024-11-21T07:52:22.083000 -CVE-2023-27126,0,1,35fc7284ec132577512aee82955bceff6609ee899eb30f2c32fa490cd809d87c,2025-01-08T16:15:27.993000 +CVE-2023-27126,0,0,35fc7284ec132577512aee82955bceff6609ee899eb30f2c32fa490cd809d87c,2025-01-08T16:15:27.993000 CVE-2023-2713,0,0,694cae7c4482cca62c82db41fe8d786686723088181886401cf7387927edecf9,2024-11-21T07:59:09.097000 CVE-2023-27130,0,0,06f01336b108dc04849f3b5e9bb0b65956704ace7574b369f36c2736344f73d9,2024-11-21T07:52:22.387000 CVE-2023-27131,0,0,e881c5ced24ba136ac16c86df0eb8291acc060ef6490a70e3b625e6de1cdc682,2024-11-21T07:52:22.527000 @@ -223137,7 +223137,7 @@ CVE-2023-29629,0,0,b02a28fe2dd06005d8e06b91cf12cd20311cc92df5a97c8e9862ac8fd7ca7 CVE-2023-2963,0,0,266977fd81eb76df86a94950c6ce356b1acc14c89419381d9fbf9984f3e043e0,2024-11-21T07:59:39.490000 CVE-2023-29630,0,0,bd5103b8d6affd7b6057d96cf1d3822608702bfbeefb4449d0fd0a250622538f,2024-11-21T07:57:21.130000 CVE-2023-29631,0,0,2659b771eea3055fcdb233fec3da0f347d37f8b93ed35de7b55a432987ffddaf,2024-11-21T07:57:21.267000 -CVE-2023-29632,0,1,a819f7ba82dd60316f6011478658c8d2f82534d1215aecfaacb0b5334d3105fa,2025-01-08T16:15:28.220000 +CVE-2023-29632,0,0,a819f7ba82dd60316f6011478658c8d2f82534d1215aecfaacb0b5334d3105fa,2025-01-08T16:15:28.220000 CVE-2023-29635,0,0,9ec522013c739bce31e9545be2ac00415b72fcb53cd77ffd2a49c83cc14439dc,2024-11-21T07:57:21.540000 CVE-2023-29636,0,0,ec407007a3539578ce1253f5ef5f3677cf5d9ec29c6a7dad8529b8a403cf1558,2024-11-21T07:57:21.680000 CVE-2023-29637,0,0,788578add425e2101415c35c7ca5a938a83f3343abc6cd3aa355527b443c031c,2024-11-21T07:57:21.827000 @@ -223452,7 +223452,7 @@ CVE-2023-30266,0,0,abed353f4357dd3f90fb390f435f2cbea9f7d4c54ce80985406e37115d79d CVE-2023-30267,0,0,ade4bf34d87290f791bc1315cc624abcd56350cf0ee208b0af06730d34f804fe,2024-11-21T07:59:58.110000 CVE-2023-30268,0,0,0db6b05ef490c868a6fa9699e92c30cecedd31a533255b1ad683822459b33b90,2024-11-21T07:59:58.250000 CVE-2023-30269,0,0,cebd756c90bb877f8e88202ba42bf1215405ee7bc7742a9b0a6d65e8dad5bfaa,2024-11-21T07:59:58.390000 -CVE-2023-3027,0,0,04eb563085d38d2ce2c11ad0913326e7ffb0529d65a80eb70ba00f3e5f73e262,2024-11-21T08:16:16.473000 +CVE-2023-3027,0,1,560d82e06a1833a4ff7380ca52c8278ca6cedaacbf61570bb31dfac50b4bff69,2025-01-08T17:15:13.653000 CVE-2023-3028,0,0,d7e6c492aa4e09f4068a4883ce78bc00c5d3a6d6e7c135ad24766c470347aba7,2024-11-21T08:16:16.607000 CVE-2023-30280,0,0,ef85ad7ae12e425f73b02ce09fe58299e837810a7b3f878ae87c5dda25f820ea,2024-11-21T07:59:58.527000 CVE-2023-30281,0,0,9285be0bb0754f7f9c0558350277e8d74652220daaa54df7dc678182821e2104,2024-11-21T07:59:58.680000 @@ -223898,7 +223898,7 @@ CVE-2023-30786,0,0,abf585160480244aa4011803fcc4c2f44598c1f0b77e9f8e22447c6e1e4d2 CVE-2023-30787,0,0,6ec1b23b0515d10f483780c608fa22ccb8ee6d55eca901dadd7788986c284f7e,2024-11-21T08:00:54.283000 CVE-2023-30788,0,0,85a4836470b3b8f59250c1e41bda76fb45205bd75c14db397cf28544ee1fe84b,2024-11-21T08:00:54.407000 CVE-2023-30789,0,0,7a801f26f6531c0689e569317f2ff563c7ab0b97496d35fcdf3e08ede266c36f,2024-11-21T08:00:54.503000 -CVE-2023-3079,0,0,09474a3d5c46797150e75c0074ee1841e048ece4e7fd7f4a9821602f9dca5b24,2024-11-21T08:16:23.833000 +CVE-2023-3079,0,1,29a23b3a6494ee01f2960fe1112ce6683479a771fffa6ec601450f04b6ac2d73,2025-01-08T18:15:15.897000 CVE-2023-30790,0,0,e563922f91cf6cdf1264a95fb7f8fd73ecb32f2a9b0c626818608d08fe8db512,2024-11-21T08:00:54.623000 CVE-2023-30791,0,0,8af240725d0fbeb118fa2f99d54364cfd184e2b65d09d8fe085a7f73c134e4eb,2024-11-21T08:00:54.737000 CVE-2023-30792,0,0,43967f763edb410d942b9f69bf896b0417eaee112de33e5665028d330d1e6da0,2024-11-21T08:00:54.883000 @@ -223946,10 +223946,10 @@ CVE-2023-30859,0,0,1b581a22ab2db15855071a3b468f847aa70dc3877e6c2976c78740cb4f1e0 CVE-2023-3086,0,0,4f76759d910599ee2ed55e8198dbdd4dc1503271cffda482d56237ef193099cf,2024-11-21T08:16:24.863000 CVE-2023-30860,0,0,a0664350663f0dd44b9f530fdd4d7ecfb1d9052d6eb13777775ab4163ea1e17d,2024-11-21T08:00:59.490000 CVE-2023-30861,0,0,461ecf881d6b41b57c5a22369d16854baedd977bd814c0945d37165743ca5a52,2024-11-21T08:00:59.623000 -CVE-2023-30863,0,1,cfc03c97fbb27fb4b54bece81f0529244d08a66e5825ae1a21171a92b7ba61b1,2025-01-08T16:15:28.967000 -CVE-2023-30864,0,1,be57fd9ac062018c5f10c4322f896a1f9e21f680a7fd661968a854d10d95a104,2025-01-08T15:15:12.297000 -CVE-2023-30865,0,1,bdde45f68564577a253a809fe35d7d17c050b2b464b24fce16ccb1a4e8ca4ac6,2025-01-08T15:15:12.540000 -CVE-2023-30866,0,1,93348cdc02ade35474cc9c0766b1c49c7259686477bd904aa49c420cb2479fdf,2025-01-08T15:15:12.760000 +CVE-2023-30863,0,0,cfc03c97fbb27fb4b54bece81f0529244d08a66e5825ae1a21171a92b7ba61b1,2025-01-08T16:15:28.967000 +CVE-2023-30864,0,0,be57fd9ac062018c5f10c4322f896a1f9e21f680a7fd661968a854d10d95a104,2025-01-08T15:15:12.297000 +CVE-2023-30865,0,0,bdde45f68564577a253a809fe35d7d17c050b2b464b24fce16ccb1a4e8ca4ac6,2025-01-08T15:15:12.540000 +CVE-2023-30866,0,0,93348cdc02ade35474cc9c0766b1c49c7259686477bd904aa49c420cb2479fdf,2025-01-08T15:15:12.760000 CVE-2023-30867,0,0,6209cdddfea6bfa4de6e8f98a67a23c327b90abc77aa6d6ea031f4f03aec871c,2024-11-21T08:01:00.287000 CVE-2023-30868,0,0,08d55230238ab1fd94581ea88379dcbb36d67a1a2fe10a58a7592ed08233c1ad,2024-11-21T08:01:00.437000 CVE-2023-30869,0,0,25196cd4a5bc5d839e7d1dcadfdfed8c30efa99b69f9d000898ba92cae740dd5,2024-11-21T08:01:00.563000 @@ -223982,8 +223982,8 @@ CVE-2023-30910,0,0,b862c7ed6b5ae4780022428c78ad9993be3e78df59f04a8c4318aca2621a2 CVE-2023-30911,0,0,1da7bff27f011400e53e1a3ebc0f4fd080e4c11ad1ec25b7335d2292bee573e8,2024-11-21T08:01:03.383000 CVE-2023-30912,0,0,4a5e09b28c6e8c7bef0abe8f57146f53d62761bcca273a06425e9a36bce86165,2024-11-21T08:01:03.547000 CVE-2023-30913,0,0,5ea9b730539be4d5ee913820ab31a71fc3cb256d6639c81c20df42218710592f,2024-11-21T08:01:03.703000 -CVE-2023-30914,0,1,41c16cdaa5c3b907f46ebe568e95e42b00562bc69085d38d18c88f7e7429ee28,2025-01-08T15:15:12.940000 -CVE-2023-30915,0,1,dd1cd8800c588e7d939fc3fdb5894ce01f6881991ee170fa1c58b575417e54c8,2025-01-08T15:15:13.160000 +CVE-2023-30914,0,0,41c16cdaa5c3b907f46ebe568e95e42b00562bc69085d38d18c88f7e7429ee28,2025-01-08T15:15:12.940000 +CVE-2023-30915,0,0,dd1cd8800c588e7d939fc3fdb5894ce01f6881991ee170fa1c58b575417e54c8,2025-01-08T15:15:13.160000 CVE-2023-30916,0,0,370bfd8b8b1f8bfe10f150c522193634d9ec1b79c902e729e7863e2d9fa83416,2024-11-21T08:01:04.087000 CVE-2023-30917,0,0,ff7cc92872ec05ba7d687abef2136bfab4295187650621ca0164d69668c2df07,2024-11-21T08:01:04.220000 CVE-2023-30918,0,0,ce84b4a2323d9294addd95db64695ae171a24b3d46d45c224858772ea686c3c5,2024-11-21T08:01:04.343000 @@ -224469,7 +224469,7 @@ CVE-2023-31557,0,0,9ff81c72e5c99944b40baf92f5efc70583af95408712da3d96dd75bda624b CVE-2023-31566,0,0,e871c886400ebd66446d3859338ecac61182d7101420a3f79ab1135a583d7062,2024-11-21T08:02:01.847000 CVE-2023-31567,0,0,bd5d8de992a43d73ec75608eadc07f5a87c2d764e49c12e6d987a6adc631a187,2024-11-21T08:02:01.977000 CVE-2023-31568,0,0,2a94cef32a460c46c54e6bf7baed4302e010b387a30baae3c629c416e075acb9,2024-11-21T08:02:02.110000 -CVE-2023-31569,0,1,d077547b542d195c8f55da836f1c847ca9af82c0c370d8805e63fdff1b63da10,2025-01-08T16:15:29.143000 +CVE-2023-31569,0,0,d077547b542d195c8f55da836f1c847ca9af82c0c370d8805e63fdff1b63da10,2025-01-08T16:15:29.143000 CVE-2023-31572,0,0,7e60986fdcdb9e6fc758fdeea9993f4cff97ce5351c559d3723d9b04a720d6aa,2024-11-21T08:02:02.400000 CVE-2023-31576,0,0,c09026c0298a63fb495458cd534a7d65d48e7b6f81c7449cf2ddf8b5d8e09121,2024-11-21T08:02:02.553000 CVE-2023-31579,0,0,75a007048fc1a54a6840179bdd981d83684b0b6ccac864aebbd94e6105ec6ffb,2024-11-21T08:02:02.700000 @@ -226021,7 +226021,7 @@ CVE-2023-33377,0,0,2ed1b558e9849cff4a407bdeeee3be6572597a9e63fb34dcdf4c8bf68fea9 CVE-2023-33378,0,0,08aa2f7b9fc1892345e4326c2048d581e2ab79f7634ebef807c3df29bd8e5e10,2024-11-21T08:05:30.973000 CVE-2023-33379,0,0,56071ddc70006503d0579ef54330f122abc6926fb2e2d89ab0a3c9f899e63563,2024-11-21T08:05:31.147000 CVE-2023-3338,0,0,3cda8649f934c581b6b533eca6ada7ce37372aa07e0c5aa58ca682eba2e45d52,2024-11-21T08:17:02.917000 -CVE-2023-33381,0,1,466cba4d3e8f58ae391c8fcef96048eb9c7b73f81ad45fe6362cef219973ba1c,2025-01-08T16:15:29.360000 +CVE-2023-33381,0,0,466cba4d3e8f58ae391c8fcef96048eb9c7b73f81ad45fe6362cef219973ba1c,2025-01-08T16:15:29.360000 CVE-2023-33383,0,0,a28a7167b95315782f605325b16be32691bcd42b3f8b778f9c9163d5147b8288,2024-11-21T08:05:31.480000 CVE-2023-33386,0,0,39ad08c3a7ff1fd51816ecd1012bc8a064af125cb1b0a886ff37869c95775e14,2024-11-21T08:05:31.720000 CVE-2023-33387,0,0,3e3361f6605be6009330b3068fed6534dc9ea26a4bdf2b70a6ee9bb32c805270,2024-11-21T08:05:31.887000 @@ -226045,9 +226045,9 @@ CVE-2023-3344,0,0,1efba69725029e7b1d6bd567dc343d8b63807c9f70a15f4490baef2c4f6b9c CVE-2023-33440,0,0,44d76c56fe89d89a000979a9e6940a510b5d8fe2ba60b7ebd43e302cb4e51bf8,2024-11-21T08:05:35.123000 CVE-2023-33443,0,0,6c4ad59b45035b5c88ac135965bacacb2dedc93413c60d04ce25fba05f45224c,2025-01-06T21:15:10.830000 CVE-2023-3345,0,0,219d5c772aa02f0c4a4b16b09721d8934adb3c1505c85a870be2fa6ad37ab3fd,2024-11-21T08:17:03.907000 -CVE-2023-33457,0,1,7eee79e2e603000fdc9c79d0c7f54a28226aded759ba1bc0cbce35446680feba,2025-01-08T16:15:29.587000 +CVE-2023-33457,0,0,7eee79e2e603000fdc9c79d0c7f54a28226aded759ba1bc0cbce35446680feba,2025-01-08T16:15:29.587000 CVE-2023-3346,0,0,09f68a6670d4a69cff8e11fa4ad9eea39d73cc8d7fe0a2dacd2a911bbd61aee1,2024-11-21T08:17:04.037000 -CVE-2023-33460,0,0,aa8115b38c6db716db4beb1ba06c8ea5ad4cbb5991dbed549a9779837f549f56,2024-11-21T08:05:35.557000 +CVE-2023-33460,0,1,6e418258c1a2b91b79efff9c4f69791d5894d1876ad79ba0f82b40a9644edd3e,2025-01-08T17:15:12.020000 CVE-2023-33461,0,0,ce5229701e545884ff53bba52824ca76317925574fd4a34ac97d8d9ec204f20d,2024-11-21T08:05:35.730000 CVE-2023-33466,0,0,8f3bb95382db1efdd63c10853d2c8cab520a0781d1269adfe6c9d0fc3cdbbf5b,2024-11-26T19:15:20.670000 CVE-2023-33468,0,0,4e03c49a7594212a8b1ff77b489a307327dcf22bee135bc562fbafc7e39748ec,2024-11-21T08:05:36.110000 @@ -226055,7 +226055,7 @@ CVE-2023-33469,0,0,994bea01d55c6edda4d230c6ca8daa28df27e07f5b1b8935938681fe0f2d3 CVE-2023-3347,0,0,4851dcfdfcc397578885c52101d604631a3c7d600a20780072cf1fe3629398cb,2024-12-06T11:15:06.970000 CVE-2023-33472,0,0,86b002e3a1ad3c07a43bbffb1f1d26c5daf73932568b8e94bc896b5fc2582380,2024-11-21T08:05:36.497000 CVE-2023-33476,0,0,b01404e0c9b18ec021a76533d274ba57d8981979a0f7356291f98b64eaa96653,2024-11-21T08:05:36.737000 -CVE-2023-33477,0,1,1612e0afbfac570e43393c9b7851644fd754df80a225b4b762d07212e5494daf,2025-01-08T16:15:29.793000 +CVE-2023-33477,0,0,1612e0afbfac570e43393c9b7851644fd754df80a225b4b762d07212e5494daf,2025-01-08T16:15:29.793000 CVE-2023-33478,0,0,00709454bd5c65a9487b456e1a8dc2d5e98b9d40e004c2b519b99603c16b1715,2024-11-21T08:05:37.057000 CVE-2023-33479,0,0,ad2508dd8f6e278966b720b990c6f15325e8a2cbe4fe4e3f3725a8373469f527,2024-11-21T08:05:37.297000 CVE-2023-3348,0,0,a47af7e02df43ebe845240c1cb93abd580419b490a9612e8ff067366036ee768,2024-11-21T08:17:04.407000 @@ -226083,9 +226083,9 @@ CVE-2023-3352,0,0,ca8ce10d91c2afb8d2b579cfae6df369db0748f6d1892a3e858fbf033cc8e8 CVE-2023-33524,0,0,d66ec022bc051aa42e4542f54f62316a5a3cc4acd4c17d154f613dfd91852764,2024-11-21T08:05:40.340000 CVE-2023-33528,0,0,f9fa69afd45a1f617c3d1403ded5098c81af0e479a18344ed6622bd5b87b3971,2024-11-21T08:05:40.480000 CVE-2023-3353,0,0,73f13e6c85e8b6a63fa0551d3ac8601dd5e6abaf30561f39657303dcaa775484,2024-06-20T14:15:10.650000 -CVE-2023-33530,0,1,3f5259f03c4db54a4fbff9537ee74602648d0c16efb6528bb870ef05b10af68d,2025-01-08T16:15:30.037000 -CVE-2023-33532,0,1,109d64130a4769ac20cd8a57448213d04ce1cb12fc0189129cfa30fade0a6a41,2025-01-08T16:15:30.250000 -CVE-2023-33533,0,1,3c4dc916ce0e09629a4d1fe9abe3d09a4054678118c9121ca7e5c0b829b1c3fb,2025-01-08T16:15:30.463000 +CVE-2023-33530,0,0,3f5259f03c4db54a4fbff9537ee74602648d0c16efb6528bb870ef05b10af68d,2025-01-08T16:15:30.037000 +CVE-2023-33532,0,0,109d64130a4769ac20cd8a57448213d04ce1cb12fc0189129cfa30fade0a6a41,2025-01-08T16:15:30.250000 +CVE-2023-33533,0,0,3c4dc916ce0e09629a4d1fe9abe3d09a4054678118c9121ca7e5c0b829b1c3fb,2025-01-08T16:15:30.463000 CVE-2023-33534,0,0,375224b30005c5c6b4df976c11ab08ed3b921dbd5d50ac7db6447c43e9441aad,2024-11-21T08:05:41.057000 CVE-2023-33536,0,0,4483a4c84bae9df5f08f3544144640e560096a5f4d7b065a9e0bcbbe032477f3,2025-01-07T16:15:31.153000 CVE-2023-33537,0,0,06a836a8ec9a8a82dac73cdff5c990d7b4a0e29c9bc271ecada9cf746e2d2bd8,2025-01-07T16:15:31.423000 @@ -226112,7 +226112,7 @@ CVE-2023-33565,0,0,1ae4356e09d86a01a442c928bdcef687df593a23090fbd6f0b2785a141cf4 CVE-2023-33566,0,0,474244334223314bafbbb34726873b97a4d786f3c255b5b6db4b37691b28714c,2024-05-27T01:15:13.207000 CVE-2023-33567,0,0,6f8070242f0b52f35467ff6fa5967af9712ffd9e8a51a555b37438dd5b9a24f4,2024-05-27T01:15:13.333000 CVE-2023-33568,0,0,c53755badbd50b80ab85c5708c7b94cbacfbb7f9effcaa8b7be6b9fcf1735b67,2024-11-21T08:05:44.090000 -CVE-2023-33569,0,0,5cec47d67c8ecb5129e53ac93c1ceac2c13cac47f938af14c49e32123291773b,2024-11-21T08:05:44.253000 +CVE-2023-33569,0,1,73aa9218e9b0ea1c29e740fd31b11bf9a7f06d0020284b0f722e6f62c477c9fd,2025-01-08T17:15:12.283000 CVE-2023-3357,0,0,893d04151b56454ecb74aded74cd09cfafc0605f54872ce5dedb520ddc580244,2024-11-21T08:17:05.570000 CVE-2023-33570,0,0,85cf59e7d43d3b836fbc8ade873b57bf05e4ee43d634b3bb632c5499b8726f78,2024-11-27T17:15:06.687000 CVE-2023-3358,0,0,cbb2ff79b282d095762345ca7bf4fb67fe17cf253ee5cba9d1d8313d2b406f40,2024-11-21T08:17:05.693000 @@ -226126,7 +226126,7 @@ CVE-2023-33599,0,0,55db37be74a013892d3fb1b0b959784c91c13cb15114f0eb3da8abcea57b2 CVE-2023-33601,0,0,083f601d16fc0c97e32a1d9a35e9fc894753c7797215ae07c91ec9209ba10419,2025-01-07T15:15:08.683000 CVE-2023-33604,0,0,9226692a3dd315a1017ff5ed1441afdde1ea9512e7a0c2d0d0e313e5471408b4,2025-01-07T15:15:08.840000 CVE-2023-3361,0,0,9ebef56d12e80daf97a750299f08bde92471b07cbe9f6a4eb2f93a79cb7a07a2,2024-11-21T08:17:05.957000 -CVE-2023-33613,0,0,d31ff0ae7b47563662632adcd8b48a93c5fd23279ad6dd401f2b3d9233df15bc,2024-11-21T08:05:45.750000 +CVE-2023-33613,0,1,69674a4d7de030fa162d60d6bf2dc0f34a91d2ed6d4c5ba2840d8e060eee90c1,2025-01-08T17:15:12.537000 CVE-2023-33617,0,0,cdd85c4f3a32f88b6ddbe476650229c42a93db6627fcd104ee4ed51cbc91add9,2024-11-21T08:05:45.893000 CVE-2023-3362,0,0,fc725c7d042d549a7eeb1b24ccecdc901c46a32cefe4f9bc4a8bcd5c367dbc3e,2024-11-21T08:17:06.123000 CVE-2023-33620,0,0,b02d7e5f0ff254ae01b37e44be1679edb56401b0c7fb58e7a5c383191e2f912f,2024-11-21T08:05:46.033000 @@ -226156,13 +226156,13 @@ CVE-2023-33641,0,0,f03645ac245a8f94feb8bc719b44cbed0a82d7ac85219a35a7fd8118532bc CVE-2023-33642,0,0,04dd767e88b758a5773a1bba9a726357784023bb5c9cdadfada68b1396bb4386,2024-11-21T08:05:48.833000 CVE-2023-33643,0,0,c2d82c119ec082a2dbaea2b12716ef3e6d07633c431b4b6e7c31fb70fdc265d6,2024-11-21T08:05:48.980000 CVE-2023-3365,0,0,3c6ece96e7b8e48be4d0b382be3132b3ae9a7d62f4846918d141d5fa6144fec5,2024-11-21T08:17:06.573000 -CVE-2023-33651,0,0,6942bff78c6057d3e84b5346551d68b7565083d08ae5fd283ab3a340ee8cc72b,2024-11-21T08:05:49.143000 -CVE-2023-33652,0,1,ed9c3fb2e1c23280631042dd046f2119a625b5cee5c68333d1e4645820a489d2,2025-01-08T15:15:13.540000 -CVE-2023-33653,0,1,3373aa4b5fcf62191cf2058e766423fd707d868253c264da4c98d6a7d7757950,2025-01-08T16:15:30.680000 +CVE-2023-33651,0,1,04442e4d32da362d0447a37d19d86b2dfe398bea552278956f8e38739076a7d9,2025-01-08T17:15:12.777000 +CVE-2023-33652,0,0,ed9c3fb2e1c23280631042dd046f2119a625b5cee5c68333d1e4645820a489d2,2025-01-08T15:15:13.540000 +CVE-2023-33653,0,0,3373aa4b5fcf62191cf2058e766423fd707d868253c264da4c98d6a7d7757950,2025-01-08T16:15:30.680000 CVE-2023-33656,0,0,e4e6380b75180317fbf51977e15aa741d31e727edeb26ee4d6c5f7dab5747769,2024-11-21T08:05:49.597000 CVE-2023-33657,0,0,322a210155724a3cc5b1f9ae642cffa69b5fac06f50840b117266323b2822378,2025-01-06T21:15:11.030000 CVE-2023-33658,0,0,10ac7d1ab00abc34ef385ea5f19d538e65b27f7d1242b0f41397489bf8d0b1d4,2025-01-06T21:15:11.230000 -CVE-2023-33659,0,1,df0d79320fc98019a029f314cc2d5ebfa8905cda27e8c67e2a95b60e7b242a83,2025-01-08T16:15:30.890000 +CVE-2023-33659,0,0,df0d79320fc98019a029f314cc2d5ebfa8905cda27e8c67e2a95b60e7b242a83,2025-01-08T16:15:30.890000 CVE-2023-3366,0,0,851d6b94eb75ce43eb6c6c16fcf1e01dbf48b2912f354f7135d5e5b92d4696d4,2024-11-21T08:17:06.790000 CVE-2023-33660,0,0,8e5fd1b36ce56f665389b8a47eddb105281a033a772a0320adf2a67b28a46083,2025-01-06T22:15:08.337000 CVE-2023-33661,0,0,e730bdaa1ac79333248374d53e7d249daab9eb0d5baa2f817e1cebb787b38d98,2024-11-21T08:05:50.393000 @@ -226212,7 +226212,7 @@ CVE-2023-33742,0,0,f85dd65ef5c98d66913323d0d12b231e9374df10f945e44c3dcd86e6b5529 CVE-2023-33743,0,0,983f3c1aa4f6be40ed15ab2c7c310ffbccd5cf2d08e6f97080abd9fca6e72778,2024-11-21T08:05:56.023000 CVE-2023-33744,0,0,6f5dbb519cf2da9fda0db029090d6c6246ba923bbd5601ebe71a839766dd6388,2024-11-21T08:05:56.177000 CVE-2023-33745,0,0,8e57590b77c9eea7578803ec1f851b4ac97404599c784a0a0bf6c243e9130403,2024-11-21T08:05:56.320000 -CVE-2023-33747,0,1,d2699a05616f30c1e7ca483405ca99837def2bbf37b557a89a642263da86ffdd,2025-01-08T16:15:31.090000 +CVE-2023-33747,0,0,d2699a05616f30c1e7ca483405ca99837def2bbf37b557a89a642263da86ffdd,2025-01-08T16:15:31.090000 CVE-2023-3375,0,0,ed69dd5f2d60488645045aa54f0e29533bc4472a62197da1d6611e55b211edcc,2024-11-21T08:17:07.917000 CVE-2023-33750,0,0,aed6daf7e716a87fceec1eed9329a12707fd14ed21830eebad1771c0c1c58668,2024-11-21T08:05:56.653000 CVE-2023-33751,0,0,922b1876d9efd9122a1657bd36c006c98332bec0d3fdd66cc5db930306beadd1,2024-11-21T08:05:56.800000 @@ -226286,8 +226286,8 @@ CVE-2023-33857,0,0,5ba69b655edf7161bab3a7e31260358223b61d6d9b01523c52b47865fbe7c CVE-2023-33859,0,0,1c6d3295bef9eb355437400d7de6ac8ddbe6bafe9a9718f078108d94e9a5bb15,2024-11-21T08:06:05.157000 CVE-2023-3386,0,0,d30955c349e34a557fc3604c8361d5876aa81b368c9209af3e63334e0abe2a15,2024-11-21T08:17:09.387000 CVE-2023-33860,0,0,e017fbdba9558f00704985467fbde4b07f66309a8eaddc6d0377f397c304755f,2024-11-21T08:06:05.317000 -CVE-2023-33863,0,1,ebb2e4d8b6a4c68a946bf04c04a71478bbb02a9f17a0babdce52dd828f7ea17d,2025-01-08T15:15:13.933000 -CVE-2023-33864,0,1,53f5700cd5421e46dec4948a579e37fec38186c25c2f7b31a3f71fa57e91f83a,2025-01-08T16:15:31.320000 +CVE-2023-33863,0,0,ebb2e4d8b6a4c68a946bf04c04a71478bbb02a9f17a0babdce52dd828f7ea17d,2025-01-08T15:15:13.933000 +CVE-2023-33864,0,0,53f5700cd5421e46dec4948a579e37fec38186c25c2f7b31a3f71fa57e91f83a,2025-01-08T16:15:31.320000 CVE-2023-33865,0,0,591f9efdebada9c214b8e020ad4d4a40ea13edda60a879949af086ed7a44751d,2025-01-07T16:15:31.647000 CVE-2023-33866,0,0,53d4f76ee94f995d0e197f13a803b8e21e4131a9ec8c445c7c4748c9b252e41c,2024-11-21T08:06:05.900000 CVE-2023-33867,0,0,98339c98bcebc4a0583c8f1275d8bbeb85001b283b4aa10d817a65e0b7c91382,2024-11-21T08:06:06.030000 @@ -226829,12 +226829,12 @@ CVE-2023-34394,0,0,5024dd48b5a3dae7028cef62d61893803441cad1bf0497670d85da6b8c674 CVE-2023-34395,0,0,6b27da8fd46729cf8e00b5b710b84600fc46a48029d9eace73be2c1175bddefe,2024-11-21T08:07:10.127000 CVE-2023-34396,0,0,a88caeed8ca60b7e2de946c97e864c28b26bd11abb406d0a5a7eed0460d71bfa,2024-11-21T08:07:10.320000 CVE-2023-3440,0,0,c3a148f8bda83f5626794fbc68f98a1dc6c64d7bea5c4682462694a567b20fe9,2024-11-21T08:17:16.337000 -CVE-2023-34407,0,0,2b16309cef26a29104965599256bceeb45b9bf50e83d8ae574cfd7ba536359d6,2024-11-21T08:07:10.453000 +CVE-2023-34407,0,1,feb0cd99a613c0605481c85d03f4038aed84545414c9a8173ba7dd7d0782d2cd,2025-01-08T17:15:13.003000 CVE-2023-34408,0,0,456d67e659eff02a3cdad2c89203c50d8445a0660fc72a6da759e9fb10fdc5e3,2024-11-21T08:07:10.603000 -CVE-2023-34409,0,1,51b8f8415923aa1a2d243bed75d521d233228a55cbd4b9792f4bc8dabc1d5016,2025-01-08T16:15:31.940000 +CVE-2023-34409,0,0,51b8f8415923aa1a2d243bed75d521d233228a55cbd4b9792f4bc8dabc1d5016,2025-01-08T16:15:31.940000 CVE-2023-3441,0,0,96b660e59290fe52a56318b9a285eab78ceae8ef9c8a005c225e8ea7c212c771,2024-12-12T20:00:32.067000 -CVE-2023-34410,0,0,e99d4bd08a4cad889198ff0e1f310a2c6d688882980e00856a3f372884f4caf2,2024-11-21T08:07:10.897000 -CVE-2023-34411,0,0,ba5af90bc04354f2e3debf8ccc664ab109c5758884976caf725d17282297fe51,2024-11-21T08:07:11.063000 +CVE-2023-34410,0,1,1d7d5688d71675c11284e2a1b91e0cd8515bec350db0e80fc1004491d1abeaf8,2025-01-08T17:15:13.230000 +CVE-2023-34411,0,1,34c8d062997ae3b47c58838bbcf9aac00b306a4cc3d40982334f497f864649eb,2025-01-08T17:15:13.440000 CVE-2023-34412,0,0,dc3066873f81c3b290881008a495f6e8ee73f7e1678d180ffb4595c75c40b9e8,2024-11-21T08:07:11.220000 CVE-2023-34414,0,0,2e47aa793fd3bb698529d060d811524b96a751b86f2db2ca5b70349f2d005a30,2024-11-21T08:07:11.377000 CVE-2023-34415,0,0,6753e9e0a9ab4a67f20e6c568ec249e22c913693eb05aa8cac8891831c42d394,2024-11-21T08:07:11.510000 @@ -227497,6 +227497,7 @@ CVE-2023-35681,0,0,c42efe9d1b23f7d568247348629915a9358c10de92db94ec496fd3dcc3d6c CVE-2023-35682,0,0,28695289346c2b274f4a836b69c29ecf5fcd5a29c6894ee240f9a190ed31038f,2024-11-21T08:08:30.047000 CVE-2023-35683,0,0,4682530b1253e33dab4999034179170390350e9eb70d1f95eff49244af957e59,2024-11-21T08:08:30.173000 CVE-2023-35684,0,0,4ef12327b13c58353e4148a940740cb3154e8b085b8775b37446242a3afee205,2024-11-21T08:08:30.320000 +CVE-2023-35685,1,1,6669021a4dd417455e4ad0b12d7f630091120938be0fe7cd04d3dbcb85764e18,2025-01-08T18:15:15.033000 CVE-2023-35686,0,0,94a3cc8276f357cbdff431b3862f270310ce0b551c6f4cfe07a8422aec983ac0,2024-11-20T17:35:20.610000 CVE-2023-35687,0,0,61f15144cec0e6a248ce6f7a5bc882bcb7f347d62bd5d2c60fbc964844504f23,2024-11-21T08:08:30.577000 CVE-2023-35689,0,0,72d5c9654a341ce9c819d4654dce7c0d875c94774f8f7d751ae90bae784ac3c9,2024-11-21T08:08:30.710000 @@ -233908,7 +233909,7 @@ CVE-2023-43899,0,0,24202feacc0665ac616da429e0ce19061d42a1b369cbeed698c875fa196f7 CVE-2023-4390,0,0,20ebba52ea52f8d8b441414e2edab0f8c9b6fe5b2cb7f3592af693fcb3d74cea,2024-11-21T08:35:03.003000 CVE-2023-43900,0,0,d4960e39fd0659e09ad785b9f34b5b3baeeb3339d979ff0470b244343b7333bf,2024-11-21T08:24:58.967000 CVE-2023-43901,0,0,8a59018288636d09211b17770ef79ee4c1385b9714b39c2aa24ced5dc73b5243,2024-11-21T08:24:59.147000 -CVE-2023-43902,0,0,07001dd4411576d8bbc6503bbd6ff2edc73684e73ad054c46d36d9edb5395b59,2024-11-21T08:24:59.313000 +CVE-2023-43902,0,1,da0642cd14d65fe2915b1237906ae3be79a7bacbff45bd32c1c70011f809171b,2025-01-08T17:15:14.070000 CVE-2023-43905,0,0,17423dd0773d530af35d39cb9326ad37708c43e53f9690c76b16b404f2fb9f42,2024-11-21T08:24:59.447000 CVE-2023-43906,0,0,a171f95bcfd1d3ecd748d05ce8d709c788ac0a7911565b81628046b14ac57cc9,2024-11-21T08:24:59.663000 CVE-2023-43907,0,0,0df9e3765907ef9a805f9bca73bd41a0e7e3d17092fd3bdccd8f37df76d9d5ad,2024-11-21T08:24:59.807000 @@ -235189,7 +235190,7 @@ CVE-2023-45872,0,0,4d24e71e460fe608650758386049867baf8ea95f6f98c472e7539440ca6d0 CVE-2023-45873,0,0,026c2bb393889c1cec762f096fdc905b0d0bd0f37c60e4bd68f52732c02e9b97,2024-11-21T08:27:32.103000 CVE-2023-45874,0,0,ff14d331fbe61af6666f1939edf0b28cfee3cf6df670fb4afe05fb9f737fd8db,2024-11-21T08:27:32.330000 CVE-2023-45875,0,0,ebbc8792c74192c3ca1116cf3a0dce87fd3248ca98ef5bb38b34c4e9ce057add,2024-11-21T08:27:32.460000 -CVE-2023-45878,0,0,91281160e4a5017364e06d531e6fe7fbc3dfeeade87874f7fc3ff6c9cf29e245,2024-11-21T08:27:32.643000 +CVE-2023-45878,0,1,9226b6c139f5d4fc59bd866d727a14b0289a871957f279deb52bb1157f73904d,2025-01-08T17:15:14.387000 CVE-2023-45879,0,0,274b1b1ac86ebf8f8b0e6f21f75f6462c42f834b218289ad7758f16bb852e0a4,2024-11-21T08:27:32.800000 CVE-2023-4588,0,0,dc3be699091d4d07305fc8a9f4dc93e2ff46337019ef077482c5c7575bcc0d8a,2024-11-21T08:35:29.647000 CVE-2023-45880,0,0,bf8757d468ae92510fb28457ebde520174857d9db976981ddd76315de7fa1115,2024-11-21T08:27:32.953000 @@ -239769,7 +239770,7 @@ CVE-2023-52222,0,0,662c7c7af63a3f624a2e105e5831f086b81f5361afd613413ad5624d6c520 CVE-2023-52223,0,0,dd4562b53360696ac699f1e9ae1954f730d5d4ab99f2d17ac6baaff220a5fffe,2024-11-21T08:39:25.960000 CVE-2023-52224,0,0,0304f27aab63b3fef9911586609743e07545d5f68cee0b628e69183780c43034,2024-11-21T08:39:26.080000 CVE-2023-52225,0,0,cb0ac31bff2bea567cab01822e62002c5c53752f08eb89c02e9f3367cdd2b438,2024-11-21T08:39:26.203000 -CVE-2023-52226,0,0,f91e97cc5482d4ce88a28d3d7b4e901e467a7dd997436d86064e557e6ba78ae2,2024-11-21T08:39:26.327000 +CVE-2023-52226,0,1,d9534cfdacaf9e49604302c93c51026fb43ddf1a762d45c0713a4e6484d13dcc,2025-01-08T17:01:20.007000 CVE-2023-52227,0,0,beb3d6ade1985f92fca5f759d82ffd4a50eb1f74741eb27fb41bad9737c19590,2024-11-21T08:39:26.440000 CVE-2023-52228,0,0,dbf758c4d88af4d9c17a754628ecb3f00f8342a2d36b444cb80a7668ca1b2a39,2024-11-21T08:39:26.560000 CVE-2023-52229,0,0,eb5ee1c9114ec221fefc0b5bdf04e6d232285e23dbc4e9fa68e1d805a6df4ef7,2024-11-21T08:39:26.680000 @@ -241595,7 +241596,7 @@ CVE-2023-6520,0,0,201e8f9048ae5691070e19e29efead7d31d35b19867d0eed4eec93e1f528ba CVE-2023-6522,0,0,46ae29335d7630b2474538f3964695f828d0aaf195a57bb70b1e58cad41492a4,2024-11-21T08:44:01.433000 CVE-2023-6523,0,0,b80afa077879cd5a88fbc7ec1b1653e9569379739649170aaa727f1ea84157d0,2024-11-21T08:44:01.557000 CVE-2023-6524,0,0,52717d9b94b1d98190c25f795880fd21d413e1cbd68e94baf71389434c2531b1,2024-11-21T08:44:01.677000 -CVE-2023-6525,0,0,4d1dfaf5a18811f6977744f9289035ad18ab4e9deecf5c569fd44f23dd4a98d8,2024-11-21T08:44:01.810000 +CVE-2023-6525,0,1,e512780e9c702981f55ac0ecc6a0aab39a371fc823678e4cae8ed313199ee495,2025-01-08T18:14:29.763000 CVE-2023-6526,0,0,f8f0d865119e82482403f18e9a51af7f31b616d1332e44468383b613e24fcf9c,2024-11-21T08:44:01.927000 CVE-2023-6527,0,0,f83b98db9940fc2d07ac6bee8934ba7dfadea973059a49837e3f07772d0918a8,2024-11-21T08:44:02.060000 CVE-2023-6528,0,0,e5808da770e68ec72828be023621b1cdae2dbfcadf3e368652daf09efc602185,2024-11-21T08:44:02.193000 @@ -242402,8 +242403,8 @@ CVE-2024-0139,0,0,97175888b963c6f6c4d9af1853169dc46a253002be2bfcb37fc1cbdc17d019 CVE-2024-0151,0,0,47427b70774487ec12e517511137a7ffbbb3bc25062c399b4c4cdc16ab998934,2024-11-21T08:45:56.783000 CVE-2024-0153,0,0,2f1922546283e50fb4f599a1bb8201eb4f407a909d4d9a7f06b4c53b0f16bcbd,2024-11-21T08:45:56.967000 CVE-2024-0154,0,0,50d65cab2fea7671d9c93f55bfc13460058493d72212a7ea026374e757c22187,2024-11-21T08:45:57.163000 -CVE-2024-0155,0,1,f1a3ede7288fb8abcf8497fcadf42b24a0a4fc3a8eb3e5a38fc16341129a3af2,2025-01-08T16:10:52.743000 -CVE-2024-0156,0,1,8e563a88aeb58af7eec551e6f7f93b57d05b0bacff508c09c54c92c23a1ac379,2025-01-08T16:13:02.593000 +CVE-2024-0155,0,0,f1a3ede7288fb8abcf8497fcadf42b24a0a4fc3a8eb3e5a38fc16341129a3af2,2025-01-08T16:10:52.743000 +CVE-2024-0156,0,0,8e563a88aeb58af7eec551e6f7f93b57d05b0bacff508c09c54c92c23a1ac379,2025-01-08T16:13:02.593000 CVE-2024-0157,0,0,e90ca216510959672ccdd8af4cca769dd1276c011fb7a862948c8162f002bdb9,2024-11-21T08:45:57.560000 CVE-2024-0158,0,0,3f3ea77ffd830457476567f09315f5a9dab182a65c2f89a99a5fa021721a34bf,2024-11-21T08:45:57.683000 CVE-2024-0159,0,0,4825585937f091768bb889c4853a4416208de67e3021ed9029260601dad348bf,2024-11-21T08:45:58.337000 @@ -242558,7 +242559,7 @@ CVE-2024-0322,0,0,fee36c9fdd1d9da7a717c5a41acc9742a80df4c9ebcfbb5b50f746853fde47 CVE-2024-0323,0,0,012c43b162f91d6084c80cb64b18a55c4b55dd954daba9bedd6e4c83bde2981b,2024-11-21T08:46:19.440000 CVE-2024-0324,0,0,4ea67a04f94947aa0502aea57504eb796d321250c16bfe5b9dd4e545bdde7ac4,2024-11-21T08:46:19.577000 CVE-2024-0325,0,0,ace4a4c77432bf075e7908c77bf3779d15ba3b48033325228190ef50b39a6beb,2024-11-21T08:46:19.720000 -CVE-2024-0326,0,0,1a73913e1a089b04c8a08da3f78d616d08145883d0c36d7f2a83183465c527d8,2024-11-21T08:46:19.863000 +CVE-2024-0326,0,1,23e9e39869c3329e0c467f3ef14ed5e1cea59a8aeb05acb6b189ad174da6a881,2025-01-08T18:33:51.347000 CVE-2024-0333,0,0,8d02600923b0d02e1b6c7070d1a8ded2d1f193f4c1d7d9ca81e40af9ef96b049,2024-11-21T08:46:19.987000 CVE-2024-0334,0,0,534a9c7b527809feb97c2a7c11cdafc92a0562477e37b97746c08fa9a807ebea,2024-11-21T08:46:20.180000 CVE-2024-0335,0,0,ad5113205ca29b2f8742e9d2c19760bae855fe4340c6c1425f590ec6a288b45e,2024-11-21T08:46:20.327000 @@ -242609,7 +242610,7 @@ CVE-2024-0381,0,0,4408f366f53a4f9f027eb35f7cc148cd5099ad6f453db0955bde4e51626db0 CVE-2024-0382,0,0,89dea95cfa60010212418517f6858b68d57b6774bff452bfccc38c701002fb49,2024-11-21T08:46:27.790000 CVE-2024-0383,0,0,4d3cd2e06d2ed6f81a82e8f563bb40368dcf1fc236d6447217886f1134d36ee6,2024-11-21T08:46:27.953000 CVE-2024-0384,0,0,7a94f21befb3cd3a1407d20d2b315c6141a3e3c615a2b4fd46013577fd76d174,2024-11-21T08:46:28.113000 -CVE-2024-0385,0,0,4aefcbcdcdcd308e6d97e9f001bd2d15bfa5a4cb5978c8b7aeacfbfd046ecf9a,2024-11-21T08:46:28.267000 +CVE-2024-0385,0,1,e922f3612d566bfbe3b6e1ae1c99ac5a9a533f03f54da953d05b03e115baef87,2025-01-08T18:32:52.073000 CVE-2024-0386,0,0,72f3d4c2fb273540318584f9e32423d6c250188bc4ad20a8ce76511cb4eeb82d,2024-11-21T08:46:28.387000 CVE-2024-0387,0,0,075384114ab3467c93b81ec0448108e969020fba39c938ff4a202d413ad38539,2024-11-21T08:46:28.533000 CVE-2024-0389,0,0,c19c30c9c655e264df646c294b1eceee85d06503afb553e693b54f02f8287a16,2024-11-21T08:46:29.147000 @@ -242661,7 +242662,7 @@ CVE-2024-0437,0,0,b3dbadc4bf51769a17424af985e0a0105b8dbb7d07004337c8d5eaa5c305f6 CVE-2024-0438,0,0,d8d9eff4f5112adcfa9d0d912a225f89819e081a28cbd99d4ee09d61949b8798,2024-12-27T15:51:18.320000 CVE-2024-0439,0,0,01a9023bc79401248bf263081929d866c325402fc40001a5a2486055884e0bdc,2024-11-21T08:46:35.647000 CVE-2024-0440,0,0,9b41d4c42ff0b29e0c33a27150bc353ca04590e3373335ebb1c4da265e318a35,2024-11-21T08:46:35.767000 -CVE-2024-0442,0,0,6ac0c6b5a09420cab59e78b387f25232ca3bbf73dad3a572eb084f761b1560a7,2024-11-21T08:46:35.890000 +CVE-2024-0442,0,1,2ff92b8b200597432f6da5c6788d273b9eceb23b02f2972bbbcd8fd6e4cd3a3b,2025-01-08T18:48:34.583000 CVE-2024-0443,0,0,aeba6274837992658e2c4b7edb27871e8468430250a040ff0202a08869d47769,2024-11-21T08:46:36.010000 CVE-2024-0444,0,0,e6663164bed0caa54a1cce1846baba77384cf71afcffd2a64cf92ab0d873e3d8,2024-12-27T18:57:15.007000 CVE-2024-0445,0,0,4ab454f150f76c3507e1d605ca8ec368c481acdb45a0591e9b5b90434536ae48,2024-11-21T08:46:36.333000 @@ -242729,9 +242730,9 @@ CVE-2024-0508,0,0,fb828139575889ebf62082bb28f21b390e9aeefcd9be5ef3ca074ce162a9d9 CVE-2024-0509,0,0,ae6f4a89df25ecefd467b1e4b1ea8e47eae1d8bde1afc12005a53807d3d0f514,2024-11-21T08:46:45.313000 CVE-2024-0510,0,0,d7cc5cdf91b8ac0c3514cffd418a64c022fc92c5ba6b8f3132aa395534814184,2024-11-21T08:46:45.447000 CVE-2024-0511,0,0,5b5729b5b63c315b290874c9574a0771ecfd42be446e93c43c1ab37bbb9a83fa,2024-11-21T08:46:45.587000 -CVE-2024-0512,0,0,622d2cd07ea4741c2b0374d3435dfd953d8146497b42d579b7f939a174223b0a,2024-11-21T08:46:45.727000 -CVE-2024-0513,0,0,547de98c5e8248b7a05560d475f229461714334fa945dce1fd551fdf84fccf94,2024-11-21T08:46:45.880000 -CVE-2024-0514,0,0,6617a6d807754ee71bb133bc96b154a68ab64b15e20084b8352da5ef45f11f0e,2024-11-21T08:46:46.017000 +CVE-2024-0512,0,1,ac85c2e98bdc908cf84739ba96d567a0d7e4a29e55962c1611e976e274b149cd,2025-01-08T18:52:15.113000 +CVE-2024-0513,0,1,d636b0c15a0e47b002a67420bcc626b28b4566542f5eabacdfa68e40eeb591e1,2025-01-08T18:58:49.240000 +CVE-2024-0514,0,1,200af424e2494b9ef1cde83af9e0336be68ac0b95160b10bc25f104a49aff710,2025-01-08T18:59:31.757000 CVE-2024-0515,0,0,38f1985b1a73900e82db865da5163417edaf0cf31c416ed8d2d94cf6fd077f84,2024-11-21T08:46:46.133000 CVE-2024-0516,0,0,34c976a113181e0df972bc81849a026287cf60ffe82c84642618b57781225ca1,2024-11-21T08:46:46.267000 CVE-2024-0517,0,0,c1d84921536d4f403fc308e0f21ef3e39772e61110c1ffc32ce08f0c2aac5138,2024-11-21T08:46:46.377000 @@ -242970,9 +242971,9 @@ CVE-2024-0761,0,0,3880824002a244098dc4a9d203545fa3dda9ea94020902bbdff8af939e9833 CVE-2024-0762,0,0,4a8d5d3e14f41d2724cad0ee811c6cd70142d2f4adfecdc299da9b13dfdcd984,2024-11-21T08:47:19.110000 CVE-2024-0763,0,0,3b704aed587b067aa8d24e0782eb1a1fafa56c750f9c698b1a7b8d8e1f6b3f35,2024-11-21T08:47:19.257000 CVE-2024-0765,0,0,bd1e10ec0269235d1f805b41ab6a7621e35014767ca84eee6da95b2930039ff6,2025-01-08T14:32:04.447000 -CVE-2024-0766,0,0,d9867ec6f020a051ad1b9f8c1c6c4f36283c8a63ecffd7a35e065d11b5f3e1da,2024-11-21T08:47:19.503000 -CVE-2024-0767,0,0,f569c8f6de8dd5c5a0b7206dd11b2e75947b370df6ee425b3d2cf1748172e113,2024-11-21T08:47:19.623000 -CVE-2024-0768,0,0,8ad3245e1115f82e6cea3b3772f7d32a86b94df319019f920dfc5ec0e7f35ae7,2024-11-21T08:47:19.743000 +CVE-2024-0766,0,1,fc8e2265c2309390a8f3d05c6a16b627720fd840beca9fc47049b86344392b06,2025-01-08T18:43:16.317000 +CVE-2024-0767,0,1,5570ef5eb5518098eab13828b388b2ad2b76bc78c25c638d801b7424efe41e19,2025-01-08T18:42:46.573000 +CVE-2024-0768,0,1,a3ab28df0ef46d3c9e1b87db961d882860c5601dc8867089aab581b504138ddb,2025-01-08T18:42:05.587000 CVE-2024-0769,0,0,56c082cdb73572bae2b8b8c671fbbddddf2942bc8dc828baf40282a3ad24b88e,2024-11-21T08:47:19.860000 CVE-2024-0770,0,0,aa612333eb176e6028f7918ce18a4aa38bcb21688669aa13f59c2d5bff87865a,2024-11-21T08:47:20.020000 CVE-2024-0771,0,0,787c709b50080c9e3e387feda8598650487f948af1881a094925b288f94ee3c4,2024-11-21T08:47:20.167000 @@ -243306,7 +243307,7 @@ CVE-2024-10147,0,0,a56a79fe5a06b98cc0b76112510f81c153284d047893303acf550d79857bb CVE-2024-10148,0,0,db0d5db25a1f49f9ba7e42a06491994c37a2b37e9a76e3ae4cc30f2bbf70efeb,2024-11-06T16:02:22.120000 CVE-2024-1015,0,0,be928180cb003f6a5eec5ab2bae4726bcad9bf29373863ff5830478d50997929,2025-01-03T19:15:53.587000 CVE-2024-10150,0,0,fac5f7de9492af33015847edbbaf4e66b672db3781dc50dc161c61d03c3e187d,2024-11-05T17:47:35.353000 -CVE-2024-10151,0,1,8fcf0e00def7266a6dd970b913a0e3ad3be5178b25bb43398424a38a9aec0aef,2025-01-08T16:15:33.753000 +CVE-2024-10151,0,0,8fcf0e00def7266a6dd970b913a0e3ad3be5178b25bb43398424a38a9aec0aef,2025-01-08T16:15:33.753000 CVE-2024-10153,0,0,205337601504c6a6060c88aa213139cbdb5096813b7204f786c736b1a09bbbe9,2024-10-22T14:45:04.670000 CVE-2024-10154,0,0,8bc22a596ba6d08db60619a5118141d0b00a385670008138b09554e9c573f4a2,2024-10-22T14:44:47.807000 CVE-2024-10155,0,0,542e5dfc2b62b1a1ca578686c2a8ae79931c9e86cdbac20993e8c86f6a9756d8,2024-10-22T14:43:42.607000 @@ -243976,7 +243977,7 @@ CVE-2024-10944,0,0,1c0b69d1ba3b87998eabf673d5ce85783b7ff742767256df1f0369b07a97f CVE-2024-10945,0,0,eaecb76bb2926a21e85aba18d448e990c084aea718f0f5fbf4d666258d929307,2024-11-13T17:01:58.603000 CVE-2024-10946,0,0,e939ae56a130941682682fa8c3248447c6e56390d24186994637b4a0f9c753fe,2024-12-11T19:58:39.510000 CVE-2024-10947,0,0,9ca33a842e00d3bfcba6a4108f29e96d0bb33f4c08646ed141de399ea04b73d1,2024-12-11T19:58:55.657000 -CVE-2024-1095,0,0,b594dd5cefff941d80a5aca1439ec1658c5df6b960761544886b2b48f93c7e36,2024-11-21T08:49:47.093000 +CVE-2024-1095,0,1,057a33d2e1acbd5bb0e3f092aa306aff7c071f56a28760869544731f02ce5e35,2025-01-08T18:05:01.880000 CVE-2024-10952,0,0,edff8b29d26accda4a8e33f169e18ac16231b4d8b9445539c32344bf5f44c6f1,2024-12-04T03:15:04.593000 CVE-2024-10953,0,0,94ed881c1741c9a6db86af195e84904697442fcf31d986afec17a96f3fc5a311,2024-11-12T13:56:54.483000 CVE-2024-10957,0,0,964548a9eedc46fb360cb39aa44c4f64670d84e4a05047fcfa8e2648b39d5482,2025-01-06T17:15:14.853000 @@ -244696,7 +244697,7 @@ CVE-2024-11775,0,0,0be2b5775aa12c2634dedea0534264de5c8544551afcfc7760cb6a86958e9 CVE-2024-11776,0,0,db96a767ae984aa946e97339afd57034a67d2d93961a6fe48dad1a311ebfe8b3,2024-12-20T03:15:06.420000 CVE-2024-11777,0,0,3f98ebf065259973e17593034b9da476d62f4f3a8b02a7ab11c065a411f92301,2025-01-07T04:15:07.200000 CVE-2024-11779,0,0,66ab9533cf27509ff85b54c7dc6f857efc44402b9c1a2b7fc4f1c1fbd8a0b4e7,2024-12-05T10:31:39.980000 -CVE-2024-1178,0,0,455b49ccf992fe53bd03a32d9f022f083f7714cf103a3dd0d2ba2a085047974c,2024-11-21T08:49:58.357000 +CVE-2024-1178,0,1,eed4631b540eb17cf77594707bc1561876f243beb66555c5572ec77e14862460,2025-01-08T17:16:27.800000 CVE-2024-11781,0,0,c0e6be58a4f2f20ed752d41934ec31e6ef434c9b40a727cf73a45e49f6a0c1d4,2024-12-12T06:15:21.940000 CVE-2024-11782,0,0,80e41e72f948036c8856df6deb0c7080f3de56cbdfa10b8def2e5b899b6badbf,2024-12-03T10:15:05.320000 CVE-2024-11783,0,0,a1a89800681b730546355720a381b5c434c9a4d5304a89bbf16fe8919a3038c8,2024-12-20T07:15:10.777000 @@ -245160,7 +245161,7 @@ CVE-2024-12414,0,0,ecf25a2c3f536085b4d44f95471b078e2b7cb6ad454e7c12c9e7d103ff4fa CVE-2024-12416,0,0,435759be4e4ba56188ea7f6720fc32442a546d90f18b812fdb1df1c91242e1f0,2025-01-07T04:15:08.143000 CVE-2024-12417,0,0,bd175c91ae947c344e10a61ee40da01cd87015ebf65316b1689d31a703a65c78,2024-12-13T09:15:08.353000 CVE-2024-12419,0,0,1650645ff6c9400ef0ef895584325bbd55288f83ea55cd87214a983e3f37109a,2025-01-07T04:15:08.337000 -CVE-2024-1242,0,0,d730388eb7530fa29fb11ce649456e01cfb020c8a1d70e87c977d44dc1314073,2024-11-21T08:50:08.620000 +CVE-2024-1242,0,1,5889b9ece9144c5504da39af2a5164931916afac4092f39fcc8067473a14c7fe,2025-01-08T18:36:55.487000 CVE-2024-12420,0,0,ae8d110f5efef295dc5d542d71461638a083f9c010e00a24758178ab1b247bfd,2024-12-13T09:15:08.627000 CVE-2024-12421,0,0,d0800edd844bf37ccee00fc76da3ec64bb2b51e717430e725122892ee39e78eb,2024-12-13T09:15:08.870000 CVE-2024-12422,0,0,27a2b7b5579aea6b626e898353e29adaf77dce7f7392fa2cdcdfb4f6d55292dc,2024-12-14T06:15:19.357000 @@ -245271,7 +245272,7 @@ CVE-2024-12581,0,0,899275a869b7c967a158446f680d5b1e6ee7fb8c13fa325a1164dc54186be CVE-2024-12582,0,0,bbfe1aae814f308a85392c13709691d46da248e6458c80cb519b63fa483aa592,2024-12-24T04:15:05.137000 CVE-2024-12583,0,0,6c1f345fbc3f1cc53302e61a1dfbebbfcc1b6c1ee5d98cc4a9e3c7ebaa7ceed3,2025-01-04T09:15:06.090000 CVE-2024-12584,0,0,816f60d6132b2347c9aa70129bc858e7047e308acf27028a30827ba4bb7b6af3,2025-01-08T07:15:26.833000 -CVE-2024-12585,0,1,ead992288f92d4be283e03018b341d11a9b47641e24068b49fe654a049e91e84,2025-01-08T16:15:34.130000 +CVE-2024-12585,0,0,ead992288f92d4be283e03018b341d11a9b47641e24068b49fe654a049e91e84,2025-01-08T16:15:34.130000 CVE-2024-12588,0,0,9ef4dd85f085f6ba612688cc14a2c49d05248e20e75bd2d7bdd4aff39b5ac0f2,2024-12-21T09:15:06.233000 CVE-2024-1259,0,0,1c6bb100fc9cba505c4d696801bfd3102c508e530bb2e36c86a6685675278bd7,2024-11-21T08:50:10.730000 CVE-2024-12590,0,0,78caf08663857a2f888f89c4842ba777750ad04068c078583ff87671d3a13c4e,2025-01-07T04:15:09.607000 @@ -245364,7 +245365,7 @@ CVE-2024-12751,0,0,c8d36ab052c0d3e9ec35af9571e74ed832930012381575b9dc1af30fc71ca CVE-2024-12752,0,0,23a1df67098cb18d5a208109678c48c3e7913067d5db32571522e50bc90bc4a8,2024-12-30T21:15:06.260000 CVE-2024-12753,0,0,4271c9d86ac6ffc21783ff22aa4d21dfabf207717e4c237171a1fe2075c45756,2024-12-30T21:15:06.400000 CVE-2024-12754,0,0,df24fa8ce9df112eb8cb8438eca3154b7b11a8ee42e16751c31ec0de51ba4cbc,2024-12-30T17:15:07.127000 -CVE-2024-1276,0,0,342e07ea1475f57185158b84be14279572eebbc1b91e4c07c491730599e6701d,2024-11-21T08:50:13.050000 +CVE-2024-1276,0,1,7fd672f8ab2d0313a55eef11978a3cbaaea942b78d4dfb1702b583b731b53a9a,2025-01-08T18:37:36.067000 CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000 CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000 CVE-2024-1278,0,0,304f88731c9c2e93f283a152f19a1ac852d3cf0fda0d38c9b82c242ac4604519,2024-11-21T08:50:13.287000 @@ -245407,7 +245408,7 @@ CVE-2024-12844,0,0,5c0e1e9f12ccd3e7b6409ec6f9fa62b1ac61e24d0cd9ed98d53a582ec95f3 CVE-2024-12845,0,0,a476f9ae604ca9ba196326844e481285fd755f33cc18c52bebc4a8c43fca5e80,2025-01-07T18:35:19.607000 CVE-2024-12846,0,0,e4c252bde2ca9af2e00706946ce2eb14da53254be655d485961e368b0c87d8ac,2024-12-21T05:15:07.373000 CVE-2024-12849,0,0,1ec1f74cc5622df60afc70cfedb69ebca5791587da5e6e97ed85991f051e26c4,2025-01-07T06:15:17.607000 -CVE-2024-1285,0,0,f377c2065ba4ae04295fe1855da43b832210575f04c4c7725642d3c9965142c4,2024-11-21T08:50:13.903000 +CVE-2024-1285,0,1,6f25c863c73c3b70a1777f6b7ea15f17f9158b6669df8af6e4411802154a74d9,2025-01-08T17:13:54.647000 CVE-2024-12850,0,0,075205b205303999a6a29790d3e10f6b915eaaea804fbc90dec0f08e9b7ce1f4,2024-12-24T10:15:06.033000 CVE-2024-12851,0,0,1a1ed3a928b1f5351defaf2a6fd966f60d7691ce0326764d64f0130c2392eaf1,2025-01-08T07:15:27.027000 CVE-2024-12852,0,0,313ac0877d12bdeba23cb1261f513c819e50243422b9728474fc9f22b61d3940,2025-01-08T07:15:27.250000 @@ -245432,8 +245433,8 @@ CVE-2024-12894,0,0,c4cf625d4772615adee18c591544caf2117d873d89401b4b96e1b17a22326 CVE-2024-12895,0,0,dc44c366693b09b37e49de75da7f896cffef79a3c3cc121d6fae871fc13f32e2,2024-12-22T14:15:04.923000 CVE-2024-12896,0,0,438fe183a3bd0ede8cbabe53a7b332d4e562662749bdc8fc0eabd833e1a8a80d,2024-12-24T16:15:24.153000 CVE-2024-12897,0,0,051572b8a57f1a094d742ee624d22a7295c3d9fa4b8f9c4ea1eba00237290677,2024-12-27T09:15:05.297000 -CVE-2024-12898,0,0,807ce781822416d59f4deea3edbe373e282d5f2ff9adc288b8bdca9dca519be3,2024-12-23T01:15:06.840000 -CVE-2024-12899,0,0,f17477ce837f4fdd7d91fe47bb23ea7ab667c6c4f20125d32a01e8ed9d730e13,2024-12-23T01:15:07.020000 +CVE-2024-12898,0,1,e92ab1f99cc048dcd6d49d4d799ff208fa2d142bab05c9798f08da370098cd2f,2025-01-08T18:48:06.917000 +CVE-2024-12899,0,1,362aaf601901f1e60245613c24915602c9904371b6de96a015f30026698e333f,2025-01-08T18:47:51.863000 CVE-2024-1290,0,0,7c95f47c5c3e77faa57d4558ce65f60c9fa0ea7551f118126af89c59b8448f97,2024-11-21T08:50:14.680000 CVE-2024-12900,0,0,6e7ade1adf855dee0179b884857a6501170116a10ef64a9a5226d093dd6d26bf,2024-12-23T02:15:05.630000 CVE-2024-12901,0,0,108dc27e1a7be00c560dbe376ce852672e3d6c21b49b59f97cb3ffd52eac942e,2024-12-23T02:15:06.613000 @@ -245629,10 +245630,11 @@ CVE-2024-13145,0,0,5293851792dc3cb6491b0cda78aca9c898b2b603a3534d53245e0430e746e CVE-2024-1315,0,0,e1f16e3b2be06db6b65befc45bb21c6efb290182d3477c01a71033b0effe0c2a,2024-11-21T08:50:18.373000 CVE-2024-1316,0,0,ec6b544cc876a8479e8de890063434d877e95d2641a1a8c864b5c959e6dbfa7d,2024-11-21T08:50:19.090000 CVE-2024-1317,0,0,a1d296c91e245cb27c998bff4f84250fb1101a61ebac429b7ce35a2ceb239c73,2024-12-31T16:57:11.080000 -CVE-2024-13173,0,1,f1a33d2e3c9b2cf91c9a53b07743d77111624711ca1e4fa83f21d1b344cad8f0,2025-01-08T15:15:16.577000 +CVE-2024-13173,0,0,f1a33d2e3c9b2cf91c9a53b07743d77111624711ca1e4fa83f21d1b344cad8f0,2025-01-08T15:15:16.577000 CVE-2024-1318,0,0,875ffbabaf295988fe72077a5574dbe20799a2a8618e7dc53ba31731145c671a,2024-12-31T16:56:50.763000 -CVE-2024-13185,0,1,309623867cf2a365ccf0f9b8bad47d56d8813a4020c9e23dc24fdd83b6361ef7,2025-01-08T15:15:17.163000 +CVE-2024-13185,0,0,309623867cf2a365ccf0f9b8bad47d56d8813a4020c9e23dc24fdd83b6361ef7,2025-01-08T15:15:17.163000 CVE-2024-13186,0,0,ab68464e9eb8c64ef77f66273b4531bf06ac11994ab182c60b128be5d808b9b1,2025-01-08T14:15:26.227000 +CVE-2024-13187,1,1,6b3f36a2340a79cb00f03c53cc5eedc706fbcd37e9329336b3a6eedb97ff1e2f,2025-01-08T17:15:15.410000 CVE-2024-1319,0,0,e6fca38f8817c3f0a93cd5d73a5a9417a178ac65495356d684dc26f204fa5765,2024-11-21T08:50:19.530000 CVE-2024-1320,0,0,80370b3cf95d31a327dfcead0766151687bef5425baa11f9a4606b327981e1e5,2024-11-21T08:50:19.647000 CVE-2024-1321,0,0,64c53fddfcf700442bf3bc09eea0aa8fb2f1c68b08bca44e74ca22c8291fb906,2024-11-21T08:50:19.770000 @@ -245712,7 +245714,7 @@ CVE-2024-1394,0,0,3bfb4bdf7cbd2e83903d52b6ed8359606dbe1ee24d71dfdae11060be7f14ef CVE-2024-1395,0,0,aa14344d5f3c417e75370dfad240218276bccf85a1cff8add87ecef1ce7213df,2024-11-21T08:50:29.483000 CVE-2024-1396,0,0,99c867002ef97abbaaafea27abb6c91c61f510e73a2f0816bc88ba650d70c41c,2024-11-21T08:50:29.700000 CVE-2024-1397,0,0,6dfc492b14f18bd41854a790c8b2baa4090eb6fa79ecf65279e3d0311e1386ed,2024-11-21T08:50:29.823000 -CVE-2024-1398,0,0,486fd591b41acc899221aa818ee020297ae08ad7ee657934a9c63243ff8f6136,2024-11-21T08:50:29.950000 +CVE-2024-1398,0,1,7f10f6a1be1871472979dfa3e08ce990ab03c4b0b1b77b6b442adf652486984a,2025-01-08T18:39:21.643000 CVE-2024-1399,0,0,de4ae2e68321a6c15c8c7d567274d914b003ef22dbc953f97581fd2a2e98f996,2024-11-21T08:50:30.073000 CVE-2024-1400,0,0,c9a2701093faf1480ccd8e9b39b916b3ce25675fb9e0932edae647fb408178b2,2024-11-21T08:50:30.200000 CVE-2024-1401,0,0,aacd439a69914554cbcd89a76778f88178b8f02575b95bb844c89b14ab015b63,2024-11-21T08:50:30.317000 @@ -245761,7 +245763,7 @@ CVE-2024-1444,0,0,56cc1378c4a049cbaf1603e47be22d792d424ac802b4bd15d8f7ed435163d8 CVE-2024-1445,0,0,0a624acf2f93fcc7458a537b50687e8779f2e95d40ded5926d8cbd4da5fc9dd4,2024-11-21T08:50:35.970000 CVE-2024-1446,0,0,bcbd55f0d2c90e85050905640a9752443538e2056a662d31a605b1bda37d17f2,2024-11-21T08:50:36.100000 CVE-2024-1447,0,0,6746acde1301c5825538a1aa38cac61672f524700591a0648dd48779ea53ab7d,2024-11-21T08:50:36.220000 -CVE-2024-1448,0,0,907e2cf35615925862c90020c543aac7ee629ef9f57982dfeb1cd4e6b6c53a20,2024-11-21T08:50:36.353000 +CVE-2024-1448,0,1,84863a880e9ce68c5c174c02d5126e87f51050d9249935c87c69c515e0ca6242,2025-01-08T18:38:49.883000 CVE-2024-1449,0,0,95a37d5ef698eee492da651c7884d70c40bd960e6512acbe5a06fb32eb9cd083,2025-01-07T17:38:57.307000 CVE-2024-1450,0,0,2c4685806ad094ef0e67bd2000051393b62a0d6ee127f95dcc18abbea7135c6a,2024-11-21T08:50:36.610000 CVE-2024-1451,0,0,b0465625c202e8f09e409320e5302d0e1b7fca565c7881c89608e7a88e11ffcb,2024-11-21T08:50:36.730000 @@ -245790,7 +245792,7 @@ CVE-2024-1474,0,0,daadec47e39f2f44b7199c43a754dd51ef7d732e2acb33666807f90722fd78 CVE-2024-1475,0,0,6a6215a0af1e99a4213db10c18098a9ffbedbdc03be33d01e385a4c1a932c070,2024-11-21T08:50:39.773000 CVE-2024-1476,0,0,f61376ad34cf2b7ae6ca76cfd975b528ec25d9329cb2f038dc1530dcd18ef2cf,2024-11-21T08:50:39.913000 CVE-2024-1477,0,0,74348eadb6214ad07d05d1e235932a474c51a995984a56d966fc8b6d5d3bb97c,2024-11-21T08:50:40.047000 -CVE-2024-1478,0,0,ca741f899e4935e12a4d32eb114a6300bf238a00e23b490fc9b21ed68ae24ec8,2024-11-21T08:50:40.173000 +CVE-2024-1478,0,1,403f7a6134fcd2f3445a189d288293e59c07ab435b9239ec1de909edcbaba2f9,2025-01-08T17:07:21.747000 CVE-2024-1479,0,0,752314f90a5f4960cc68dd04058d672b74cbe0911f4cbcaf920c0becda321632,2024-11-21T08:50:40.303000 CVE-2024-1480,0,0,03d3f4ccf7da39137b14bb7df631d0ca8dfa9b9937250b5474f8035d12beb0fd,2024-11-21T08:50:40.430000 CVE-2024-1481,0,0,7fd58e745dc38e4d7e47d117d56c6f445eed7fa5191f3735a2692d3de2dee70a,2024-11-21T08:50:40.563000 @@ -245810,7 +245812,7 @@ CVE-2024-1496,0,0,71a5c9ff961f70d5c4e2145e340948010a4486cd14c2a715cb1c9eaa56db41 CVE-2024-1497,0,0,135b57c143aea476a4b103b6a41508a0aa39f5d2197178fcea14053e7a1759c8,2024-11-21T08:50:42.460000 CVE-2024-1498,0,0,9cbd92d0f33965fc6126a633cc19db346c78e615eab4dbf18c292d9646196f1d,2025-01-07T18:18:04.250000 CVE-2024-1499,0,0,2fa895202673064cbd35a54445b99c9cb0cf65d5e0d54bc253de6d34157152db,2024-11-21T08:50:42.720000 -CVE-2024-1500,0,0,f0baad270213be3a3b3ffd4ce4ec973dd4a0ab50e726cc28eaa12b3ce2c96526,2024-11-21T08:50:42.853000 +CVE-2024-1500,0,1,1a2689bd4dcc7fdb3935a898039d25a11719c226152d0787db6d49bd67e84aeb,2025-01-08T18:34:33.033000 CVE-2024-1501,0,0,7278cf3016d6e749f83586c857f319c6893ef852e37caa5b00a791eeb8409c93,2024-11-21T08:50:42.983000 CVE-2024-1502,0,0,321ade08663ef4c52de698551c83e1933eff98b10674b67784c71cebf1a6bb75,2024-11-21T08:50:43.110000 CVE-2024-1503,0,0,dc20017c9fb5e4e443c308e7aac4d1055cdc0e51b3045e8b6f5474cdaa32a336,2024-11-21T08:50:43.240000 @@ -245841,7 +245843,7 @@ CVE-2024-1532,0,0,e80e81902d6512b170ef25fc1c0b7197df19d6d6709ea2ea911faf11cd3695 CVE-2024-1533,0,0,672ff40ebd2d9061fbc3bbc9de7d5e8e4d35c5769bab92790afed3ed40e3dc7d,2024-11-21T08:50:46.400000 CVE-2024-1534,0,0,2e9320299e2180ef1d7e929914dab933cb3e85ea5d4a83efd84ab898f262cf69,2024-11-21T08:50:46.520000 CVE-2024-1535,0,0,927dc46177fcf2f0646a5365a296286366125eb861cfedb1145399176e63f500,2024-11-21T08:50:46.647000 -CVE-2024-1536,0,0,284c7e1064190e2d2c35764f86bc17b286dafe15d921a76f39da4db600c9a53a,2024-11-21T08:50:46.770000 +CVE-2024-1536,0,1,c46b5077118b6287104aa95a7ed0934321fcad65589140f40d58f23e342e618e,2025-01-08T18:32:08.960000 CVE-2024-1537,0,0,7d525a30d5cdfe7798fc8911c287d952eeda39ad86e6e67360b00e68b870af53,2024-11-21T08:50:46.897000 CVE-2024-1538,0,0,f692a13d2117fab62bd43f3c930015d27dcdfedb4ea2c6fbf2a4f89e666d71a5,2024-11-21T08:50:47.027000 CVE-2024-1540,0,0,dcc5f7f06abf726edf9706049e280bf2503f16b7be61b8dfaef13d5b5b992664,2024-11-21T08:50:47.170000 @@ -245917,7 +245919,7 @@ CVE-2024-1621,0,0,212b3fca00d5946f120096ca5a7a0afc1b2cac9a26b845aa6388948724d529 CVE-2024-1622,0,0,641704d79708c5027cc525cdcdef74d012d3f37e9becbffc2cb36bf8a804f978,2024-11-21T08:50:56.633000 CVE-2024-1623,0,0,9237c655c57b57297f9d4e4236790c55b53a9289ac0a8c9d29baec29f36f1ab5,2024-11-21T08:50:56.787000 CVE-2024-1624,0,0,b1f0918bec96549f8bbfed4a1ac0caeb704927103c0fd16a821022d931105e93,2024-11-21T08:50:56.927000 -CVE-2024-1625,0,0,682a4a322c1044445e783985f0e45f6a8568cb4522d663460603832a6378a738,2024-11-21T08:50:57.063000 +CVE-2024-1625,0,1,a3c7b4228295e9fdc1f0f0703e1d7098f9618bfe3ecc3707e6c876bbb21a68f5,2025-01-08T18:58:39.100000 CVE-2024-1626,0,0,0731246020549054f06fc6e24bc9f41662b4a4c38adc41f1bcde01b32057aa8f,2024-11-21T08:50:57.200000 CVE-2024-1628,0,0,462aaf7a2aba24826516994be48daf03675e0663819d4ebb8cdd24916637fbda,2024-11-21T08:50:57.333000 CVE-2024-1629,0,0,c74dc0a8115d571151dcc08903e06d82eae076a5e9551b744e94ddebd2daf4d9,2024-11-21T08:50:57.473000 @@ -246019,7 +246021,7 @@ CVE-2024-1727,0,0,835ea1a8de83b3427eca53b821927695e2fbfdeed0970e648bc2bbc24acad5 CVE-2024-1728,0,0,65ac5027c66230a900a5259c3b3bb10c527fa4ddae212a665be9e3b619bf334f,2024-11-21T08:51:10.707000 CVE-2024-1729,0,0,603fe17ef908698c8fdfdf59f37a45c2855c2ff5669409f8c7c472a39c67fc29,2024-11-21T08:51:10.860000 CVE-2024-1730,0,0,517937ddd67607029b6fa8230e6d5a44fba2e45d94ecbd2b45dc8d7be4618002,2024-11-21T08:51:11 -CVE-2024-1731,0,0,fb6d85bb9d4c855c464a4c9a9eb0eaebf75291e0117681e6bf4f414c07f7f092,2024-11-21T08:51:11.123000 +CVE-2024-1731,0,1,a902f14cc2968b1ad9f7e1b8f948b77dbad988dd6d596e43ac9225ce87d9cbcf,2025-01-08T17:02:59.463000 CVE-2024-1732,0,0,f0faf98c61d7814db4d39f791e5545925e8accb9aa6c5efc9a70509edc7894fc,2024-11-21T08:51:11.253000 CVE-2024-1733,0,0,6508d2b5fb32c2573644403b0a9c315289a80afcfecac1317ebb718d1a2bbd70,2024-11-21T08:51:11.377000 CVE-2024-1735,0,0,7db5b578f50f68036d47590d9fa7513610b67146b451cc0887c1e730aba3dd20,2024-11-21T08:51:11.510000 @@ -246068,7 +246070,7 @@ CVE-2024-1778,0,0,9cd53e12eb037ddd3e7de0379c0dbd7f2f3849a7ce9d3d09c51f1551388ca1 CVE-2024-1779,0,0,8f0a2f2da391861791cf7451c71b563df6dc1e872a02e3e84396a6f6384745fc,2024-11-21T08:51:17.553000 CVE-2024-1780,0,0,80f26599b8f4d3abbd5d5938cad0c480de1894fa1b8d2642b95876ef2965114e,2024-11-21T08:51:17.680000 CVE-2024-1781,0,0,3daeacfd1a761b461bfa74c09725de95b95754d778b1b0c7aeb6b35ab1727dec,2024-11-21T08:51:17.810000 -CVE-2024-1782,0,1,15bc4a01eecf562070055e67a3b5b6d087e6b8c48666a5dcecf70ea075210086,2025-01-08T16:59:14.453000 +CVE-2024-1782,0,0,15bc4a01eecf562070055e67a3b5b6d087e6b8c48666a5dcecf70ea075210086,2025-01-08T16:59:14.453000 CVE-2024-1783,0,0,594da34a49bb55c82ff9fc17102c6a156816bdf59c95a1d9d5e8a48feb45d1d5,2024-11-21T08:51:18.077000 CVE-2024-1784,0,0,04cca439e6113763bf6a59c7d618f5b9b01eabe35d7dccb243485ba20a56ec50,2024-11-21T08:51:18.223000 CVE-2024-1785,0,0,d5071643d4460d30b810ad9c3b3d9dbd3daf0edfd77acea7798a44fd4c3311c3,2024-11-21T08:51:18.363000 @@ -246223,7 +246225,7 @@ CVE-2024-1939,0,0,ba14000cd43977e6f1eb1cd14ab27eeb70bb77dfe0844ae9ad68ecebd9e8d1 CVE-2024-1940,0,0,7e977c77b87dd39105da7f76cfd55a77e6e1e8669ae9826b7d02c15574f02730,2024-11-21T08:51:38.897000 CVE-2024-1941,0,0,9c69f1cafeafe1dc903ef64743a28dd74bf0a40675a6145a85e76229a13c3f6f,2024-11-21T08:51:39.030000 CVE-2024-1942,0,0,9959f1b48d8df074a766267681ef60ee70470ef041e97518033e1c9e3f4c9350,2024-12-13T17:06:52.710000 -CVE-2024-1943,0,0,37ee7dc6e76bef78b6102bf9229e0c5b6bd4a623fe009b654b2b47d58d3660ba,2024-11-21T08:51:39.290000 +CVE-2024-1943,0,1,427bdf5401d6f091cadbed61a8541fc961c944e687902b5c9c41fbd9c10f1f0d,2025-01-08T18:47:34.333000 CVE-2024-1945,0,0,1cd03843ae9b02b2f9e2a4e3da716e6e248a5bee1ad05b48bc5df5e30e975c59,2024-11-21T08:51:39.410000 CVE-2024-1946,0,0,6e530bc8c980b17cefc57dd6e915dd2f6d9a46c0b013e7d939b447a6baac7b82,2024-11-21T08:51:39.527000 CVE-2024-1947,0,0,da177b83a444550855dec5b8b8817e007af8e063cf499e42655ad9d32504de61,2024-12-13T17:14:57.493000 @@ -246778,9 +246780,9 @@ CVE-2024-20664,0,0,d2eb4face0f8f0d0f0a4a04f47040d17c1c6026a1869b44738d228cbc7d85 CVE-2024-20665,0,0,ddba14178d893bcbb52fd3cb7ea26310f3edddc497c01a887ad1e2b25a06d853,2025-01-06T14:33:29.733000 CVE-2024-20666,0,0,64613b17d7a3102d1325ccd3f27245ab53ccbff3b654c38bebeb520779d319e8,2024-11-21T08:52:52.700000 CVE-2024-20667,0,0,74b7eaeab6adad7a8d6a11e3aa398b5c550729fc518babae280c377b7f0458cb,2024-11-21T08:52:52.857000 -CVE-2024-20669,0,1,f4a40fdc3a370f7bbda0460be50624f293e8c893b4fd0fc378a2b6c4544343bb,2025-01-08T16:38:53.370000 +CVE-2024-20669,0,0,f4a40fdc3a370f7bbda0460be50624f293e8c893b4fd0fc378a2b6c4544343bb,2025-01-08T16:38:53.370000 CVE-2024-2067,0,0,6c90938e3ddfc84e2e5c47b777802d653de65b0becbd6daa161f22512c6cc446,2024-12-17T22:01:09.097000 -CVE-2024-20670,0,1,d92a7d7252658b538d5c3c642e72ed7ca328199b0a37b14292b01a122c435bc7,2025-01-08T16:39:28.907000 +CVE-2024-20670,0,0,d92a7d7252658b538d5c3c642e72ed7ca328199b0a37b14292b01a122c435bc7,2025-01-08T16:39:28.907000 CVE-2024-20671,0,0,6b0a7f41059b2984fe800d80092f13f75ad163ac7e615b02ff43563d05f345cb,2024-11-29T20:40:08.810000 CVE-2024-20672,0,0,5db276fe350cecf3e33fc8e55331d61fd60f5bf88098f91cb579efd578b7d9bf,2024-11-21T08:52:53.400000 CVE-2024-20673,0,0,61b7b122969a362009d29db767a9bd07d6c29d0460fa20e02a1216c0791a1a66,2024-11-21T08:52:53.537000 @@ -246788,7 +246790,7 @@ CVE-2024-20674,0,0,c245ce24079f62f86adee0ca5cf5a89acfab423e98816304a6438639037e2 CVE-2024-20675,0,0,107c9cb23560bd9b584d87a1dbae0fc9df91a56cf024d1e33df7b9f82a5134db,2024-11-21T08:52:53.853000 CVE-2024-20676,0,0,7bfdff026f047a27053b8fb5a547f77af04e4a4c70894208feb9d0cd93775f9f,2024-11-21T08:52:53.990000 CVE-2024-20677,0,0,563b37431807f27e08c293a4556c04e8b5204c7d233439ce26df7c5d4cda9d00,2024-11-21T08:52:54.120000 -CVE-2024-20678,0,1,af61731891979dfe144bebdc4c590eb55ceb08c543bc4524b4bba37da14362bd,2025-01-08T16:39:53.293000 +CVE-2024-20678,0,0,af61731891979dfe144bebdc4c590eb55ceb08c543bc4524b4bba37da14362bd,2025-01-08T16:39:53.293000 CVE-2024-20679,0,0,0d18febc18bea22d77b5234d7bde767752df8d1fb3ab38d7d78e4ae119653896,2024-11-21T08:52:54.410000 CVE-2024-2068,0,0,7bee0d6515428803efa5aeadd27bc360f1f191fab2135e7e59904b024174595e,2024-12-17T21:49:34.503000 CVE-2024-20680,0,0,60c11f06e599b6bafac603d229fc98b1d6cb26ec45e76a99b7bb7da1df3db64d,2024-11-21T08:52:54.540000 @@ -246796,16 +246798,16 @@ CVE-2024-20681,0,0,5723601005dcebbe9dc590f7e9e98358f5811c9b0570a8ff0762691e53ac6 CVE-2024-20682,0,0,152747128cf3542439257ca216340fd94b2e56a02ba3849305cf9c5ca658a356,2024-11-21T08:52:54.830000 CVE-2024-20683,0,0,7a1e7f8f6d873cec6a31811b652c06c3ea5d34bd6c7aba6419a911ef6fdadfc0,2024-11-21T08:52:54.977000 CVE-2024-20684,0,0,cc297d537be0cc10e0c91d4ce453c09384704a87f681132096bcaa58b8d6334d,2024-11-21T08:52:55.123000 -CVE-2024-20685,0,1,f944a9f6524e49e7f5476bc9191f07ed84952555db92a559894139a94a5960f7,2025-01-08T16:40:10.677000 +CVE-2024-20685,0,0,f944a9f6524e49e7f5476bc9191f07ed84952555db92a559894139a94a5960f7,2025-01-08T16:40:10.677000 CVE-2024-20686,0,0,858d331d834613f70aec2d758404ed2350f5abbfb31b9711b8d4e4cbe94324b6,2024-11-21T08:52:55.383000 CVE-2024-20687,0,0,7c52f1e1bed817209b53280114ffbd4bc497611dfb3771a3b2a104709800f271,2024-11-21T08:52:55.517000 -CVE-2024-20688,0,1,f2be42fa09d8ac43b17d3c91935d25ec18e8c24b04d2b46e0c9ab620978c25d0,2025-01-08T16:40:30.807000 -CVE-2024-20689,0,1,9e97f612d714ae3d0ed24837eda9596669099bf84a1506a7656877f1d1d7069b,2025-01-08T16:41:13.190000 +CVE-2024-20688,0,0,f2be42fa09d8ac43b17d3c91935d25ec18e8c24b04d2b46e0c9ab620978c25d0,2025-01-08T16:40:30.807000 +CVE-2024-20689,0,0,9e97f612d714ae3d0ed24837eda9596669099bf84a1506a7656877f1d1d7069b,2025-01-08T16:41:13.190000 CVE-2024-2069,0,0,9436a6f870785051c85de178936b151e115fec61706bf25c68450bcd758d8c1c,2024-12-17T21:47:11.063000 CVE-2024-20690,0,0,71f3dc7f067d2d072f88aed564765399e0a2561c6d51eebbc9fbd5fe33f5ed8a,2024-11-21T08:52:55.923000 CVE-2024-20691,0,0,99137b3a21a4550a10fd5f2752d2158fbcd6b23847f68512359e6832002d2f94,2024-11-21T08:52:56.063000 CVE-2024-20692,0,0,074cb7d14c5010da3a5afcd2d6b9d56d25ab7168d6be9932d226f2a7af7dbd43,2024-11-21T08:52:56.220000 -CVE-2024-20693,0,1,2c5f6d952db6c0fa836b5956074a04971ad1d54da53cd13c15bc16aceeb429a2,2025-01-08T16:41:23.463000 +CVE-2024-20693,0,0,2c5f6d952db6c0fa836b5956074a04971ad1d54da53cd13c15bc16aceeb429a2,2025-01-08T16:41:23.463000 CVE-2024-20694,0,0,87eab08d83193f70b50b2a89923c7eb7a80a75e57c93609bdc5366778e87999c,2024-11-21T08:52:56.557000 CVE-2024-20695,0,0,42cbea82efdf000be2a7e7ccfffa7d38cf01ecbf84eb55789967a343b2341fb0,2024-11-21T08:52:56.703000 CVE-2024-20696,0,0,7538e8e62f6755e4d1197f10d140eb08d68fb12ba8bf321e3b3e60536c7567a3,2024-11-21T08:52:56.870000 @@ -247226,7 +247228,7 @@ CVE-2024-21096,0,0,700328c435fe7e0efc3a46639530e00f4d735944b038cc3f6d4f82ae46971 CVE-2024-21097,0,0,799d135c25dc4257f45e950777010e72c0906c1ff7b9c0c2b0344e2ff488f381,2024-12-06T21:34:11.057000 CVE-2024-21098,0,0,3b9f26852cd073a585052d12c11fb47a6b32adcaba23463f21effa5bf231e77f,2024-12-06T14:35:46.047000 CVE-2024-21099,0,0,ad561fc3574d446cb78a80ee81ea27a050a78626756f88ce35b05d0eb497ff1a,2024-11-21T08:53:46.970000 -CVE-2024-2110,0,0,c00b31bb946582f904270e31f9b94485354aeebed83255169deb5244a5285d5d,2024-11-21T09:09:03.200000 +CVE-2024-2110,0,1,2ade019aa92b1c3b31f3273d5767fd4fbc1eeb010963e4fc39247a7c6dfbdce8,2025-01-08T18:20:25.510000 CVE-2024-21100,0,0,12a3c29c6c1c13390d400569bc84c4e06d7169a584bc805ee9b42835b2f70642,2024-12-06T21:24:25.520000 CVE-2024-21101,0,0,9ec2a02fb67c461ca3610e012d0e4527d555538cc029519bf17c727f1645bb1c,2024-12-06T20:41:55.317000 CVE-2024-21102,0,0,6ab4ef9ca48b579e83e31dfa18b7d9bcc1bf1ed28c6bb3755d44c0bfa342ccfe,2024-12-06T20:40:44.093000 @@ -247237,7 +247239,7 @@ CVE-2024-21106,0,0,bc12911fc75b906fb80175749843ce751c9a8642078e55a9e1c24a436b0f5 CVE-2024-21107,0,0,6d6d1f3d5bf48cd1a5aaab1801ad6011862dbf1f148dccaa974ac531cb27ddd8,2024-11-21T08:53:47.917000 CVE-2024-21108,0,0,0aa73826356529169ca32161f3148e64f89898c133699dc5c1f7375bf2d91e4e,2024-12-05T15:15:56.193000 CVE-2024-21109,0,0,cc4f1adc4745c06ca7a7a281d0022f50da47ffa469ecf384bdeb4475a6299c21,2024-12-05T15:16:07.703000 -CVE-2024-2111,0,0,5dc16634a80abbb8dd11fcc3dc385c3f93c71a2e29263247049f623c4458cf9f,2024-11-21T09:09:03.313000 +CVE-2024-2111,0,1,e7b737ad21498d72afeac55573741ec14d270cbe6717a3805c824181bcb9c5b6,2025-01-08T18:23:37.207000 CVE-2024-21110,0,0,5de512fcaa05c997e9352f53e43d504fb84e931f43c53c58b30d52517f92662b,2024-11-21T08:53:48.270000 CVE-2024-21111,0,0,ce04902122edd823f80a1fc79ecddd6498bfae611dda514cff0b08c3d5f73631,2024-12-05T15:16:10.643000 CVE-2024-21112,0,0,5f9a410d7e29e43b4a2df72469fe4323aca9f75837d3af964d48ebb5bcf4f6d9,2024-12-05T15:16:13.397000 @@ -247279,7 +247281,7 @@ CVE-2024-21146,0,0,93917a4413ac27762a7ca33035df6b31830c2c1fab0bde46632af0332d2d8 CVE-2024-21147,0,0,f9b3ce61bcfd0739b224ab3df778de64cc9f81c542249c3ff7985bfca81e013d,2024-11-21T08:53:52.630000 CVE-2024-21148,0,0,a961a19a001681356591f7a5aac5ec6c6ba03a137425a9a549d889b9b58016e0,2024-11-21T08:53:52.773000 CVE-2024-21149,0,0,b71ec17e5d800b1927013623f8da3815813773851489400311b7ea1d76054285,2024-12-05T21:41:33.037000 -CVE-2024-2115,0,0,87b4f7b7681ccdf7e3d063451d71d1c153d07e635e63f8ff4cccfd1fc31262ec,2024-11-21T09:09:03.650000 +CVE-2024-2115,0,1,fd358f9df3c552e36e2281b23e0f18ea9aac7fc7392bbd3c872a6d66c52e1a0e,2025-01-08T18:02:33.007000 CVE-2024-21150,0,0,9f2997fb27ec50dad1591b9adbcb8b4f1ec888ed3bce7192b5fa134e333ba8f1,2024-12-05T21:41:28.893000 CVE-2024-21151,0,0,e352a08d81541678dfa74d4c431f468d5dca65fdba253ab705b7cbca25259ef8,2024-12-05T21:41:23.637000 CVE-2024-21152,0,0,b29fe6c7acc98373e1b0ea6f88096a0ee9cc1e51ab942374126a18689f32c537,2024-11-21T08:53:53.213000 @@ -247532,7 +247534,7 @@ CVE-2024-21405,0,0,0fffca5c7742e4fc8e5114da2d6ac42f99491b82ac5a3bc3cf8e5c527d59c CVE-2024-21406,0,0,7d85838affa212c651678b9fb8ef594a841d8333ffff139aee401b4bbd991664,2024-11-21T08:54:17.750000 CVE-2024-21407,0,0,55c5603d483df486768f0c569e8a21ed6755ed009c8e36e38e2da52e021ab2a1,2024-11-21T08:54:17.900000 CVE-2024-21408,0,0,1e186c25fb155b4cac913f7f35efd6e10f70dc789ac5ec0658a18dd1cfa1fa03,2024-11-21T08:54:18.060000 -CVE-2024-21409,0,1,dc819e596a0f67d5242bf6de7a3b8f4db0925ef94638783abfb15349530108bb,2025-01-08T16:41:34.453000 +CVE-2024-21409,0,0,dc819e596a0f67d5242bf6de7a3b8f4db0925ef94638783abfb15349530108bb,2025-01-08T16:41:34.453000 CVE-2024-2141,0,0,e25edc3e366c33121ab88f864948d943b2cc55f959cde5bf1ebbabb3fc09fbe8,2024-11-21T09:09:07.003000 CVE-2024-21410,0,0,cff9ec17f7c98dd2a10dfde7d5847d7f80f14e8f69eab3ffc175bf54ec78e14c,2024-11-29T15:28:11.497000 CVE-2024-21411,0,0,1ae6015480b938b5cbbe1f91956803cc87debb183467930ca481b97d111ba498,2024-12-27T17:07:01.770000 @@ -247548,7 +247550,7 @@ CVE-2024-2142,0,0,c318dba0209d3ec013e13acbf3bb96f3ae1d78956d6f11ffc31b2eb03a294c CVE-2024-21420,0,0,df46f449fc3e701aee95b1e30bd20d24c2e7d48e4a861f3e3fa692518d0c5ea1,2024-11-21T08:54:19.540000 CVE-2024-21421,0,0,7ebaa57c4b9f49640ba80e90c6b54f95b3d9c928a138d063e19319565b4f1441,2024-12-27T18:25:29.033000 CVE-2024-21423,0,0,f9af7e37fa4ac00db3d27c63c91f6cab8fd61fd4e0cd58b29bafe7da8fbc1bbb,2024-11-29T20:42:08.630000 -CVE-2024-21424,0,1,69268fa4d05c7c72753f06ddfafde0ba7d45361da9176b7add3cda4916845692,2025-01-08T16:41:51.853000 +CVE-2024-21424,0,0,69268fa4d05c7c72753f06ddfafde0ba7d45361da9176b7add3cda4916845692,2025-01-08T16:41:51.853000 CVE-2024-21425,0,0,9b22fd2f2bbafa6b412c65d40da0f708a935ea72443779d442de89f7be54cbd3,2024-11-21T08:54:20.160000 CVE-2024-21426,0,0,28cc51db69ba03e1e83cb7f3a9f5914be340ff48d83ec7285f47ab6e4a1893d0,2024-11-29T20:50:09.910000 CVE-2024-21427,0,0,c8fca909f1ebd3caf8e518589319c47ad8bb6383ef7d8dedc9738dca072eb2c7,2024-11-29T20:49:42.757000 @@ -247573,7 +247575,7 @@ CVE-2024-21443,0,0,c2e6ed54d01619298231829fdf2a396f626a40f55cf63ef5452fea36519eb CVE-2024-21444,0,0,a8c6c6274226dbd29fa0d9ac33fdf9a2b6daef7a6f57066d1b02a7561d909a58,2024-12-05T03:18:50.527000 CVE-2024-21445,0,0,82395e1bf965267a108ae6c83941355d531d61dc0cf2e64a73b3ce95db8a8b88,2024-12-27T17:51:59.413000 CVE-2024-21446,0,0,d59dcd1f78e2a4b4fd1b2405e3dab411029f5d5d412cc3be05b96a52f38dae26,2024-12-27T17:52:12.337000 -CVE-2024-21447,0,1,03878755a7137e57d44381458ba7463ba89a936c41440b1f79aa6976691dc2d4,2025-01-08T16:43:32.287000 +CVE-2024-21447,0,0,03878755a7137e57d44381458ba7463ba89a936c41440b1f79aa6976691dc2d4,2025-01-08T16:43:32.287000 CVE-2024-21448,0,0,c996f0b534b3ac1fa41f31656478310b178c17dadb7c6ed03fa7e6cc9f999d5d,2024-12-05T03:19:21.767000 CVE-2024-21449,0,0,7896fc6d2aa5851cb5662df05cdedd5d1007bba8cae9edda90e1131ebd165eec,2024-11-21T08:54:23.507000 CVE-2024-2145,0,0,cd8a4d5dbfc9265ce43625b1c7d94fa09f2df8f9d2bedbc3c7c2e4a17f147f9d,2024-11-21T09:09:07.667000 @@ -247618,7 +247620,7 @@ CVE-2024-21484,0,0,26b63af38e471dd724df65831754acb4fd0a4b4156e340e2452f70064c78a CVE-2024-21485,0,0,6191d2a38c44232799bb0c7e561adce601efa08cdf8a283380dc5f2661f65ce6,2024-11-21T08:54:31.980000 CVE-2024-21488,0,0,245c5473def4aa0191be5f10fc6baa18aab621fbebc3bdd6b8cb4be4ebd3a0ec,2024-11-21T08:54:32.133000 CVE-2024-21489,0,0,53515493089291e8b9d6b5d5cf7c7875e7663716ffd514b330d3e4a5f3efaa4f,2024-10-04T13:51:25.567000 -CVE-2024-2149,0,0,a4385ff42223f96af4c025272df4d976e9442140c453601aef2ec945a18dd09b,2024-11-21T09:09:08.230000 +CVE-2024-2149,0,1,623462d7a5ff9b51b2aa7ade43da64daac4359951ec4d2679456f2fd8be039b8,2025-01-08T18:09:38.630000 CVE-2024-21490,0,0,b14e68113c71fc42ffaebf92dce9c2c5c2817d0b73b87d0c0f7ad029f8fb63f9,2024-11-21T08:54:32.410000 CVE-2024-21491,0,0,ed885d0621c9afa15f31ced4c11fa76b30b44086a27ec3bd748a089ebf894a3b,2025-01-03T19:40:54.883000 CVE-2024-21492,0,0,41784e48d5d56f935bbe9f5a3d60c45053ca0d5f0bf8670ce081293e9f26c581,2024-12-06T19:15:11.520000 @@ -247857,7 +247859,7 @@ CVE-2024-21745,0,0,d5592a068985b9fee47b1c30d3824b8b25fe21b1c4a2ea02729a391f34a46 CVE-2024-21746,0,0,8d08589ee793b47440fcd470879c77e3fbbb7559c7c0f17c2620eb70aefb6049,2024-11-21T08:54:55.913000 CVE-2024-21747,0,0,b1e8d9d4ebab222c141b47fcc600d98537e3bdb1b3c07cbf493d1474d479fe0a,2024-11-21T08:54:56.037000 CVE-2024-21748,0,0,3117ecd9f5543ffe29c62ad3da6eb1a31cb8d17885eb2a17e0fe086c48dd1a37,2024-11-21T08:54:56.160000 -CVE-2024-21749,0,0,ed6abe4cc28f28a06d55c2763a6cfd8e1cde070ff15ca727e5fd23a900f651ee,2024-11-21T08:54:56.303000 +CVE-2024-21749,0,1,854c07ea14d44f1a6f258b4195b384ea52b627e1c7fb4eba6779b50701ad855f,2025-01-08T17:03:30.207000 CVE-2024-2175,0,0,f23583a5f89b3c048c3a390c725234de0385c846391e27a731d22c7274e14129,2024-08-19T13:00:23.117000 CVE-2024-21750,0,0,34ac4bf556abed3b579ceb283a732cbafac6840724519bcf2f9521daaba609b5,2024-11-21T08:54:56.420000 CVE-2024-21751,0,0,37727b39c87b6c1a9e9b1b8c4a5a7fcb8c766a4a78fd465a68a305c6b49c5b57,2024-11-21T08:54:56.547000 @@ -248483,7 +248485,7 @@ CVE-2024-22458,0,0,054e05bee56fc2634d5e195c469d65ee7587b8df2315833e22fae6dafab2d CVE-2024-22459,0,0,a59f3a79899e105a6cc3ac3d292c77dd254a456412e506a47ad8a1495f05a21f,2024-11-21T08:56:19.873000 CVE-2024-22460,0,0,cf9685057b4b3269739ae374acfa00b4da824093a0d95fe8e25340068e29c40d,2024-11-21T08:56:20.010000 CVE-2024-22461,0,0,15fc026d7ad5be4a1c4f9e580805f2e43b808a92e87953af4df4577e636db90c,2024-12-13T14:15:21.383000 -CVE-2024-22463,0,1,d7d862658e3c45f198827763f0f948786983de80b86774f7ea7e7d6abb7a0b97,2025-01-08T15:46:14.627000 +CVE-2024-22463,0,0,d7d862658e3c45f198827763f0f948786983de80b86774f7ea7e7d6abb7a0b97,2025-01-08T15:46:14.627000 CVE-2024-22464,0,0,89df0e10ef44510a8e5904e121c14fc7d7fe04dd8b75af148ba79e6d8aedebac,2024-11-21T08:56:20.280000 CVE-2024-2247,0,0,0ca7d7b7e23609e28e1499a00333ba2939a4606a46ffba5afb79df586f8f7777,2024-11-21T09:09:20.660000 CVE-2024-22472,0,0,cee1f8bd8d53e1f58b74d1b8778f6d5e5846827b53d5cb2194a2b8f2a34bd2ce,2024-11-21T08:56:20.427000 @@ -248959,7 +248961,7 @@ CVE-2024-23324,0,0,f7c02ba436f285311f78cf12adf98895d4cd3df08fe2ee6150dbfce969045 CVE-2024-23325,0,0,ee772a88ad3928809d1ce5d80c3570e65b1d165a304d4403f60cf046b130b73a,2024-11-21T08:57:30.717000 CVE-2024-23326,0,0,4cad096b926e61ba5057fc61c818f175644122ba3bf2af2998e5007964e72fc7,2024-11-21T08:57:30.870000 CVE-2024-23327,0,0,a8afe8abda31e003c23c096976d7f35de964762f6854560205e003d15676baef,2024-11-21T08:57:31.030000 -CVE-2024-23328,0,0,173c826f0a0d10c265f4a052f21ed25ae09f9c079124f087f881539b175959e8,2024-11-21T08:57:31.160000 +CVE-2024-23328,0,1,31d0cef0ed7438d2981343da4f7a2780ae54e6fa105b1858178661dbbd43b5cf,2025-01-08T18:52:16.350000 CVE-2024-23329,0,0,6f00857f1323e733be7f4007f4cd28eb924527a4b1e19ac242db7d35637409df,2024-11-21T08:57:31.297000 CVE-2024-2333,0,0,aa9fbee873f24a7fcf3257af1de3e39f370ee81e78e3d2194f8b11717ede7e1c,2024-11-21T09:09:31.550000 CVE-2024-23330,0,0,9c37dd2c8d5180b5d682b7e4b5e92f1c52ed11136a4f6aa3156db7d54d493360,2024-11-21T08:57:31.440000 @@ -249156,7 +249158,7 @@ CVE-2024-23515,0,0,a65871ec61b19196b2445830d9379dcb33c393cd38ac11a45b1841d487eae CVE-2024-23516,0,0,b030ba26c18c3d8bc0eec3f8fab4c0f53e11b5b341e577d4dbd40c20de4d0f1f,2024-11-21T08:57:52.210000 CVE-2024-23517,0,0,a07da7f8ff74c07e3aafe68f2ec68f4874cf7345f49bddc3b7ceff7f2c49d92e,2024-11-21T08:57:52.357000 CVE-2024-23518,0,0,3536980112272660cb2e5c6f499a750764ce48713e0c277c9ee2a48797df869f,2024-11-21T08:57:52.507000 -CVE-2024-23519,0,0,095eee8c0a151c856e2999fa7fdaff265cf8759d9f21bba9502bc2558f00b2e2,2024-11-21T08:57:52.640000 +CVE-2024-23519,0,1,1ea214d5503ad45ce590c4615c30761c36942dab36a632af4bf1fde9401787f8,2025-01-08T17:10:44.600000 CVE-2024-2352,0,0,df01bfeba406516e47c68626bb04466e860ae8647f100b5446a6c462ccdabf1e,2024-11-21T09:09:34.573000 CVE-2024-23520,0,0,2a224669f65b031e874f35d3255621eb3e7a990714db584111418c730d11b0cb,2024-11-21T08:57:52.773000 CVE-2024-23521,0,0,57d58ffb0b9d9efecde4d13454097fc5a706b8ca84a89b6c40b02bdc1acf2c89,2024-11-21T08:57:52.917000 @@ -249888,7 +249890,7 @@ CVE-2024-24698,0,0,f2b2d1a6e84108fb481fdf433f6d79f1560639cbf4127bbbea63682efe99d CVE-2024-24699,0,0,1c8fae90adb2a33e39da40f95fd4607a7c448e738507d23c95f2ba0155b0e771,2024-11-21T08:59:32.053000 CVE-2024-2470,0,0,cd7f92263708be92d733df90848dc7a8170c433ced593a4af66edc35195b9d4b,2024-11-21T09:09:49.417000 CVE-2024-24700,0,0,8c44609095884de1aae337c5b8bdab731aee137d5ae8bf159ced92b79970a70b,2024-11-21T08:59:32.183000 -CVE-2024-24701,0,0,87f9ab753f51c90d010fa5f96e2421eebc947584a987264049989eaee6bbaf5a,2024-11-21T08:59:32.317000 +CVE-2024-24701,0,1,8cb64e88b3411138bffd254a75f74b838e393ab5074945081e24aa5c14c791a4,2025-01-08T17:11:18.907000 CVE-2024-24702,0,0,b1a7ccc75ac7f90e4c66070a29e3a04224280fa1b532ea31f57ef48ff7312cb4,2024-11-21T08:59:32.440000 CVE-2024-24703,0,0,c7ef9d71ed53815de6feb7bc4aaf27f0da7e571c7110b48c8a27715e4c8142f9,2024-11-21T08:59:32.557000 CVE-2024-24704,0,0,0b98e4e25b7c425c67742bf048b6f41dee16fb6db8585ccf095aac68285291fc,2024-11-21T08:59:32.680000 @@ -250014,7 +250016,7 @@ CVE-2024-2483,0,0,17a6d91b1a0bce426a92e3f3c9e7a49ee2c29077b7b7c477ce24a653e1db6b CVE-2024-24830,0,0,2604369fa1b173e0c63cb64b9cf0a9ee65d8f3caaf7a2202fe8ec85357f37b5c,2024-11-21T08:59:48.503000 CVE-2024-24831,0,0,79b53e3f2f08a9fcc2402c1ea185326b8812ae4c17ad199e9ba39e8d04543fb7,2024-11-21T08:59:48.643000 CVE-2024-24832,0,0,f4c5f351f3486b689ae332db55add5cef8b03879ce86859f6e19985aba3c701a,2024-11-21T08:59:48.787000 -CVE-2024-24833,0,0,7f409bf27056f9af59ffb9fbb2a3ed28a0f821b58ea6ede6d21a267c3677ce37,2024-11-21T08:59:48.913000 +CVE-2024-24833,0,1,0b569d5f030fc8d02fc4bcbaf8e65596ac662168b819175c4ff05ff2c74c4386,2025-01-08T17:14:47.103000 CVE-2024-24834,0,0,2b55d088597fc3ebc5386acef715e319fba0648d90a9c27dfb74125fc7cf22eb,2024-11-21T08:59:49.053000 CVE-2024-24835,0,0,c88c0363656348cc835b25fe08e144f0875c71bee4dc5f39427077cbfe899c84,2024-11-21T08:59:49.197000 CVE-2024-24836,0,0,0468b6ec04583463bff3590023f79b4c3fdc144c9a581e1e17284b820318e242,2024-11-21T08:59:49.317000 @@ -250082,7 +250084,7 @@ CVE-2024-24898,0,0,c2aeb0b2ae2f782f2dc66bdade7c7d1a93fc15cf5d6489a9f48c316ac3bf0 CVE-2024-24899,0,0,2bc91dcd7ae04ef9b7ce8699e0547facdca6bac3dccb8b3215f6cc8ec7bb7104,2024-11-21T08:59:56.620000 CVE-2024-2490,0,0,a65eb1b03e3ccb77b9452872014ef202736a2123ff92feca9ecf560217bfcbee,2024-11-21T09:09:52.163000 CVE-2024-24900,0,0,d5304f8431348447d6c427e55f3d4ca1cb09c058bcac6836ca3d23f9d77a4f59,2024-12-04T17:57:20.727000 -CVE-2024-24901,0,1,90f43cff66c2d3472fc27e388657195ab3c16dada990167848ae27558cad40b9,2025-01-08T15:38:23.727000 +CVE-2024-24901,0,0,90f43cff66c2d3472fc27e388657195ab3c16dada990167848ae27558cad40b9,2025-01-08T15:38:23.727000 CVE-2024-24902,0,0,bc5b9cdf96c129a42228207a374692a23fabe93823cd024f4399b30a0562660f,2024-12-13T15:15:26.810000 CVE-2024-24903,0,0,c3a9a41ff490c9fdd4344ed69609d58d017da5c09d11cfb9e580e9b5f0d24596,2024-12-05T16:45:06.087000 CVE-2024-24904,0,0,89ccd1ef3878c459f037e72c0bd66f3e26116e19f4be95f7db4d735ee9ada7fa,2024-12-05T16:46:28.330000 @@ -250631,10 +250633,10 @@ CVE-2024-25678,0,0,729747d5c1336c53cdfaa66d473a2ac39a3979cb22bc24c655a7f03ac3271 CVE-2024-25679,0,0,9d9902f44f841f235413342c5795906282c237988699ba4d2c673a3dc96338c5,2024-11-21T09:01:13.083000 CVE-2024-2568,0,0,d4e6e10874500d2ea89294d3405e8284be14375ae317ddfb2d7fc0707a27db60,2024-11-21T09:10:01.847000 CVE-2024-2569,0,0,a5fd3a0431159ecd32269b50578312ad6e31648e37f3b126e62ccf9e24585d0e,2024-11-21T09:10:01.980000 -CVE-2024-25690,0,1,e4bc0fa2bffba2b4b7b6c95d5601df6a949f5a71918ac3f4c9cd22137a04dce4,2025-01-08T15:20:46.477000 +CVE-2024-25690,0,0,e4bc0fa2bffba2b4b7b6c95d5601df6a949f5a71918ac3f4c9cd22137a04dce4,2025-01-08T15:20:46.477000 CVE-2024-25691,0,0,2362cde9799e6b851c7dd2267742ffcdda3af0440492747b2ad48c078f82bbe0,2024-10-15T14:35:02.133000 -CVE-2024-25692,0,1,ec5dba086b7a96c231f459f429bde4c491b8b761bae18660e885f0f14ecadc52,2025-01-08T15:16:56.533000 -CVE-2024-25693,0,1,40f8e7b94bb8e2a66a9642d1ff4e5d6a13f6d858911d8a000c32e1568f66ed04,2025-01-08T15:09:41.357000 +CVE-2024-25692,0,0,ec5dba086b7a96c231f459f429bde4c491b8b761bae18660e885f0f14ecadc52,2025-01-08T15:16:56.533000 +CVE-2024-25693,0,0,40f8e7b94bb8e2a66a9642d1ff4e5d6a13f6d858911d8a000c32e1568f66ed04,2025-01-08T15:09:41.357000 CVE-2024-25694,0,0,9aea7ed506f3e75701da5f8d91f5126ddb9fc6039a2cfaf95eafeb4edbb1abac,2024-10-16T21:00:18.683000 CVE-2024-25695,0,0,dd69ada188cfe555126eccfc8160d5342bb635827d40f664117ae84700fdfe7e,2025-01-08T14:32:59.223000 CVE-2024-25696,0,0,d5a9136c1d8f99bf95f80eb21266c5f45a51ff0365b75c1e51382b7ec2cfb6a2,2025-01-08T14:30:29.987000 @@ -250648,7 +250650,7 @@ CVE-2024-25702,0,0,3b42a2341816cd1940ae7f2801adf99cef9cc48b11969bf629ed4e52d3d6c CVE-2024-25703,0,0,1afe4ca1ce005dadbbbe3861ac31e3fa775711912585fe3575d9e4d068c0830c,2024-04-25T19:15:49.520000 CVE-2024-25704,0,0,fb54909d350b3454c6bcc148be02f730a032c03d05d0a91141a9e8dbb6c64f5c,2024-04-25T19:15:49.597000 CVE-2024-25705,0,0,8f7f68cd9f340fd1839fdb99e45a2a52528b2018ad9d801ce07fbb022804f7ac,2024-10-10T12:57:21.987000 -CVE-2024-25706,0,1,600484eed8897ea0828c44518c90f03573bbab70d24e0af6fb3b1629c531bd2e,2025-01-08T15:42:03.523000 +CVE-2024-25706,0,0,600484eed8897ea0828c44518c90f03573bbab70d24e0af6fb3b1629c531bd2e,2025-01-08T15:42:03.523000 CVE-2024-25707,0,0,3ee4e6517fecbbb60a3555239aa46206819a90f2a089c6815089490eaf01924b,2024-10-15T14:34:43.597000 CVE-2024-25708,0,0,68c9390638f6220a8a747f45f94bf4ae8b6c1bbc385eb469c159bfd10cf1ca30,2024-11-21T09:01:14.923000 CVE-2024-25709,0,0,31489fbef83fb265c90fba2ad01feb192daca17cb8946a88d5b798b413e187b5,2024-10-10T12:57:21.987000 @@ -250786,7 +250788,7 @@ CVE-2024-25927,0,0,8a41c2999ba39b28b9941ef34197a0a11af8d4674af1c96e0f1d73c91816a CVE-2024-25928,0,0,1a67bcf2ef6fe420ba267e12835a282a0f599cf9a6372a88b3a2d7eba8c5e241,2024-11-21T09:01:35.503000 CVE-2024-25929,0,0,a345c209e6ba592f3cf75f81619de24a58894a576bbf017e35677fd43e3029ae,2024-11-21T09:01:35.637000 CVE-2024-2593,0,0,f2c3aaff93814841c841cb17b61fd4128828a2f8efd9272fbb0bae22c31d38fa,2024-11-21T09:10:05.037000 -CVE-2024-25930,0,0,4774d853682869b8de934a61c65314536d34761d10a0d291d958685edada92f4,2024-11-21T09:01:35.777000 +CVE-2024-25930,0,1,1f97e9549c770fc331309e56c669203fc8ccf622dc1e38a527e25ad5df31e145,2025-01-08T17:11:38.167000 CVE-2024-25931,0,0,8cbe399f7fd0918aca51288fcf69cd817979574ffe4dbee799b5e808475d8ef7,2024-11-21T09:01:35.910000 CVE-2024-25932,0,0,5347ed6760391be270b3034f9a6f35f69064b64a9ff35240e953d7452eb242a6,2024-11-21T09:01:36.037000 CVE-2024-25933,0,0,10c4dcd1d4877c2c5d9d0ce4b63a969433dc4656fa5c7f916b0ffa00f975f7c4,2024-11-21T09:01:36.157000 @@ -251024,100 +251026,100 @@ CVE-2024-26164,0,0,955f43c621335a0915ed0ccd09771b1791419f5f5b5d2b4566de2ffe6ff42 CVE-2024-26165,0,0,323d735601fce5550052f5beda02dd0e7629a06390bb099382338fcea909aba4,2024-12-27T17:52:57.313000 CVE-2024-26166,0,0,e18f80ad40f8bc6f793bad005879d5e5b9993daac689d33724d3bc73a70a370a,2024-12-06T17:13:11.063000 CVE-2024-26167,0,0,8855bcc7e86d2bfb321c97571f709e8374a60be9ce3b496dc4c11c762f54238c,2024-11-29T20:40:52.990000 -CVE-2024-26168,0,1,62c8ee0c240ff65b4fb97e0fc41592a55b6e7336a7af67a393725b04f7586eb5,2025-01-08T16:43:41.883000 +CVE-2024-26168,0,0,62c8ee0c240ff65b4fb97e0fc41592a55b6e7336a7af67a393725b04f7586eb5,2025-01-08T16:43:41.883000 CVE-2024-26169,0,0,1019f2fc447e0f9753156720ba4d1d39073dcb9223b8501955c81cf0a85bd6ec,2024-11-29T16:24:31.767000 CVE-2024-2617,0,0,df50cc3304e28fac26946c783498321b1d7826e081bad204a1f2dac326819b7c,2024-11-21T09:10:08.513000 CVE-2024-26170,0,0,b55f72374c7063386941814ba0bdf0898d32da11ed22d12b938ae885cc41c8b6,2024-12-27T17:54:12.860000 -CVE-2024-26171,0,1,ce31895ba62f0f8d87fe0351cfeeef5b2cfa003f2d57425422746f778461a3f3,2025-01-08T16:43:51.780000 -CVE-2024-26172,0,1,0d5d66be6ac629f822c789f4ac6b1e80e6bdf21ad9b47e369b552a319a0a5ce8,2025-01-08T16:44:30.350000 +CVE-2024-26171,0,0,ce31895ba62f0f8d87fe0351cfeeef5b2cfa003f2d57425422746f778461a3f3,2025-01-08T16:43:51.780000 +CVE-2024-26172,0,0,0d5d66be6ac629f822c789f4ac6b1e80e6bdf21ad9b47e369b552a319a0a5ce8,2025-01-08T16:44:30.350000 CVE-2024-26173,0,0,c6d08fd3f223b0b539800fe98fcf9d8d17f7c436982164c8e7a6699f533aa1cb,2024-12-27T17:27:57.820000 CVE-2024-26174,0,0,7da91917d8122e6dc23fc9e8b6ab7bbf3617faddc3c5402d9df094b37745890d,2024-12-27T17:28:23.807000 -CVE-2024-26175,0,1,81e82933e9a6ac39990645b00898a4d88fa07ad1b9c0a199240db1fcbe947200,2025-01-08T16:44:43.310000 +CVE-2024-26175,0,0,81e82933e9a6ac39990645b00898a4d88fa07ad1b9c0a199240db1fcbe947200,2025-01-08T16:44:43.310000 CVE-2024-26176,0,0,3fa7c590ca078e2dc9788a850bf058f23adcc943db1bda7dd6d51d0426888fac,2024-12-27T17:48:16.630000 CVE-2024-26177,0,0,140c61605091974d5f7c9b823f5c9fad32b4393d01a2f9fb7dca92d2451fc583,2024-12-27T17:48:45.967000 CVE-2024-26178,0,0,77a13c16eb092c06a4b9efc112f2c6310896b9c693f815128487ef8b2e740ba4,2024-12-27T17:12:57.623000 -CVE-2024-26179,0,1,5e959c3dc59a642d86611c4f2fc63baea95247dcbf24cf0d54636cfab9a1c16c,2025-01-08T16:44:57.670000 +CVE-2024-26179,0,0,5e959c3dc59a642d86611c4f2fc63baea95247dcbf24cf0d54636cfab9a1c16c,2025-01-08T16:44:57.670000 CVE-2024-2618,0,0,b476fc0bedf83014aa48a984c6371e33ad232b973d35d0c9b9acc50c28ee23dd,2024-11-21T09:10:08.630000 -CVE-2024-26180,0,1,2d7983b542e422c616db5498c3e51f052f2bebc5b7387ccc79eaa507b34f1493,2025-01-08T16:13:27.780000 +CVE-2024-26180,0,0,2d7983b542e422c616db5498c3e51f052f2bebc5b7387ccc79eaa507b34f1493,2025-01-08T16:13:27.780000 CVE-2024-26181,0,0,bb21cc2354e89b2223370f46966d5bd78361e859d5124ce037ee99f38492bf50,2024-12-27T17:13:10.520000 CVE-2024-26182,0,0,14e7459827ebe4f5b4e619965ba9914b121235c5bb72dfe561ec5ef874dc387d,2024-12-27T17:13:24.903000 -CVE-2024-26183,0,1,e4c2105e6ca0f0e1cf6946a63e67eb64c1c0e33a848d37ce72c5f906a70e3a26,2025-01-08T16:13:44.660000 +CVE-2024-26183,0,0,e4c2105e6ca0f0e1cf6946a63e67eb64c1c0e33a848d37ce72c5f906a70e3a26,2025-01-08T16:13:44.660000 CVE-2024-26184,0,0,1c16dcc7c54a331432bf60e07ad47ea98087ec260c1a0a58b3b6ac2c53861298,2024-11-21T09:02:06.237000 CVE-2024-26185,0,0,8d258551a03f6d853387332213ed65690b50d09b7ce58f79f04f923ece3e688b,2024-12-27T17:14:05.590000 CVE-2024-26186,0,0,951ceba60b890e2d798c51d8118f7a3180cdf931f1ef9f336e5ad2dc5a46d885,2024-09-23T16:48:36.993000 CVE-2024-26188,0,0,dc54c4d9a5d848ec0b1e8b8383a55a611364acd7c047ade8b5f14981ef4b7578,2024-11-29T20:41:53.547000 -CVE-2024-26189,0,1,707c143c0adf422e6ae15318ded6112bddd6e1c6886b075864e1b625b7806a3b,2025-01-08T16:13:57.177000 +CVE-2024-26189,0,0,707c143c0adf422e6ae15318ded6112bddd6e1c6886b075864e1b625b7806a3b,2025-01-08T16:13:57.177000 CVE-2024-2619,0,0,f13555722e45f2cc192805496a6b4cf1a80d2448e7cefd54b5e79e390f0f935e,2024-11-21T09:10:08.750000 CVE-2024-26190,0,0,cd3063d65b7cfa0d6d76f32a5e4d79ea614249f1437ce0653ea13fbafbff442b,2024-12-27T17:14:18.263000 CVE-2024-26191,0,0,2b55f500e1886402c0bfacf8bfeae1423eaad9f386f2b496b231785464ebaea7,2024-09-23T16:51:43.927000 CVE-2024-26192,0,0,902591bef94f52ba914c3fcd6fecc2d37a089b0a8650f5c905e8f55fef155ff1,2024-11-29T20:41:36.453000 -CVE-2024-26193,0,1,5b2846dfe3ab7b2789020ebcf6378a67c3efa5316ed507233a139056db8ffdb1,2025-01-08T16:14:25.807000 -CVE-2024-26194,0,1,896c1b3244af1aab0410c0e336846f4c15f4927bd98e15fce9942eb2533ea244,2025-01-08T16:14:44.903000 -CVE-2024-26195,0,1,ff23d974d5c3725b3c026b5695bba3d1982a35590366b917117a509b5e84cadf,2025-01-08T16:15:12.980000 +CVE-2024-26193,0,0,5b2846dfe3ab7b2789020ebcf6378a67c3efa5316ed507233a139056db8ffdb1,2025-01-08T16:14:25.807000 +CVE-2024-26194,0,0,896c1b3244af1aab0410c0e336846f4c15f4927bd98e15fce9942eb2533ea244,2025-01-08T16:14:44.903000 +CVE-2024-26195,0,0,ff23d974d5c3725b3c026b5695bba3d1982a35590366b917117a509b5e84cadf,2025-01-08T16:15:12.980000 CVE-2024-26196,0,0,a307bc6f11b80dbe1dace8a44cd97db91996f1d88f45980bd5d679d6ff6fbf85,2024-11-21T09:02:07.560000 CVE-2024-26197,0,0,b4d347eb956c125e9f4823292b403ccb4b3a782f997ecaec3a18ff58a2965b27,2024-12-27T17:14:36.480000 CVE-2024-26198,0,0,e84246f9a50ce130b577ac09bbb53f0b839bbe0b88ca56ac36c78356e6403593,2024-12-06T17:12:07.640000 CVE-2024-26199,0,0,de92fa6956c0375e1cc6cc07bb193dcb58ea6bd7f5ca90a22b99af62ae11f509,2024-12-06T17:12:27.343000 CVE-2024-2620,0,0,081a1eae077b060a0a5f62f01f683964d107b0ba2c8573d730f1e778e44e6357,2024-11-21T09:10:08.880000 -CVE-2024-26200,0,1,66f85cad798699634751b0fcb92fdf5471e0e65f99f92173c000c05bcf9fe3aa,2025-01-08T16:15:36.940000 +CVE-2024-26200,0,0,66f85cad798699634751b0fcb92fdf5471e0e65f99f92173c000c05bcf9fe3aa,2025-01-08T16:15:36.940000 CVE-2024-26201,0,0,b695a22668f344c6a5009b94534cd93f805e4d96d32a3c9c05b50b0be3b8117d,2024-12-06T17:02:30.493000 -CVE-2024-26202,0,1,fb896d556747ecbd467716f65321b40ede1c339e758a187990fdafc6277ff7db,2025-01-08T16:15:53.347000 +CVE-2024-26202,0,0,fb896d556747ecbd467716f65321b40ede1c339e758a187990fdafc6277ff7db,2025-01-08T16:15:53.347000 CVE-2024-26203,0,0,dbdd1aaa2777015a30f68c81ec3fada100c571487f1431e6b15ff78ddd79dc32,2024-11-21T09:02:08.417000 CVE-2024-26204,0,0,173dffbee7468ba10d3f77a732bbaa0d8cc93b033b7bb04bd90621e6b81e39ef,2024-11-21T09:02:08.533000 -CVE-2024-26205,0,1,de27bf31ab69d42497235f18c71db07132fcbd4955345188ba5775b04377d495,2025-01-08T16:16:05.497000 -CVE-2024-26207,0,1,2a618295e04311fdcd807eed2b213dee150e20d395059e0b5bb1e948d10c9de8,2025-01-08T16:16:18.420000 +CVE-2024-26205,0,0,de27bf31ab69d42497235f18c71db07132fcbd4955345188ba5775b04377d495,2025-01-08T16:16:05.497000 +CVE-2024-26207,0,0,2a618295e04311fdcd807eed2b213dee150e20d395059e0b5bb1e948d10c9de8,2025-01-08T16:16:18.420000 CVE-2024-26208,0,0,c546b7ba6fe9738cfb1a6d5077c2f4c407e24a16222e2a17068cdcf4f76a6419,2024-12-06T15:39:42.890000 CVE-2024-26209,0,0,079303da558aa9eef55bdbe0038fa18e334cab0e7233447eb24a997dfebe5593,2024-12-06T15:37:15.937000 CVE-2024-2621,0,0,1ab5d8c7854e54144e35f8b5017b4000f6b180fcf0bb9fd27b47a711005a7a9c,2024-11-21T09:10:09.033000 CVE-2024-26210,0,0,80668a0088efda63c0156312b85125604fcb808022ff6ecf79973436c0b409ba,2024-12-06T14:42:44.433000 -CVE-2024-26211,0,1,f2b833be96e158ebdfc2549fb79e6559abdc270ddbbd8a3e76c757b1a950eca2,2025-01-08T16:16:41.933000 -CVE-2024-26212,0,1,4a2e9a73279a50f170dccd0e0908f4a6122a55fe39b7b69d81a75693627e03a9,2025-01-08T16:16:58.303000 +CVE-2024-26211,0,0,f2b833be96e158ebdfc2549fb79e6559abdc270ddbbd8a3e76c757b1a950eca2,2025-01-08T16:16:41.933000 +CVE-2024-26212,0,0,4a2e9a73279a50f170dccd0e0908f4a6122a55fe39b7b69d81a75693627e03a9,2025-01-08T16:16:58.303000 CVE-2024-26213,0,0,5a2a2da6d81a01672bc99c3e79b917c0c1e54771e696947d704edfaa4d0f49b6,2024-12-06T14:41:46.023000 CVE-2024-26214,0,0,8866865b72676a3d79c514af72de9a6fb00238adfc940346c8215eeec13cf909,2024-12-06T14:41:12.913000 -CVE-2024-26215,0,1,d7554d957374e469a59aad1e8c053b078f5f3c41dbc5306210a065348173bbab,2025-01-08T16:17:13.453000 -CVE-2024-26216,0,1,6bc6c747968e33954d7068f7679564ccef439234ef8758a13b6ae97631056074,2025-01-08T15:22:26.050000 -CVE-2024-26217,0,1,698d5e9a5bdaffb142a4e11b792e1e07292f2d5a0f3b598dd3353de156063094,2025-01-08T15:07:45.367000 -CVE-2024-26218,0,1,f833db2eed37295bff96ed2466eb27b10261e67b35c55c0bb0112d6a8a3425c2,2025-01-08T15:00:32.987000 +CVE-2024-26215,0,0,d7554d957374e469a59aad1e8c053b078f5f3c41dbc5306210a065348173bbab,2025-01-08T16:17:13.453000 +CVE-2024-26216,0,0,6bc6c747968e33954d7068f7679564ccef439234ef8758a13b6ae97631056074,2025-01-08T15:22:26.050000 +CVE-2024-26217,0,0,698d5e9a5bdaffb142a4e11b792e1e07292f2d5a0f3b598dd3353de156063094,2025-01-08T15:07:45.367000 +CVE-2024-26218,0,0,f833db2eed37295bff96ed2466eb27b10261e67b35c55c0bb0112d6a8a3425c2,2025-01-08T15:00:32.987000 CVE-2024-26219,0,0,c2261219ef6b6dfb28f4f4b2d192fb0ee8dea6c577366131624b74c52fe02de0,2025-01-08T14:37:03.257000 CVE-2024-2622,0,0,98890a285e6b5712e3a88d4fa5c54895b47cfd151e3de3dac31b847139815507,2024-11-21T09:10:09.180000 CVE-2024-26220,0,0,83ce1b7527ea3b2ae83c28a935f7fb97b765870413ac5533c02c2dd974c6cc5c,2025-01-08T14:23:13.767000 CVE-2024-26221,0,0,fc1f3a316ea077bed64542b98807e21669537ae452fcf0ffdb149ded927eedef,2025-01-08T13:53:25.107000 -CVE-2024-26222,0,1,161c522774f6c0fb1e694685e4ac194c1511eeb092b99cc0898ae983186b167d,2025-01-08T16:18:03.547000 -CVE-2024-26223,0,1,da66b4b5ead327cf12269b098d92648b7104d66519418e9faac9a9e2a2a5c220,2025-01-08T16:25:28.040000 -CVE-2024-26224,0,1,a1ff1d86fc660e402fa9bf756f06948c9ac7cdc437e282f2296f02bc2e29de6f,2025-01-08T16:27:06.937000 -CVE-2024-26226,0,1,f53978cfbf6d99fdbc30bc25db1632168b5ccc1c3dec083c913a87ec62927990,2025-01-08T16:27:22.497000 -CVE-2024-26227,0,1,5c2fc4b90f1b4bbec7fdc7c88fc60c47c166e99b440dc547f2214ea4f38b0b17,2025-01-08T16:28:31.610000 -CVE-2024-26228,0,1,fbbae24dbfd1a6f2bfc2cd895125564469a7a613f2eed01bc0d7f5fccfb5a109,2025-01-08T16:31:38.633000 -CVE-2024-26229,0,1,553aad4240827e067db49fe129df0c528dd2b5cb7c8699a5a51f37123c98796e,2025-01-08T16:31:52.880000 +CVE-2024-26222,0,0,161c522774f6c0fb1e694685e4ac194c1511eeb092b99cc0898ae983186b167d,2025-01-08T16:18:03.547000 +CVE-2024-26223,0,0,da66b4b5ead327cf12269b098d92648b7104d66519418e9faac9a9e2a2a5c220,2025-01-08T16:25:28.040000 +CVE-2024-26224,0,0,a1ff1d86fc660e402fa9bf756f06948c9ac7cdc437e282f2296f02bc2e29de6f,2025-01-08T16:27:06.937000 +CVE-2024-26226,0,0,f53978cfbf6d99fdbc30bc25db1632168b5ccc1c3dec083c913a87ec62927990,2025-01-08T16:27:22.497000 +CVE-2024-26227,0,0,5c2fc4b90f1b4bbec7fdc7c88fc60c47c166e99b440dc547f2214ea4f38b0b17,2025-01-08T16:28:31.610000 +CVE-2024-26228,0,0,fbbae24dbfd1a6f2bfc2cd895125564469a7a613f2eed01bc0d7f5fccfb5a109,2025-01-08T16:31:38.633000 +CVE-2024-26229,0,0,553aad4240827e067db49fe129df0c528dd2b5cb7c8699a5a51f37123c98796e,2025-01-08T16:31:52.880000 CVE-2024-2623,0,0,092a8bd4e4daebc06a436bebefc463483bb05935626e710a0ed23a1e150adc34,2024-11-21T09:10:09.310000 -CVE-2024-26230,0,1,69377b64970d710af9e251debe1b54da41351ea80d23b5be64d65d9ef5099bf1,2025-01-08T16:32:41.670000 -CVE-2024-26231,0,1,b932e0c89a81d839ec530889e3bba74a55df396ef61aac39c031a3add1c31c60,2025-01-08T16:33:08.860000 +CVE-2024-26230,0,0,69377b64970d710af9e251debe1b54da41351ea80d23b5be64d65d9ef5099bf1,2025-01-08T16:32:41.670000 +CVE-2024-26231,0,0,b932e0c89a81d839ec530889e3bba74a55df396ef61aac39c031a3add1c31c60,2025-01-08T16:33:08.860000 CVE-2024-26232,0,0,3b717e9ae005d4734140ff5837bde84cda000758a327ccc4b5664a77a5b55004,2024-12-06T14:39:54.630000 -CVE-2024-26233,0,1,ebcf3f7a7aa4a056365d2c0e5f0419facb47a5848f533fb7aff0f34ffed252bf,2025-01-08T16:37:21.217000 -CVE-2024-26234,0,1,db16ed64dcc4ff6911d4071294d440768cb4877bc16f8ef07a35071524aaacc1,2025-01-08T16:37:17.700000 -CVE-2024-26235,0,1,90a9c7d5280b779a052ee32ef689e7a17b6061525d8f54b0760b3b681a266608,2025-01-08T16:37:39.897000 -CVE-2024-26236,0,1,b3b9a73f635d53188f72ed8d4bfdf7570c407e8d7860bb45359bcbfc66b0532a,2025-01-08T15:53:19.297000 -CVE-2024-26237,0,1,b6ed63c886bbef69d9180cf6bc82ee96dada1d58c2dc845441c40e98d2ac9e1f,2025-01-08T15:54:58.580000 +CVE-2024-26233,0,0,ebcf3f7a7aa4a056365d2c0e5f0419facb47a5848f533fb7aff0f34ffed252bf,2025-01-08T16:37:21.217000 +CVE-2024-26234,0,0,db16ed64dcc4ff6911d4071294d440768cb4877bc16f8ef07a35071524aaacc1,2025-01-08T16:37:17.700000 +CVE-2024-26235,0,0,90a9c7d5280b779a052ee32ef689e7a17b6061525d8f54b0760b3b681a266608,2025-01-08T16:37:39.897000 +CVE-2024-26236,0,0,b3b9a73f635d53188f72ed8d4bfdf7570c407e8d7860bb45359bcbfc66b0532a,2025-01-08T15:53:19.297000 +CVE-2024-26237,0,0,b6ed63c886bbef69d9180cf6bc82ee96dada1d58c2dc845441c40e98d2ac9e1f,2025-01-08T15:54:58.580000 CVE-2024-26238,0,0,29eb84d72f4dfc3bcae14dac7f62a0da44395608805b84bc29b6f93a004843e4,2024-11-21T09:02:12.737000 -CVE-2024-26239,0,1,e8dc81b014c8d64d304b2034d096f12fbbb656650b562a5b91f3b5833037b94d,2025-01-08T15:55:35.740000 +CVE-2024-26239,0,0,e8dc81b014c8d64d304b2034d096f12fbbb656650b562a5b91f3b5833037b94d,2025-01-08T15:55:35.740000 CVE-2024-2624,0,0,72d06684172a0b67b71cfadebc73e6297a732acc67b7f4a91e537bcb8fa461ff,2024-11-21T09:10:09.430000 -CVE-2024-26240,0,1,44d4125112f72e7d129139dc15aefa83ffc03a8b60a0d690ad9a3c8a89cecb18,2025-01-08T15:55:58.603000 -CVE-2024-26241,0,1,6028c5be189cfe07b2b1595562467d1357458b7d64c5b20e5e1a788670b37969,2025-01-08T15:59:42.057000 -CVE-2024-26242,0,1,28ff3319e70f121c7ed20001152362f2c1e8ac6837bf9689b9742203569373ac,2025-01-08T15:57:08.793000 -CVE-2024-26243,0,1,724094315d8d7076955b62a9c7bf38765b55cd32433052a6bacb2d50a6cff2d6,2025-01-08T15:58:34.267000 +CVE-2024-26240,0,0,44d4125112f72e7d129139dc15aefa83ffc03a8b60a0d690ad9a3c8a89cecb18,2025-01-08T15:55:58.603000 +CVE-2024-26241,0,0,6028c5be189cfe07b2b1595562467d1357458b7d64c5b20e5e1a788670b37969,2025-01-08T15:59:42.057000 +CVE-2024-26242,0,0,28ff3319e70f121c7ed20001152362f2c1e8ac6837bf9689b9742203569373ac,2025-01-08T15:57:08.793000 +CVE-2024-26243,0,0,724094315d8d7076955b62a9c7bf38765b55cd32433052a6bacb2d50a6cff2d6,2025-01-08T15:58:34.267000 CVE-2024-26244,0,0,7541ec5473155fdc897929ec7500413844789371b750f5769ea582fc80ab0c6d,2024-12-06T14:33:58.663000 -CVE-2024-26245,0,1,06d4d30f6e191180c494f7d8ab5ef516f537abb83f2f912849288d3af33b73e6,2025-01-08T15:58:55.043000 +CVE-2024-26245,0,0,06d4d30f6e191180c494f7d8ab5ef516f537abb83f2f912849288d3af33b73e6,2025-01-08T15:58:55.043000 CVE-2024-26246,0,0,60d13b377c10db048dc34b21ac5deb53732a4d8b2008d8c6f30c7c41df8ffd55,2024-11-21T09:02:13.780000 CVE-2024-26247,0,0,cea52640ed81546887a0689389d64bc644e12ba6fa979c3acd81ad91d9206a6f,2024-11-21T09:02:13.900000 -CVE-2024-26248,0,1,40233588a9cfcd917326e1614c2aea1e7c8ff0d83506c41e426b42e4b7986909,2025-01-08T15:59:13.603000 +CVE-2024-26248,0,0,40233588a9cfcd917326e1614c2aea1e7c8ff0d83506c41e426b42e4b7986909,2025-01-08T15:59:13.603000 CVE-2024-2625,0,0,06c7a7c95e1e00aea3236f4c8bba83849b4481616872e476ce05bb47111d63e5,2024-11-21T09:10:09.553000 -CVE-2024-26250,0,1,27335d2dae1d4ef8ff1daf34ff99a16b2c5759eb5b950a3bb4cbd3859ea8e0d7,2025-01-08T15:59:38.290000 +CVE-2024-26250,0,0,27335d2dae1d4ef8ff1daf34ff99a16b2c5759eb5b950a3bb4cbd3859ea8e0d7,2025-01-08T15:59:38.290000 CVE-2024-26251,0,0,bd1db17ac5da21ecd817685a80204e8aed337c915553f24e49042f322f98a6a5,2024-12-05T19:29:12.660000 -CVE-2024-26252,0,1,32222337ba86a09cbf6a7c5c00e27d16b0157c696742d27eeac7edfe711bd89e,2025-01-08T16:00:05.467000 -CVE-2024-26253,0,1,4febcc3e9d1b8e957022765ee0df2f5e64595be8ddeb5bea7d7a16a047f728e5,2025-01-08T16:00:24.463000 +CVE-2024-26252,0,0,32222337ba86a09cbf6a7c5c00e27d16b0157c696742d27eeac7edfe711bd89e,2025-01-08T16:00:05.467000 +CVE-2024-26253,0,0,4febcc3e9d1b8e957022765ee0df2f5e64595be8ddeb5bea7d7a16a047f728e5,2025-01-08T16:00:24.463000 CVE-2024-26254,0,0,d25b1273b9feb301eab47fad4ae85e4ab128d1c06978252fade60d032721b613,2024-12-05T19:14:00.320000 -CVE-2024-26255,0,1,dfdfc865ed065a338ae831df725f6adf057e80f7bd35c83886a017feecaf0e64,2025-01-08T16:02:21.560000 -CVE-2024-26256,0,1,6c688574d1f3e9f7a8263907c5232ac256d7e74b6e437de7598b14f43b4cfb40,2025-01-08T16:03:05.373000 +CVE-2024-26255,0,0,dfdfc865ed065a338ae831df725f6adf057e80f7bd35c83886a017feecaf0e64,2025-01-08T16:02:21.560000 +CVE-2024-26256,0,0,6c688574d1f3e9f7a8263907c5232ac256d7e74b6e437de7598b14f43b4cfb40,2025-01-08T16:03:05.373000 CVE-2024-26257,0,0,b8bb637c848aeb610a87bae7128adefa902fe8fdc7bf11c9377e5065cc3416fa,2024-12-05T19:11:37.323000 CVE-2024-26258,0,0,f44dbe4ece2a696fe76796e8cdd34f69e383db4a2848f8680d1714e4770f70a5,2024-11-26T08:15:04.673000 CVE-2024-2626,0,0,187238078dced3a6eb09a09edaeaa9bf7f43988c2088701468fb3aeaed9e9f87,2024-11-21T09:10:09.767000 @@ -252054,7 +252056,7 @@ CVE-2024-27326,0,0,9c7e2b9fdb34a40e3e15b646c2105decdf69a8f22693558651330deac1e0b CVE-2024-27327,0,0,b1f985bd9470ed536a3784c792a0223d30f4e8799e174ea1d5049c4f79b6ed86,2024-12-04T15:03:46.113000 CVE-2024-27328,0,0,d60be5d90dbfbf7efdce9cdcbb4ca86fe380f80228e13ee52df3d7912bdcb7ee,2024-12-04T15:03:16.167000 CVE-2024-27329,0,0,f730ccc363e49ec85098e55d3ee00c0542737f21f124abd177c04f5de216f250,2024-12-04T15:02:57.010000 -CVE-2024-2733,0,0,45a7c70d6c7720a7f5fe19e6b19c785cb11fa095f32f3114529ff4f9d10e58c4,2024-11-21T09:10:23.930000 +CVE-2024-2733,0,1,39b0aecfaf355b02775da451d6999e79174e90a7919694c38b39b3c5a0e8ad4e,2025-01-08T17:52:18.777000 CVE-2024-27330,0,0,1d5d311e9f256cc4f221441c72dd390f2ca526a4e5468675946106599cefa6da,2024-11-21T09:04:20.897000 CVE-2024-27331,0,0,e195e88155826ea4b63da1691e81b356a034bba1f2ef928e8838c78e72e60fbb,2024-11-21T09:04:21.023000 CVE-2024-27332,0,0,aaa4dffc6bf333f244c6f25f902be7cb0c54ea98dcf6de9140197a28969da44c,2024-11-21T09:04:21.157000 @@ -252065,7 +252067,7 @@ CVE-2024-27336,0,0,a1e007445298d9569a21e7e46d6e5613ce5be0c116dc6ab2ba0a34f5bd663 CVE-2024-27337,0,0,04c3d3db0bec8dce3da789a7d42e81f08a5dd5dc86aa9d9776792e193199f356,2024-11-21T09:04:21.820000 CVE-2024-27338,0,0,03e8ec17267e27bcaacc4695d46519c9829afcd476821257efa3e182a341359a,2024-11-21T09:04:21.953000 CVE-2024-27339,0,0,99621b5b6ace59da7f06c016daa1bdf0b88cbf302b933ff1a0deb8f415ff217e,2024-11-21T09:04:22.120000 -CVE-2024-2734,0,0,67234a5f8fa9733df20b07adeed01efdab3e5672cc157373d6dce9c153f007d6,2024-11-21T09:10:24.050000 +CVE-2024-2734,0,1,15700c39506c6737511a90240e8902ac502bcd36576bf0b22c45142008dd44d1,2025-01-08T17:52:29.340000 CVE-2024-27340,0,0,fd6392deb312e164a1dfa6395055ee9ded35ed75bc17aa548ae060d17a3b472d,2024-11-21T09:04:22.263000 CVE-2024-27341,0,0,13da6c7d33e066a09b0d4d4dca1b40112998d6acdc4daf4324465ecb51c879ca,2024-11-21T09:04:22.403000 CVE-2024-27342,0,0,44118e0720a961c463831ac7c838f43df76ddfcaa3e2aa548a24a4369e3158e9,2024-11-21T09:04:22.547000 @@ -252076,7 +252078,7 @@ CVE-2024-27346,0,0,4ef1236f8b7db87812c0165f7f7fb6230e69020f019ead98bf2a8322c5b12 CVE-2024-27347,0,0,82870f64ac0a2a14ab143ebd6e83380e883828e2697e94972ee09305c8810ede,2024-11-21T09:04:23.187000 CVE-2024-27348,0,0,8907c77d1f87a0067012d7f1cb60ccb1c019a3817dd62d759186d11783415e97,2024-12-16T20:12:08.900000 CVE-2024-27349,0,0,64f0ce0987be250d4ba50f90637a07a25050f972f064a55adeb0ac9a5e260832,2024-11-22T15:15:05.917000 -CVE-2024-2735,0,0,1804d4b542784e87b1f218fc94851eb57bf3659299449fca226f8456d1bb6e3b,2024-11-21T09:10:24.170000 +CVE-2024-2735,0,1,58eb8e801b828e96d4d3a0b893575290d14b8ccf76fef7a100e552908de15596,2025-01-08T17:52:42.690000 CVE-2024-27350,0,0,5d2af758328dbaf2f007a2d7df7e7c029e0e88326cef12f01f6df91c842f3c2e,2024-11-21T09:04:23.840000 CVE-2024-27351,0,0,8abb1f2545237be12b6dadbe1f320b90fa23f151f9ed4a4a0a2ce44a3f71a09d,2024-11-21T09:04:24.087000 CVE-2024-27353,0,0,62e36dc368cbe5699859a16ea6b58854e0eb7537ffc3cb01a93e718c536f007f,2024-11-21T09:04:24.347000 @@ -252086,7 +252088,7 @@ CVE-2024-27356,0,0,98fbad32108df0a81ed05f8ed15969257da1e551b2530f7ad159695de7eda CVE-2024-27357,0,0,15736746300b11a044bdbe36d80b43350223e7be84675e1a9da30f0de7cd203a,2024-11-21T09:04:25.280000 CVE-2024-27358,0,0,f5e6cb633af9a6703a613689de04e1a2cc6a85126e5470b5d52499380066cfed,2024-11-21T09:04:25.497000 CVE-2024-27359,0,0,be475d000f5021d6959e65f4bafe704d89d8d833c8d9a5372f53a3261a6b08db,2024-11-21T09:04:25.703000 -CVE-2024-2736,0,0,232a8f622d9c3dcc805d744f06c40023ae5c4a2dddf242b78eb428f303012c81,2024-11-21T09:10:24.287000 +CVE-2024-2736,0,1,42479b81c7b7bb1f0cc691ae9843f3a641e8308bbe69be2da07a921df442435c,2025-01-08T17:24:59.387000 CVE-2024-27360,0,0,77efb6dac120a74a11618c9e38ba64c067450192f4f4e7551dd0a979307a6c9d,2024-11-21T09:04:25.937000 CVE-2024-27361,0,0,77d90ea36f27bea18e74dba7c2e8422a0b7db46e4c92b699af7c71e56fcb3f57,2024-11-21T09:04:26.190000 CVE-2024-27362,0,0,8fcbfe3c3547e93103323dff220f142e81361fc5323b166a8e70487632531ddc,2024-11-21T09:04:26.353000 @@ -252467,7 +252469,7 @@ CVE-2024-27911,0,0,163d4032cccefd06169212e4b4f3531d5c43c99d1d0f8350d0f1bdd5571d1 CVE-2024-27912,0,0,17a916159656f5b71e76460ab9dd8159bb40a0e837babb274b88d74bea610fa1,2024-11-21T09:05:24.420000 CVE-2024-27913,0,0,79609b73829d0e3a51abfdab110ae0c2179d3260bb658ab73948feb51075cd8c,2024-11-21T09:05:24.547000 CVE-2024-27914,0,0,5e5ddccbbb74882dbffdd5d78490fdd3d3796c1de57e829c23a8c79b22b255e1,2025-01-02T15:30:15.373000 -CVE-2024-27915,0,0,0ceaed02bb0a3d0fc99d3ded72f8a3fe7e89ae057e877ce21269673f4cb11e1e,2024-11-21T09:05:24.810000 +CVE-2024-27915,0,1,30fc89ed2d0e90a6aa678686ee66f14cc7586bdc17f811032d4a74d25d20d03e,2025-01-08T18:37:37.653000 CVE-2024-27916,0,0,b572f3243ffe86527b7ad8e11be508172ba6d1e3dd7a87cc545fdc48dc633024,2024-11-21T09:05:24.950000 CVE-2024-27917,0,0,f35bbaf1bf1edd8283326f39a3a7879f08bd17cc746f8a365b00af88afdafd3b,2024-11-21T09:05:25.077000 CVE-2024-27918,0,0,76e11fed0f30cfc4f256dd5762f679acf819b0030cb78b3f612ea0581f6d24ad,2024-11-21T09:05:25.243000 @@ -252626,10 +252628,10 @@ CVE-2024-28075,0,0,b47e096d1281b2db48bf7d7b0638678a231d5631f69f1624a13bafd0fcef8 CVE-2024-28076,0,0,9cf7cda7aea4d69674fe28d82a7d579f97a8b7cd17249ac7884cf6062cd21642,2024-11-21T09:05:45.840000 CVE-2024-28077,0,0,11861d52f1181341bb4975b159315043797eeb1a5228fdf7968084b7f30c6ead,2024-09-05T18:29:31.127000 CVE-2024-2808,0,0,929e834e70a4305880128a178e107c6fe817020c4a8d1b390bde853ff35341d0,2024-11-21T09:10:34.280000 -CVE-2024-28084,0,1,0d3287ba2deeb433e3245fd8b556726348ccc51234bd81cde3d2e3755fc61195,2025-01-08T15:50:22.960000 +CVE-2024-28084,0,0,0d3287ba2deeb433e3245fd8b556726348ccc51234bd81cde3d2e3755fc61195,2025-01-08T15:50:22.960000 CVE-2024-28085,0,0,e4974c1a5de240996c5adfec977f7c96492d57c62385b43f7fc4461a6ced18fa,2024-11-21T09:05:46.257000 CVE-2024-28087,0,0,1cf2c29c3a52af51eece9d14d776aa50c22fd39822de195a1746d467e8c2dafb,2024-11-21T09:05:46.523000 -CVE-2024-28088,0,1,1cb8a1d0b63338fd18325d3f75eb7b62999e851ce9d7f91a18ce7885b3c5b7b8,2025-01-08T16:13:57.860000 +CVE-2024-28088,0,0,1cb8a1d0b63338fd18325d3f75eb7b62999e851ce9d7f91a18ce7885b3c5b7b8,2025-01-08T16:13:57.860000 CVE-2024-28089,0,0,49f0aa6513ba2ab4d442d451601a63c564c42eeec06484d5925e65cddbb914d3,2024-11-21T09:05:46.980000 CVE-2024-2809,0,0,b9cdd35de4fb9230ed0e9e2d2ef0de2c5b79fe90f04d01576f8dafc087db02ef,2024-11-21T09:10:34.453000 CVE-2024-28090,0,0,fd1c5d24517e6f980a9802838d46bbe8c34473d65c6fd3784544457108b42ec7,2024-11-21T17:15:12.523000 @@ -252770,7 +252772,7 @@ CVE-2024-28233,0,0,9dfb6a281036a246e6a8c7797767e8821a8200df2339f7f383cd790364689 CVE-2024-28234,0,0,598260d530e844b988103ffca1d1f3c6f915fb6f021808bfe5979b115274823f,2025-01-02T17:49:55.720000 CVE-2024-28235,0,0,c592361641fcd3391202760c674630aa3f40f7abf453fde494084cedbc09dc21,2024-11-21T09:06:03.783000 CVE-2024-28236,0,0,dfd61e97fd2f4e8bda5301eb249a81bee1ced1010d8891ae6b2fc931094dc494,2024-11-21T09:06:03.913000 -CVE-2024-28237,0,1,6596ca9e95c7bbdbdf1ce7fad38ad1f3d78868edb778ee33c83d80a6c532886b,2025-01-08T16:22:58.707000 +CVE-2024-28237,0,0,6596ca9e95c7bbdbdf1ce7fad38ad1f3d78868edb778ee33c83d80a6c532886b,2025-01-08T16:22:58.707000 CVE-2024-28238,0,0,54e673a11dc58ef2f1ce67b17902858e9a639439ca947a54911f01e497b4cc07,2025-01-03T16:14:55.823000 CVE-2024-28239,0,0,cad2389eb8ad3f3fc89b4de0deaf45f55e8417efae42f10b632472f86525ee21,2025-01-03T16:17:32.100000 CVE-2024-2824,0,0,f1bf8222502fdfe6970d6bec7f9f262cc2a23adafeaf181a033793e1be015aa2,2024-11-21T09:10:36.917000 @@ -253081,7 +253083,7 @@ CVE-2024-28851,0,0,64684c9808bba072162a30e9b68edda03449afeb907ef399bbfbbb2b88661 CVE-2024-28852,0,0,0fa34d2996926049a3853f8cfbd3cfe829b2800bca87371526216e20f7c662c0,2024-11-21T09:07:02.927000 CVE-2024-28853,0,0,c6b3d8ca5dc60e19f977b74c1f3c7e65504369ba6c0c2c39097a04ce40648b26,2024-11-21T09:07:03.070000 CVE-2024-28854,0,0,fc72a1af9a4423f23eb1c2bfab5673b3cdf91d9369b066233da617e99e87a321,2024-11-21T09:07:03.207000 -CVE-2024-28855,0,0,e1ba687866985367a53b4a3ac957f1f419c211866bea866410ef834d64f95818,2024-11-21T09:07:03.350000 +CVE-2024-28855,0,1,acb3d3e157cc68dbbea7f5c0e503c2de3d780f240741901169138f093e88a38c,2025-01-08T18:14:28.137000 CVE-2024-28859,0,0,6f026de9f6ccdab17442bfff936b54d3f18997dbcded841f5c04513f5212d2c9,2024-11-21T09:07:03.500000 CVE-2024-2886,0,0,394d8e95a7c910d17686664af11972d5aee835e493ecc95268e0fb8dd1bffa87,2024-12-19T16:09:30.553000 CVE-2024-28860,0,0,615b0e6dc4018679696c4d7b10ac840d76cd4c01792710452a17c3362532000e,2024-11-21T09:07:03.630000 @@ -253119,15 +253121,15 @@ CVE-2024-28892,0,0,0675780aff3c9ab12c12dfa28834b58fee94e67a571b3eca76e1a2ca00b40 CVE-2024-28893,0,0,db742559f8c06478e8575a7b0b3efd5fffbc67fba44a19cb78f8e38f79742eca,2024-11-21T09:07:07.740000 CVE-2024-28894,0,0,b9faf34ec909306221ab162d492936e7fd18d2418e4f829a4af1d6fc9a632145,2024-11-21T09:07:07.920000 CVE-2024-28895,0,0,d2dda34349233b4529d0456a907510ce0ea82c958aeef35d6f0b65b75c4f7cc9,2024-11-21T09:07:08.117000 -CVE-2024-28896,0,1,ae4e1fa0c54824c05f5525000ca636e3351a07ac2127029e362ec0604e9092af,2025-01-08T16:03:33.820000 -CVE-2024-28897,0,1,d0e73fd43d40821340a5903ce2161c10e498e76051406a60607624983841c4ec,2025-01-08T16:04:12.530000 -CVE-2024-28898,0,1,cf7b0db691b94909b3952f81306d1d22d84a5b2895c23f3d57a6cd7ba0c5195c,2025-01-08T16:04:27.403000 +CVE-2024-28896,0,0,ae4e1fa0c54824c05f5525000ca636e3351a07ac2127029e362ec0604e9092af,2025-01-08T16:03:33.820000 +CVE-2024-28897,0,0,d0e73fd43d40821340a5903ce2161c10e498e76051406a60607624983841c4ec,2025-01-08T16:04:12.530000 +CVE-2024-28898,0,0,cf7b0db691b94909b3952f81306d1d22d84a5b2895c23f3d57a6cd7ba0c5195c,2025-01-08T16:04:27.403000 CVE-2024-28899,0,0,377801cb4fca6674152ad4df3b5fe2a269d017643767d42c77cc19fddc753671,2024-11-21T09:07:08.733000 CVE-2024-2890,0,0,9f3de28a2d200668c10961a2e062abf955c96d77921e4e0222aeb6258f112722,2024-11-21T09:10:46.020000 -CVE-2024-28900,0,1,3f8eb169cde4546b974edc798acdfc0e3a675b69a0c3a20605a7bcedd118fa17,2025-01-08T16:04:41.253000 -CVE-2024-28901,0,1,bd7a483ebfff353be5ff1bb2987efcaf79e51d5757af04796119fa56168ed344,2025-01-08T16:10:06.617000 -CVE-2024-28902,0,1,8cbc34727ef15998be762183f071f5194164e6931d25fce10389f0f8220e23d4,2025-01-08T16:10:20.793000 -CVE-2024-28903,0,1,76d888947943a37b1ce2fc9a7134078c439854dac24e603e98e8dc5730fdb99d,2025-01-08T16:11:00.583000 +CVE-2024-28900,0,0,3f8eb169cde4546b974edc798acdfc0e3a675b69a0c3a20605a7bcedd118fa17,2025-01-08T16:04:41.253000 +CVE-2024-28901,0,0,bd7a483ebfff353be5ff1bb2987efcaf79e51d5757af04796119fa56168ed344,2025-01-08T16:10:06.617000 +CVE-2024-28902,0,0,8cbc34727ef15998be762183f071f5194164e6931d25fce10389f0f8220e23d4,2025-01-08T16:10:20.793000 +CVE-2024-28903,0,0,76d888947943a37b1ce2fc9a7134078c439854dac24e603e98e8dc5730fdb99d,2025-01-08T16:11:00.583000 CVE-2024-28904,0,0,9f007588993cf4a4ddcca27129a47e2feae065c5111b453c43fc38b2aff0f7f2,2024-12-05T18:54:13.320000 CVE-2024-28905,0,0,a08eee1382a1bc3a2ad1eab03718f1c1af09a74713904c7f3a9b3b8a590e95d7,2024-12-05T18:50:21.030000 CVE-2024-28906,0,0,2d31615044f057a4577ab855bd3b743067a2cccf8fb6a4a0761ba8b0e41a1734,2025-01-07T20:30:25.303000 @@ -253141,13 +253143,13 @@ CVE-2024-28912,0,0,652f6f09ef9e3cb510a1123a480abcb8fb57058b882893d580010967efb9e CVE-2024-28913,0,0,3680b0f7a5cea0c8ffb90c366d0338d5211c1942b9d5d8480bdc5ddc82421b30,2025-01-07T20:03:28.853000 CVE-2024-28914,0,0,8b0b3b0fa5a15e2252e78d407a87af3f4d7576daf56d9f4726d1bc959cd00697,2025-01-07T19:51:53.947000 CVE-2024-28915,0,0,4d9efd3b5de3b2e9930bbec9717f9230f7b3a49711c9d523bcf861dacb977e7c,2025-01-07T19:48:07.427000 -CVE-2024-28916,0,0,7e8518a9373fa848d2766930cdc99728632e579ae0d86f80b414ea87c8f277e4,2024-11-21T09:07:11.097000 +CVE-2024-28916,0,1,e34cd9ef2748a7cccd5995352677bfa0b35bbb61565917369bb676539d215256,2025-01-08T18:35:14.683000 CVE-2024-28917,0,0,89bc645416800446819a0650a2fb393ffa2225d66115e5b665d823e1631a9607,2025-01-07T19:29:24.970000 -CVE-2024-28919,0,1,1c6282b7290ea6d12f58497301cfb1bf431a4c9d6bfe90ac3ecda81daa1fc9b4,2025-01-08T16:10:55.147000 +CVE-2024-28919,0,0,1c6282b7290ea6d12f58497301cfb1bf431a4c9d6bfe90ac3ecda81daa1fc9b4,2025-01-08T16:10:55.147000 CVE-2024-2892,0,0,74c239cacaa79151a1c470c6b6fc24b5a5eb0198576c9c168529a88848909c96,2024-11-21T09:10:46.323000 -CVE-2024-28920,0,1,b1f59a0172c6d2ab413458de6a58ff8bb5ad0546c83587f17da4930f09c4e726,2025-01-08T16:11:26.560000 -CVE-2024-28921,0,1,8e0c5de7255ffbaf24ec273d5f031faae03acb44b8a2c66037dc33a5236abed7,2025-01-08T16:11:39.433000 -CVE-2024-28922,0,1,69fdcf8fc01da16e5d877ef26236de0eef66dfedc059000948bd219bf8b8531b,2025-01-08T16:11:54.427000 +CVE-2024-28920,0,0,b1f59a0172c6d2ab413458de6a58ff8bb5ad0546c83587f17da4930f09c4e726,2025-01-08T16:11:26.560000 +CVE-2024-28921,0,0,8e0c5de7255ffbaf24ec273d5f031faae03acb44b8a2c66037dc33a5236abed7,2025-01-08T16:11:39.433000 +CVE-2024-28922,0,0,69fdcf8fc01da16e5d877ef26236de0eef66dfedc059000948bd219bf8b8531b,2025-01-08T16:11:54.427000 CVE-2024-28923,0,0,a83bc8b273882fb4a01545b9451074ac05770cf89d346a76403e8bc09bbdcb6b,2024-11-21T09:07:11.947000 CVE-2024-28924,0,0,d86af187f3780ccc5a96c01efeeefbabf997156d3d184938b6eaa9d3fb460efd,2024-11-21T09:07:12.100000 CVE-2024-28925,0,0,27b8c55ace8e27dbb5a933cd4e3851d9cafd18db0f72835107622a20412c89a4,2024-11-21T09:07:12.250000 @@ -253279,7 +253281,7 @@ CVE-2024-29054,0,0,1e866fb4a6512987938aa9eb4a6ebd0720c280be55ed1e0df32cddebb5ef2 CVE-2024-29055,0,0,34b4bb1a3acd3066744a91cecdfe941450337a606e849fb76b0a879a9aacd457,2024-11-21T09:07:27.810000 CVE-2024-29056,0,0,9e607943f1430c66c22b61255cfe8e261fc175de9249a1c578594b29cd1b824e,2024-11-21T09:07:27.943000 CVE-2024-29057,0,0,3deaebdc7af567eb027e3b4630e3d0b2f66daac347366af604fd2bccf7d6f841,2024-11-21T09:07:28.087000 -CVE-2024-29059,0,0,27e64e0af241bcf74c576cd264ccdbb9cd497617a982c958b178423e20ccba1b,2024-11-21T09:07:28.230000 +CVE-2024-29059,0,1,044a6984feb8642a951af040c98024cedfb7a63fd2dcd127eff738d3575cbc8b,2025-01-08T18:33:02.303000 CVE-2024-2906,0,0,e78fa1cdb9d009f1e1f59fe20ffafc00d26c9427eeacf6bf57bd9ccb61ba19e2,2024-11-21T09:10:48.327000 CVE-2024-29060,0,0,af396cbe0064d82e679fb903757b48ee4457b3c97de8af5053371646760bdc49,2024-11-21T09:07:28.380000 CVE-2024-29061,0,0,52a54c8f53a5af43122eb6a24e6ea10a22f7c7472b299c9e051c0cc4fdcf255c,2024-11-21T09:07:28.530000 @@ -253327,7 +253329,7 @@ CVE-2024-29104,0,0,f1f189a63b7a01d1d49f3a6b0cae20a47961d88101d8514d2c423c4ec2f14 CVE-2024-29105,0,0,c66a7fda0a5c9f8df47a07bbce9c424c595eafc32fe89bcf2c583a37e4654e1f,2024-11-21T09:07:33.893000 CVE-2024-29106,0,0,e43ca02781df97eb9a42c68cd071bbc76bda4a8d7d18edf1496174b796e85aec,2024-11-21T09:07:34.030000 CVE-2024-29107,0,0,7d19dc574278cf1683013d8ff659c1411a9735a9ace582b1cdb650f880b70eef,2024-11-21T09:07:34.160000 -CVE-2024-29108,0,1,0ae5c87de818ee6d85336d44fecde11bf0ad3f784ce5bb54a4b6c764bf7af8c3,2025-01-08T16:30:17.263000 +CVE-2024-29108,0,0,0ae5c87de818ee6d85336d44fecde11bf0ad3f784ce5bb54a4b6c764bf7af8c3,2025-01-08T16:30:17.263000 CVE-2024-29109,0,0,4d51f8f3341e8657e6c8c880f4f2d73bd95482441c6ac3a26d0a8cd436b3b41c,2024-11-21T09:07:34.440000 CVE-2024-2911,0,0,947f33674e3a84a4df184fca1e8444d630bfce299331118affd153d9859966df,2024-11-21T09:10:49.123000 CVE-2024-29110,0,0,188b12a44958677313d622a075fc663921a549ff0ec7192ae3aa84b867a019d1,2024-11-21T09:07:34.573000 @@ -253391,7 +253393,7 @@ CVE-2024-29167,0,0,1ef36d76b20e6770213daa93e804f5c39767f403426f49bcd96e85b430a6c CVE-2024-29168,0,0,76da846afbf9a55737b5d5153c7075fb50544a452bceda1dfcbdd4dbae96e234,2024-11-21T09:07:42.920000 CVE-2024-29169,0,0,03077a8e18279867e58f0538c1ce576e0403d3968cc312fcceee0d04c9493bf9,2024-11-21T09:07:43.060000 CVE-2024-2917,0,0,b5f4311ed824c628747b6d6d6b66642d4215c934be667bd71791c2a5029b2dec,2024-11-21T09:10:50.053000 -CVE-2024-29170,0,1,370cd60a5ddffa88cf8f7934c452c63f52b7ba07af57e96fdb32da3666fff09f,2025-01-08T16:25:58.207000 +CVE-2024-29170,0,0,370cd60a5ddffa88cf8f7934c452c63f52b7ba07af57e96fdb32da3666fff09f,2025-01-08T16:25:58.207000 CVE-2024-29173,0,0,2927c987b1bca666dc42efce13e217bdb905c1239077627159c2a4923dc5301f,2024-11-21T09:07:43.383000 CVE-2024-29174,0,0,65010050e670e870e2ab6c488596f4f6fc1385fbeba243078e77aa3e825c9f1d,2024-11-21T09:07:43.507000 CVE-2024-29175,0,0,1a7114481e9b20c8eff6bf81f7575050706de007b87f7c2ddbf4ca9624c9a616,2024-11-21T09:07:43.653000 @@ -253465,7 +253467,7 @@ CVE-2024-29240,0,0,b0b33e00bdb53519abfc89d12c7f6ad5d919f4f1070ab5d39520c9db259c1 CVE-2024-29241,0,0,950df0e991bfb383a328e544bbf2fd16681d3360062fd830d81932fd473785e1,2024-11-21T09:07:53.033000 CVE-2024-29243,0,0,6712fc080a5e8c9532d36ee5213cbfa29db8274191ca6d9bba87c131b413b31a,2024-11-21T09:07:53.150000 CVE-2024-29244,0,0,10592a85c5d4647480056a5bbd0b67225862ce6c23f623418cd1bca09ea83d5f,2024-11-21T09:07:53.363000 -CVE-2024-2925,0,0,a15404e84d1f8d88f2fd5754d715e00b35246709f8449c0741663e29ae687055,2024-11-21T09:10:51.240000 +CVE-2024-2925,0,1,08a688428b1cf91c81dd53f1f81a26bc2648cbdabba0669e09c3c551848cd6da,2025-01-08T18:28:36.057000 CVE-2024-2926,0,0,18353582fbf60ea48ced69d4190ccb60f0390ef67dfa3f20a639890b23e716a0,2024-11-21T09:10:51.370000 CVE-2024-29269,0,0,59344950251fa21a0e7c78785a2aa3fcb549293d2bf33594b54e6b598043aea6,2024-11-21T09:07:53.570000 CVE-2024-2927,0,0,03a7365e8e4d348218dde20ddc39fe906873932323b37259861ce99ea9e8e4b5,2024-11-21T09:10:51.553000 @@ -253785,8 +253787,8 @@ CVE-2024-29888,0,0,e28fc9e19b75542310a12faddf511cff2dc9442370e83a7e680b4cee42dc5 CVE-2024-29889,0,0,b08cfc6c99ac16a03c9d67ee12715b7adf65f152924721c4a7e5babce434443e,2024-11-21T09:08:33.337000 CVE-2024-2989,0,0,1946e73ae76c4bb63fcfac8150f6b63e8bdf1aa6f6d8b7b4fd418be4b8485b51,2024-11-21T09:10:59.990000 CVE-2024-29890,0,0,d7aeef7b1a852d07093e767dae05e03ec8f713df2d306c8f69aabec8a291c766,2024-11-21T09:08:33.470000 -CVE-2024-29891,0,0,23ef730cecceb38500189d7160ac26ca9315826841b0f52d23b88f1d50977cd4,2024-11-21T09:08:33.593000 -CVE-2024-29892,0,0,6d9ede0b55845b4b0fdbbb3f51fc083d8330e51ccf4295b110761e834ea5315b,2024-11-21T09:08:33.727000 +CVE-2024-29891,0,1,c0d9dab934686f17f30a346e9b9705d4d5114c8534d422583c3a21338cc873ff,2025-01-08T18:16:59.630000 +CVE-2024-29892,0,1,1aa4a9eb4c0da9065679dc05f23fe9be7a8f64d91a7f460d2181c137f34ee287,2025-01-08T18:20:34.003000 CVE-2024-29893,0,0,d62c0ef2026f28366c688f12ac2a46a973213698560165c03ede9e99a40a9db7,2024-11-21T09:08:33.863000 CVE-2024-29894,0,0,63a0f8ebc2b89dbefe86d49c0639f6e96b849498d3625b601a9b5117c947eff3,2024-12-18T21:10:38.887000 CVE-2024-29895,0,0,304ec674d940c6c6be41bc00c8f8967d1334e98bed6f24f921965e14ed63e7ab,2024-11-21T09:08:34.137000 @@ -253907,59 +253909,59 @@ CVE-2024-30007,0,0,81e8a9d80acb0fd4b4d2e28f1473ce582950380596c9f3bd4ac01f0b63c78 CVE-2024-30008,0,0,73164509e0d550004dfc26ecd32fcb0af01f43487cc022cd53e562266e54016b,2024-11-21T09:11:02.853000 CVE-2024-30009,0,0,6ce6cd3fab64823a18507498edbeb715aa197def63be726e7885ed988a8aa767,2024-11-21T09:11:02.997000 CVE-2024-3001,0,0,a7374e476d7442a06066a14e1bd58098fcf6ff210b0ec172c2e3dfeb580cd5c2,2024-11-21T09:28:39.010000 -CVE-2024-30010,0,1,3b57dded1365346a40ef9d907acf2a62b1045574e11d0dc8d1e83f92596365c8,2025-01-08T15:40:07.350000 -CVE-2024-30011,0,1,656da07e190efbff9361ca41e3b1ba9c4f70c5c9e619a121ad703b0c703533ed,2025-01-08T15:45:48.600000 -CVE-2024-30012,0,1,3cfcd5e62f53a2fbf8d6797d2013b52f1fcef1f665bb139337dcf3b0adecd4c4,2025-01-08T15:40:37.453000 +CVE-2024-30010,0,0,3b57dded1365346a40ef9d907acf2a62b1045574e11d0dc8d1e83f92596365c8,2025-01-08T15:40:07.350000 +CVE-2024-30011,0,0,656da07e190efbff9361ca41e3b1ba9c4f70c5c9e619a121ad703b0c703533ed,2025-01-08T15:45:48.600000 +CVE-2024-30012,0,0,3cfcd5e62f53a2fbf8d6797d2013b52f1fcef1f665bb139337dcf3b0adecd4c4,2025-01-08T15:40:37.453000 CVE-2024-30013,0,0,c68eb3354c7c99066d2eda818df8b6f3ed32924c738e48ac0d29222d12e2e15f,2024-11-21T09:11:03.577000 -CVE-2024-30014,0,1,29e6609974e54c3e1df07137e60b2d5eaf0f65e4f3ca96c74c8eb545ca718d6a,2025-01-08T15:44:31.357000 -CVE-2024-30015,0,1,52aa651dde0ea6bf84bb00419c07634297d067ef9334197e11876d2d34a70478,2025-01-08T15:45:00.623000 -CVE-2024-30016,0,1,5b295ec99e9b88a24423f588f50ea49d5754b5759903d2d073a3d6bf2cf7fa7a,2025-01-08T15:45:16.347000 -CVE-2024-30017,0,1,b334193ef5ee49dc171003b282b5e1a193bc772e9a0cf65c48d1f03f390d06ee,2025-01-08T15:45:33.653000 -CVE-2024-30018,0,1,5e2118645be8937acb72174dfed9cd182e370335b3a175a518dffa5d94318100,2025-01-08T15:45:45.587000 -CVE-2024-30019,0,1,36a9650e035ec5224df9a52bc463199a43fc6ab8696a43446828b4d871ac7a5b,2025-01-08T15:46:05.617000 +CVE-2024-30014,0,0,29e6609974e54c3e1df07137e60b2d5eaf0f65e4f3ca96c74c8eb545ca718d6a,2025-01-08T15:44:31.357000 +CVE-2024-30015,0,0,52aa651dde0ea6bf84bb00419c07634297d067ef9334197e11876d2d34a70478,2025-01-08T15:45:00.623000 +CVE-2024-30016,0,0,5b295ec99e9b88a24423f588f50ea49d5754b5759903d2d073a3d6bf2cf7fa7a,2025-01-08T15:45:16.347000 +CVE-2024-30017,0,0,b334193ef5ee49dc171003b282b5e1a193bc772e9a0cf65c48d1f03f390d06ee,2025-01-08T15:45:33.653000 +CVE-2024-30018,0,0,5e2118645be8937acb72174dfed9cd182e370335b3a175a518dffa5d94318100,2025-01-08T15:45:45.587000 +CVE-2024-30019,0,0,36a9650e035ec5224df9a52bc463199a43fc6ab8696a43446828b4d871ac7a5b,2025-01-08T15:46:05.617000 CVE-2024-3002,0,0,43285269ba1ba668064835131e260faa1611d81ce919795b2f96499b7ec676f4,2024-11-21T09:28:39.160000 -CVE-2024-30020,0,1,eb2de9c88a26e4fdff8b9a9fbb69f65e1e1c4827bb87d27edc60e3239c77b34c,2025-01-08T15:46:24.710000 -CVE-2024-30021,0,1,33a7963d197cba861f91b7e0591ffaa981a77ea97759ddaca998052f275beb5c,2025-01-08T15:46:36.790000 -CVE-2024-30022,0,1,43667532f65ff0b53387b8234898ff9f433c199f1b2ce49500723329e760b918,2025-01-08T15:46:52.783000 -CVE-2024-30023,0,1,9416945581295109283a17eb1d99f9b17ab126301030f8415afe630cb0fe0e89,2025-01-08T15:47:02.393000 -CVE-2024-30024,0,1,dabb051c03f81b43d8416493a51a114476e0159a5ec351f1dc83f3d88de6ea34,2025-01-08T15:47:13.457000 -CVE-2024-30025,0,1,21057b92300751aadad16c16a4a948e06523e1018675b78d47c9fe9e5d847372,2025-01-08T15:47:23.433000 -CVE-2024-30027,0,1,0dcc09c8689612ef4e141810f5fdb2bb4bd3a45aca0efcca423a06cefdc6d0f7,2025-01-08T15:47:32.647000 -CVE-2024-30028,0,1,5d659cfbdfcd545490a8507c0fb9434e9e963eec345df488a28a8271e4bad889,2025-01-08T15:47:42.203000 -CVE-2024-30029,0,1,4c948f29fa3e08ffee7027eae47f62d14458a3bf8a568e7881d80c9f4095a848,2025-01-08T15:47:58.657000 +CVE-2024-30020,0,0,eb2de9c88a26e4fdff8b9a9fbb69f65e1e1c4827bb87d27edc60e3239c77b34c,2025-01-08T15:46:24.710000 +CVE-2024-30021,0,0,33a7963d197cba861f91b7e0591ffaa981a77ea97759ddaca998052f275beb5c,2025-01-08T15:46:36.790000 +CVE-2024-30022,0,0,43667532f65ff0b53387b8234898ff9f433c199f1b2ce49500723329e760b918,2025-01-08T15:46:52.783000 +CVE-2024-30023,0,0,9416945581295109283a17eb1d99f9b17ab126301030f8415afe630cb0fe0e89,2025-01-08T15:47:02.393000 +CVE-2024-30024,0,0,dabb051c03f81b43d8416493a51a114476e0159a5ec351f1dc83f3d88de6ea34,2025-01-08T15:47:13.457000 +CVE-2024-30025,0,0,21057b92300751aadad16c16a4a948e06523e1018675b78d47c9fe9e5d847372,2025-01-08T15:47:23.433000 +CVE-2024-30027,0,0,0dcc09c8689612ef4e141810f5fdb2bb4bd3a45aca0efcca423a06cefdc6d0f7,2025-01-08T15:47:32.647000 +CVE-2024-30028,0,0,5d659cfbdfcd545490a8507c0fb9434e9e963eec345df488a28a8271e4bad889,2025-01-08T15:47:42.203000 +CVE-2024-30029,0,0,4c948f29fa3e08ffee7027eae47f62d14458a3bf8a568e7881d80c9f4095a848,2025-01-08T15:47:58.657000 CVE-2024-3003,0,0,78a766eb2a27d90e6c3a6602d7b541a446a959cc45dfa310f5acc6722fa85ca7,2024-11-21T09:28:39.300000 CVE-2024-30030,0,0,af474312cb4e960fea17e558d06fcbeafb6a2249b8210fc15006b0667069305a,2024-11-21T09:11:05.957000 -CVE-2024-30031,0,1,eaec24b86ec3c772bf18a29e2e1f2d8aee993b4ac5434ad355c9c7457557d8e4,2025-01-08T15:48:09.667000 -CVE-2024-30032,0,1,8e2db32d8091883fa385b4dcb8e37f3ddfd7572d104510c784f8369ab9736831,2025-01-08T15:48:37.563000 -CVE-2024-30033,0,1,c5e25a1167bf46fd0b5726bcb42591f65965c2b1391cac06ede50dd8a018ee9e,2025-01-08T15:49:01.177000 -CVE-2024-30034,0,1,8d8bb16b32dc1d0cf05d2093c5f3e8b850a95559ada3729f30b7d93b5b53a949,2025-01-08T15:49:15.833000 -CVE-2024-30035,0,1,da8189a989c95cce8d5f08da706fcc687c021b05179b24bb1973f6a61805d1ca,2025-01-08T15:49:31.547000 -CVE-2024-30036,0,1,c7113a79574222a795bbda176773c48ee1043e69142ebe5cda8a43517fcf8ccd,2025-01-08T15:49:50.370000 -CVE-2024-30037,0,1,f73d6ad5114cbe6a80525e62afbba48e677b916d63cf3e605483de0567bba938,2025-01-08T15:50:32.630000 +CVE-2024-30031,0,0,eaec24b86ec3c772bf18a29e2e1f2d8aee993b4ac5434ad355c9c7457557d8e4,2025-01-08T15:48:09.667000 +CVE-2024-30032,0,0,8e2db32d8091883fa385b4dcb8e37f3ddfd7572d104510c784f8369ab9736831,2025-01-08T15:48:37.563000 +CVE-2024-30033,0,0,c5e25a1167bf46fd0b5726bcb42591f65965c2b1391cac06ede50dd8a018ee9e,2025-01-08T15:49:01.177000 +CVE-2024-30034,0,0,8d8bb16b32dc1d0cf05d2093c5f3e8b850a95559ada3729f30b7d93b5b53a949,2025-01-08T15:49:15.833000 +CVE-2024-30035,0,0,da8189a989c95cce8d5f08da706fcc687c021b05179b24bb1973f6a61805d1ca,2025-01-08T15:49:31.547000 +CVE-2024-30036,0,0,c7113a79574222a795bbda176773c48ee1043e69142ebe5cda8a43517fcf8ccd,2025-01-08T15:49:50.370000 +CVE-2024-30037,0,0,f73d6ad5114cbe6a80525e62afbba48e677b916d63cf3e605483de0567bba938,2025-01-08T15:50:32.630000 CVE-2024-30038,0,0,a110458651a9eccf20a20127267985311cd4020527c39bb7fe92fbd8245e1a43,2024-11-21T09:11:07.077000 CVE-2024-30039,0,0,6d4c2a358502acece6d39ccda69e9264f55f52a713bb5953f79ee8082ca9b1ab,2024-11-21T09:11:07.213000 CVE-2024-3004,0,0,090e547619a006fd8749e79d0e05f6b17fb4b3abcde3d586f7d775d03c5b12a4,2024-11-21T09:28:39.437000 CVE-2024-30040,0,0,53137381cad4836b484aca2921dfa740d0639018920e030d4cd815e000aa758f,2024-11-29T15:41:55.210000 CVE-2024-30041,0,0,8b7ab366ce513e2fdbc80519fb27f06f87b9d5ac0b395363d51eb112c9ff868c,2024-11-21T09:11:07.513000 -CVE-2024-30042,0,0,e0a7c7febda53c56c48bb5f5eedd610e46dffebfc940987683553513f684cfe8,2024-11-21T09:11:07.643000 -CVE-2024-30043,0,0,a3260652a0abfa91a8540c43a7a3302f366e52889458028861a9aaca7266ba19,2024-11-21T09:11:07.770000 -CVE-2024-30044,0,0,3807d207e1cafdbf5a17764217d3c98d94bde20137e0382eef7150d7e2846054,2024-11-21T09:11:07.893000 -CVE-2024-30045,0,0,dd40c070c6537c88fb48533bdd0ee0696f6db6370fde1af1f61e89de5d255d87,2024-11-22T12:15:18.707000 -CVE-2024-30046,0,0,b7fffa63c92317e63be3a72ca9b9519b4128c2c543c0fbc1d09a3eb638d82c72,2024-11-21T09:11:08.140000 -CVE-2024-30047,0,0,2361a303e95d3aae19d64453f5e1331717e12b1cad96c94c374d58da80bb6c1c,2024-11-21T09:11:08.260000 -CVE-2024-30048,0,0,fabe1dcc28835b2e5092560359b2f630f2fb6832e6034da1a8a3a6bf317c1b69,2024-11-21T09:11:08.380000 -CVE-2024-30049,0,0,503f61657c47bb40b3238fd6b0c6be488b00b9bfd3f2d55bca5949d2a0749f11,2024-11-21T09:11:08.507000 +CVE-2024-30042,0,1,2ddeae73b8180fcd7b495ee7af2110afd4caf7ffe153ba2c55cd9ba91b6ad034,2025-01-08T18:59:45.373000 +CVE-2024-30043,0,1,4238deb754843aa8d72d31430a10f30c6667ebbbec7c44850b6d8f05dd2eceee,2025-01-08T18:56:55.587000 +CVE-2024-30044,0,1,c23984af5436e2f8cdb7981e48d399d742c3a14edea38f21dc44bdf3d8badb4d,2025-01-08T18:50:31.400000 +CVE-2024-30045,0,1,e0d43b7db0d4c7583415ee6575063950aa1a6b829e9e46eb1268110b9f2b1b74,2025-01-08T18:36:30.457000 +CVE-2024-30046,0,1,d4d8d29304eff59696a1e9e2074d3674114d8a9b0575cbb567eb19dd03870030,2025-01-08T18:29:04.867000 +CVE-2024-30047,0,1,e98278f4fb1557acf8bc900543cf7083e2929e6e576bcd5c5d91159085fa6644,2025-01-08T18:28:16.327000 +CVE-2024-30048,0,1,099990b86f32938d07a24f79abe3b0f64fc529f35a28e500ad48180ad1918787,2025-01-08T18:20:38.433000 +CVE-2024-30049,0,1,ca3dedc01de3a12b156f862bbd9ab8cbcab4bda2bb67d6ff66927cad9d798dea,2025-01-08T18:18:56.370000 CVE-2024-3005,0,0,ddf6cfb62d5ace4e5fe68c31f35584424789893f5e7edb1a7c030a0cf407ac97,2024-11-21T09:28:39.580000 -CVE-2024-30050,0,0,db8ddeec1ffc696afb4a553778b60e99bd20319db29734408e098bb4cb5eac16,2024-11-21T09:11:08.647000 +CVE-2024-30050,0,1,950049f3ba6b13d34cf1d35f34fac3f6307d087b3c14dd922cbd0f1b558c23dc,2025-01-08T18:13:48.903000 CVE-2024-30051,0,0,f3d7e31338c8088a249f8ce59310ac1cfeceb64ac3766a9e058b1303d7825f6c,2024-11-29T16:31:39.730000 CVE-2024-30052,0,0,feb05ec8d13faa8a370fe0b1fe28c0e714784156b747323ede30cca425a95fcd,2024-11-21T09:11:08.930000 -CVE-2024-30053,0,0,d7e19bb5494e557057fcb4a9959718186b9cd1b5f84b61a5551f15f706b105bd,2024-11-21T09:11:09.060000 -CVE-2024-30054,0,0,3749e95dcc6ed76bc187d7bac9a913699918a8611f15f95b2bce002f078a98c6,2024-11-21T09:11:09.177000 +CVE-2024-30053,0,1,65fd346c7990f2cdd0711ae82d91c16e78b5a16baa5880e2cffcb953ec779622,2025-01-08T18:09:06.970000 +CVE-2024-30054,0,1,208fd51c6e44baf0d897570f55f50e9e26e7f0682cb01924b044db6a064f4934,2025-01-08T17:57:54.547000 CVE-2024-30055,0,0,d40900a82e156b5f78aede24cf5411e3dbd4c61b795d8cc3395f093438a333c8,2024-11-21T09:11:09.297000 CVE-2024-30056,0,0,8aa59f1c85046e20ea4e64f9db9e15b47d8724dc6178c40993f015acdd8e205d,2024-11-21T09:11:09.417000 CVE-2024-30057,0,0,b9793e2532dfdaebb4194bb6e92ee863caeee414e13d6455dbf08c10146ae17d,2024-11-21T09:11:09.533000 CVE-2024-30058,0,0,20262ca43dabc2c08aa015c0c48b80c60a8e2b5adb6e58d04501640e7acc003a,2024-11-21T09:11:09.667000 -CVE-2024-30059,0,0,cc8e5a32c432ec58ce5dca0f28b2dcd91acb41f9428600f0af537d4acbe0699b,2024-11-21T09:11:09.787000 +CVE-2024-30059,0,1,3163a987284d43fc0ffca06b376cb917d6abd4a21ba6d05abf0a3e3c9f35694b,2025-01-08T17:33:36.930000 CVE-2024-3006,0,0,55404a107dd535d649375a9d24002b858b505059cc836f79e268ba7574b65f64,2024-11-21T09:28:39.720000 CVE-2024-30060,0,0,0b3e0fbc176260205ffa4a1c23582ac78ea1a8545baf3ae2da80191d1128bfd0,2024-11-21T09:11:09.907000 CVE-2024-30061,0,0,80f55abf3454e8925c1a0a0022584e693e992f5f50f9897113a65aa23914353f,2024-11-21T09:11:10.027000 @@ -254060,7 +254062,7 @@ CVE-2024-30172,0,0,690673599610e6fc17fcb2b0d34b3d19b36c3a3e806e4a07a5cc646c8560a CVE-2024-30176,0,0,aa066c55eeeca0fd6bb4beb9ec423ba6486b66e97848e6e3c1974ce9983157d0,2024-11-21T09:11:22.050000 CVE-2024-30177,0,0,44c797d5a3808fe7f3d09ed56fa89cae0d3f4a517c94d374e7585b27408ea653,2024-11-21T09:11:22.287000 CVE-2024-30178,0,0,a5c303cfe3274dddc07583df103192092e5bee518dfa7fb8388fe33b5060991d,2024-11-21T09:11:22.410000 -CVE-2024-30179,0,1,f8038176185d07e7f724f868e44725dee5d89f9e567d5a1272779cd6cb9c487e,2025-01-08T16:30:39.030000 +CVE-2024-30179,0,0,f8038176185d07e7f724f868e44725dee5d89f9e567d5a1272779cd6cb9c487e,2025-01-08T16:30:39.030000 CVE-2024-3018,0,0,55eef59a613ab68f7147402f5c864e76543302220f40dbbd97c233d873cb7633,2024-11-21T09:28:41.610000 CVE-2024-30180,0,0,9ad3efa7e683e4471ea88f07410b3c0c613e57d65ed8126b5bf9db13a8b4971b,2024-11-21T09:11:22.647000 CVE-2024-30181,0,0,4b63a15f923a825c1f6a8173bcb6b942101ded5f17f3fc266f511573c31cc6ed,2024-11-21T09:11:22.757000 @@ -254328,7 +254330,7 @@ CVE-2024-30439,0,0,2923da285e40ac77b413460851594a656c14b713556f7fe4137eb769c5819 CVE-2024-3044,0,0,899efd3fb7fec1c211d6d244a983f2138453d0f3b18e79a7ae6ae330fdec3684,2024-11-21T09:28:45.103000 CVE-2024-30440,0,0,ce439b83174a50c62c97762ce3e800d3d549e66b86a8da32234ce6e554d107a4,2024-11-21T09:11:55.657000 CVE-2024-30441,0,0,c799396597839196253fa940df42551777c9dfe0411cbff4cb86f9f56e860359,2024-11-21T09:11:55.783000 -CVE-2024-30442,0,1,ebecb678b0d9ae360e580180a171dcd851158a40e5a735d03a8e2c21a47d88d1,2025-01-08T16:30:56.737000 +CVE-2024-30442,0,0,ebecb678b0d9ae360e580180a171dcd851158a40e5a735d03a8e2c21a47d88d1,2025-01-08T16:30:56.737000 CVE-2024-30443,0,0,f98b7722ec0942e58e38bda324860eb03644a99d0c9aa79a209dff2163dae997,2024-11-21T09:11:56.040000 CVE-2024-30444,0,0,a50e61f38e9ba2a86dd287511bb6a9b78c595b935dfc33d9fbe29281eca2a0b8,2024-11-21T09:11:56.157000 CVE-2024-30445,0,0,874bdf3927970c91abad101c91c26c73f7d7792b695c4eb235e1bd01d64cceda,2024-11-21T09:11:56.283000 @@ -254888,7 +254890,7 @@ CVE-2024-31232,0,0,6f14ecdcda55c23d6d8a845ceb0f82f2d17be3c2c0bbcabea5c90258b076a CVE-2024-31233,0,0,4fef7c459d2634b1cf5aca06b55ca651e38494f7cab91e1aa63ff6e648fee03b,2024-11-21T09:13:05.557000 CVE-2024-31234,0,0,6c5fcd33cc12207a0d0c7f2dafbda68b89fe97de40de88621b1d9d9b68cecb61,2024-11-21T09:13:05.670000 CVE-2024-31235,0,0,147fab763da85000fc44bcfebdc83ac43d24ebd32a65232421e7f78e3f718582,2024-11-21T09:13:05.783000 -CVE-2024-31236,0,1,bff042f8726985fb860755bc7fb8bd63dad982446c4f38b13ffc87bc66b98f2f,2025-01-08T16:31:38.360000 +CVE-2024-31236,0,0,bff042f8726985fb860755bc7fb8bd63dad982446c4f38b13ffc87bc66b98f2f,2025-01-08T16:31:38.360000 CVE-2024-31237,0,0,66bfa9e4dadc57180a229dfe2ccba2695c9bcc4fff41697828ab41aa905d5bde,2024-11-21T09:13:06.017000 CVE-2024-31238,0,0,0e642d7f89d18d0888fabf3ea9d087b9b65d40719f7e79a76a4c068e6be99253,2024-11-21T09:13:06.137000 CVE-2024-31239,0,0,5db5a8dec6862679e5e5ef2b043410a1073eaeb51a99cc29fbd99418a0892955,2024-11-21T09:13:06.253000 @@ -255346,7 +255348,7 @@ CVE-2024-31881,0,0,e09f1658aa69d8655212ad42dabc043e14e33323dbef71ee6054873933c34 CVE-2024-31882,0,0,d2a6f85d99d53e526c3c9100af6eb017a0bbdeee04c38d09c070666403fc0f01,2024-09-21T10:15:05.403000 CVE-2024-31883,0,0,1a45197ac48a2c3087c3c1adce02986893130b17565a49d3e7eb8ceeb8e4dbd9,2024-11-21T09:14:05.113000 CVE-2024-31887,0,0,7595a9bf13d2e1c15ce814c8cb36a9167cf49ef9a4ff4ef12b17d1fa0af3b084,2024-11-21T09:14:05.267000 -CVE-2024-31889,0,0,f3ef5042fe4cfbe4b2282b2c92ab6372a53e8081f7075846cd3e8cb966c46da5,2024-11-21T09:14:05.393000 +CVE-2024-31889,0,1,8846d3c4ec41abd005b1ea31285bb37c11d55ffaacd614dd2883c87b173a5de0,2025-01-08T17:10:40.470000 CVE-2024-3189,0,0,cf3c2d45c5c1f6cc61b6d398c2f0b2f840ed23d80ea9e7c4c6d89950994902a5,2024-11-21T09:29:06.663000 CVE-2024-31890,0,0,651fa0b1e1cfc65d537ba9b852527cb69af9fe2a04587dff5261b833582033b6,2024-11-21T09:14:05.540000 CVE-2024-31891,0,0,01ff6a81cab4a69609149b5caef3f483d0f0e227ded20c94a2b847f21423d70d,2024-12-14T13:15:17.630000 @@ -255361,8 +255363,8 @@ CVE-2024-3190,0,0,bad297e304fb4b0d6eafd0a234cf1fc72af8a9c2c234dc9ef80f9a08d6ffcb CVE-2024-31902,0,0,003a18851ece455ee1e6ea2a4455c0284b8742534b1304a5388aa31d40a16816,2024-11-21T09:14:06.483000 CVE-2024-31904,0,0,d2a04e1afb3ab14e7bd62c982b1ec9fbcf0becba36a47360842f1553f25b269c,2025-01-07T21:05:40.810000 CVE-2024-31905,0,0,4f1bdfcd5321f7b992df963e233e7a11fb0781b24167b44218cf69a784597a28,2024-08-28T22:08:30.560000 -CVE-2024-31907,0,0,766c5037edcc6c2c834f4d55bbd6954e77b70d6bdf71d2c01d166b4beda2cf32,2024-11-21T09:14:06.817000 -CVE-2024-31908,0,0,b99423df6404f34750bc64b8c4574b7d4db6c4a5987445ad5dba0b24ab9eb708,2024-11-21T09:14:06.937000 +CVE-2024-31907,0,1,56360f441ba18f82366ed4eb471a5c96a8260a64fefc6012f99306629a9a97be,2025-01-08T17:06:40.250000 +CVE-2024-31908,0,1,74d2a41f6e31ae19807e7a04173849b90024608a485a3ca2443e9547826e8735,2025-01-08T17:02:59.363000 CVE-2024-3191,0,0,26fefd7ee9b00b194a72c3556380217e011fbb35712e009d8c207a4a175b109d,2024-11-21T09:29:06.920000 CVE-2024-31912,0,0,e94e3df1ade121bddb59b6e335d1c107f2b94a6c777e07a2785aa6e9b40b0354,2024-11-21T09:14:07.060000 CVE-2024-31913,0,0,0c60ce902f9bc425cc4ff385203bdf252b467675164b8e2fd4f6e5f8d5356ab0,2025-01-06T16:15:28.163000 @@ -255932,7 +255934,7 @@ CVE-2024-32656,0,0,91746b11da65d2e4ab66c01efb1a9fc2127bab853c30e98b7e74d84040f9d CVE-2024-32657,0,0,59f39b07b5b1c0f88cb39f0e150d8cacad3debd627332ced87c96ed7d67cc905,2024-11-21T09:15:24.660000 CVE-2024-32658,0,0,db3c3248ea9d579fa7974d32389abca9820cdcf8709637ec240241f605bdee7c,2024-11-21T09:15:24.807000 CVE-2024-32659,0,0,0912847c47318b99f1d2bcca6c2e3248767fd51e6b82596f75cb82243fb1d423,2024-11-21T09:15:24.947000 -CVE-2024-3266,0,0,833342b854994b3a893c8718ad0c03a3a7674ddd1ab1f643ba2b9a3f07450017,2024-11-21T09:29:16.790000 +CVE-2024-3266,0,1,e1e285869a4472fac8f2f72ce44a7752affd4b5e6c984357f4ae26b88ae9abbb,2025-01-08T18:10:17.250000 CVE-2024-32660,0,0,dcdc520d8c475a4a7e71b04ca3ab821e625a055825b00078c921b8f30a00eadc,2024-11-21T09:15:25.083000 CVE-2024-32661,0,0,3841152192536b0a1ad320fab6dde353ffc29d81a93034d63e8fb3886fa80d33,2024-11-21T09:15:25.213000 CVE-2024-32662,0,0,48e80361043f9c7a65a335f7df07874593811c4bf72e4ffe20645ee08c509152,2024-11-21T09:15:25.340000 @@ -255942,7 +255944,7 @@ CVE-2024-32666,0,0,8193abf65a97f94c8f1f4db5ad8ac7b0da33805a07a897d07db06fc991ca4 CVE-2024-32667,0,0,052324384f933eee2e5090b9fef4e66c8077dc03814fa41b1bdfa31a3353a74b,2024-11-15T14:00:09.720000 CVE-2024-32668,0,0,eb966574b22f89274f591709a86c4d2609db30bced69c95347697d9179df7da8,2024-11-21T09:15:25.913000 CVE-2024-32669,0,0,ce1cb6d9aef028e25a92d2717c0a791403e2e51f70bd8d6989345ca994bb57e3,2024-11-21T09:15:26.217000 -CVE-2024-3267,0,0,8c2e47804715170fe528677b5fab9579937f0becfb5411f009fc0d26c9635ac7,2024-11-21T09:29:16.917000 +CVE-2024-3267,0,1,4d7d26e2e47884911c253e731861b4eb9f8b33380e5d6b82302014008d6bfc33,2025-01-08T18:10:33.463000 CVE-2024-32670,0,0,65231c0f178dea86b02ef292e86d82424a7fde13a91c3ed6a2fd12210a6bd6fc,2024-11-21T09:15:26.347000 CVE-2024-32671,0,0,f92e9461041868c2292c4da4fe2ed111b4180d08c849785f27bd9d4f258821ae,2024-11-21T09:15:26.477000 CVE-2024-32672,0,0,0d89e3e1479ee790995bec31911268e6696e3620afb8e0673c6e77f748d19b97,2024-11-21T09:15:26.653000 @@ -255973,7 +255975,7 @@ CVE-2024-32694,0,0,3623bf20aaa672f54622ebdf55253354aea4bb07c3f303f16da3a0d19c879 CVE-2024-32695,0,0,44a7fc182b60a54ce17816c78970d3c6117ed56f7dacb8fa693ce5786966b34b,2024-11-21T09:15:29.800000 CVE-2024-32696,0,0,f2b333922479b150dc2827f698685081a20ac72c577c67bfe7cb8282745ccd4f,2024-11-21T09:15:29.930000 CVE-2024-32697,0,0,3932fdb16a80d1592d870bba832f62b51f8424569416f3c57d4590a44b02ea4c,2024-11-21T09:15:30.050000 -CVE-2024-32698,0,1,76a74e569095f7c4efad69678b1e65c469a378ef9bf5fb4a04a33e5e7ef10e6f,2025-01-08T16:56:44.690000 +CVE-2024-32698,0,0,76a74e569095f7c4efad69678b1e65c469a378ef9bf5fb4a04a33e5e7ef10e6f,2025-01-08T16:56:44.690000 CVE-2024-32699,0,0,bab6e7e3349863a2832e55576d6e52ab4f11cabbd6ef78796448377868df46f0,2024-11-21T09:15:30.310000 CVE-2024-3270,0,0,101e0181065fe551bbc56017a40a79ecd11a8e7a028494b82987dc8fe5d66ddc,2024-11-21T09:29:17.263000 CVE-2024-32700,0,0,f50e020916fa2e1cc1ac1e02ad40ae579404486f1181eb577649cdaf1b5318ef,2024-11-21T09:15:30.443000 @@ -256147,7 +256149,7 @@ CVE-2024-32864,0,0,8024288cba2148f7d07e88b0d46465ca5be1417dd81cf1fc700c4b31dcaca CVE-2024-32865,0,0,4fdbd8a131bad8f2bc06ad8d7aa6ce852b51265c8becf1e2bcc51885b4afec49,2024-08-09T19:02:33.167000 CVE-2024-32866,0,0,348d874a258798029ff03a383326f9c8553cf1168c21d905212c7e2478faad1e,2024-11-21T09:15:53.583000 CVE-2024-32867,0,0,335f21f9c9657ebec01f605f0ad2a08d5f373d9cd74e792c277c15be71b3ad1d,2024-12-19T19:48:46.393000 -CVE-2024-32868,0,0,a540e313705256550137639b6cd72f30557f4f8cef2a624651d48b4ecfc963b1,2024-11-21T09:15:53.900000 +CVE-2024-32868,0,1,7c87f35c6c09da847152d291f2fc2c9abb2b13b3628cff035ca515b3dbc1dd16,2025-01-08T18:21:50.550000 CVE-2024-32869,0,0,f04e610bd1fbf8495fc24695345adf8e32137fdfa40558c82545cbb975de6c73,2024-11-21T09:15:54.040000 CVE-2024-3287,0,0,e70d022764b46c93f0cd3392480e46a9e4a94f083b615241cdf1d370388d7956,2024-11-21T09:29:19.453000 CVE-2024-32870,0,0,2366e88eb8f1fcb7a8785c0c9713281b84da1260e6c9f739d5e3a56f464fbba5,2024-11-13T01:07:24.057000 @@ -256246,7 +256248,7 @@ CVE-2024-32963,0,0,da06dad0a0d4088cff2b66bbdf37cf3430ec6e846a19732bf4dafea3931f1 CVE-2024-32964,0,0,53cff567a9cf10210c25e54df558440c6d1ba3270630ed04ddf537830e1546e4,2024-11-21T09:16:07.637000 CVE-2024-32965,0,0,5b774412bf583d334262bfb1e4f2f6a704ffbf31854c16be83187ab88aabd736,2024-11-26T19:15:23.343000 CVE-2024-32966,0,0,ed6fde53cd05a56e5cc03e00b905deca375edcce1c09ca16ff73bc50c9c19f9b,2024-11-21T09:16:07.767000 -CVE-2024-32967,0,0,a953ea51baf3bdc03b038270735965aeb24c0eab360c4239fff31ae214ef2feb,2024-11-21T09:16:07.900000 +CVE-2024-32967,0,1,a25e93f3021334137db9330c5f0a7cef1cf436364cc7ef4ad3b59f40a5660db0,2025-01-08T18:30:33.600000 CVE-2024-32969,0,0,0e37b9915860a1d1eba563a121b63dba3b4ff64149a529c895220d0c13f441c6,2024-11-21T09:16:08.023000 CVE-2024-3297,0,0,8893f5e1e7a6a140158e1f007a7ad6700a8504d26a34fc35fc6a99c921a59649,2024-11-21T09:29:20.620000 CVE-2024-32970,0,0,e1984ac8e430168e51893136bbc3e55060419d74f501ac3cd034192f1071b327,2024-11-21T09:16:08.173000 @@ -258040,7 +258042,7 @@ CVE-2024-35522,0,0,2626616769563e7a96297f39345d530eb58b02f356a18fe02e8e08a2db8a5 CVE-2024-35526,0,0,de3a832d01072d880b0e7f865e64ed7d95d3fed5f854bbcc2e5b8cb7231ebca2,2024-11-21T09:20:23.833000 CVE-2024-35527,0,0,d802d5954ff7f9b39a6b2dc0af26915bbf794a29707ccef9cebcfa3c1be1edad,2024-11-21T09:20:24.040000 CVE-2024-3553,0,0,c997e76340d2569cee154991e02a7ad2e13c17e9507753eb8dd6bd1059f541e8,2024-11-21T09:29:51.813000 -CVE-2024-35532,0,1,d5dce768c0b30ed331525ad1922860096f653a705b5e81a17d6f30025af1dd0c,2025-01-08T15:15:17.793000 +CVE-2024-35532,0,0,d5dce768c0b30ed331525ad1922860096f653a705b5e81a17d6f30025af1dd0c,2025-01-08T15:15:17.793000 CVE-2024-35537,0,0,21d93b44cce1e0ea0c269b874880ed5b770c1a2fdf35d7de97a57a169f267fd1,2024-11-21T09:20:24.273000 CVE-2024-35538,0,0,1466111acec37e4d2df7289bfbd264c0429fad437a46245bcd2bfb14bbd7c76d,2024-08-20T15:44:20.567000 CVE-2024-35539,0,0,4f279216ce5454db3adbdb46420f92fade8a007bf9e1d3c6bbc30aa69408e3de,2024-08-21T14:35:10.017000 @@ -258080,7 +258082,7 @@ CVE-2024-35591,0,0,0cb889b29f6690f8b16ac299f92825df07699606193b71b187dfc1e5ac097 CVE-2024-35592,0,0,e6fef64de786ac29c80e79f76443c13d6391b8c3dc4253018d62a8feb4f8835c,2024-11-21T09:20:30.733000 CVE-2024-35593,0,0,91dcda4b6eb9e36336ff5f21e45be42b4410cbde9e6c00e7ab19e173d2ca669c,2024-11-21T09:20:30.960000 CVE-2024-35595,0,0,ed19450d89ea0f5e939a230190c62bcdcc5cc3f271196e7ee45a9c064bc5fa31,2024-11-21T09:20:31.177000 -CVE-2024-3560,0,0,8ed707b11a3959cb269585b5e7702362bcecfce248adf7f1ee8ae331e16b60ac,2024-11-21T09:29:52.617000 +CVE-2024-3560,0,1,c397428cfcb9b5f18b3a90eac4419a387b27d100babfed08ae37c835d54a300b,2025-01-08T17:25:20.823000 CVE-2024-3561,0,0,88f3e14256d827f46421032889c1c5cda4496483f1001600d1896efa64027275,2024-11-21T09:29:52.747000 CVE-2024-35618,0,0,86fcbce4eb035f60808d5accf542869518cdd99394694db30f159b5f58d7d866,2024-11-21T09:20:31.393000 CVE-2024-3562,0,0,9c9f57c5460d61dfdd495d1b087a7861097e9d1e1b57cf14e2455042c8f7bd8b,2024-11-21T09:29:52.887000 @@ -258466,7 +258468,7 @@ CVE-2024-35976,0,0,e54b83ebdae1b78b335c6669c6f07edba32fd678644b60a19e36075d50215 CVE-2024-35977,0,0,123429e4d97cec1bf1813324968b35c8cc45aad0f17c69fdc01fbd294532471b,2024-11-21T09:21:20.613000 CVE-2024-35978,0,0,454b5f38fcf94da8a14587a7c8869850b14e624b1555e8c5359f80cfaf7c7c5c,2024-11-21T09:21:20.740000 CVE-2024-35979,0,0,13f96c4d683b1bcb5a3397987190b01b6c6ca497822d8af239656a6bc63e2b1b,2024-11-21T09:21:20.893000 -CVE-2024-3598,0,0,97954666652922fe86e16e7a90212919f5c305954fb5df8a4f8e623528b20a7e,2024-11-21T09:29:57.437000 +CVE-2024-3598,0,1,119ef9f5041f661536a93962da8549d2898a293c6c446964f2fd4168e3c1d071,2025-01-08T17:26:13.300000 CVE-2024-35980,0,0,3111d7ffa21a44e22a4b11db583466d1a024bdb995edea69f44a4a219621a61a,2024-11-21T09:21:21.040000 CVE-2024-35981,0,0,2935e67e0c7016a6a5c1c59b500045dc906210d41e41d6245f89da6fa3127d2b,2024-11-21T09:21:21.163000 CVE-2024-35982,0,0,ffc0591ff45e47ac4517cfe2ad4e5279acd4b701b9862173d0d4a17749d9809c,2024-11-21T09:21:21.300000 @@ -259660,7 +259662,7 @@ CVE-2024-37460,0,0,d49f6672c77d9335ba853d157c907d4557b655a080b084cc4c3c4d6c1d665 CVE-2024-37461,0,0,48459be0d23592b9634fe5e9e7fa9669c06c928fe927cbbd1ff2bc7e40f1488d,2024-11-21T09:23:52.827000 CVE-2024-37462,0,0,3d81afb049cf58b9fbcc57ea0f6d417bbdb6a60b236fd8d955aba7966527bf7c,2024-11-21T09:23:52.947000 CVE-2024-37463,0,0,0c9e3e9c69dc3b295f36153ab7d590b32c5c3df64d79ba1d89febb04fd4cb96e,2024-11-01T20:24:53.730000 -CVE-2024-37464,0,1,92cd51b919c681b283bc866665ee917ed837d0beb17e895ae19b7b7aecf2a2e7,2025-01-08T15:58:49.923000 +CVE-2024-37464,0,0,92cd51b919c681b283bc866665ee917ed837d0beb17e895ae19b7b7aecf2a2e7,2025-01-08T15:58:49.923000 CVE-2024-37465,0,0,b0ecdc7b82d736b5ea68d2799308ae038a5de79d78d091c99e47d068d824b1df,2024-11-21T09:23:53.320000 CVE-2024-37466,0,0,15fbd8302b54cf76dcf3489b124c8132e7d1fe29ad5c3affe1b94cf346981a1b,2024-11-21T09:23:53.463000 CVE-2024-37467,0,0,ae9b81f57e9c702fa540b027b391baef01f1155f5fd7702b5d7e9246b9cca186,2025-01-02T12:15:20.590000 @@ -261023,7 +261025,7 @@ CVE-2024-39226,0,0,b8c0b3ad8490d4a5be764fbced8d4410e26e6c46e0d16aecb7461fcf33332 CVE-2024-39227,0,0,d180670ff6b1d7372dc5eed38b426d2d0535f283f8a4668a29746b0a4f85bc7d,2024-08-15T16:15:19.650000 CVE-2024-39228,0,0,fbe3b6960a96eb9fe32fa4f66a18a01501aaf645ebdb56b0fabd0a3df25fbae5,2024-08-15T16:15:19.800000 CVE-2024-39229,0,0,0ba144b76379836690d752be3610500a97e8f48b21df7b8b41b34939068fed7f,2024-11-21T19:15:09.887000 -CVE-2024-3923,0,0,52ac95762840d4d014b7949dc5a341ec2cea227f4d165f3e8e3bb68a003c0e02,2024-11-21T09:30:42.610000 +CVE-2024-3923,0,1,e5df35773bda20ed72d01c5fca237e586010813c9a75364a918eb66db931fa08,2025-01-08T18:43:59.440000 CVE-2024-39236,0,0,5e94994c95168f463ef8d7eb7fbdb134133f68838b3416c347f6229125283e73,2024-11-21T09:27:21.240000 CVE-2024-3924,0,0,a7d7d2f179b70fee660a7c5121a05bb1bfb909c2c19095cfe92531fde96543ed,2024-11-21T09:30:42.713000 CVE-2024-39241,0,0,62f2aa86038a75db9f42650078b01738271c6f6139d6a16667450f1373f6b200,2024-11-21T09:27:21.467000 @@ -261417,7 +261419,7 @@ CVE-2024-3968,0,0,ab7ceb38b88897743ac0d865e5cc6425f384c32e665a3f6d64b2fbfee4af3c CVE-2024-39680,0,0,a3d66acd865338c22d95f3d0435c23c1bfc2ab2eec05275bc3b199da58784939,2024-11-21T09:28:12.453000 CVE-2024-39681,0,0,67076dcc661c5600eccd416d4149292cec159fbd4f03afb9bb52918c7919d5ad,2024-11-21T09:28:12.573000 CVE-2024-39682,0,0,5f14159aaee284985ffd033171b86285b61047163734ee13ee538a1abc6332a6,2024-11-21T09:28:12.697000 -CVE-2024-39683,0,0,8c732e26ba0d42fb522517153c029a83eb343286c5839f24dee75514050ba06b,2024-11-21T09:28:12.830000 +CVE-2024-39683,0,1,e54fd7af2f0712b4eae297839c852f7ac8656a0041e0bff7e4a29cb6fd214320,2025-01-08T18:24:07.627000 CVE-2024-39684,0,0,c57314a0eae110d16c00dfa33f3f1fb243b69a46950f1d9a3816d8cff956556e,2024-11-21T09:28:12.970000 CVE-2024-39685,0,0,5faae2a25966aa52e2cdc427c23df743b7059f0aadb369dfd40104df0f6d3481,2024-11-21T09:28:13.100000 CVE-2024-39686,0,0,4c0d49815593c35be978e09a72cc87820f4cb6eb19ea107476f4468b42201e33,2024-11-21T09:28:13.253000 @@ -261936,8 +261938,8 @@ CVE-2024-40744,0,0,500374d1b7dcc6ceb47ed346384bf42b0fa553630fa102e80407350b833dd CVE-2024-40745,0,0,cd13ff95b3dae5558dba4f85299c61c29cfa0dd17dc355a880cf8c9b4262abba,2024-12-04T17:15:14.097000 CVE-2024-40746,0,0,28b5eac0696e1aa464ec2af9223be9793b0cfde2d3c3c98b18ce12186dc2b572,2024-10-29T15:34:22.100000 CVE-2024-40747,0,0,4ac0d947ad350f4ce82e954feff0a48ad670b67ab2a398cf1268d1edafd92d56,2025-01-07T17:15:23.430000 -CVE-2024-40748,0,1,abf90c4a5f747b6ea6823573814ba0262b5d0894bdb2b8697e4dd39962589ed8,2025-01-08T15:15:18.110000 -CVE-2024-40749,0,1,c405cbf3b6c51507764336f24786cbc1b6ca573aa63846f0db1ff789b26cf01c,2025-01-08T15:15:18.400000 +CVE-2024-40748,0,0,abf90c4a5f747b6ea6823573814ba0262b5d0894bdb2b8697e4dd39962589ed8,2025-01-08T15:15:18.110000 +CVE-2024-40749,0,0,c405cbf3b6c51507764336f24786cbc1b6ca573aa63846f0db1ff789b26cf01c,2025-01-08T15:15:18.400000 CVE-2024-4075,0,0,6c653a7c78c4e11129adcbe0518ad6a07843b29f0e234c98fb05402925f6c893,2024-11-21T09:42:08.680000 CVE-2024-40750,0,0,c491090d917045d507fa28976c97558943f972457181ebb36c0ba9aa25c97d61,2024-11-22T19:15:07.113000 CVE-2024-40754,0,0,bd9d6903684af54e3d4f528bdae88b70db33043ddc74f4404f7d893dbc9cb397,2024-09-10T14:35:04.833000 @@ -262044,7 +262046,7 @@ CVE-2024-40863,0,0,efb999a6b55f80944461931ebc68c2cef1f3d64950cbe5d16a1146f61077b CVE-2024-40865,0,0,abd5d84a65bf1302ff2cfe864de28885ab20c66492005af9a62953803902c667,2024-09-19T17:58:37.370000 CVE-2024-40866,0,0,37c5b82377ad631e6b48a756c17f64865cdbebad5f3491debc1baa242c6b7a96,2024-09-24T19:02:09.850000 CVE-2024-40867,0,0,8601cb8b0c811f09acfb455bf7c1672afe97c43c8dc9da2ce2d48e4ae43c9eb8,2024-10-29T20:35:26.040000 -CVE-2024-4087,0,1,5d71d9d5c6a7fc0c96af8c894d31eaa355a909daeef0a71056a96d7699bebfcc,2025-01-08T16:49:54.677000 +CVE-2024-4087,0,0,5d71d9d5c6a7fc0c96af8c894d31eaa355a909daeef0a71056a96d7699bebfcc,2025-01-08T16:49:54.677000 CVE-2024-40872,0,0,106c56c655b8aa3b981616dfaebe13acb1900ab261808e9a25876faae11bc34f,2024-11-21T09:31:47.340000 CVE-2024-40873,0,0,aa70099da3a2b57fc7692a41f25befffc1d9d9e7c4e118e66794004c0e878cea,2024-11-21T09:31:47.467000 CVE-2024-40875,0,0,4c431a6e01f03f609254da17abb3470fe9993e1f6c6e2a9d3bfea01315b0b228,2024-12-20T21:15:08.290000 @@ -262476,7 +262478,7 @@ CVE-2024-41468,0,0,10bf02a4bb290678b06592c8c1b3227ccfabee3baa4072ea0f6b7fc4b45e9 CVE-2024-41473,0,0,29d4e7b54fb4126a361ecc042f6a7b31e6afda88ff19b4c6fc756b4a5212f348,2024-11-21T09:32:42.720000 CVE-2024-41475,0,0,b8be933a7b93d0c1cf4b6c4176e5022fbe4f2cb5fba128f6278ff8ebfcb5d463,2024-09-18T18:51:25.513000 CVE-2024-41476,0,0,36071a8bb76fa7000bdd44fd6508ba17d20e4aae8303bd257093c61563aaa3c3,2024-08-12T14:35:13.627000 -CVE-2024-4148,0,1,1a56514a5b753ece576cf3a7f0a5ec8389dd254f80966fc371a4aecc92222acb,2025-01-08T16:29:40.813000 +CVE-2024-4148,0,0,1a56514a5b753ece576cf3a7f0a5ec8389dd254f80966fc371a4aecc92222acb,2025-01-08T16:29:40.813000 CVE-2024-41481,0,0,6eb5de345a9525c442ab97a24184da0c8a5a6c01c4d00868ab2a9512a25cc800,2024-08-13T14:51:33.017000 CVE-2024-41482,0,0,58ae3affe6e4394d947e5aa2d9dcb7a3ce735382358e46a1f77100da98d84172,2024-08-13T14:51:43.163000 CVE-2024-4149,0,0,f45d768064d804412c5499f92694d8be86562e7ca241a43abd934c3f16fce1ed,2024-11-21T09:42:16.890000 @@ -262815,8 +262817,8 @@ CVE-2024-41949,0,0,ba00371f44252e55246d1a7d2f5fa0dfa7605953cf6a28d48eec18833be56 CVE-2024-4195,0,0,11509b5aaed5cb8912c4d90378cb4c3de8386a219b03f46a1d8b69b0997419e2,2024-11-21T09:42:22.097000 CVE-2024-41950,0,0,bc9430e4d846b2a2800044ac6fe10a43cb3774ebadb2a5a31c3cda90548951f0,2024-08-01T12:42:36.933000 CVE-2024-41951,0,0,2ee54059fd4d374a872e7931321067a7220bd37d5b9e5493a9e6aa0f31880468,2024-08-01T12:42:36.933000 -CVE-2024-41952,0,0,1c9497c9ed8bb706a6052647d70716d38a22033122dee3fa3b84cdebc8f95cb2,2024-08-01T12:42:36.933000 -CVE-2024-41953,0,0,457ad29834b5013b70bdf6323f223e541abbfd4b95949d53d0bd38f67d7025d6,2024-08-01T12:42:36.933000 +CVE-2024-41952,0,1,344b67531bf1cb0b21aaa47cb3c963fd3bed88ba0b4b12d9566df97fa0711aed,2025-01-08T18:27:21.500000 +CVE-2024-41953,0,1,5d15745cb7a6ef234b60e7d5e72d914878eaf08ba4b879cfc219b905b68157d6,2025-01-08T18:29:25.370000 CVE-2024-41954,0,0,ba4ec10fdfcdb3218e2fcc328a145a19ee6ffec4b4dc0808f87f19728d7a3a06,2024-09-05T16:18:09.940000 CVE-2024-41955,0,0,d6f09a009224fd65a9e34983dd336210304a962e167d7cba04b53741d8044ce8,2024-08-15T14:10:40.157000 CVE-2024-41956,0,0,5e680f8eb542fda81d1f4993ab3aa0701a585ba951699e4b103a764c9e5f4502,2024-08-02T12:59:43.990000 @@ -263944,7 +263946,7 @@ CVE-2024-43415,0,0,5a4e5a3aa10caa0938c29e25e546071550f87b677e0e2bfbe801097e243e3 CVE-2024-43416,0,0,2fc12b328347487003a10a9144d0427da1c43668f15962d7f0305543cbb3040f,2025-01-07T17:05:20.757000 CVE-2024-43417,0,0,a64db853aab641666e5ccd36b5774318b1b87e33ceca621611b145b74c8ae52a,2024-11-20T15:21:07.650000 CVE-2024-43418,0,0,4070430691b02a9c3a3480d7781582dd0e8dd4d964b3db2f1a26ad5f03bae23d,2024-11-20T15:20:43.297000 -CVE-2024-4342,0,1,282558c76df5bcb3009222bdb45a6cd86ea77fbc4b5b09640c455d3443a4a75b,2025-01-08T16:34:29.273000 +CVE-2024-4342,0,0,282558c76df5bcb3009222bdb45a6cd86ea77fbc4b5b09640c455d3443a4a75b,2025-01-08T16:34:29.273000 CVE-2024-43423,0,0,316b19bda13e21d020d2eec730832f82508abb99f2b62220b1f20850af40fe86,2024-10-01T15:41:32.537000 CVE-2024-43424,0,0,cc0f47c54bc4c371470b3c35d0c5f93b67809f67fdaa7990da8d6cb4b234c505,2024-11-05T19:39:33.873000 CVE-2024-43425,0,0,ae032f6cc4b0d89178b4cd7f9d5f3877292e13c149984e52fcc22e387b15bf99,2024-11-08T19:01:03.880000 @@ -264490,7 +264492,7 @@ CVE-2024-43992,0,0,42a7ee04db8a57a50fda5617d60043a834125c658b5ba9ade4a4d928ada3a CVE-2024-43993,0,0,d79801a8377f30d47468ceff180d9e81a9411d332e3f5a0a2b01a1c65d4d0ad4,2024-09-25T13:44:39.917000 CVE-2024-43994,0,0,7aa64100d3da38cac194599de0781ed807c09379c2aeb88a9fa942447d419b36,2024-09-25T17:09:09.230000 CVE-2024-43995,0,0,ffaec0829e7a3994249866fe3a3dfb3c5cbd7d5ad653ebe30a3d0eea3ddbdc71,2024-09-25T20:01:53.380000 -CVE-2024-43996,0,1,844ee29b58ab633f072665fd41d2e688e12b259d5dc7abdd9b55f7b7131ec306,2025-01-08T16:16:57.593000 +CVE-2024-43996,0,0,844ee29b58ab633f072665fd41d2e688e12b259d5dc7abdd9b55f7b7131ec306,2025-01-08T16:16:57.593000 CVE-2024-43997,0,0,e931018cc34ba0edfc8c2590b7469ab9b1bb6fcec646eaeb92588c30192c3f92,2024-10-18T12:52:33.507000 CVE-2024-43998,0,0,aa13d8b779d2439b4ceb62964005ff000587152001c076d770f87fe671d46c03,2024-11-08T21:11:32.880000 CVE-2024-43999,0,0,d389f9e09f0122e270b929ec3a2d44dbd6496c0a503dd335f2c7a2d8dd2783e7,2024-09-25T15:15:43.683000 @@ -264765,7 +264767,7 @@ CVE-2024-44296,0,0,5fa9d13f224f3a0a67aaaa3541de4a3651fe9910d7529312fb8483d35af02 CVE-2024-44297,0,0,15b11a1a880cbcc6b8dc8f6c7e90f9afa6080bf98d20fe4b15a67c3ef7cd8eaa,2024-10-30T15:35:17.777000 CVE-2024-44298,0,0,64784e81947396c199d7c1d021c6b05802cd1ece1576c434a521b3dd9f3dca38,2025-01-07T19:00:43.213000 CVE-2024-44299,0,0,3fad1e1fc6e494d5112c8007d008afd8a0cdb0129eb46588d4ade8d86481d2e9,2024-12-13T18:47:10.657000 -CVE-2024-4430,0,0,cd2b5f6c22c5864ef6fbb53b96bda6b69614cea20c5eca84025328f7be701bc0,2024-11-21T09:42:48.940000 +CVE-2024-4430,0,1,2a2d41a9a530b06685d6b2d35040ed23f62b64880e64642449fce3314076cd9b,2025-01-08T18:43:41.327000 CVE-2024-44300,0,0,bae43a573b0fc5576aad7e68076991c0fff3f7113750dddf3be341943a7729db,2024-12-20T19:15:07.507000 CVE-2024-44301,0,0,10f1c2e87bf42ace95d4c598f50b3f632b94819bfa4a1517624dd03460e1d549,2024-12-12T18:06:12.680000 CVE-2024-44302,0,0,8e2df0f8c8bbf990ae9e0c0188d5dc060a503901afef39bb207c003562ed13c7,2024-12-06T15:15:09.050000 @@ -268813,7 +268815,7 @@ CVE-2024-50413,0,0,bd4b287f3337bd55ee29b87110326b0698b9735c4c15d49ff893b975e52c5 CVE-2024-50414,0,0,e8f83212518d1814cdb913d515fc32a692ef784b5a45ba02d9fbbe301014d6d0,2024-10-29T14:34:04.427000 CVE-2024-50415,0,0,ecdc858cc870df8cea44a2c3699e9e7c95ecd5f9077c9b55069a30599910f968,2024-10-29T14:34:04.427000 CVE-2024-50416,0,0,1133815dd0ab2d74dccecc9841236eb0695bf244664f1d2e85f8870e053472a1,2024-10-29T16:02:10.660000 -CVE-2024-50417,0,1,549ac30bb444c5999ab3c901abd14eb820bdc3ff6d00009dbf5b1941a2ed21fe,2025-01-08T16:20:13.667000 +CVE-2024-50417,0,0,549ac30bb444c5999ab3c901abd14eb820bdc3ff6d00009dbf5b1941a2ed21fe,2025-01-08T16:20:13.667000 CVE-2024-50418,0,0,6b14b3794b9a3ea8d1c29f562e6d13cc35d8bff6ca5a621ad7056e95c10437d6,2024-10-29T14:34:04.427000 CVE-2024-50419,0,0,46249b29929f6ef8bd124c172ecc1dc44f512c10333fd96ae4d06cf101b5d356,2024-11-01T12:57:03.417000 CVE-2024-5042,0,0,0d0d16b9418f5aa452537f6467ea8b7ab398fb59d6349b3c352b21cbb83e2717,2024-11-21T09:46:50.500000 @@ -269025,10 +269027,10 @@ CVE-2024-50653,0,0,c3c2eb452e8edda9530908359ecefe1b49303fe46316e9194f74a85e37342 CVE-2024-50654,0,0,5fcda88001562dfee1e6cc60fc3a7e9ed1e6a24d11c939faa9c604dfe739ca92,2024-11-21T19:15:11.113000 CVE-2024-50655,0,0,1459d7257280aa2e8bdcb66b80527b54cff1ac83583af5c95b1d9f4626d5dfc0,2024-11-21T09:44:54.133000 CVE-2024-50657,0,0,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000 -CVE-2024-50658,0,1,73ac0501aca90b0d1c994980db41c5a58be35ef1940a0591e3d997dcd72d43f6,2025-01-08T16:15:34.413000 -CVE-2024-50659,0,1,435d0e21d7616ff9ee8745b77d1c306c5b9d1a2f4b510cc7aca05f20bf5253de,2025-01-08T16:15:34.597000 +CVE-2024-50658,0,0,73ac0501aca90b0d1c994980db41c5a58be35ef1940a0591e3d997dcd72d43f6,2025-01-08T16:15:34.413000 +CVE-2024-50659,0,0,435d0e21d7616ff9ee8745b77d1c306c5b9d1a2f4b510cc7aca05f20bf5253de,2025-01-08T16:15:34.597000 CVE-2024-5066,0,0,0791653545be3944782f3bdc7c1ab3604d2c7f0fab82f79e00981952033549de,2024-11-21T09:46:53.670000 -CVE-2024-50660,0,1,e65e3c5244699be332549a6d9ef31cecda7ab67b207af15130a73859b07f2160,2025-01-08T16:15:34.817000 +CVE-2024-50660,0,0,e65e3c5244699be332549a6d9ef31cecda7ab67b207af15130a73859b07f2160,2025-01-08T16:15:34.817000 CVE-2024-50667,0,0,2acba17bb6b4eea051169d8d69b68e53449d255d2507f74a89d880a87e24dc78,2024-11-12T17:35:12.270000 CVE-2024-5067,0,0,1b5c70fd6aa8a713385c4f1e29f8c71eeaa98648b5736e6e39376f75e3abb922,2024-11-21T09:46:53.810000 CVE-2024-50671,0,0,99782c17088a8d91d172d01f5a082085329526fd6f7189288ae0f91a8aaa1a9a,2024-12-04T17:15:14.860000 @@ -269327,6 +269329,7 @@ CVE-2024-51431,0,0,828fd39fe0bf7bfec25d83e9c0a08cb7b9c4b5cc6704676ba7781e14660e7 CVE-2024-51432,0,0,90d6088b4b691a13d46bf67decae9a8dc78d3184ac661e87666bdc2bf7a4111b,2024-11-04T22:35:10.037000 CVE-2024-51434,0,0,fd0f2e493c6557b3a7b75698795afa3b125b8838b7989d6283ab0195617010c3,2024-11-08T19:01:03.880000 CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000 +CVE-2024-51442,1,1,06f26d6df06606b7a8ea2b5062dc209bee49de78a51fab87ef18c085adf75386,2025-01-08T18:15:16.650000 CVE-2024-5145,0,0,1ce6a725d120216d833ed23f25099d9f4810ecb9d4c63ffcf11012cbf68534d1,2024-11-21T09:47:03.920000 CVE-2024-51460,0,0,0d1d0884deead80ce10e102d7fe3745fd378c1bb1816cc36f4177c2f9263fd37,2024-12-11T13:15:06.510000 CVE-2024-51463,0,0,c0364c05afe1e0b2d0890e7f96c1b512b7afe4d3c2862d4a930e0585099ce1e6,2024-12-21T14:15:21.453000 @@ -269340,7 +269343,7 @@ CVE-2024-51472,0,0,7bdead71249065fcbd818917368b77d15bccf70ee70ae6963c84c47575e93 CVE-2024-51478,0,0,f0595ed35f1f283d907e9d623fdb50e27981165a57dcab6e98c75f63ec12b3b4,2024-11-01T12:57:03.417000 CVE-2024-51479,0,0,cb129c5fa9252110468d8449b172cda17bf48af7dcff3fe804fa3e07241cca0d,2024-12-17T19:15:06.697000 CVE-2024-5148,0,0,f40c04de71d66c8857441b50b10a14db507d29d1691198e2bceac6bdc772cfd5,2024-09-03T12:59:02.453000 -CVE-2024-51480,1,1,5634664dd484972b7bc5443f022bffdd8950d35587589d61dc205a04a532d21a,2025-01-08T16:15:34.993000 +CVE-2024-51480,0,0,5634664dd484972b7bc5443f022bffdd8950d35587589d61dc205a04a532d21a,2025-01-08T16:15:34.993000 CVE-2024-51481,0,0,83094151def53bdd7b20b08694eaa3e2ea765e6cd9123a6af8b2435defbf5135,2024-11-01T12:57:03.417000 CVE-2024-51482,0,0,cbc1fc8da81cca1505f36c0f1154509470eaa8654cfa8f7bc9fc64f67fae91d0,2024-11-05T14:15:14.840000 CVE-2024-51483,0,0,fa3125bf4200bbd556b6245d913e02934637abfcb5898f415b371150065c77e1,2024-11-01T20:24:53.730000 @@ -269596,7 +269599,7 @@ CVE-2024-5173,0,0,090e48f75343bb69589a840e25ae60a8ac00187572b68cf38125a567b358b8 CVE-2024-51734,0,0,c7b97e928c8850d54c2fdbd4124a5548ebb3a9718f17988908d6f3c7921c071a,2024-11-05T20:35:26.167000 CVE-2024-51735,0,0,48473e5db4cd5ecc77914f0341bc3fe19cd3b449987f541b0b758a8a1a3f060f,2024-11-06T18:17:17.287000 CVE-2024-51736,0,0,29e0c9e964880fe165f986cd62daad2610accc1f9fe0e31c385a89c289e90f1f,2024-11-08T19:01:25.633000 -CVE-2024-51737,1,1,b2ade7657240ff3de094039bdb3431a3461e6116aa763c4de2d1ed23830c79fa,2025-01-08T16:15:35.170000 +CVE-2024-51737,0,0,b2ade7657240ff3de094039bdb3431a3461e6116aa763c4de2d1ed23830c79fa,2025-01-08T16:15:35.170000 CVE-2024-51739,0,0,4a842171b608b06417875a07ea66bc940b2544517c02b0c89638130ff781c875,2024-11-08T15:56:18.753000 CVE-2024-51740,0,0,aa733ae0827e15b33ac1bc93d1e5306d2cfe3763dcbc15868bfbaab35851c4a6,2024-11-08T21:09:45.387000 CVE-2024-51741,0,0,2be0e53602dfcfe6f957cfe0f310cbadb641cb6bb28c1b3dd9021c8a1c89f290,2025-01-06T22:15:09.827000 @@ -270619,7 +270622,7 @@ CVE-2024-53222,0,0,f47a5510f6b23d61cde71f55aaf5c70eb4fbab132cd4c256d01cfe97bfe4a CVE-2024-53223,0,0,1fb9775898b8edbe24341acf3f71ecbe157ce3c086c57964866b83250fee9b02,2024-12-27T14:15:30.453000 CVE-2024-53224,0,0,336b7f256f93ca4c42653234db59c438e5694f32d74f85e7f140e28d6a850d12,2024-12-27T14:15:30.583000 CVE-2024-53225,0,0,54a582b699de817df243bd1fa3b72bd7fcc44132f78acb35cb6f8a61ed85e2ca,2024-12-27T14:15:30.687000 -CVE-2024-53226,0,1,4afa77721d61d6f8ca05d58b3da0677231dc8df76dc3e76d4b714129740520ab,2025-01-08T16:40:59.597000 +CVE-2024-53226,0,0,4afa77721d61d6f8ca05d58b3da0677231dc8df76dc3e76d4b714129740520ab,2025-01-08T16:40:59.597000 CVE-2024-53227,0,0,966c942f82ff1c93518341256ee912e0a79f64d2ed5dd2fdc9b3e97d00ec6479,2024-12-27T14:15:30.937000 CVE-2024-53228,0,0,b1ea1e0d5f0693bcf931d26e972c20e7ef3af5cd7c48fd90aa6b16f88a533676,2024-12-27T14:15:31.057000 CVE-2024-53229,0,0,a74230d15d8357e8999d91897a965ebf07017f726c655955763713cfc55a9ac9,2024-12-27T14:15:31.163000 @@ -270631,7 +270634,7 @@ CVE-2024-53234,0,0,74235b9bba8c6fa335f832d794b846a6cdfc4adf175080c7f64bc2837d1b0 CVE-2024-53235,0,0,0c72a9d02c4c1323ac68c14078ff2fdc579770d6094d03c12233e24c514bf29f,2025-01-07T16:02:48.350000 CVE-2024-53236,0,0,7fb60b41991b24fab1f4d66c148092639a1f6c1a16382de6518a0eb474a5c377,2024-12-27T14:15:32.013000 CVE-2024-53237,0,0,23d171fbd4bb56e8eac2319610adf1e1fd3e1e2401f72a4cefcfacfc9e5a2a90,2024-12-27T14:15:32.130000 -CVE-2024-53238,0,1,3c406b6fc48f1e67a491784d7df49d294e069e6ba2707bd93d3a166e8be6e2ca,2025-01-08T16:41:35.353000 +CVE-2024-53238,0,0,3c406b6fc48f1e67a491784d7df49d294e069e6ba2707bd93d3a166e8be6e2ca,2025-01-08T16:41:35.353000 CVE-2024-53239,0,0,2dbcea6108cac685093598ea95a7534dbbbaa2209a1d006a3b3659a533297412,2024-12-27T14:15:32.373000 CVE-2024-5324,0,0,616d1ba80af339308061f2c79fb4da68886ab2b91b97eb35403d14df6efb4acc,2024-11-21T09:47:25.537000 CVE-2024-53240,0,0,9b22f872478d25b1b8d5510910ebb2d032d63f29cc9ff7aa44552f79bec6df78,2024-12-24T10:15:06.460000 @@ -270736,7 +270739,7 @@ CVE-2024-53506,0,0,9dfa3208f902ab3513f3502d8928ce98e8eedec2f27ad06842644780d149d CVE-2024-53507,0,0,12d141a23906013906618b23cee234cf31c91fd8e1e8d9da3760596286952af5,2024-12-02T17:15:13.707000 CVE-2024-5351,0,0,a2df3cc9be27d64a2cd3dc5a2f1d5f6a44f6e98794670e6c0c19928c9af58ef2,2024-11-21T09:47:28.610000 CVE-2024-5352,0,0,afede3a744404a4b63e0d831a5ec0e86e744b459100c94c26c1030a6d60025a6,2024-11-21T09:47:28.743000 -CVE-2024-53522,0,1,7466344c37c80a75f9949c9a474636edf28718607b90a0d9bf7bdac59eda3ec3,2025-01-08T16:15:35.343000 +CVE-2024-53522,0,0,7466344c37c80a75f9949c9a474636edf28718607b90a0d9bf7bdac59eda3ec3,2025-01-08T16:15:35.343000 CVE-2024-53523,0,0,62264463ec7bd597c8cd954da8d0baf08b58aa4c7ac24397d44469055812e6bd,2024-12-11T17:15:20.073000 CVE-2024-5353,0,0,797e03a5615e2bede928ac816012d8783c471de5bd74a0480881887afd7a657a,2024-11-21T09:47:28.863000 CVE-2024-5354,0,0,e179ff0fdd33289a32ca4c68c73a51c0aa8ddee9c94944cd1d4fd7185f36a76c,2024-11-21T09:47:28.997000 @@ -270890,7 +270893,7 @@ CVE-2024-53798,0,0,dd15d9db7be990295567f0511fa2c3e51a57e6a70e8f9db78d34a77a51f00 CVE-2024-53799,0,0,783da60a33ccbce78617be33a3c476d287119720767ee98d4405ce9d100a841c,2024-12-06T14:15:22.170000 CVE-2024-5380,0,0,226318c98a74a19f1dd2a14061de91ef6b8613a700730137544bc16df39ee24e,2024-11-21T09:47:32.550000 CVE-2024-53800,0,0,60f2b1b418aa5af9bf8eb7e264f0747ee70d94d6038011b54f5154fa38aa6730,2025-01-07T16:15:35.883000 -CVE-2024-53801,0,1,95df68651124aa797a705f7b5a5f6851e90e49bc961e22dbe8e54a1034ec1e08,2025-01-08T16:20:07.380000 +CVE-2024-53801,0,0,95df68651124aa797a705f7b5a5f6851e90e49bc961e22dbe8e54a1034ec1e08,2025-01-08T16:20:07.380000 CVE-2024-53802,0,0,d38c12f04c4095c1a6ac4f4dc30d15b9305c85ea7eb04aa1ddfb5bdeec10087f,2024-12-06T14:15:22.430000 CVE-2024-53803,0,0,3ee8313ec2c5826e6c44093bf2e19288a4ab5e01b17ba7838c8e2683c5a34992,2024-12-06T14:15:22.567000 CVE-2024-53804,0,0,c64f2291c3e202809c8bf90598d4a2a0d324c8b22742806eb77826f9e995a47d,2024-12-06T14:15:22.697000 @@ -270979,10 +270982,10 @@ CVE-2024-5393,0,0,03f52ea3100aa691cac10394b6f99ef6880a74fc6f5839ec2548a00bbba3cf CVE-2024-53930,0,0,4c5164466e0edc2dc94be8460bd35fddb8be39646d6d12f4d1b2cb254100683a,2024-11-26T16:15:21.150000 CVE-2024-53931,0,0,77ff5a910067e68acb1360e732666f9398c8f9d529fa9282c40e4c59ef92ab72,2025-01-06T22:15:10.070000 CVE-2024-53932,0,0,a1340f254ee4139622dc4827742470a22bd1d8c2724823dabd329fa8971bf8d2,2025-01-06T22:15:10.187000 -CVE-2024-53933,0,0,eff8ccb6015491c912bdd95414ebddaaa03db0ff46f959740ee621262994cf84,2025-01-06T22:15:10.293000 -CVE-2024-53934,0,0,186984c1ab3c6b8a0c4a6202e5bbca851e30216bf20f2c66a54f43deedb614ef,2025-01-06T22:15:10.410000 +CVE-2024-53933,0,1,db258f59d01e7e0a35abc28b4c06c75a7869e5372f2851212ef66e9f93739cbb,2025-01-08T18:15:16.830000 +CVE-2024-53934,0,1,f50233c522c7566625d128ece5511975863aa14d88756b027208f7a5801cf365,2025-01-08T17:15:15.630000 CVE-2024-53935,0,0,e7a89bbaab57e9f8cfa36ddccaa7ded268242ad9837ae15774898afacfe8a75f,2025-01-07T22:15:30.790000 -CVE-2024-53936,0,0,0fbb410b7e63d8868365f11fe6adaac28e4e5f4dab7ddbba3c6ad260cff18dfa,2025-01-06T22:15:10.630000 +CVE-2024-53936,0,1,f4cc5b3aa6d7f8a1434587994c947af882c4c9dd8090ccb9200829a801f79df2,2025-01-08T18:15:17.067000 CVE-2024-53937,0,0,d1cd3a208e2e01cbeda6e314a3aeae43902ecd4a49e9dc0eff32993f2ac3461c,2024-12-03T19:15:12.127000 CVE-2024-53938,0,0,d0a91f2a4ef2aa08452cc7e6ae9a19bbc5f3a7a19dbe27547769ceb8e70ec886,2024-12-03T19:15:12.330000 CVE-2024-53939,0,0,63ec4d4d8a57c7e9203228b0cd3c3c84ff0fa6ec3d0f30c37967d23e20f39166,2024-12-03T19:15:12.690000 @@ -271421,7 +271424,7 @@ CVE-2024-54486,0,0,5df005d0d8864aa5a133b3a90c1c09a871b54e236cb0257a1e40ecfc6e05f CVE-2024-54489,0,0,1ce8b5ab65a55735f38feb96fae54ecbe9c5aa5b683277170ac859678b8dcc0a,2024-12-13T19:15:09.570000 CVE-2024-5449,0,0,1d8d63580d1cb9064d797bded58f9169ad76c503e92c814880090cdd281d631c,2024-11-21T09:47:42.400000 CVE-2024-54490,0,0,2c61af9f099ad6e59b9a01082060a877b296ae3dacfdcd653badbfc16c369658,2024-12-19T15:27:32.170000 -CVE-2024-54491,0,0,195da49ba5755bf027e92d47b8bdd6952fc64d77a018ab69cbf732bba7b4ff5a,2024-12-20T19:15:08.100000 +CVE-2024-54491,0,1,c5247d6af358c281e2e09323bf2bdb35fafe75ce9620f03dff8996cf973db8c4,2025-01-08T18:06:21.337000 CVE-2024-54492,0,0,85af0b7e8310e62bdbb661f9396591c8a16f77bd78856ca16684e2e3405868de,2024-12-19T15:36:15.687000 CVE-2024-54493,0,0,fa153b7b9aa4539638e8a2a5a8a0f6bc0ba6e98aa0e9ed776ffdda5b5b98dbb4,2024-12-13T18:30:16.170000 CVE-2024-54494,0,0,ad0ca4adae0115148142da0f4fc562e3313919e91e70297d0cc4e22d056236b8,2024-12-16T19:15:08.730000 @@ -271498,7 +271501,7 @@ CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade3136481 CVE-2024-5481,0,0,6aaa03c1e132f74e5c4e90ead29bd24eb7065ad2c73e1f2805fbc82099451674,2024-11-21T09:47:45.877000 CVE-2024-54810,0,0,98b1b32485df996df7d9929d6a4a4f3f6576d87de7e3a8405b0f88648f287e10,2024-12-13T18:15:21.707000 CVE-2024-54811,0,0,c518d2be0055f2f694c9ca48885a5257eabcc0287b36c8555688778fe5e578d7,2024-12-13T18:15:21.940000 -CVE-2024-54819,0,1,5c1961a544502914eb3b6471593c9f93ff2e75de98f3ccb61d07b0e0c14fa158,2025-01-08T15:15:19.317000 +CVE-2024-54819,0,0,5c1961a544502914eb3b6471593c9f93ff2e75de98f3ccb61d07b0e0c14fa158,2025-01-08T15:15:19.317000 CVE-2024-5482,0,0,201df0de22cd2de6baef389275fa06366007791ec5f711f789012d102cd7d319,2024-11-21T09:47:46.010000 CVE-2024-5483,0,0,079d428e5ef1f2457bdcfb946982be872b42b40e94b6bfbc28ab3fe49f413326,2024-11-21T09:47:46.130000 CVE-2024-5484,0,0,b3b185b98c733a0f4717de1a808b2127ff5f3061f156212c34336d217a368118,2024-05-31T11:15:09.783000 @@ -271617,15 +271620,16 @@ CVE-2024-55408,0,0,f29d22484915f373690eb82371db4cff76b365f8201325c0d76b3e731d67f CVE-2024-5541,0,0,f9b4d455e6b62fc87b5177b190c5e5d55cffd60f56e01c7f957c7d36f3e08c46,2024-11-21T09:47:53.453000 CVE-2024-55410,0,0,a341b2a61f8dc44291b67917ab046b0ca56af6f84ecbeba25576f5a2ddd34b5b,2025-01-07T22:15:31.423000 CVE-2024-55411,0,0,1aaefe335c6784c1c51d968334cc18ae747aab41b366982bf94b394b831a6ba0,2025-01-07T18:15:20.543000 -CVE-2024-55412,0,1,492ff029e687dc426b43e155e183e30d83635b8bd9198a179052d60e8971056e,2025-01-08T16:15:35.527000 -CVE-2024-55413,0,1,e71132936dff763cacd1e3af9fafa9260fb08cafb24be1848dd04f5f45cfd409,2025-01-08T16:15:35.717000 -CVE-2024-55414,0,1,9fbe004e5b78117f4dbe49f0ac8bd9b93d7d50832df3cfac0515d848006dd754,2025-01-08T16:15:35.883000 +CVE-2024-55412,0,0,492ff029e687dc426b43e155e183e30d83635b8bd9198a179052d60e8971056e,2025-01-08T16:15:35.527000 +CVE-2024-55413,0,0,e71132936dff763cacd1e3af9fafa9260fb08cafb24be1848dd04f5f45cfd409,2025-01-08T16:15:35.717000 +CVE-2024-55414,0,0,9fbe004e5b78117f4dbe49f0ac8bd9b93d7d50832df3cfac0515d848006dd754,2025-01-08T16:15:35.883000 CVE-2024-5542,0,0,6f204123d7eb6582297f3ed2f1f9284859b42e6e6e67e32f4ec293ca8971e5c4,2024-11-21T09:47:53.577000 CVE-2024-5543,0,0,a26f2d14789d49017a49269cf3e4b4468656a016d744676df971b6df226be4f0,2024-11-21T09:47:53.697000 CVE-2024-5544,0,0,9d691e1e8372bdc434d572825f303cd1b0a2983a0161dea14c330331f38ec0b0,2024-11-21T09:47:53.813000 CVE-2024-5545,0,0,b3cc69efdd158ef8f80171ade54c093cb4f6f75ed2a82ff6b2260af3cf25e4f5,2024-11-21T09:47:53.940000 CVE-2024-55451,0,0,4eb1042aa51ba5a2799fe7ce59f7c5e8943825e1ba0ec7639498dab2444e41a0,2024-12-17T17:15:09.687000 CVE-2024-55452,0,0,681d222c3a1792768b7aa7a338d01a7a3eab54a804f9924046fdaec1682302e7,2024-12-17T15:15:16.287000 +CVE-2024-55459,1,1,456230754e3039571421d54c4a12aa4c7795bceae5795f00880335582d8c3572,2025-01-08T18:15:17.297000 CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000 CVE-2024-55461,0,0,8a5762fd3b90cc63ffd9ce1bb9331b80ec6ee2b8f4f1ecbac3350d77382b6dcf,2024-12-31T20:16:07.727000 CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000 @@ -271646,7 +271650,7 @@ CVE-2024-55513,0,0,fedcaafc6e85e6bd74dcc7a40ecdf11b2568dda1579c04082d671c5acf74e CVE-2024-55514,0,0,1ab6d03dbd59f8b12772670ec93c7ec4ae46219483a32dbdb16b58811fc912d3,2024-12-18T16:15:14.900000 CVE-2024-55515,0,0,aa63dd224a4ced8fb9deb1eadd4b58815859b25e0d9ddafab8ac8045b9bd13ff,2024-12-18T16:15:15.090000 CVE-2024-55516,0,0,4229f59dc90fe9b1d907ed2bb61094e572306fdea72c70c9a7f771b2d9b1733b,2024-12-18T16:15:15.263000 -CVE-2024-55517,1,1,46da1e738ca42138952c063c28fa2a522dc6c570eee168ea725e1e95b478ed34,2025-01-08T16:15:36.080000 +CVE-2024-55517,0,0,46da1e738ca42138952c063c28fa2a522dc6c570eee168ea725e1e95b478ed34,2025-01-08T16:15:36.080000 CVE-2024-5552,0,0,779c8b119b5a7bc042c6e25c9be4959c8015ea49092434c017d15512182ef4be,2024-11-21T09:47:54.927000 CVE-2024-55529,0,0,59094f574a1ef2f6096a3e5fba1fa56f532a786844da89e23934c518ec5e2e07,2025-01-06T20:15:39.163000 CVE-2024-5553,0,0,c6aeec952a2778be27c1792a1d1c97b8ff8c01ca6ed08226c6b506a6f771b767,2024-11-21T09:47:55.040000 @@ -271707,7 +271711,7 @@ CVE-2024-5565,0,0,d611550f5bcf5e6c3db2413f5bd8aaf6eb30fde2563331d26a9ad58249b730 CVE-2024-55652,0,0,4e4448d6da8b16d3811a29eb55a690e8e4ef0fe299bd552eafd44d61141bd125,2024-12-12T17:15:11.360000 CVE-2024-55653,0,0,6adab931e15ac490e0ece82122d6e070bb38c705c58b8befc0c0aa90aa8fe483,2024-12-10T23:15:06.410000 CVE-2024-55655,0,0,bef00fcc348918ad1311160a89fda65196adb8f2af6577d95b0acc0a21190439,2024-12-10T23:15:06.570000 -CVE-2024-55656,1,1,46e43658c39c0da316d76f931fb81aadda5dd7fa7670e712bc5b1dcf2f53fba6,2025-01-08T16:15:36.213000 +CVE-2024-55656,0,0,46e43658c39c0da316d76f931fb81aadda5dd7fa7670e712bc5b1dcf2f53fba6,2025-01-08T16:15:36.213000 CVE-2024-55657,0,0,e3a13e103683f05b93abf0dd927a7c0d9024c3649cc998088f3e7a1d85a2ceab,2024-12-12T02:15:32.507000 CVE-2024-55658,0,0,c949ae18febfe1edc874d06e2355cc21345c7bd7bfd85d7215da9d3fc46dcd6d,2024-12-12T02:15:32.633000 CVE-2024-55659,0,0,dae2af40e764fbb0030d736eaddecfe37ef895af54da40dedcee663fed2b72e5,2024-12-12T02:15:32.760000 @@ -271915,7 +271919,7 @@ CVE-2024-56198,0,0,abfdcb1f69b5c065e3b798d9edb33ef48ebf0110440e37af007485f81618d CVE-2024-56199,0,0,b62df53baa8d4848a6f31e2b0b1f49a9a24a4405c740c5c1ac552cd60e35a283,2025-01-02T18:15:20.427000 CVE-2024-5620,0,0,240638ef58a29a459ed1037710fcf1b7e875e31a78e263978233bb4c4a8442da,2024-11-21T09:48:01.930000 CVE-2024-56200,0,0,3879bcf029467f661c4f86f22f421720527f4e18cebe03faa8ac0ac24cb0d998,2024-12-19T19:15:08.280000 -CVE-2024-56201,0,1,96f6dccb5d9eee1aebc91ce6c8578e9c38f6d2d0d9bb42f64cafa8b5002a7dfb,2025-01-08T16:15:36.387000 +CVE-2024-56201,0,0,96f6dccb5d9eee1aebc91ce6c8578e9c38f6d2d0d9bb42f64cafa8b5002a7dfb,2025-01-08T16:15:36.387000 CVE-2024-56203,0,0,51759cbb4476088df63db090de9799324d920ca10202f18ca01ed4e47fe27dea,2024-12-31T14:15:25.400000 CVE-2024-56204,0,0,29d317ef540c04a3c1370210f72eb2ad1092da07e31f4181b526002329212ae2,2024-12-31T14:15:25.547000 CVE-2024-56205,0,0,05115ecefd611267c4c19ce2b2b0a93b99d990683bc8444b258453fad8f9d47b,2024-12-31T13:15:08.803000 @@ -272134,8 +272138,8 @@ CVE-2024-56531,0,0,9232cb3a908777655dbde1aa267550e5ea5aa16a08b8557030526152c4ddd CVE-2024-56532,0,0,5bcb2cd4e9965371ef2a861ddd25ad6f994e367edbb9b2eec6976a7bc0fb3478,2024-12-27T14:15:32.640000 CVE-2024-56533,0,0,17b202ad82ebbae53f8b885f9b2426bb6ec2c92b42ed039546a9a8365e5f6f1b,2024-12-27T14:15:32.800000 CVE-2024-56534,0,0,e6cdf66835e16deda6663f99f34198934e5c06c3550581413dee8ecb168955ed,2024-12-27T14:15:32.940000 -CVE-2024-56535,0,1,e0a8f74a51f6e8cba55dd942f422ba56dbc13106a9c8a6802d1f4c5337275592,2025-01-08T16:43:06.310000 -CVE-2024-56536,0,0,e81eb0c2533820b3bc62e909568aec53247d171a114db6c81255d249113c217a,2024-12-27T14:15:33.173000 +CVE-2024-56535,0,0,e0a8f74a51f6e8cba55dd942f422ba56dbc13106a9c8a6802d1f4c5337275592,2025-01-08T16:43:06.310000 +CVE-2024-56536,0,1,82f3a35e441faff3c7a03cb0b45206fa994c5b438f7f20a576643417c1362cf9,2025-01-08T17:08:05.557000 CVE-2024-56537,0,0,0f50e2b3d5ee18728fcbbdeeca2756b16ba6670964fd2d47b597dade772a636e,2024-12-27T14:15:33.290000 CVE-2024-56538,0,0,05e6f243370f67e67c96f68f4c76b456d8b1f3b18efe17183f721393738aa996,2024-12-27T14:15:33.400000 CVE-2024-56539,0,0,73e3ac9371c38a01feaab685bc0b80785d1a14a9bbe3f9b6fa012305e81e56ab,2024-12-27T14:15:33.530000 @@ -272149,7 +272153,7 @@ CVE-2024-56545,0,0,b19a2ba17d6965bf3b02f8b4675286f8fb225dc536b446fa97ec76fd3722b CVE-2024-56546,0,0,69a114fe693d135933b03c09be788b3440117b47c45a7792afcbcac9317d87c0,2024-12-27T14:15:34.383000 CVE-2024-56547,0,0,e8b50d10358462601d97aeca5191b7d8139764ee45376f21c8029ea1eac06a30,2024-12-27T14:15:34.497000 CVE-2024-56548,0,0,16645d1541312215a4bf3f6392eb289c3edcde3bcdb0f4b6f92d5230f284c240,2024-12-27T14:15:34.603000 -CVE-2024-56549,0,1,9ca11094a73d6c045ef338af0ec9ace139ce3e7651f95f997f30515a9e16b544,2025-01-08T16:43:25.180000 +CVE-2024-56549,0,0,9ca11094a73d6c045ef338af0ec9ace139ce3e7651f95f997f30515a9e16b544,2025-01-08T16:43:25.180000 CVE-2024-5655,0,0,0fa4e3b504ccc8e08941dc807198e5a29b07306b6e1d02090b484b1570bb08fd,2024-11-21T09:48:06.140000 CVE-2024-56550,0,0,04d74517c386c38c5a8c7b0e1144163e0e9e19fcfd004bb9db0bb6bb64a064cf,2024-12-27T15:15:13.737000 CVE-2024-56551,0,0,f283601a0e481f41c645275541605f5f3eda11cfd0c4eb480285490826440c96,2024-12-27T15:15:13.850000 @@ -272181,10 +272185,10 @@ CVE-2024-56574,0,0,d1659bb2467b974570337abca4ede43186d6aecfacc04f417144c3b6fc3cf CVE-2024-56575,0,0,d800439f994543901ae2936ca5724eb88e88f1f7c25bd51e79024d2a6df8170e,2024-12-27T15:15:16.537000 CVE-2024-56576,0,0,e5bd38b60a30f7044dce9a0ea37acf3f6568bf209930b2d10e73dea540708a34,2024-12-27T15:15:16.657000 CVE-2024-56577,0,0,3ecccc37529565eba4667f5b0409fc9500b7d3d95e9ec471d37b764a28244e5e,2025-01-06T17:21:33.627000 -CVE-2024-56578,0,0,6b0f3b20d2fedfafeff1688b07d6d8a6e4d1a3560e9940b78384e1dd9e589c91,2024-12-27T15:15:16.873000 -CVE-2024-56579,0,0,fcf272a802513285f36c52001ec02bbb68cc32be40cc3f7325f026784f58773b,2024-12-27T15:15:16.983000 +CVE-2024-56578,0,1,b7d234c4ac370ed43017dd1993adaa95e62523ec826e1c8450512390eb22d5ba,2025-01-08T17:08:24.730000 +CVE-2024-56579,0,1,ed133437fbec982ed5352c737f5d06af0ae68ef76be424fcabd4fe2113323e74,2025-01-08T17:08:40.187000 CVE-2024-5658,0,0,7e7462fc3515e519516e2f809c98e13e2106352e6aac99c565fb770e189dd063,2024-11-21T09:48:06.413000 -CVE-2024-56580,0,1,179f3e1a27c51bf03a0456aee4863f0a350c8b2c58261c2a20019a0968714a4b,2025-01-08T16:43:44.460000 +CVE-2024-56580,0,0,179f3e1a27c51bf03a0456aee4863f0a350c8b2c58261c2a20019a0968714a4b,2025-01-08T16:43:44.460000 CVE-2024-56581,0,0,6e98b054ab30e9a79a0d35ae442e5a2bf4559a3a6bfbf332b263e41eb8de179b,2024-12-27T15:15:17.207000 CVE-2024-56582,0,0,36fe78df8427d9724578c8a616d0f4ef219b1b68ee364f1f9a9e5972e03cb6e5,2024-12-27T15:15:17.333000 CVE-2024-56583,0,0,0a093de5a3582fcba5319e6417804083fa2f13d21a794dc18a40b22855a6eab7,2024-12-27T15:15:17.453000 @@ -272198,7 +272202,7 @@ CVE-2024-5659,0,0,83e7687f93b86419198f1683634dd14733df87a0c466715b2e7e79370f69ac CVE-2024-56590,0,0,ce1170c24714fa2e0e447addbede8cbfc003003487543f7771793bf3ebdaca04,2024-12-27T15:15:18.263000 CVE-2024-56591,0,0,4ba918238e3f95ae969f7fc6eb9deb7c2f61d316c31ff9b582499d3d15ae9fc6,2024-12-27T15:15:18.383000 CVE-2024-56592,0,0,da483575f709d66f59d5bd6be0ac7fdbfa2fd5f2d9c42677ad036c85af63cd52,2024-12-27T15:15:18.500000 -CVE-2024-56593,0,1,faea6b897ded7b7e0d37e707c5c76f3c41457d87821844a4fda3e915f895b60e,2025-01-08T16:44:02.073000 +CVE-2024-56593,0,0,faea6b897ded7b7e0d37e707c5c76f3c41457d87821844a4fda3e915f895b60e,2025-01-08T16:44:02.073000 CVE-2024-56594,0,0,95d37c95ffd3c1047558eb918909503f02d3b31daebb50f3acfd3fcc47e3e7ea,2024-12-27T15:15:18.727000 CVE-2024-56595,0,0,5c739d39a04368864cbc388d8808a97d325a73a29c39f4cccb5f255c6ed55ba8,2024-12-27T15:15:18.843000 CVE-2024-56596,0,0,f9a03aa1aa88f972ffe6a55ad6e165129f456075471da9dcb4076a6e6b502209,2024-12-27T15:15:18.963000 @@ -272214,22 +272218,22 @@ CVE-2024-56604,0,0,565ab9d0b315999a07c7d4356116cd8598a6b3b07028c5fa8b14764daf5f9 CVE-2024-56605,0,0,b64b4a627bbf95f44fe3405d04872bb763af58a6067e54da35f3e7f7c0ee5116,2024-12-27T15:15:19.980000 CVE-2024-56606,0,0,a71e7dd711eb0364b89172b0c372f28265292eee0cf911f2b3aeffd343a59e7c,2024-12-27T15:15:20.087000 CVE-2024-56607,0,0,ee73eedd6bd0ee7c97d323bfb736f17af98e701dbbb2223cb0dfb05c4d0e1892,2024-12-27T15:15:20.180000 -CVE-2024-56608,0,0,097cacbd2b702d2f82dcc6dc51b8f7e512ed0a5b905c3f499bbf877ee8b8b499,2024-12-27T15:15:20.283000 +CVE-2024-56608,0,1,0d4d7a76c820d078ab63176c92aa3cecb2c95ef837fece154b0757799d40a37f,2025-01-08T17:10:01.233000 CVE-2024-56609,0,0,cebfeb02fea20d2e5ec9b6db1e720f3f3e0983a6f297439668797a7ca6772c63,2024-12-27T15:15:20.387000 CVE-2024-5661,0,0,7d090de96660a134ff2e3cb7262fde0b3d927ce5a88611486b37761a6a2d78a0,2024-11-21T09:48:06.673000 CVE-2024-56610,0,0,3616430b001245a9667a9f4aa45a5afeac5c8dd0cb6af7e882645d533e24c8ba,2024-12-27T15:15:20.490000 CVE-2024-56611,0,0,0d93be71bfd72357cc54d7ccd72b59dc3ffef4c2b81f6098928deb94ac964bb5,2025-01-06T17:22:48.560000 -CVE-2024-56612,0,1,f02cb9a5a497bab1cc02d2af39cd52bf8fd6d5468613153d1da2ffcfc44c13d1,2025-01-08T16:44:20.777000 -CVE-2024-56613,0,1,bcdd018642860eac1962ebef4d87191542f737182e11f4fd8fcddbe437261a94,2025-01-08T16:51:18.680000 -CVE-2024-56614,0,0,0dc0201a77a7b3fde399c7cc5c2af413a8c9c98270694ae4b38d36beb69d3561,2024-12-27T15:15:20.897000 +CVE-2024-56612,0,0,f02cb9a5a497bab1cc02d2af39cd52bf8fd6d5468613153d1da2ffcfc44c13d1,2025-01-08T16:44:20.777000 +CVE-2024-56613,0,0,bcdd018642860eac1962ebef4d87191542f737182e11f4fd8fcddbe437261a94,2025-01-08T16:51:18.680000 +CVE-2024-56614,0,1,68b560d72c5c168c49969c3f70ee5419af628f3dbaae23240c69a99286fc507a,2025-01-08T17:10:39.210000 CVE-2024-56615,0,0,873a568be01f0549a53bba8981a0b7f3ac107b358e5772ad839fb2e60aa2aabc,2024-12-27T15:15:21.013000 CVE-2024-56616,0,0,ead354e30becaaba72f0fdac0d69b79d7046430f7f7262905b5e54a14c2f3be4,2024-12-27T15:15:21.120000 CVE-2024-56617,0,0,fc087c687b8dff99b58f2939f77fa49bf48a0eeffb6a09b1ad34eb87c4b55aa7,2024-12-27T15:15:21.227000 CVE-2024-56618,0,0,27c2363f772214d155c7ea30b1bb342f6bb2eb036ac771b2dd810e31d927c144,2024-12-27T15:15:21.337000 CVE-2024-56619,0,0,b0c2a960644b177041a995fd8f73f350348bd550dc63bd05c80f5fc52f6df6b2,2024-12-27T15:15:21.437000 CVE-2024-5662,0,0,a32230f368c985ce000177685318420ae12365dafb7b142a133da07f0e3fd986,2024-11-21T09:48:06.860000 -CVE-2024-56620,0,1,62b2b96faf1f60cd015b681859229c54b1fe9ce3304d6f6d4b7456590dbf38dd,2025-01-08T16:09:56.403000 -CVE-2024-56621,0,1,becec3cb921696ec1e8d223c5c672e8625b14e057d03ddbb4a1c14a40fb95387,2025-01-08T16:44:53.720000 +CVE-2024-56620,0,0,62b2b96faf1f60cd015b681859229c54b1fe9ce3304d6f6d4b7456590dbf38dd,2025-01-08T16:09:56.403000 +CVE-2024-56621,0,0,becec3cb921696ec1e8d223c5c672e8625b14e057d03ddbb4a1c14a40fb95387,2025-01-08T16:44:53.720000 CVE-2024-56622,0,0,57f9032cf59eb1768889e07334129fae85d94e8871f8d41026f335ec621b8f94,2024-12-27T15:15:21.730000 CVE-2024-56623,0,0,84061956886d3000a76b0070d5a577cf5fb7fb2729269449f1a67fa7e5d9b903,2024-12-27T15:15:21.823000 CVE-2024-56624,0,0,88799a063f0b005c3843d9067ee2b8e4d19fb1fd500724d525e887a886596206,2024-12-27T15:15:21.933000 @@ -272243,7 +272247,7 @@ CVE-2024-56630,0,0,d6d5216a0f142ba6bcf7c47d2e00c742ad87f849638306ffcd1bf65dea9d3 CVE-2024-56631,0,0,29d4144c015cfc42f072d5a6177bf3298ac1895ae6616941381c6f653c33dbf5,2024-12-27T15:15:22.690000 CVE-2024-56632,0,0,87f002e611c90fbf889f9615cfc01c68922e19cca4853fe3161af73b8e3806db,2024-12-27T15:15:22.803000 CVE-2024-56633,0,0,8f14e1f5dec3f29ec32002015820b7dc04ee262ce167624069ed4db31922fa34,2024-12-27T15:15:22.933000 -CVE-2024-56634,0,1,d0f7bf396b8d8ec8091b0dd6b12e9ac6a4e3bc63a9f97a38d388da788cc29e3e,2025-01-08T16:45:10.040000 +CVE-2024-56634,0,0,d0f7bf396b8d8ec8091b0dd6b12e9ac6a4e3bc63a9f97a38d388da788cc29e3e,2025-01-08T16:45:10.040000 CVE-2024-56635,0,0,35ee22d0e663a25e651aa366de1000d245b5c87c40c87e3948780fb4c874067c,2024-12-27T15:15:23.207000 CVE-2024-56636,0,0,382c414b076daac2c867da5824c736b037680e63fd1ebc0f415b86a3d39a0598,2024-12-27T15:15:23.320000 CVE-2024-56637,0,0,ce12920afbf5f1fb34531af28442fd249602c3b014f7632db7bac795c36f2b85,2024-12-27T15:15:23.430000 @@ -272301,17 +272305,17 @@ CVE-2024-56684,0,0,1985fcc273ba4140fb204ccdde539644ed1c07bf1b25168f5fedc516042d8 CVE-2024-56685,0,0,8004cd7f5551d83f0a296fb637efd38d0f7cfc910e138f911d41944c6e4bcd83,2024-12-28T10:15:11.593000 CVE-2024-56686,0,0,2bbdea7ee4d0bece808400f8f6b47a4a8890f61065b7e70bed4dc9d78ff78344,2025-01-07T09:15:16.897000 CVE-2024-56687,0,0,4db0f31fe9918baff8b88fec7f981f5bce223a69e6b5f0650ad08be1200eb53f,2024-12-28T10:15:12.153000 -CVE-2024-56688,0,0,b5afb935f0cf7c8c0f833925106338d02c3d2154cdac3a6fd6b70b2e90f52dc5,2024-12-28T10:15:12.643000 -CVE-2024-56689,0,1,3e1c60c8f3537281f621c8c40f5cabe14289ecb4136001aa4f875d9e5224c0c1,2025-01-08T16:45:25.490000 +CVE-2024-56688,0,1,816f428715dee613a33e11c5f9ae0c400d12ae37a3ae55b82191e493c4cfa74f,2025-01-08T17:11:05.457000 +CVE-2024-56689,0,0,3e1c60c8f3537281f621c8c40f5cabe14289ecb4136001aa4f875d9e5224c0c1,2025-01-08T16:45:25.490000 CVE-2024-5669,0,0,9cd51c21a0e40ca0880591ec94cc1c064da62242943ba53e10301d0eb8bfe684,2024-11-21T09:48:07.570000 CVE-2024-56690,0,0,2a72c8e6571a5a1d0298311d84636f71e3ae4d29693e80187270d779ac92c120,2024-12-28T10:15:13.537000 CVE-2024-56691,0,0,62c59d5d1a3d371802a9cee1fb0752a9e914735965be638d034aafb90a06960b,2024-12-28T10:15:14.027000 CVE-2024-56692,0,0,5c33e737c3bcad090ff32f8b13c5bd44758834f65a74f4fa5cab1bf99e0f55b2,2024-12-28T10:15:14.490000 CVE-2024-56693,0,0,5d463ee65304d8347500c614a6927974a7b867229756c573966b39df25e26e7c,2024-12-28T10:15:14.833000 -CVE-2024-56694,0,0,68fdda24be270643adbcc4cd32f45d53ec4c6a8b8dabe93502be89d41e2bb3ac,2024-12-28T10:15:15.203000 +CVE-2024-56694,0,1,e2466f84852eb6e75afc4a8297aa7c42b58fc86c833b880ab6877b4326138a58,2025-01-08T17:11:31.067000 CVE-2024-56695,0,0,1049a7ea492b9a468c5631b60a8b10497c8017b3b7122fffb0b919ea0dbcafe0,2024-12-28T10:15:15.533000 -CVE-2024-56696,0,1,e7ff58f277f582521235fb4a39dccc778e70841711b02192c9e97fdaa9f8f3ce,2025-01-08T16:45:40.197000 -CVE-2024-56697,0,1,415312cd2de09e121d8f6863f3f85137f2ef58c344d43a9b863b32cfd98dbc09,2025-01-08T16:45:54.327000 +CVE-2024-56696,0,0,e7ff58f277f582521235fb4a39dccc778e70841711b02192c9e97fdaa9f8f3ce,2025-01-08T16:45:40.197000 +CVE-2024-56697,0,0,415312cd2de09e121d8f6863f3f85137f2ef58c344d43a9b863b32cfd98dbc09,2025-01-08T16:45:54.327000 CVE-2024-56698,0,0,baf6927465cfc310d189e6d61b7a49f40f7006d9132b12825efbf385d839d222,2024-12-28T10:15:16.473000 CVE-2024-56699,0,0,82cfdb095c3450af1c700bcac30f9b126cd60578e5fd583cc3381044dcc2e19d,2024-12-28T10:15:17.060000 CVE-2024-5670,0,0,833b3289d1bb921143306eb422f5f9db6cfd66717dc638bdad9a2ca39097d40f,2024-11-21T09:48:07.687000 @@ -272323,11 +272327,11 @@ CVE-2024-56704,0,0,48e5a0d619df270073488e7c19d7903171e1acc92eea5d1ff8f4c9b18c1af CVE-2024-56705,0,0,d44dcf1285cd38e1d062c7fb5bdaee01c818db7d4cf87dc2b219ad9bde922d33,2024-12-28T10:15:19.043000 CVE-2024-56706,0,0,a4ba04f2ce7d48f15b7673aaedbcd9366ea8d3ba1e2c788436c2ecc7452df2fb,2024-12-28T10:15:19.400000 CVE-2024-56707,0,0,b05b8792b2b7de0466fe1a56bcfb7d27eb2e048786ee1140fc3035d1622e8c70,2024-12-28T10:15:19.660000 -CVE-2024-56708,0,0,e5f0e19c72b7781e683010a70d6ebaa08a94790dc924fb31d3c4c256c2d7ff31,2024-12-28T10:15:20.397000 +CVE-2024-56708,0,1,6fa15c75d83d4c4307dfef942a14e389f86e429e089aca7c88a1ff3d1cedf1d5,2025-01-08T17:11:50.683000 CVE-2024-56709,0,0,cdf942cc701521c1ff3c800ae103d3cea4ef72f866f736a0015304fbfad4223b,2024-12-29T09:15:05.820000 CVE-2024-5671,0,0,ed90f881c7f33cc4424c259b337566a1f77772369738ebea5bec64062f030b65,2024-11-21T09:48:07.823000 CVE-2024-56710,0,0,d570c66cc1493f8ba1b163d30fce601a9571d4053345eabd5838e156955920fe,2025-01-06T17:13:00.090000 -CVE-2024-56711,0,1,8eddbbeefa112ed89f1c54ad9c0be9219e878580c5285b1d97e53e72270a67e9,2025-01-08T16:46:10.493000 +CVE-2024-56711,0,0,8eddbbeefa112ed89f1c54ad9c0be9219e878580c5285b1d97e53e72270a67e9,2025-01-08T16:46:10.493000 CVE-2024-56712,0,0,5b4b2cfbf10a7f1957aa2405de52e1416f37c32b46cc4476328392ec38eda5bb,2025-01-06T17:11:48.987000 CVE-2024-56713,0,0,5020834a260519e2be6a95e6f4f1901adc3b751bc54eb22b967ecc861237a872,2024-12-29T09:15:06.377000 CVE-2024-56714,0,0,b3ce9d06b99ca38b43d3fc7ca241e57e4a1bb78055defdbd69f868bbfc41abea,2024-12-29T09:15:06.510000 @@ -272389,7 +272393,25 @@ CVE-2024-56767,0,0,d69c719ff44c9bc26c1f6b95810e7e5be266383e1fa4b4ba2c15f5c845d55 CVE-2024-56768,0,0,d8373e0dbf214f4feec34d3f904be6536bfb761175850928b1ed7e4f24a9c3b7,2025-01-07T22:50:43.207000 CVE-2024-56769,0,0,e75774dddc9639ce3f1ef9c47d4ccb2bed68d565027bcdd2f05bc827ccd14b56,2025-01-07T22:49:54.483000 CVE-2024-5677,0,0,1c94c489b32a2f3740f8b8867e0aff380d1e56445098bb97785a4bdba0037977,2024-11-21T09:48:08.540000 +CVE-2024-56770,1,1,5854677383e6e820e5cdee945ad65b74d897b00edb04a3c6bca2e9d3611a9af1,2025-01-08T17:15:15.957000 +CVE-2024-56771,1,1,16debccc3dc015a954cd6ee94102c2e7557ae015b0ea137433964de6f0cf971b,2025-01-08T18:15:17.777000 +CVE-2024-56772,1,1,732eac8f17b6d58e14e471b97d114891caad2cf101f502b91ea6d35636ec7930,2025-01-08T18:15:17.897000 +CVE-2024-56773,1,1,c85be71c1ebfc03df93cfcd74219d78187693ca219f6f260001a1bd7767bb67e,2025-01-08T18:15:18.087000 +CVE-2024-56774,1,1,0da5f66a47122293c436b992b97d785d57c5af5a49e631e1eb4d05b74ff92000,2025-01-08T18:15:18.213000 +CVE-2024-56775,1,1,b9e7adfd2a8199f2639dddd6b4cbd9e878680795ac280bc15ab94c7b45c609db,2025-01-08T18:15:18.333000 +CVE-2024-56776,1,1,64b0f03755bb848ec120fc2bb2876d2b0be15b47212a61bcc711824a49e19188,2025-01-08T18:15:18.447000 +CVE-2024-56777,1,1,ddd722cae6c0c34036941fae56e2b318684679e4127b4d92231fe898129f71b2,2025-01-08T18:15:18.560000 +CVE-2024-56778,1,1,2b6a40b227c8da7e3bb1f731175a53abbf65c2bb46f743b28887d964f7ba9d67,2025-01-08T18:15:18.683000 +CVE-2024-56779,1,1,9fd748a138b50df7635df5d13b18c2b350bc6d67fa8dfb224f545332cf25bd7e,2025-01-08T18:15:18.793000 CVE-2024-5678,0,0,bb4133b16eab99226f567cd512e0bec4d1a7175fc845cb5a8a3e18dcdbfd75d7,2024-08-15T18:05:54.847000 +CVE-2024-56780,1,1,29c66d63f46d220d5930f208a31634fefbc816ee1394122259e8311f9f835571,2025-01-08T18:15:18.910000 +CVE-2024-56781,1,1,eb6567a022bd15a9d12c087893aaa5c1ff2269b10cd13690bd4fc532b0bfb4f1,2025-01-08T18:15:19.030000 +CVE-2024-56782,1,1,27290ac8973c5aeb7b0bbff311170a6dacebcedfe7562071a7760d331a466209,2025-01-08T18:15:19.147000 +CVE-2024-56783,1,1,13c1527123f92365d0a4b009b6d51af7842712db44a370f9e7cce29fd03ddd67,2025-01-08T18:15:19.247000 +CVE-2024-56784,1,1,6813fb11a94eb02bedb8a52119977666c1ea05daa8242f517b05a5138889d1f1,2025-01-08T18:15:19.357000 +CVE-2024-56785,1,1,3bfaabf6ebc32581a3623b6898b68be4b22f376a3607bc72a02ca800eeb458c7,2025-01-08T18:15:19.487000 +CVE-2024-56786,1,1,d3d5c188ea0a8b2b5afff9d33177ab07315e4f304f4375b65561236881d9e415,2025-01-08T18:15:19.633000 +CVE-2024-56787,1,1,0aee60b63c8963baa9b21799eb0d822410c976efa00af077915bb2bb1ddb40f1,2025-01-08T18:15:19.763000 CVE-2024-5679,0,0,dc654eef86d673e662acc6dfc1ecb27b2f541880d76227d1d93861f825adc641,2024-11-21T09:48:08.710000 CVE-2024-56799,0,0,7c81f75b0fadc031d3c3a69969ffb946d254b09a307c8ed595c44ee135ddd7a5,2024-12-30T19:15:08.160000 CVE-2024-5680,0,0,926c5c2f45d297ec0fa81be8768753266fc85d73f972d4984111118e8fceffa2,2024-11-21T09:48:08.837000 @@ -273015,6 +273037,7 @@ CVE-2024-6346,0,0,fe2ee47547440c67b79f08fc428fde1fe9a461a17301cc498fa98e07795e20 CVE-2024-6347,0,0,ead9b349654f8c1b56b42b60b3e21504af84ff862f187d8c4f01052391405f6e,2024-08-16T14:33:42.730000 CVE-2024-6348,0,0,f8ec53a55d7061e6e616a9d49e72c1cd9f0282aa80090fa0b8e8fbc34eed5872,2024-08-20T16:17:03.810000 CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000 +CVE-2024-6350,1,1,77fb90352ae4244d9794160736591baaf0748482f37ee2770258379fc091d7f9,2025-01-08T18:15:19.880000 CVE-2024-6353,0,0,d4c4115348071ea0df993e53207fed00124ba29370e36d0bee2aef495fa28299,2024-11-21T09:49:28.547000 CVE-2024-6354,0,0,b2dccb6ff0cf7d4d778c16d437a8f334569c687ad872e701936b9155052ef539,2024-11-21T09:49:28.670000 CVE-2024-6355,0,0,4c7974dc5e52fdaa43d5f5a202a9f019ba0b6401d733645ab7e0c57b90e3af56,2024-11-21T09:49:28.797000 @@ -276120,17 +276143,17 @@ CVE-2025-0230,0,0,da56c380fbd78e0c1f33c2e3a59c91c27f8ad01a46dc235a12db28093892ee CVE-2025-0231,0,0,73ba5b334ad5db7bd7f18e0277fa8cbe48a99916bc557dd1170e5fb52d78d868,2025-01-05T22:15:05.540000 CVE-2025-0232,0,0,bbb1f8dd03cca1cfde501a9cda5da15f541da213c05bfee0e291ed634d921d4c,2025-01-05T22:15:05.767000 CVE-2025-0233,0,0,5ed4a33582b9d256ec10fa7176aad6ab5c25b941c467fc43ba8899ab1d384b8a,2025-01-05T23:15:07.320000 -CVE-2025-0237,0,1,1becb30a5153a9f87c8dcd95591b69c5bf659833bca9d5c3abd04888a3e6e760,2025-01-08T16:15:37.330000 -CVE-2025-0238,0,0,e82327f2f3ebe1b24a464a1a04ae8d05e90f55b42a3f025ea84dc43f52b25878,2025-01-07T16:15:38.470000 -CVE-2025-0239,0,0,afe9eebfe4b4296706d9ce7f0682dd4ed3f5045335b08cc44d37cc5438c37472,2025-01-07T16:15:38.563000 -CVE-2025-0240,0,0,e96fcd5423b4d2b2ff7a765d0bfae31256c7b6e21ad279b2a7a9221a4d70de9d,2025-01-07T16:15:38.663000 +CVE-2025-0237,0,0,1becb30a5153a9f87c8dcd95591b69c5bf659833bca9d5c3abd04888a3e6e760,2025-01-08T16:15:37.330000 +CVE-2025-0238,0,1,50894038de77fb1ebf563c119d1e1fdce0d46105147c4aa7d615e648cd7db1d9,2025-01-08T17:15:16.070000 +CVE-2025-0239,0,1,dd98627a0fe231acbc4f67019979adafca5d0e8310c70ed72dddf97631304169,2025-01-08T17:15:16.240000 +CVE-2025-0240,0,1,3f146513e767102a40a759d24479305835c1d0f3abffd18a5a4fd7d8c408f270,2025-01-08T17:15:16.403000 CVE-2025-0241,0,0,de4460d398e9a978698b951541d871507b0033d391ba8312f623449de07c64a9,2025-01-07T16:15:38.767000 -CVE-2025-0242,0,0,9b431442a04718d3c03b715641e5690877e9163ddca776bb88f8cd458d487a6a,2025-01-07T16:15:38.860000 -CVE-2025-0243,0,0,444567568d81e3ebf7b0ef1744bbe79078a7f79e5d87b28594b3b341799213d8,2025-01-07T16:15:38.973000 -CVE-2025-0244,0,1,4dc39d4eb7e9626e46633620b63b126f4ca8c432d219058ffa0df86e8e17d0ee,2025-01-08T16:15:37.520000 -CVE-2025-0245,0,1,17124b2bb78bf9f026108e77a44161cf6b567d6714acd6476cda81e3148b7689,2025-01-08T16:15:37.693000 -CVE-2025-0246,0,1,f212da1e386aff9790e671db2401da03b9d2ebbeea4ee1b40e830ef0d58e3da6,2025-01-08T16:15:37.880000 -CVE-2025-0247,0,1,19788955cc9b607e55d300602d56942e119086cfe1c51c09f21df249cc649c46,2025-01-08T15:15:21.033000 +CVE-2025-0242,0,1,436b4010a0353e73e425adf71340fd210221fcb70ce54fa0e4ed498b8e2738c6,2025-01-08T17:15:16.563000 +CVE-2025-0243,0,1,3385f5f4417e520856a6aa95edf9231cc97628ab73cc02078d726b2e70d59e2e,2025-01-08T17:15:16.723000 +CVE-2025-0244,0,0,4dc39d4eb7e9626e46633620b63b126f4ca8c432d219058ffa0df86e8e17d0ee,2025-01-08T16:15:37.520000 +CVE-2025-0245,0,0,17124b2bb78bf9f026108e77a44161cf6b567d6714acd6476cda81e3148b7689,2025-01-08T16:15:37.693000 +CVE-2025-0246,0,0,f212da1e386aff9790e671db2401da03b9d2ebbeea4ee1b40e830ef0d58e3da6,2025-01-08T16:15:37.880000 +CVE-2025-0247,0,0,19788955cc9b607e55d300602d56942e119086cfe1c51c09f21df249cc649c46,2025-01-08T15:15:21.033000 CVE-2025-0294,0,0,e5d86f9b17bdfc744e2441f17af376b91232f83a0091836e1403d549321b0bdf,2025-01-07T15:15:12.113000 CVE-2025-0295,0,0,52a16028421d06d344a294c38baeb65e7eade91eddca5850ff08cb460a814ef0,2025-01-07T16:15:39.460000 CVE-2025-0296,0,0,ef99994aa0e927283601f299ff2a2a7b6828140dc06395bd45961df4e93495db,2025-01-07T16:15:39.673000 @@ -276139,10 +276162,14 @@ CVE-2025-0298,0,0,ec923ed4b9b6afa6228d656ddb0c601f5ebbf31d02abf4f38a99c8dda70d2f CVE-2025-0299,0,0,46c993a70c9dd5843cd4dc3486123b8f79f076cb607c745df442454088b3fb74,2025-01-07T19:15:34.743000 CVE-2025-0300,0,0,6462b093b202cdda5c643638789beb08104cb14d8ff95eb1f2f740fecb0f8630,2025-01-07T17:15:32.090000 CVE-2025-0301,0,0,db7e09db06a3c89075ef99c6e0773ce8d9b6391802870d788b13b4dc1d994dbc,2025-01-07T18:15:21.460000 -CVE-2025-20123,1,1,7f3b728d3f9cbfa875df0a45e50a08c953f805f15b1141475f4e31dfbed0e1d1,2025-01-08T16:15:38.150000 -CVE-2025-20126,1,1,c5db57aefb51164ccb6e849ffeda7fe53ec9db60cd4b270d9efd1d7bff2bdec8,2025-01-08T16:15:38.357000 +CVE-2025-20123,0,0,7f3b728d3f9cbfa875df0a45e50a08c953f805f15b1141475f4e31dfbed0e1d1,2025-01-08T16:15:38.150000 +CVE-2025-20126,0,0,c5db57aefb51164ccb6e849ffeda7fe53ec9db60cd4b270d9efd1d7bff2bdec8,2025-01-08T16:15:38.357000 +CVE-2025-20166,1,1,b11a57811b63f7d2208067ccc65af65bb9e1761d9a36811f745adce498b4e21f,2025-01-08T17:15:16.990000 +CVE-2025-20167,1,1,e3874d78f816684b3ad3095069171d70c3e3e27074d9afdb1ef0c3389781207f,2025-01-08T17:15:17.163000 +CVE-2025-20168,1,1,1b582f0e103ddf474141bdcff2b1873e77789f263e13a1a2b55771b742e937b2,2025-01-08T17:15:17.323000 CVE-2025-21102,0,0,2ea9dc2a8684b7cddaddfe4341f8f27d4b76937cd9aabee635ab02b83d4b3e6e,2025-01-08T12:15:22.850000 -CVE-2025-21603,0,1,b5e381674b14c0da15b91edbb6dfa15bbf2e7ab847df89260480b3be932a728c,2025-01-08T15:15:21.320000 +CVE-2025-21111,1,1,16b52f24c4b80d09f6e5e5284496a40288893ce98ea4f8b371a26cbe1749320e,2025-01-08T18:15:20.157000 +CVE-2025-21603,0,0,b5e381674b14c0da15b91edbb6dfa15bbf2e7ab847df89260480b3be932a728c,2025-01-08T15:15:21.320000 CVE-2025-21604,0,0,ec728601eba6bd539d6daf316c2c18ea930a896bd5f0099ef67fb1e9d57f3d64,2025-01-06T16:15:30.927000 CVE-2025-21609,0,0,46e3af17bfffe98fbaec33d01272d23877fbd06c6cc0e4a79625fd3beabb7e1e,2025-01-03T17:15:09.147000 CVE-2025-21610,0,0,803b1c12bbaab2c87bcfc5865cced8b68fa26746eb8c056e6bba01e1200224ac,2025-01-03T17:15:09.290000 @@ -276158,13 +276185,13 @@ CVE-2025-21620,0,0,66289b3b3f28df54a495a49470b309f007a7b7fd72e39a3c6fd58a9e688ab CVE-2025-21622,0,0,6c5785ebf77d1798b874aaffe451a58c4a37257af0382e9b593172ad9a04e2cc,2025-01-07T18:15:21.703000 CVE-2025-21623,0,0,6087933d996aad8edaafac7f0dbca82dce0a66add1f565d4e48b576d3a77cbb8,2025-01-07T17:15:32.313000 CVE-2025-21624,0,0,48317da35eed5453ecdf02e6a373b353bc1bb2bc0793e255b08a0ed1235e3ac9,2025-01-07T17:15:32.417000 -CVE-2025-22130,1,1,1c04fe501f2c52c223532c188d73e6b294c7cd14c808267f30384be4f18c686f,2025-01-08T16:15:38.543000 +CVE-2025-22130,0,0,1c04fe501f2c52c223532c188d73e6b294c7cd14c808267f30384be4f18c686f,2025-01-08T16:15:38.543000 CVE-2025-22132,0,0,68d348d844ec3947f7795605dbc0f9b5ea1e9ec0bb464d07ae2fd1571ba27a37,2025-01-07T22:15:31.590000 -CVE-2025-22133,0,1,fbcb8ce624ceed57d4b59a3f2fe5dc11cb74a45b756ff7cc7f2369bba16ab526,2025-01-08T15:15:21.727000 -CVE-2025-22136,1,1,123a9917fd0885e775ecfe67805e47c52e223b69c26b7474799ef308240a577d,2025-01-08T16:15:38.770000 -CVE-2025-22137,1,1,b7624e8939f9495a9a9ad1232e6a1d9ca96cc90779cda5c7141fa5d1adf92295,2025-01-08T16:15:38.920000 +CVE-2025-22133,0,0,fbcb8ce624ceed57d4b59a3f2fe5dc11cb74a45b756ff7cc7f2369bba16ab526,2025-01-08T15:15:21.727000 +CVE-2025-22136,0,0,123a9917fd0885e775ecfe67805e47c52e223b69c26b7474799ef308240a577d,2025-01-08T16:15:38.770000 +CVE-2025-22137,0,0,b7624e8939f9495a9a9ad1232e6a1d9ca96cc90779cda5c7141fa5d1adf92295,2025-01-08T16:15:38.920000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 -CVE-2025-22215,0,1,67b181a6458a232e8ac5c80f2cba09df8333cbef01abc4197cfb8a002eebc845,2025-01-08T15:15:21.927000 +CVE-2025-22215,0,0,67b181a6458a232e8ac5c80f2cba09df8333cbef01abc4197cfb8a002eebc845,2025-01-08T15:15:21.927000 CVE-2025-22261,0,0,b64f32ab7c14edb8b70371073baa276f94f41977fffad6128d5b8c7f32ae4fb7,2025-01-07T11:15:13.290000 CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000 CVE-2025-22293,0,0,bd03641f797a3639dbea19e70261d5f3ef47716330e1253c8622562a786a5f2c,2025-01-07T11:15:13.473000