From 55846f66335eb47a99adeac9fbe7893a03ee2909 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 3 Jan 2025 21:03:44 +0000 Subject: [PATCH] Auto-Update: 2025-01-03T21:00:20.421180+00:00 --- CVE-2022/CVE-2022-285xx/CVE-2022-28550.json | 36 ++- CVE-2022/CVE-2022-316xx/CVE-2022-31637.json | 32 ++- CVE-2022/CVE-2022-316xx/CVE-2022-31638.json | 32 ++- CVE-2022/CVE-2022-316xx/CVE-2022-31639.json | 32 ++- CVE-2022/CVE-2022-473xx/CVE-2022-47376.json | 22 +- CVE-2023/CVE-2023-244xx/CVE-2023-24469.json | 32 ++- CVE-2023/CVE-2023-301xx/CVE-2023-30179.json | 32 ++- CVE-2023/CVE-2023-311xx/CVE-2023-31195.json | 32 ++- CVE-2023/CVE-2023-311xx/CVE-2023-31196.json | 32 ++- CVE-2023/CVE-2023-311xx/CVE-2023-31198.json | 32 ++- CVE-2023/CVE-2023-314xx/CVE-2023-31437.json | 32 ++- CVE-2023/CVE-2023-315xx/CVE-2023-31541.json | 32 ++- CVE-2023/CVE-2023-321xx/CVE-2023-32131.json | 70 +++++- CVE-2023/CVE-2023-321xx/CVE-2023-32132.json | 70 +++++- CVE-2023/CVE-2023-321xx/CVE-2023-32133.json | 70 +++++- CVE-2023/CVE-2023-321xx/CVE-2023-32134.json | 70 +++++- CVE-2023/CVE-2023-321xx/CVE-2023-32135.json | 70 +++++- CVE-2023/CVE-2023-325xx/CVE-2023-32546.json | 32 ++- CVE-2023/CVE-2023-325xx/CVE-2023-32548.json | 32 ++- CVE-2023/CVE-2023-326xx/CVE-2023-32673.json | 22 +- CVE-2023/CVE-2023-326xx/CVE-2023-32674.json | 32 ++- CVE-2023/CVE-2023-342xx/CVE-2023-34294.json | 64 +++++- CVE-2023/CVE-2023-342xx/CVE-2023-34295.json | 64 +++++- CVE-2023/CVE-2023-342xx/CVE-2023-34296.json | 64 +++++- CVE-2023/CVE-2023-342xx/CVE-2023-34297.json | 64 +++++- CVE-2023/CVE-2023-350xx/CVE-2023-35036.json | 32 ++- CVE-2023/CVE-2023-357xx/CVE-2023-35734.json | 64 +++++- CVE-2023/CVE-2023-389xx/CVE-2023-38944.json | 102 ++++++++- CVE-2023/CVE-2023-516xx/CVE-2023-51638.json | 54 ++++- CVE-2023/CVE-2023-516xx/CVE-2023-51639.json | 54 ++++- CVE-2023/CVE-2023-516xx/CVE-2023-51640.json | 54 ++++- CVE-2023/CVE-2023-516xx/CVE-2023-51641.json | 54 ++++- CVE-2023/CVE-2023-516xx/CVE-2023-51642.json | 54 ++++- CVE-2023/CVE-2023-516xx/CVE-2023-51643.json | 55 ++++- CVE-2023/CVE-2023-516xx/CVE-2023-51644.json | 64 +++++- CVE-2023/CVE-2023-516xx/CVE-2023-51645.json | 54 ++++- CVE-2023/CVE-2023-516xx/CVE-2023-51646.json | 54 ++++- CVE-2023/CVE-2023-516xx/CVE-2023-51647.json | 55 ++++- CVE-2023/CVE-2023-516xx/CVE-2023-51648.json | 54 ++++- CVE-2023/CVE-2023-523xx/CVE-2023-52332.json | 54 ++++- CVE-2023/CVE-2023-523xx/CVE-2023-52333.json | 54 ++++- CVE-2023/CVE-2023-523xx/CVE-2023-52334.json | 54 ++++- CVE-2023/CVE-2023-55xx/CVE-2023-5528.json | 39 +++- CVE-2024/CVE-2024-10xx/CVE-2024-1014.json | 8 +- CVE-2024/CVE-2024-10xx/CVE-2024-1015.json | 8 +- CVE-2024/CVE-2024-130xx/CVE-2024-13043.json | 52 ++++- CVE-2024/CVE-2024-17xx/CVE-2024-1703.json | 6 +- CVE-2024/CVE-2024-17xx/CVE-2024-1704.json | 6 +- CVE-2024/CVE-2024-18xx/CVE-2024-1867.json | 49 +++- CVE-2024/CVE-2024-18xx/CVE-2024-1868.json | 49 +++- CVE-2024/CVE-2024-214xx/CVE-2024-21491.json | 8 +- CVE-2024/CVE-2024-279xx/CVE-2024-27931.json | 64 +++++- CVE-2024/CVE-2024-279xx/CVE-2024-27932.json | 85 ++++++- CVE-2024/CVE-2024-279xx/CVE-2024-27933.json | 153 +++++++++++-- CVE-2024/CVE-2024-279xx/CVE-2024-27934.json | 65 +++++- CVE-2024/CVE-2024-279xx/CVE-2024-27935.json | 85 ++++++- CVE-2024/CVE-2024-279xx/CVE-2024-27936.json | 92 +++++++- CVE-2024/CVE-2024-303xx/CVE-2024-30372.json | 64 +++++- CVE-2024/CVE-2024-303xx/CVE-2024-30377.json | 49 +++- CVE-2024/CVE-2024-346xx/CVE-2024-34601.json | 8 +- CVE-2024/CVE-2024-488xx/CVE-2024-48814.json | 41 +++- CVE-2024/CVE-2024-550xx/CVE-2024-55078.json | 41 +++- CVE-2024/CVE-2024-563xx/CVE-2024-56365.json | 10 +- CVE-2024/CVE-2024-563xx/CVE-2024-56366.json | 10 +- CVE-2024/CVE-2024-564xx/CVE-2024-56408.json | 6 +- CVE-2024/CVE-2024-564xx/CVE-2024-56409.json | 10 +- CVE-2024/CVE-2024-69xx/CVE-2024-6943.json | 8 +- CVE-2024/CVE-2024-69xx/CVE-2024-6944.json | 8 +- CVE-2024/CVE-2024-79xx/CVE-2024-7971.json | 22 +- CVE-2025/CVE-2025-01xx/CVE-2025-0196.json | 145 ++++++++++++ CVE-2025/CVE-2025-01xx/CVE-2025-0197.json | 145 ++++++++++++ README.md | 75 +++--- _state.csv | 238 ++++++++++---------- 73 files changed, 3315 insertions(+), 402 deletions(-) create mode 100644 CVE-2025/CVE-2025-01xx/CVE-2025-0196.json create mode 100644 CVE-2025/CVE-2025-01xx/CVE-2025-0197.json diff --git a/CVE-2022/CVE-2022-285xx/CVE-2022-28550.json b/CVE-2022/CVE-2022-285xx/CVE-2022-28550.json index bd87d3da741..82fa04fa4f6 100644 --- a/CVE-2022/CVE-2022-285xx/CVE-2022-28550.json +++ b/CVE-2022/CVE-2022-285xx/CVE-2022-28550.json @@ -2,7 +2,7 @@ "id": "CVE-2022-28550", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-13T20:15:08.907", - "lastModified": "2024-11-21T06:57:30.327", + "lastModified": "2025-01-03T20:15:24.200", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,20 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31637.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31637.json index 1101b5fb595..a4be59854f4 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31637.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31637.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31637", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-06-13T17:15:12.700", - "lastModified": "2024-11-21T07:04:55.353", + "lastModified": "2025-01-03T20:15:24.413", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.1, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31638.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31638.json index a67d96fd3b1..65129fff126 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31638.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31638.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31638", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-06-13T17:15:12.753", - "lastModified": "2024-11-21T07:04:55.950", + "lastModified": "2025-01-03T20:15:25.023", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.1, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31639.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31639.json index 17f10226291..fd94b8a90b2 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31639.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31639.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31639", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-06-13T17:15:12.807", - "lastModified": "2024-11-21T07:04:56.547", + "lastModified": "2025-01-03T19:15:06.797", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.1, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47376.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47376.json index e6d85df06dd..b8669192d02 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47376.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47376.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47376", "sourceIdentifier": "cybersecurity@bd.com", "published": "2023-06-13T20:15:08.967", - "lastModified": "2024-11-21T07:31:51.407", + "lastModified": "2025-01-03T19:15:09.270", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.5 } ] }, diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24469.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24469.json index d957583ec18..afc09bba8a6 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24469.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24469.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24469", "sourceIdentifier": "security@opentext.com", "published": "2023-06-13T22:15:09.317", - "lastModified": "2024-11-21T07:47:55.230", + "lastModified": "2025-01-03T19:15:09.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30179.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30179.json index 0f36edb3117..79d872bd1d8 100644 --- a/CVE-2023/CVE-2023-301xx/CVE-2023-30179.json +++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30179.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30179", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-13T17:15:14.600", - "lastModified": "2024-11-21T07:59:51.583", + "lastModified": "2025-01-03T20:15:25.737", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -52,6 +72,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31195.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31195.json index 5390a562d20..1941020a1fa 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31195.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31195.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31195", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-13T10:15:10.410", - "lastModified": "2024-11-21T08:01:36.417", + "lastModified": "2025-01-03T20:15:25.963", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-319" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31196.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31196.json index 17835c309c2..0d41d0723b5 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31196.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31196.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31196", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-13T10:15:10.450", - "lastModified": "2024-11-21T08:01:36.537", + "lastModified": "2025-01-03T20:15:26.123", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31198.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31198.json index ae0c0b5c253..feee4b0e93b 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31198.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31198.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31198", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-13T10:15:10.493", - "lastModified": "2024-11-21T08:01:36.777", + "lastModified": "2025-01-03T20:15:26.290", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31437.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31437.json index 78c0f334291..5c4849232b0 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31437.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31437.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31437", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-13T17:15:14.657", - "lastModified": "2024-11-21T08:01:51.810", + "lastModified": "2025-01-03T20:15:26.457", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -52,6 +72,16 @@ "value": "CWE-354" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-354" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31541.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31541.json index c2082dee15a..42e554d2ced 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31541.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31541.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31541", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-13T17:15:14.810", - "lastModified": "2024-11-21T08:02:00.770", + "lastModified": "2025-01-03T20:15:26.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32131.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32131.json index 0438cae8eea..2ee20281a75 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32131.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32131.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32131", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:15.943", - "lastModified": "2024-11-21T08:02:45.930", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-03T20:30:12.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,56 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:santesoft:dicom_editor:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.8.12", + "matchCriteriaId": "95F33AB2-1322-498F-ADD5-F4089EBD6A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:santesoft:dicom_viewer_pro:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.8.12", + "matchCriteriaId": "4DF55FB8-25BE-40C9-85BD-5461C539818A" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-523/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-523/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32132.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32132.json index 8b475310b54..8a3eadc7384 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32132.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32132.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32132", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:16.130", - "lastModified": "2024-11-21T08:02:46.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-03T20:30:32.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,56 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:santesoft:dicom_editor:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.8.12", + "matchCriteriaId": "95F33AB2-1322-498F-ADD5-F4089EBD6A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:santesoft:dicom_viewer_pro:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.8.12", + "matchCriteriaId": "4DF55FB8-25BE-40C9-85BD-5461C539818A" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-524/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-524/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32133.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32133.json index 474013984ea..ecec367f4d7 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32133.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32133.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32133", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:16.320", - "lastModified": "2024-11-21T08:02:46.150", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-03T20:32:13.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,56 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:santesoft:dicom_editor:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.8.12", + "matchCriteriaId": "95F33AB2-1322-498F-ADD5-F4089EBD6A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:santesoft:dicom_viewer_pro:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.8.12", + "matchCriteriaId": "4DF55FB8-25BE-40C9-85BD-5461C539818A" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-525/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-525/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32134.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32134.json index 189269e9d99..57d952d4833 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32134.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32134.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32134", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:16.510", - "lastModified": "2024-11-21T08:02:46.263", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-03T20:32:33.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,56 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:santesoft:dicom_editor:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.8.12", + "matchCriteriaId": "95F33AB2-1322-498F-ADD5-F4089EBD6A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:santesoft:dicom_viewer_pro:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.8.12", + "matchCriteriaId": "4DF55FB8-25BE-40C9-85BD-5461C539818A" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-526/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-526/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32135.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32135.json index 7cd0a08389b..c43ab82348c 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32135.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32135.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32135", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:16.687", - "lastModified": "2024-11-21T08:02:46.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-03T20:33:16.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,56 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:santesoft:dicom_editor:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.8.12", + "matchCriteriaId": "95F33AB2-1322-498F-ADD5-F4089EBD6A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:santesoft:dicom_viewer_pro:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.8.12", + "matchCriteriaId": "4DF55FB8-25BE-40C9-85BD-5461C539818A" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-527/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-527/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32546.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32546.json index 19785957faa..fcd3c725933 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32546.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32546.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32546", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-13T10:15:10.533", - "lastModified": "2024-11-21T08:03:34.360", + "lastModified": "2025-01-03T20:15:26.840", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.5 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32548.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32548.json index 68964b583c2..e1fdeb837ed 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32548.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32548.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32548", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-13T10:15:10.573", - "lastModified": "2024-11-21T08:03:34.613", + "lastModified": "2025-01-03T20:15:26.993", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32673.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32673.json index d34cb2ec579..8ad8d270ab2 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32673.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32673.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32673", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-06-12T22:15:10.033", - "lastModified": "2024-11-21T08:03:49.397", + "lastModified": "2025-01-03T19:15:09.823", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32674.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32674.json index 42f23e8b88b..f1d062030ff 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32674.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32674.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32674", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-06-12T22:15:10.077", - "lastModified": "2024-11-21T08:03:49.517", + "lastModified": "2025-01-03T19:15:09.997", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34294.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34294.json index 66912ceeb2b..cb3ed210f32 100644 --- a/CVE-2023/CVE-2023-342xx/CVE-2023-34294.json +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34294.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34294", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:29.840", - "lastModified": "2024-11-21T08:06:57.140", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-03T20:33:50.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,50 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:santesoft:dicom_viewer_pro:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.2.4", + "matchCriteriaId": "2FEE9517-67E3-4A76-B335-7A13806CBF58" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-853/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-853/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34295.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34295.json index 2e21f535c42..f8b774c604e 100644 --- a/CVE-2023/CVE-2023-342xx/CVE-2023-34295.json +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34295.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34295", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:30.000", - "lastModified": "2024-11-21T08:06:57.307", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-03T20:34:11.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,50 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:santesoft:dicom_viewer_pro:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.2.4", + "matchCriteriaId": "2FEE9517-67E3-4A76-B335-7A13806CBF58" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-854/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-854/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34296.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34296.json index 5dbe222ee45..5c490884558 100644 --- a/CVE-2023/CVE-2023-342xx/CVE-2023-34296.json +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34296.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34296", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:30.167", - "lastModified": "2024-11-21T08:06:57.423", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-03T20:35:30.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,50 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:santesoft:dicom_viewer_pro:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.2.4", + "matchCriteriaId": "2FEE9517-67E3-4A76-B335-7A13806CBF58" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-855/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-855/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34297.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34297.json index eb6d99805ea..607ed6e0373 100644 --- a/CVE-2023/CVE-2023-342xx/CVE-2023-34297.json +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34297.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34297", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:30.337", - "lastModified": "2024-11-21T08:06:57.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-03T20:35:46.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,50 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:santesoft:dicom_viewer_pro:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.2.4", + "matchCriteriaId": "2FEE9517-67E3-4A76-B335-7A13806CBF58" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-856/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-856/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35036.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35036.json index 2ea207dd5c3..b5d62492913 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35036.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35036.json @@ -2,7 +2,7 @@ "id": "CVE-2023-35036", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-12T03:15:09.233", - "lastModified": "2024-11-21T08:07:51.630", + "lastModified": "2025-01-03T19:15:10.400", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35734.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35734.json index 15832336f67..12cb76dcb1d 100644 --- a/CVE-2023/CVE-2023-357xx/CVE-2023-35734.json +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35734.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35734", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:36.970", - "lastModified": "2024-11-21T08:08:36.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-03T20:36:02.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,50 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:santesoft:dicom_viewer_pro:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.2.5", + "matchCriteriaId": "E1C2D859-786A-4A88-8DC3-CF1B1C1FEC0D" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-970/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-970/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38944.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38944.json index 965cfa8731c..40f23283c80 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38944.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38944.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38944", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-06T00:15:52.143", - "lastModified": "2024-11-21T08:14:29.993", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-03T20:12:34.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,78 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:multilaser:re160v_firmware:12.03.01.09_pt:*:*:*:*:*:*:*", + "matchCriteriaId": "3FACF669-288B-4B42-8120-E567A5C477C3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:multilaser:re160v:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70C33130-2E3E-488B-9389-BA2610A3A4BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:multilaser:re163v_firmware:12.03.01.10_pt:*:*:*:*:*:*:*", + "matchCriteriaId": "2681506E-307D-40C3-BB6E-063179804472" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:multilaser:re163v:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB80F4FB-89C3-4862-B8B6-7DB3F91E3B25" + } + ] + } + ] + } + ], "references": [ { "url": "https://seclists.org/fulldisclosure/2024/Mar/0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://seclists.org/fulldisclosure/2024/Mar/0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51638.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51638.json index c2c1c85dc0b..da76b715c3f 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51638.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51638.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51638", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:06.283", - "lastModified": "2024-11-22T20:15:06.283", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T20:19:29.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.5.1", + "matchCriteriaId": "21BACEA1-B578-4BE9-89BC-CA7C3F409FD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-111/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51639.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51639.json index 6da5ea9c688..4dde18dce50 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51639.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51639.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51639", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:06.400", - "lastModified": "2024-11-22T20:15:06.400", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T20:19:50.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.5.1", + "matchCriteriaId": "21BACEA1-B578-4BE9-89BC-CA7C3F409FD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-110/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51640.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51640.json index 94c8be4cc27..a0b16fc7e2c 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51640.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51640.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51640", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:06.523", - "lastModified": "2024-11-22T20:15:06.523", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T20:21:13.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.5.1", + "matchCriteriaId": "21BACEA1-B578-4BE9-89BC-CA7C3F409FD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-107/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51641.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51641.json index 467992a10d0..ec51edbbf76 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51641.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51641.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51641", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:06.643", - "lastModified": "2024-11-22T20:15:06.643", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T20:22:19.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.5.1", + "matchCriteriaId": "21BACEA1-B578-4BE9-89BC-CA7C3F409FD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-106/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51642.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51642.json index 4467ba18b0c..d3c2810e9ca 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51642.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51642.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51642", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:06.757", - "lastModified": "2024-11-22T20:15:06.757", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T20:23:03.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.5.1", + "matchCriteriaId": "21BACEA1-B578-4BE9-89BC-CA7C3F409FD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-105/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51643.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51643.json index 3b6e4126e34..5dedaceb28d 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51643.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51643.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51643", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:06.870", - "lastModified": "2024-11-22T20:15:06.870", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T20:06:29.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,14 +73,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.5.1", + "matchCriteriaId": "21BACEA1-B578-4BE9-89BC-CA7C3F409FD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-103/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51644.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51644.json index 0fda21f4270..486eda338f7 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51644.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51644.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51644", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:06.987", - "lastModified": "2024-11-22T20:15:06.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T20:08:18.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,50 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.5.1", + "matchCriteriaId": "21BACEA1-B578-4BE9-89BC-CA7C3F409FD8" + } + ] + } + ] } ], "references": [ { "url": "https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-102/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51645.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51645.json index 76aba98cd5b..31e45f71b79 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51645.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51645.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51645", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:07.103", - "lastModified": "2024-11-22T20:15:07.103", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T20:09:25.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.5.1", + "matchCriteriaId": "21BACEA1-B578-4BE9-89BC-CA7C3F409FD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-101/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51646.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51646.json index 67844ecc6ee..45b0e70d77b 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51646.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51646.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51646", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:07.230", - "lastModified": "2024-11-22T20:15:07.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T20:15:14.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.5.1", + "matchCriteriaId": "21BACEA1-B578-4BE9-89BC-CA7C3F409FD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-109/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51647.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51647.json index 23696397eb0..55f0efe2463 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51647.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51647.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51647", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:07.337", - "lastModified": "2024-11-22T20:15:07.337", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T20:18:04.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,14 +73,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.5.1", + "matchCriteriaId": "21BACEA1-B578-4BE9-89BC-CA7C3F409FD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-108/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51648.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51648.json index 8fdf6526b59..8e10601b08f 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51648.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51648.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51648", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:07.447", - "lastModified": "2024-11-22T20:15:07.447", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T19:28:29.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.5.1", + "matchCriteriaId": "21BACEA1-B578-4BE9-89BC-CA7C3F409FD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-099/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52332.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52332.json index 49b3d24f141..8634ede0a59 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52332.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52332.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52332", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:07.560", - "lastModified": "2024-11-22T20:15:07.560", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T19:29:05.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.5.1", + "matchCriteriaId": "21BACEA1-B578-4BE9-89BC-CA7C3F409FD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-100/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52333.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52333.json index a446c18dad9..07a5db14fd8 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52333.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52333.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52333", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:07.670", - "lastModified": "2024-11-22T20:15:07.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T19:49:29.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.5.1", + "matchCriteriaId": "21BACEA1-B578-4BE9-89BC-CA7C3F409FD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-104/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-523xx/CVE-2023-52334.json b/CVE-2023/CVE-2023-523xx/CVE-2023-52334.json index 453fe4f6736..2a2a1793e61 100644 --- a/CVE-2023/CVE-2023-523xx/CVE-2023-52334.json +++ b/CVE-2023/CVE-2023-523xx/CVE-2023-52334.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52334", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:07.793", - "lastModified": "2024-11-22T20:15:07.793", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T19:54:44.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.5.1", + "matchCriteriaId": "21BACEA1-B578-4BE9-89BC-CA7C3F409FD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.trackplus.com/en/service/release-notes-reader/7-5-1-release-notes-2.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-112/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5528.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5528.json index d1cb2044e13..a6ec3514688 100644 --- a/CVE-2023/CVE-2023-55xx/CVE-2023-5528.json +++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5528.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5528", "sourceIdentifier": "jordan@liggitt.net", "published": "2023-11-14T21:15:14.123", - "lastModified": "2024-11-21T08:41:56.820", - "vulnStatus": "Modified", + "lastModified": "2025-01-03T19:42:12.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -83,6 +83,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -117,6 +118,17 @@ "matchCriteriaId": "8C9231AD-C3B9-4531-9052-0317AA506B0B" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] } ] }, @@ -179,19 +191,34 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JH444PWZBINXLLFV7XLIJIZJHSK6UEZ/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4XZIX727JIKF5RQW7RVVBLWXBCDIBJA7/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MPGMITSZXUCAVO7Q75675SOLXC2XXU4/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240119-0009/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1014.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1014.json index 1eadec63a68..27bd0967e70 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1014.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1014.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1014", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-29T14:15:09.437", - "lastModified": "2024-12-26T14:47:20.980", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T19:15:10.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -91,8 +91,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:se-elektronicgmbh:e-ddc3.3_firmware:03.07.03:*:*:*:*:*:*:*", - "matchCriteriaId": "2FB32F1D-8E3D-4C2F-BF31-A107C9963D25" + "criteria": "cpe:2.3:o:se-elektronic:e-ddc3.3_firmware:03.07.03:*:*:*:*:*:*:*", + "matchCriteriaId": "21E9EB83-8C81-483F-9070-F2770ACE5292" } ] }, diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1015.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1015.json index 9b9e2167068..413d66e7557 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1015.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1015.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1015", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-01-29T14:15:09.657", - "lastModified": "2024-12-26T14:47:20.980", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T19:15:53.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -91,8 +91,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:se-elektronicgmbh:e-ddc3.3_firmware:03.07.03:*:*:*:*:*:*:*", - "matchCriteriaId": "2FB32F1D-8E3D-4C2F-BF31-A107C9963D25" + "criteria": "cpe:2.3:o:se-elektronic:e-ddc3.3_firmware:03.07.03:*:*:*:*:*:*:*", + "matchCriteriaId": "21E9EB83-8C81-483F-9070-F2770ACE5292" } ] }, diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13043.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13043.json index 1709b258a9d..cd305175916 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13043.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13043.json @@ -2,16 +2,42 @@ "id": "CVE-2024-13043", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-12-30T21:15:06.713", - "lastModified": "2024-12-30T21:15:06.713", - "vulnStatus": "Received", + "lastModified": "2025-01-03T20:56:34.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Panda Security Dome Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Hotspot Shield. By creating a junction, an attacker can abuse the application to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23478." + }, + { + "lang": "es", + "value": "Vulnerabilidad de escalada de privilegios locales en Panda Security Dome Link Following. Esta vulnerabilidad permite a los atacantes locales escalar privilegios en las instalaciones afectadas de Panda Security Dome. Un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo con poco nivel de privilegios en el sistema de destino para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro de Hotspot Shield. Al crear una uni\u00f3n, un atacante puede abusar de la aplicaci\u00f3n para eliminar archivos arbitrarios. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios y ejecutar c\u00f3digo arbitrario en el contexto de SYSTEM. Era ZDI-CAN-23478." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,10 +73,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:watchguard:panda_dome:22.02.01:*:*:*:*:*:*:*", + "matchCriteriaId": "011C3DEE-483F-4FD5-8632-9E412398B717" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1727/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1703.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1703.json index 0672ce0b1be..b38c2f769c9 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1703.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1703.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1703", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-21T17:15:08.793", - "lastModified": "2024-12-04T22:33:29.567", + "lastModified": "2025-01-03T19:11:33.877", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -115,8 +115,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:zhongbangkeji:crmeb:5.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "429519B4-5DD9-4348-B318-6C4F1273BA81" + "criteria": "cpe:2.3:a:crmeb:crmeb:5.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F0566B98-D93C-4D4D-BB2B-37FCF55D0585" } ] } diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1704.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1704.json index 806ec803d5d..c28f5f7bc52 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1704.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1704.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1704", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-21T18:15:50.613", - "lastModified": "2024-12-04T22:24:16.043", + "lastModified": "2025-01-03T19:11:28.830", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -105,8 +105,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:zhongbangkeji:crmeb:5.2.2:*:*:*:*:*:*:*", - "matchCriteriaId": "429519B4-5DD9-4348-B318-6C4F1273BA81" + "criteria": "cpe:2.3:a:crmeb:crmeb:5.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F0566B98-D93C-4D4D-BB2B-37FCF55D0585" } ] } diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1867.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1867.json index 04f02b65684..25cea197e29 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1867.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1867.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1867", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:08.163", - "lastModified": "2024-11-22T20:15:08.163", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T20:47:30.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gdata-software:total_security:*:*:*:*:*:*:*:*", + "versionEndExcluding": "25.5.17.355", + "matchCriteriaId": "3F3A5D65-C4F4-4BCA-B1AF-FE6C17EE3CA9" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-559/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1868.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1868.json index 83c3e0e1388..3e63fa3e612 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1868.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1868.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1868", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:08.280", - "lastModified": "2024-11-22T20:15:08.280", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T20:47:05.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gdata-software:total_security:*:*:*:*:*:*:*:*", + "versionEndExcluding": "25.5.17.355", + "matchCriteriaId": "3F3A5D65-C4F4-4BCA-B1AF-FE6C17EE3CA9" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-558/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21491.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21491.json index 286a9666f51..5c31a85e805 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21491.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21491.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21491", "sourceIdentifier": "report@snyk.io", "published": "2024-02-13T05:15:08.873", - "lastModified": "2024-11-21T08:54:32.553", - "vulnStatus": "Modified", + "lastModified": "2025-01-03T19:40:54.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:svix:svix:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:svix:svix-webhooks:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.17.0", - "matchCriteriaId": "966B2847-AEC3-4D16-8230-5FDA3526B474" + "matchCriteriaId": "1748F9E0-E919-496F-BD6E-8A0787D334D7" } ] } diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27931.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27931.json index af27ecfaae0..4082ee34844 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27931.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27931.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27931", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-05T17:15:07.310", - "lastModified": "2024-11-21T09:05:26.613", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-03T19:29:35.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.41.1", + "matchCriteriaId": "CDC88459-089C-4E6D-950E-341DB3737E84" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/denoland/deno/security/advisories/GHSA-hrqr-jv8w-v9jh", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/denoland/deno/security/advisories/GHSA-hrqr-jv8w-v9jh", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27932.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27932.json index b83f94bd916..6ec7ac82806 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27932.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27932.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27932", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-21T02:52:21.953", - "lastModified": "2024-11-21T09:05:26.747", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T19:19:52.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 } ] }, @@ -49,32 +69,81 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.8.0", + "versionEndExcluding": "1.40.4", + "matchCriteriaId": "848BE47F-134F-4489-BC2C-785B5B0C0AAB" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/denoland/deno/blob/3f4639c330a31741b0efda2f93ebbb833f4f95bc/cli/auth_tokens.rs#L89", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/commit/de23e3b60b066481cc390f459497d5bef42a899b", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/denoland/deno/security/advisories/GHSA-5frw-4rwq-xhcr", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/denoland/deno/blob/3f4639c330a31741b0efda2f93ebbb833f4f95bc/cli/auth_tokens.rs#L89", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/commit/de23e3b60b066481cc390f459497d5bef42a899b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/denoland/deno/security/advisories/GHSA-5frw-4rwq-xhcr", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27933.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27933.json index 42f51d8d217..0f8dca1e296 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27933.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27933.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27933", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-21T02:52:22.197", - "lastModified": "2024-11-21T09:05:26.873", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T19:23:04.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.5, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 } ] }, @@ -49,88 +69,177 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deno:deno:1.39.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F5D56C51-E65E-4594-8936-3BBA9322E97D" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L214", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L220", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L225", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L241", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L256", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L265", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L99", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/commit/55fac9f5ead6d30996400e8597c969b675c5a22b", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/denoland/deno/commit/5a91a065b882215dde209baf626247e54c21a392", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/security/advisories/GHSA-6q4w-9x56-rmwq", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L214", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L220", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L225", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L241", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L256", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L265", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L99", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/commit/55fac9f5ead6d30996400e8597c969b675c5a22b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/denoland/deno/commit/5a91a065b882215dde209baf626247e54c21a392", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/denoland/deno/security/advisories/GHSA-6q4w-9x56-rmwq", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27934.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27934.json index 254d612473d..012553ac083 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27934.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27934.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27934", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-21T02:52:22.427", - "lastModified": "2024-11-21T09:05:27.020", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T19:23:57.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 } ] }, @@ -49,16 +69,53 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.36.2", + "versionEndExcluding": "1.40.3", + "matchCriteriaId": "38E9C09A-0D15-4AA7-8807-1B740D26419D" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/denoland/deno/security/advisories/GHSA-3j27-563v-28wf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/denoland/deno/security/advisories/GHSA-3j27-563v-28wf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27935.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27935.json index b73717dc17d..80b140da1e3 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27935.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27935.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27935", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-21T02:52:22.627", - "lastModified": "2024-11-21T09:05:27.147", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T19:25:19.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.7 } ] }, @@ -49,32 +69,81 @@ "value": "CWE-488" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.35.1", + "versionEndExcluding": "1.36.3", + "matchCriteriaId": "9C495C2E-08BD-43EB-9210-6FF31E09ECCF" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/denoland/deno/commit/3e9fb8aafd9834ebacd27734cea4310caaf794c6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/denoland/deno/issues/20188", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/denoland/deno/security/advisories/GHSA-wrqv-pf6j-mqjp", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/denoland/deno/commit/3e9fb8aafd9834ebacd27734cea4310caaf794c6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/denoland/deno/issues/20188", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/denoland/deno/security/advisories/GHSA-wrqv-pf6j-mqjp", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27936.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27936.json index 6e8ded147b6..3b8c28067cd 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27936.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27936.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27936", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-21T02:52:22.813", - "lastModified": "2024-11-21T09:05:27.273", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T19:27:46.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,32 +69,88 @@ "value": "CWE-150" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.32.1", + "versionEndExcluding": "1.41.0", + "matchCriteriaId": "9CA87604-33E8-4CAE-B495-A1CA54375989" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deno:deno_runtime:*:*:*:*:*:rust:*:*", + "versionStartIncluding": "0.103.0", + "versionEndExcluding": "0.147.0", + "matchCriteriaId": "96B2F540-1D61-413F-A71F-2B95C6FB5149" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/denoland/deno/commit/78d430103a8f6931154ddbbe19d36f3b8630286d", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/denoland/deno/commit/7e6b94231290020b55f1d08fb03ea8132781abc5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/denoland/deno/security/advisories/GHSA-m4pq-fv2w-6hrw", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/denoland/deno/commit/78d430103a8f6931154ddbbe19d36f3b8630286d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/denoland/deno/commit/7e6b94231290020b55f1d08fb03ea8132781abc5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/denoland/deno/security/advisories/GHSA-m4pq-fv2w-6hrw", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30372.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30372.json index 9b67fe4564b..a44f3e07a5d 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30372.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30372.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30372", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:08.550", - "lastModified": "2024-11-22T20:15:08.550", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T19:55:22.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,50 @@ "value": "CWE-1336" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.5.1", + "matchCriteriaId": "21BACEA1-B578-4BE9-89BC-CA7C3F409FD8" + } + ] + } + ] } ], "references": [ { "url": "https://alltena.com/en/resources/release-notes/relnotes-7-5-2", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1165/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30377.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30377.json index b70eb2c23c6..ad742a57616 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30377.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30377.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30377", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:08.780", - "lastModified": "2024-11-22T20:15:08.780", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T20:46:41.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gdata-software:total_security:*:*:*:*:*:*:*:*", + "versionEndExcluding": "25.5.18.333", + "matchCriteriaId": "064D1335-1C83-4479-AC18-855DB6BD6799" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1159/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34601.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34601.json index 568071c2a61..fbd1e899b34 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34601.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34601.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34601", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-07-02T10:15:08.980", - "lastModified": "2024-11-21T09:19:03.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T19:15:49.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:samsung:galaxystore:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:samsung:galaxy_store:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.5.81.0", - "matchCriteriaId": "8323DEF6-1739-468B-9322-A11444BE8A2C" + "matchCriteriaId": "1A9CE783-7732-4C6A-BBAE-7CB691AC5273" } ] } diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48814.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48814.json index 771256973c2..2c4dfbb8818 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48814.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48814.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48814", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-03T15:15:10.570", - "lastModified": "2025-01-03T15:15:10.570", - "vulnStatus": "Received", + "lastModified": "2025-01-03T20:15:27.807", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "SQL Injection vulnerability in Silverpeas 6.4.1 allows a remote attacker to obtain sensitive information via the ViewType parameter of the findbywhereclause function" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/SubZ3r0-0x01/7150f7cbc3b7d810adb221cae3d08fc8", diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55078.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55078.json index e934438d9f3..593b9a6b597 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55078.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55078.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55078", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-03T15:15:10.697", - "lastModified": "2025-01-03T15:15:10.697", - "vulnStatus": "Received", + "lastModified": "2025-01-03T20:15:27.957", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "An arbitrary file upload vulnerability in the component /adminUser/updateImg of WukongCRM-11.0-JAVA v11.3.3 allows attackers to execute arbitrary code via uploading a crafted file." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/summerxxoo/8a0c9905feda6e192c10b860888afd26", diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56365.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56365.json index 6bac26c2c46..a5298598098 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56365.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56365.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56365", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-03T17:15:08.407", - "lastModified": "2025-01-03T17:15:08.407", - "vulnStatus": "Received", + "lastModified": "2025-01-03T19:15:12.340", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -60,7 +60,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -77,6 +77,10 @@ { "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-jmpx-686v-c3wx", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-jmpx-686v-c3wx", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56366.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56366.json index 794a8ca5212..770cf1d12c0 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56366.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56366.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56366", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-03T17:15:08.550", - "lastModified": "2025-01-03T17:15:08.550", - "vulnStatus": "Received", + "lastModified": "2025-01-03T19:15:12.443", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -60,7 +60,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -77,6 +77,10 @@ { "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-c6fv-7vh8-2rhr", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-c6fv-7vh8-2rhr", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56408.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56408.json index b50f59199bd..55983739939 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56408.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56408.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56408", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-03T16:15:26.773", - "lastModified": "2025-01-03T18:15:15.860", + "lastModified": "2025-01-03T19:15:12.533", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -77,6 +77,10 @@ { "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-x88g-h956-m5xg", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-x88g-h956-m5xg", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56409.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56409.json index 6be62b4dca0..37226079026 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56409.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56409.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56409", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-03T17:15:08.687", - "lastModified": "2025-01-03T17:15:08.687", - "vulnStatus": "Received", + "lastModified": "2025-01-03T19:15:12.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -60,7 +60,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -77,6 +77,10 @@ { "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-j2xg-cjcx-4677", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-j2xg-cjcx-4677", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6943.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6943.json index a4a8519695c..eb7369343e0 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6943.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6943.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6943", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-21T07:15:06.360", - "lastModified": "2024-11-21T09:50:36.260", - "vulnStatus": "Modified", + "lastModified": "2025-01-03T19:11:26.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -149,9 +149,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:zhongbangkeji:crmeb:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:crmeb:crmeb:*:*:*:*:*:*:*:*", "versionEndIncluding": "5.4.0", - "matchCriteriaId": "0244E52E-00B5-40AA-8A9B-1D9A37D9F8A1" + "matchCriteriaId": "764F844C-E182-48DF-88A7-83A266A152C4" } ] } diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6944.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6944.json index 757549cfa82..36b32e50b61 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6944.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6944.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6944", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-21T08:15:06.687", - "lastModified": "2024-11-21T09:50:36.410", - "vulnStatus": "Modified", + "lastModified": "2025-01-03T19:11:23.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -149,9 +149,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:zhongbangkeji:crmeb:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:crmeb:crmeb:*:*:*:*:*:*:*:*", "versionEndIncluding": "5.4.0", - "matchCriteriaId": "0244E52E-00B5-40AA-8A9B-1D9A37D9F8A1" + "matchCriteriaId": "764F844C-E182-48DF-88A7-83A266A152C4" } ] } diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7971.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7971.json index 60631ef06bb..d7e31829e58 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7971.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7971.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7971", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-08-21T21:15:09.277", - "lastModified": "2024-11-27T17:21:35.077", + "lastModified": "2025-01-03T19:39:45.157", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -111,6 +111,22 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0.2739.42", + "matchCriteriaId": "5B3C4915-21C5-4DB1-8791-EB3AEB04A654" + } + ] + } + ] } ], "references": [ @@ -133,7 +149,9 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", - "Third Party Advisory" + "Patch", + "Third Party Advisory", + "Vendor Advisory" ] } ] diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0196.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0196.json new file mode 100644 index 00000000000..8287b43b85d --- /dev/null +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0196.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0196", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-03T19:15:12.793", + "lastModified": "2025-01-03T19:15:12.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in code-projects Point of Sales and Inventory Management System 1.0. This affects an unknown part of the file /user/plist.php. The manipulation of the argument cat leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/Masamuneee/13b0a6384f0c07e8db462df9cb18fd47", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.290133", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.290133", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.473350", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0197.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0197.json new file mode 100644 index 00000000000..92ba83590cf --- /dev/null +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0197.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0197", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-03T20:15:28.873", + "lastModified": "2025-01-03T20:15:28.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in code-projects Point of Sales and Inventory Management System 1.0. This vulnerability affects unknown code of the file /user/search.php. The manipulation of the argument name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/Masamuneee/07a787e5a4599954c178baf90eeb553c", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.290134", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.290134", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.473362", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index e1024b929ec..69f5c857217 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-03T19:00:21.539428+00:00 +2025-01-03T21:00:20.421180+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-03T18:20:45.393000+00:00 +2025-01-03T20:56:34.317000+00:00 ``` ### Last Data Feed Release @@ -33,57 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -275667 +275669 ``` ### CVEs added in the last Commit -Recently added CVEs: `13` +Recently added CVEs: `2` -- [CVE-2024-35365](CVE-2024/CVE-2024-353xx/CVE-2024-35365.json) (`2025-01-03T18:15:15.177`) -- [CVE-2024-36613](CVE-2024/CVE-2024-366xx/CVE-2024-36613.json) (`2025-01-03T18:15:15.343`) -- [CVE-2024-56365](CVE-2024/CVE-2024-563xx/CVE-2024-56365.json) (`2025-01-03T17:15:08.407`) -- [CVE-2024-56366](CVE-2024/CVE-2024-563xx/CVE-2024-56366.json) (`2025-01-03T17:15:08.550`) -- [CVE-2024-56409](CVE-2024/CVE-2024-564xx/CVE-2024-56409.json) (`2025-01-03T17:15:08.687`) -- [CVE-2024-56410](CVE-2024/CVE-2024-564xx/CVE-2024-56410.json) (`2025-01-03T18:15:15.987`) -- [CVE-2024-56411](CVE-2024/CVE-2024-564xx/CVE-2024-56411.json) (`2025-01-03T18:15:16.203`) -- [CVE-2024-56412](CVE-2024/CVE-2024-564xx/CVE-2024-56412.json) (`2025-01-03T18:15:16.380`) -- [CVE-2024-56513](CVE-2024/CVE-2024-565xx/CVE-2024-56513.json) (`2025-01-03T17:15:08.840`) -- [CVE-2024-56514](CVE-2024/CVE-2024-565xx/CVE-2024-56514.json) (`2025-01-03T17:15:09.017`) -- [CVE-2025-0195](CVE-2025/CVE-2025-01xx/CVE-2025-0195.json) (`2025-01-03T18:15:17.317`) -- [CVE-2025-21609](CVE-2025/CVE-2025-216xx/CVE-2025-21609.json) (`2025-01-03T17:15:09.147`) -- [CVE-2025-21610](CVE-2025/CVE-2025-216xx/CVE-2025-21610.json) (`2025-01-03T17:15:09.290`) +- [CVE-2025-0196](CVE-2025/CVE-2025-01xx/CVE-2025-0196.json) (`2025-01-03T19:15:12.793`) +- [CVE-2025-0197](CVE-2025/CVE-2025-01xx/CVE-2025-0197.json) (`2025-01-03T20:15:28.873`) ### CVEs modified in the last Commit -Recently modified CVEs: `40` +Recently modified CVEs: `69` -- [CVE-2023-27368](CVE-2023/CVE-2023-273xx/CVE-2023-27368.json) (`2025-01-03T17:34:13.227`) -- [CVE-2023-27369](CVE-2023/CVE-2023-273xx/CVE-2023-27369.json) (`2025-01-03T17:00:18.243`) -- [CVE-2023-27370](CVE-2023/CVE-2023-273xx/CVE-2023-27370.json) (`2025-01-03T17:01:01.870`) -- [CVE-2023-30762](CVE-2023/CVE-2023-307xx/CVE-2023-30762.json) (`2025-01-03T18:15:14.630`) -- [CVE-2023-30764](CVE-2023/CVE-2023-307xx/CVE-2023-30764.json) (`2025-01-03T18:15:14.867`) -- [CVE-2023-34283](CVE-2023/CVE-2023-342xx/CVE-2023-34283.json) (`2025-01-03T17:03:08.457`) -- [CVE-2023-34284](CVE-2023/CVE-2023-342xx/CVE-2023-34284.json) (`2025-01-03T17:03:38.247`) -- [CVE-2023-34285](CVE-2023/CVE-2023-342xx/CVE-2023-34285.json) (`2025-01-03T17:04:04.607`) -- [CVE-2023-35722](CVE-2023/CVE-2023-357xx/CVE-2023-35722.json) (`2025-01-03T17:04:45.290`) -- [CVE-2024-11578](CVE-2024/CVE-2024-115xx/CVE-2024-11578.json) (`2025-01-03T17:42:27.113`) -- [CVE-2024-12829](CVE-2024/CVE-2024-128xx/CVE-2024-12829.json) (`2025-01-03T17:46:48.507`) -- [CVE-2024-12830](CVE-2024/CVE-2024-128xx/CVE-2024-12830.json) (`2025-01-03T17:47:52.397`) -- [CVE-2024-12831](CVE-2024/CVE-2024-128xx/CVE-2024-12831.json) (`2025-01-03T17:48:53.940`) -- [CVE-2024-12832](CVE-2024/CVE-2024-128xx/CVE-2024-12832.json) (`2025-01-03T17:50:27.337`) -- [CVE-2024-13044](CVE-2024/CVE-2024-130xx/CVE-2024-13044.json) (`2025-01-03T17:38:23.907`) -- [CVE-2024-13045](CVE-2024/CVE-2024-130xx/CVE-2024-13045.json) (`2025-01-03T17:38:40.123`) -- [CVE-2024-13046](CVE-2024/CVE-2024-130xx/CVE-2024-13046.json) (`2025-01-03T17:38:53.197`) -- [CVE-2024-13047](CVE-2024/CVE-2024-130xx/CVE-2024-13047.json) (`2025-01-03T17:39:08.300`) -- [CVE-2024-13048](CVE-2024/CVE-2024-130xx/CVE-2024-13048.json) (`2025-01-03T17:39:16.277`) -- [CVE-2024-13049](CVE-2024/CVE-2024-130xx/CVE-2024-13049.json) (`2025-01-03T17:39:26.240`) -- [CVE-2024-13050](CVE-2024/CVE-2024-130xx/CVE-2024-13050.json) (`2025-01-03T17:41:08.837`) -- [CVE-2024-13051](CVE-2024/CVE-2024-130xx/CVE-2024-13051.json) (`2025-01-03T17:41:21.100`) -- [CVE-2024-49664](CVE-2024/CVE-2024-496xx/CVE-2024-49664.json) (`2025-01-03T17:42:09.330`) -- [CVE-2024-53473](CVE-2024/CVE-2024-534xx/CVE-2024-53473.json) (`2025-01-03T17:15:08.243`) -- [CVE-2024-56408](CVE-2024/CVE-2024-564xx/CVE-2024-56408.json) (`2025-01-03T18:15:15.860`) +- [CVE-2024-1015](CVE-2024/CVE-2024-10xx/CVE-2024-1015.json) (`2025-01-03T19:15:53.587`) +- [CVE-2024-13043](CVE-2024/CVE-2024-130xx/CVE-2024-13043.json) (`2025-01-03T20:56:34.317`) +- [CVE-2024-1703](CVE-2024/CVE-2024-17xx/CVE-2024-1703.json) (`2025-01-03T19:11:33.877`) +- [CVE-2024-1704](CVE-2024/CVE-2024-17xx/CVE-2024-1704.json) (`2025-01-03T19:11:28.830`) +- [CVE-2024-1867](CVE-2024/CVE-2024-18xx/CVE-2024-1867.json) (`2025-01-03T20:47:30.137`) +- [CVE-2024-1868](CVE-2024/CVE-2024-18xx/CVE-2024-1868.json) (`2025-01-03T20:47:05.937`) +- [CVE-2024-21491](CVE-2024/CVE-2024-214xx/CVE-2024-21491.json) (`2025-01-03T19:40:54.883`) +- [CVE-2024-27931](CVE-2024/CVE-2024-279xx/CVE-2024-27931.json) (`2025-01-03T19:29:35.223`) +- [CVE-2024-27932](CVE-2024/CVE-2024-279xx/CVE-2024-27932.json) (`2025-01-03T19:19:52.197`) +- [CVE-2024-27933](CVE-2024/CVE-2024-279xx/CVE-2024-27933.json) (`2025-01-03T19:23:04.357`) +- [CVE-2024-27934](CVE-2024/CVE-2024-279xx/CVE-2024-27934.json) (`2025-01-03T19:23:57.387`) +- [CVE-2024-27935](CVE-2024/CVE-2024-279xx/CVE-2024-27935.json) (`2025-01-03T19:25:19.090`) +- [CVE-2024-27936](CVE-2024/CVE-2024-279xx/CVE-2024-27936.json) (`2025-01-03T19:27:46.510`) +- [CVE-2024-30372](CVE-2024/CVE-2024-303xx/CVE-2024-30372.json) (`2025-01-03T19:55:22.060`) +- [CVE-2024-30377](CVE-2024/CVE-2024-303xx/CVE-2024-30377.json) (`2025-01-03T20:46:41.177`) +- [CVE-2024-34601](CVE-2024/CVE-2024-346xx/CVE-2024-34601.json) (`2025-01-03T19:15:49.823`) +- [CVE-2024-48814](CVE-2024/CVE-2024-488xx/CVE-2024-48814.json) (`2025-01-03T20:15:27.807`) +- [CVE-2024-55078](CVE-2024/CVE-2024-550xx/CVE-2024-55078.json) (`2025-01-03T20:15:27.957`) +- [CVE-2024-56365](CVE-2024/CVE-2024-563xx/CVE-2024-56365.json) (`2025-01-03T19:15:12.340`) +- [CVE-2024-56366](CVE-2024/CVE-2024-563xx/CVE-2024-56366.json) (`2025-01-03T19:15:12.443`) +- [CVE-2024-56408](CVE-2024/CVE-2024-564xx/CVE-2024-56408.json) (`2025-01-03T19:15:12.533`) +- [CVE-2024-56409](CVE-2024/CVE-2024-564xx/CVE-2024-56409.json) (`2025-01-03T19:15:12.627`) +- [CVE-2024-6943](CVE-2024/CVE-2024-69xx/CVE-2024-6943.json) (`2025-01-03T19:11:26.513`) +- [CVE-2024-6944](CVE-2024/CVE-2024-69xx/CVE-2024-6944.json) (`2025-01-03T19:11:23.650`) +- [CVE-2024-7971](CVE-2024/CVE-2024-79xx/CVE-2024-7971.json) (`2025-01-03T19:39:45.157`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 97b9c5473d4..b9cb269bb4e 100644 --- a/_state.csv +++ b/_state.csv @@ -17326,7 +17326,7 @@ CVE-2006-1543,0,0,2ab7c1d9a52e5bf57a9f1bffe0623c6e137155ae37839a9fb178ca04300018 CVE-2006-1544,0,0,a869b93df69e7ee0207f948a309713c425137fa24b60ee9ab62fd769086e0873,2024-11-21T00:09:08.527000 CVE-2006-1545,0,0,cfa8a9e7e564348dbafed08f402c00ad55216dc83186cb4385f09170c7e3819d,2024-11-21T00:09:08.697000 CVE-2006-1546,0,0,668330d2ab00a73854fae4880112fb2af74122fbe364745933f4af4aa9efde23,2024-11-21T00:09:08.847000 -CVE-2006-1547,0,1,abbe10ed3d1413132d5facbc3fa98c7c726c1d3247ee8aed6d83552891b5e039,2025-01-03T18:20:45.393000 +CVE-2006-1547,0,0,abbe10ed3d1413132d5facbc3fa98c7c726c1d3247ee8aed6d83552891b5e039,2025-01-03T18:20:45.393000 CVE-2006-1548,0,0,1016ac81f01f493a553bdfa250c686a2608633e7e9807b3e5733588ce968fcb5,2024-11-21T00:09:09.127000 CVE-2006-1549,0,0,288f33a8095473b67939ae9f38a8722893f968a46ac64c810de9431e08eec50f,2024-11-21T00:09:09.270000 CVE-2006-1550,0,0,777f9cb9210df99bc3321c20f188fa1792fea28086f09cc1546ae99cad8c76b2,2024-11-21T00:09:09.460000 @@ -83385,7 +83385,7 @@ CVE-2016-10059,0,0,6f840593e92c435c3d83a492f3fa64ec91251c197f4184d29f50f570b946f CVE-2016-1006,0,0,6588158b1ed0ec0ce449c95e767745278a4d83adf9d4860df80100fdb81d27a7,2024-11-21T02:45:34.620000 CVE-2016-10060,0,0,3dcc4f9856f7354b52910766b9b7518839d1924cb53872af4003c838c78f4f26,2024-11-21T02:43:11.753000 CVE-2016-10061,0,0,641cf1961d25671abae8960f61a9050fd7b776731b8d9ac3b8f48aee6ccf3ae0,2024-11-21T02:43:11.910000 -CVE-2016-10062,0,1,38bd7decf6f20628b1178cdb13ffdba8168dbf2e3ec0aaec0ae56a151f4908ea,2025-01-03T18:20:22.340000 +CVE-2016-10062,0,0,38bd7decf6f20628b1178cdb13ffdba8168dbf2e3ec0aaec0ae56a151f4908ea,2025-01-03T18:20:22.340000 CVE-2016-10063,0,0,f635ba6774b274bcc0fd502508fe28056560068f6dd48f117c8687c91dcd22f8,2024-11-21T02:43:12.297000 CVE-2016-10064,0,0,5c5ff9cdd2ed7edf90dc8addeffa2a8070f37895a24b5ada4b26b1519909c4ea,2024-11-21T02:43:12.460000 CVE-2016-10065,0,0,54e082872c32096566d040f97b4b434a218a6d0101d1efbd59d3af785a21486b,2024-11-21T02:43:12.637000 @@ -153461,7 +153461,7 @@ CVE-2020-22390,0,0,f9d086888ce5c65a7d44777dda41ec51d32a4c3bc7a5567d05b4f3368cf00 CVE-2020-22392,0,0,62702e0a7e144c031c2165780889f726206ad57ebaade43e27d024f22968fe50,2024-11-21T05:13:15.473000 CVE-2020-22394,0,0,f44dd3ca33ae93dbbe325e8eeaccfc11cfea6e215dad6179fe4ad638475c7705,2024-11-21T05:13:15.610000 CVE-2020-2240,0,0,d567409857b58079a5a12d8f546f7d0a9a2d32a4fca2d37bd856111e038a0d46,2024-11-21T05:25:03.603000 -CVE-2020-22402,0,1,d2e2a3cd770e1e14df3c8e52966e5d754981f0ea2564d94758e0bde58ae59904,2025-01-03T17:15:06.927000 +CVE-2020-22402,0,0,d2e2a3cd770e1e14df3c8e52966e5d754981f0ea2564d94758e0bde58ae59904,2025-01-03T17:15:06.927000 CVE-2020-22403,0,0,a40a98a9d4903fd648d2a8387ce28db5163a35426bcb92509c7863dfdd749bf1,2024-11-21T05:13:15.897000 CVE-2020-2241,0,0,1b52f30e527a0e43c9dd80a10fe5ed47f31738af379ced8c21962efc33a8cfda,2024-11-21T05:25:03.827000 CVE-2020-2242,0,0,90f2ecd8729f03378450428a343e45f746aa0dbcb301275e9e943fcffcf47e51,2024-11-21T05:25:04 @@ -175597,7 +175597,7 @@ CVE-2021-3127,0,0,d1a3ffb1780b8a68102979c2e7c58a6ff85bca544f761c5acceb56ee5563ef CVE-2021-31272,0,0,4989df1b5472bebf9080d6598239e7f640f4e81bfdd754d1be4d766a2994b331,2024-11-21T06:05:23.793000 CVE-2021-31274,0,0,018dd46d212ee9c3392a1c9cbdbe6492c560173b0003bc0efdb754e96d24508d,2024-11-21T06:05:23.943000 CVE-2021-3128,0,0,c166646890dcf23fab3f195fc3186159c12c2acc6281b5ec4715944aacbe17ba,2024-11-21T06:20:56.883000 -CVE-2021-31280,0,1,f95ef05b567dc5e38a364d70fdff8090025fe6da6b77c8da7d7451d06615f3c9,2025-01-03T17:15:07.990000 +CVE-2021-31280,0,0,f95ef05b567dc5e38a364d70fdff8090025fe6da6b77c8da7d7451d06615f3c9,2025-01-03T17:15:07.990000 CVE-2021-3129,0,0,a8c612203263a4c7cee418652ff772134f56508f201161bf2d5fe467cb29cb74,2024-11-21T06:20:57.187000 CVE-2021-31291,0,0,3b3ab8ae8d27c4255775267f902739deadafe3e8732d63dde770678f2a1b21a4,2023-11-07T03:34:55.890000 CVE-2021-31292,0,0,7fcbc2168475f9dfcc7f013432b34dbab0f0dadcc50fa4ab34429f1dd294d4c5,2024-11-21T06:05:24.233000 @@ -180654,7 +180654,7 @@ CVE-2021-38147,0,0,c4996c156facf700ff149bc78c0ecbc3a63c80f07b0ea9f835ab676d3e7ee CVE-2021-38148,0,0,9376c71090e5318965004c7e43cb7ca598dcbd10ba2df6d1921cd10026f42955,2024-11-21T06:16:29.247000 CVE-2021-38149,0,0,a2cffdb05c81935c576a3411ebcf79d3fa2decbbbc1781943dbdf1b11ffe690b,2024-11-21T06:16:29.430000 CVE-2021-3815,0,0,c83201416471447532778aebede0d2aab20941033910f593f68b90574f7e884a,2024-11-21T06:22:31.270000 -CVE-2021-38150,0,1,bd0fac7838cb54c0f72b1d0fe6ec5403e6f320e0ce1903ae88159c97796bdb69,2025-01-03T18:20:00.257000 +CVE-2021-38150,0,0,bd0fac7838cb54c0f72b1d0fe6ec5403e6f320e0ce1903ae88159c97796bdb69,2025-01-03T18:20:00.257000 CVE-2021-38151,0,0,3dfe3f9f7054540d9f0b4a3a9035e9ce579bff17a9fbd1c7220b79204211a732,2024-11-21T06:16:29.757000 CVE-2021-38152,0,0,3d14231ef013535e968c8bc46da251a982b8d9bac9e9dfa08f2440132f8a2d5b,2024-11-21T06:16:29.937000 CVE-2021-38153,0,0,ac0349cae53856595ccdf05dc2ae1e4d4b1f9bc4d9042196ff1d4b688bf494c7,2024-11-21T06:16:30.110000 @@ -193311,7 +193311,7 @@ CVE-2022-23810,0,0,ff5d2d15bc9eb5726e154439e83da92f1e685850446c9aee10f5e6307cf0e CVE-2022-23812,0,0,c76eea71de654c3bf44e7ec650442d871ab0a86962282d7b14615a6ca7ad5155,2024-11-21T06:49:17.960000 CVE-2022-23813,0,0,4f29df08de2a66824a78f2f0e2495eecd130874f96d4a5b598e6fdacd2cf0dcf,2024-11-21T06:49:18.083000 CVE-2022-23814,0,0,f221c5fed4ea708846f64cdec0979e1d7c60492ed369edb82988b96c17bda6b4,2024-11-21T06:49:18.207000 -CVE-2022-23815,0,1,32f2b2413eb325d507269c9820e0d2bfd57ac1be30f822aa13e6954e84ddb889,2025-01-03T18:04:08.963000 +CVE-2022-23815,0,0,32f2b2413eb325d507269c9820e0d2bfd57ac1be30f822aa13e6954e84ddb889,2025-01-03T18:04:08.963000 CVE-2022-23816,0,0,b3e8a185ce7f00305c2d16541dec1c202970fddb180fd72b9358d6be7b074a1f,2023-11-07T03:44:19.220000 CVE-2022-23817,0,0,3b71e6ec45f6acd0944fe7938d40f55066aaaf507fdda7d54104f1b4d447e14b,2024-08-16T21:35:00.430000 CVE-2022-23818,0,0,3856155fdefaac51ecc607bd8de135bb8597bd18819ab757f9565a89af093b21,2024-11-21T06:49:18.543000 @@ -197203,7 +197203,7 @@ CVE-2022-28543,0,0,45267ea51a8603c4ae6213811c445937e20b81cd965a1b9cb9a11863e049a CVE-2022-28544,0,0,8ae535e96cd0f8dcae69b86ae415ba6c6bd3dbf434c338684f12f0e4eeb2997e,2024-11-21T06:57:30.083000 CVE-2022-28545,0,0,453b6c8905bceb5fa10739b9f5c13ebd5cbd340b102d13d3dbf32494dd405834,2024-11-21T06:57:30.197000 CVE-2022-2855,0,0,5d3757e1c1cc455ca40f4a8f6a8b9b938b7c679bbe8f1842940ae22f0a6800fd,2024-11-21T07:01:48.870000 -CVE-2022-28550,0,0,a2fe4088428605a7a1a90887a4d93b42f6cd76d14bf2ee8bdd4cbf281de9c28c,2024-11-21T06:57:30.327000 +CVE-2022-28550,0,1,d61aae6d6abf9b6a8a86235902813f696840ff6a6a4b80d0018dbdfdb7131560,2025-01-03T20:15:24.200000 CVE-2022-28552,0,0,bf6b5f3af9c90093dcbe6a1e6758e74be069a7d6a399928ec5c61d8d6a467586,2024-11-21T06:57:30.483000 CVE-2022-28556,0,0,0507dc57a0de99a07253c9db2a03990e18b0a50af78ad25d1f7cd400d397b6ee,2024-11-21T06:57:30.647000 CVE-2022-28557,0,0,4926cd7b8eadd04d6c5fc52348cef453ebb742155b50f1e177062444932a671a,2024-11-21T06:57:30.793000 @@ -199834,9 +199834,9 @@ CVE-2022-31629,0,0,5ef862df04f8d255ed02bf719beeb80649437a92cf9e67e9f3f71844fbe16 CVE-2022-31630,0,0,048f94737739e9ec1f539180d01531111b8a9b6e3fb03b23f54e62135c59134e,2024-11-21T07:04:53.693000 CVE-2022-31635,0,0,f33cce5b1e193c9081577f172af1b88917acd23104921caa053576c10bfcf687,2025-01-03T15:15:06.873000 CVE-2022-31636,0,0,dc5d48671ff8c8359b8ab236feb93a3c4723a165b95081331578932b6b185c1e,2025-01-03T15:15:08.580000 -CVE-2022-31637,0,0,7e118aefb900f1b8771bfb03c3f88a05095e573d84c8f798deca45c7a537e9d6,2024-11-21T07:04:55.353000 -CVE-2022-31638,0,0,2059d84d26545dd04336453f64b35e323c5ddc67e0fdd01032a49e7d96e0e32b,2024-11-21T07:04:55.950000 -CVE-2022-31639,0,0,2db9867db165c9710bd5f24a4058d245249a75be5ab8aab9a798192b24a8bc65,2024-11-21T07:04:56.547000 +CVE-2022-31637,0,1,30c8596251895654f5e10b1d0756a872401cb82752723a34976c21eb08a2360a,2025-01-03T20:15:24.413000 +CVE-2022-31638,0,1,bbcdc27c144be00d167e7f2c64edd6cb4af07ad32a706d7a003f2ca9f515f31f,2025-01-03T20:15:25.023000 +CVE-2022-31639,0,1,69de07b5649a494941d2318c37ae24b1880ad366dfabd728be78f768144fda86,2025-01-03T19:15:06.797000 CVE-2022-31640,0,0,f11ab96742ffed0fb0a866e562fccf8c44d323795437840f01b1c6fa62caafe8,2024-12-30T16:15:06.100000 CVE-2022-31641,0,0,19b2fb0e0f951485c4ce9094635fe73b00e4bc17b8e05ad62063edc0869672a9,2024-12-30T16:15:08.253000 CVE-2022-31642,0,0,bff5cf87808677159fc9a6eb9ac18eb2800300e0308ae0d505b80b1cf22db0b8,2024-12-30T16:15:08.893000 @@ -211767,7 +211767,7 @@ CVE-2022-47372,0,0,dfa77dc4d425c9bf12877c67de0f763eabc9ccacebbcddff67044d9d21c0f CVE-2022-47373,0,0,96a907b08b5e21840b5e6f0473ecbf70469d1dc841e707b95ca2af1207a9a256,2024-11-21T07:31:51.007000 CVE-2022-47374,0,0,0fc68a2d2ba75f7fa891da2f570cf59855fee3dac0ed28f98a8e1489bb311d72,2024-11-21T07:31:51.127000 CVE-2022-47375,0,0,b36e5baae10913f50373f82a07dc081447f9e2b7fb6db7afeb63d1eca2b49c61,2024-11-21T07:31:51.270000 -CVE-2022-47376,0,0,8b7cbb439f0a0b9453edfad75b2e0a092767c0ff9980a3d94cd8a4834d65d9ea,2024-11-21T07:31:51.407000 +CVE-2022-47376,0,1,5b920e77d1707c16d4b54f2f1138a8fe9706be91359a765b25a7c054a4921111,2025-01-03T19:15:09.270000 CVE-2022-47377,0,0,96cec5fa7988280419b16532ed5797a4e66d56635ce5d4a5578da85008847c1f,2024-11-21T07:31:51.530000 CVE-2022-47378,0,0,308a8c24c380a71a7d80c77486aa9a1c6d100f0a1767ab1ddf2586fa8a75e6e0,2024-11-21T07:31:51.643000 CVE-2022-47379,0,0,d6bbf2e779af2426507e56dac52d088c49b4b81a1b54d0aed92bfdbe7b95ffe4,2024-11-21T07:31:51.783000 @@ -214735,7 +214735,7 @@ CVE-2023-1703,0,0,9d3bc8641ddcda52c3019fa8bf60ba69711dd4b5b965807d3b5d971617b1c4 CVE-2023-1704,0,0,c3b3a79fda1be97ab8ecf7ae5f6444447556a547e2207761b7bdcb0b4a9423be,2024-11-21T07:39:43.977000 CVE-2023-1705,0,0,58b31c4c3a80d976bb017f89f5ee26d43a18485e24c973aabdbcc1715d907502,2024-11-21T07:39:44.103000 CVE-2023-1706,0,0,fbc7178daa090d28ffcc81a867748c2665d47dd106343db62b977fb8446b171c,2023-11-07T04:04:41.703000 -CVE-2023-1707,0,1,ec9fa528c43120034ed2a51e429f69c5bfe27e84f321340110c483e273be340c,2025-01-03T18:15:12.427000 +CVE-2023-1707,0,0,ec9fa528c43120034ed2a51e429f69c5bfe27e84f321340110c483e273be340c,2025-01-03T18:15:12.427000 CVE-2023-1708,0,0,56c47660911673fa13db344ae59a04cef430da6276d951fba2971764c610dfd6,2024-11-21T07:39:44.423000 CVE-2023-1709,0,0,71c842e3742673ce6275f87515688c528446cb711413c90b40770e1108ecd758,2024-11-21T07:39:44.550000 CVE-2023-1710,0,0,3dde9cc3fef8644f3d8bf5d3ef914f8325e81c41ce36e55866c34dac4b4dc049,2024-11-21T07:39:44.677000 @@ -218788,7 +218788,7 @@ CVE-2023-24465,0,0,5448889530988c381c47996b768fed4b61a602e0da0ee13f5efeff6b48fd5 CVE-2023-24466,0,0,8825cb5f95bf994402763fbf571f68eb37c34d6ee18462ed3ffef9bccf2207fd,2024-11-22T16:15:19.673000 CVE-2023-24467,0,0,55406cf1faaec4b6580953c04a3012fa1c0d42832668608c31cb96b9c3c3eb6e,2024-11-22T16:15:19.810000 CVE-2023-24468,0,0,b16bd4de6dfdbe945d32fdf1548c9e11d1c93ddf707756efebe0726c679f4afb,2024-11-21T07:47:55.107000 -CVE-2023-24469,0,0,edee8c9b485a445aa8b508a1a129e506a15dbafc0996714d9495ee63f1451947,2024-11-21T07:47:55.230000 +CVE-2023-24469,0,1,a9377ea65c9498eaf5d1c4eae744f9e44b65020ab796251fe5a53a3ce5c454f8,2025-01-03T19:15:09.590000 CVE-2023-2447,0,0,4ec809bb328a770bd9ca5946a889993e16b770e9ec04f38adc8310b23274c0c6,2024-11-21T07:58:38.067000 CVE-2023-24470,0,0,03ff63b96651fef3f6dd6be06dff6c3163e266ed6d008e2a29454e257eb85d70,2024-11-21T07:47:55.353000 CVE-2023-24471,0,0,5179a7361f4c151520a50596dd93febc191a697ab0b9e040a68f4894d1c0bf24,2024-11-21T07:47:55.473000 @@ -219517,9 +219517,9 @@ CVE-2023-25363,0,0,a13e12e2d521248bb56a1f4c931835a614aa9c58a3850209d3d076c4362a4 CVE-2023-25364,0,0,18e074f726c1a7bbb7f4b7c4f618e112147b7df67e3764dd5918c3fb79f094a5,2024-11-21T07:49:27.050000 CVE-2023-25365,0,0,ad5f61675742eba1fbb7732c180aed0ffb329f9cdee48813c521c4336a44e25b,2024-11-21T07:49:27.247000 CVE-2023-25366,0,0,e034a09dabe66546dba0104923cd2c56b7a8bad5dbcfb8795891a662bfdeb239,2024-12-12T19:15:07.573000 -CVE-2023-25367,0,1,717aae8162d73c14f2031ca4e6d35a3c6339f31664c247e5a3044c78f0ab8198,2025-01-03T18:15:13.890000 -CVE-2023-25368,0,1,9045fd682abf836aa58dc88f54032f36a259e19895d82843c52df057cb701a22,2025-01-03T18:15:14.157000 -CVE-2023-25369,0,1,7cdd4f65cd1c30cdf40b14b27d813c27948af8791e66dce8e47f6022af768e8a,2025-01-03T18:15:14.387000 +CVE-2023-25367,0,0,717aae8162d73c14f2031ca4e6d35a3c6339f31664c247e5a3044c78f0ab8198,2025-01-03T18:15:13.890000 +CVE-2023-25368,0,0,9045fd682abf836aa58dc88f54032f36a259e19895d82843c52df057cb701a22,2025-01-03T18:15:14.157000 +CVE-2023-25369,0,0,7cdd4f65cd1c30cdf40b14b27d813c27948af8791e66dce8e47f6022af768e8a,2025-01-03T18:15:14.387000 CVE-2023-2537,0,0,e3a9c998932448650780785025f952c0f7b32e296e003856d3969bc04f6bd978,2023-11-07T04:12:51.387000 CVE-2023-2538,0,0,87bc4ddaa11456f8361a7ebfc443c1645da044670547f1078b9eccff71bfc6a2,2024-11-21T07:58:47.727000 CVE-2023-2539,0,0,ae74cec33301234ee3b520b9d0f6263f8d76bb15f1cfba6769fd21e3c4081489,2023-11-07T04:12:51.427000 @@ -221068,23 +221068,23 @@ CVE-2023-27352,0,0,36bcc25408a4fbf2bc9135569be2acc6fab1c7473499ddc6879b975933048 CVE-2023-27353,0,0,ded79b0d485d91d82b6e474294a4f9929a9819953fcf444de9e017188f0e5dd8,2024-11-21T07:52:43.487000 CVE-2023-27354,0,0,da8df92338820c5fb20f4e89f33e47b9c7eb5150157c3cb9df33e4647bb7e020,2024-11-21T07:52:43.663000 CVE-2023-27355,0,0,d2bda171b63f748905f526dc6ad3e975cfc4febb56bbae61b7a5e800be48b8ac,2024-11-21T07:52:43.850000 -CVE-2023-27356,0,1,ca800bfb4f92a29dd2a2a1f653811d147a63f9e618a6ed4c52f852751940496f,2025-01-03T17:15:37.810000 -CVE-2023-27357,0,1,fa65af5937538c2d763be0f2a055e197deaea902bb831ee9aafd5a0da56f6d5d,2025-01-03T17:29:55.853000 +CVE-2023-27356,0,0,ca800bfb4f92a29dd2a2a1f653811d147a63f9e618a6ed4c52f852751940496f,2025-01-03T17:15:37.810000 +CVE-2023-27357,0,0,fa65af5937538c2d763be0f2a055e197deaea902bb831ee9aafd5a0da56f6d5d,2025-01-03T17:29:55.853000 CVE-2023-27358,0,0,7904c6fc14caf29f5870476f1a0620b7f9d8e9865f41a4d8841c93e930abd9b6,2024-11-21T07:52:44.827000 CVE-2023-27359,0,0,efe37eff2098ab2ebfe3e366776ee27ed09a254caeb19b2c1236a05179269e53,2024-11-21T07:52:44.960000 CVE-2023-2736,0,0,029afefcfee12ce70bc21ef9a9111309236914bda59377983cc5ec5de213ee16,2024-11-21T07:59:11.743000 -CVE-2023-27360,0,1,0564779fef4214695b6ad370571e5e7ee15b6d75d9adea1008c74a2eedd2256d,2025-01-03T17:32:11.500000 -CVE-2023-27361,0,1,ea1e33c9a9cdcc0d481b43d0f356ad64cfe883a2b146c0f37bca337cfd2b3cd0,2025-01-03T17:33:32.360000 +CVE-2023-27360,0,0,0564779fef4214695b6ad370571e5e7ee15b6d75d9adea1008c74a2eedd2256d,2025-01-03T17:32:11.500000 +CVE-2023-27361,0,0,ea1e33c9a9cdcc0d481b43d0f356ad64cfe883a2b146c0f37bca337cfd2b3cd0,2025-01-03T17:33:32.360000 CVE-2023-27362,0,0,484230cceb7b54355067bb8d64d0a84987f6418b8f2c38895dd23db3be3559ae,2024-11-21T07:52:45.330000 CVE-2023-27363,0,0,be34098a9cc1de8fb78f3d586861b1844e8a5da3da56c90195411a81be99396b,2024-11-21T07:52:45.453000 CVE-2023-27364,0,0,18d8e3ea674ca8f1f23044f950fe5d90295a36d271235b18adc52eb0b4e0db55,2024-11-21T07:52:45.573000 CVE-2023-27365,0,0,184143c2b2791bcaa9e22f8da747e6e72c629cfabbe05663003bb3e920e5c02d,2024-11-21T07:52:45.697000 CVE-2023-27366,0,0,73ed349c0b5baf7a6d8b186d5c4ed67783a1913cc36aa21d99cefb7c7de14be5,2024-11-21T07:52:45.823000 -CVE-2023-27367,0,1,35df382fc2db96e935e4b923d0179af67604021ba37734ff8c7baa711f76e6a3,2025-01-03T17:33:54.537000 -CVE-2023-27368,0,1,20106675f2e4d389a71c65af765338423683b1ebdf29353c900848a1abd2aa8b,2025-01-03T17:34:13.227000 -CVE-2023-27369,0,1,53ea492f4014f9a96dc283724b1330cd227c3403ebab1a750f9c76feb0488c55,2025-01-03T17:00:18.243000 +CVE-2023-27367,0,0,35df382fc2db96e935e4b923d0179af67604021ba37734ff8c7baa711f76e6a3,2025-01-03T17:33:54.537000 +CVE-2023-27368,0,0,20106675f2e4d389a71c65af765338423683b1ebdf29353c900848a1abd2aa8b,2025-01-03T17:34:13.227000 +CVE-2023-27369,0,0,53ea492f4014f9a96dc283724b1330cd227c3403ebab1a750f9c76feb0488c55,2025-01-03T17:00:18.243000 CVE-2023-2737,0,0,2d58eab6403b8ec835f691292ee157b11d2132c361cab72cff399928ed237c60,2024-11-21T07:59:11.863000 -CVE-2023-27370,0,1,2caa0c83c4c453d1353c995ebb950b7f0e81ef2851f9f0bf8ca09ec66f7d3849,2025-01-03T17:01:01.870000 +CVE-2023-27370,0,0,2caa0c83c4c453d1353c995ebb950b7f0e81ef2851f9f0bf8ca09ec66f7d3849,2025-01-03T17:01:01.870000 CVE-2023-27371,0,0,2a3f97a58295ebda42a0c6cc169c64eef1379055af6286654e30c6197b78c7c5,2024-11-21T07:52:46.460000 CVE-2023-27372,0,0,21435a747a9696e416d2c3ef746764775f76705636523d17cbaf48daf348c5bd,2024-11-21T07:52:46.640000 CVE-2023-27373,0,0,5dc4c663b716509eda6d7c23ba32c5f8e21316de49711ee888bfbe4eadfb0b80,2024-11-21T07:52:46.800000 @@ -223387,7 +223387,7 @@ CVE-2023-3016,0,0,6f0d74025bd389a247adba39cc5e9bdc2f343990210dfe25f8b2ea9fb714dd CVE-2023-3017,0,0,1ce0b9fe62b66cb32fa45359de13cc30aaa93f003e67de3952d12a79da4fcb85,2024-11-21T08:16:15.047000 CVE-2023-30172,0,0,34dc2dce5443d412cd254a8a37f8e483f4f51381736802fff425c952bfb4c87a,2024-11-21T07:59:51.253000 CVE-2023-30177,0,0,d6d73aefc9c9a3ae7b61d42607fe438b612e64a949ce1031d6842dd9833d5211,2024-11-21T07:59:51.433000 -CVE-2023-30179,0,0,354488a47be93a079c129b67299da4952070569d258f28b33d1cc28db17f0f07,2024-11-21T07:59:51.583000 +CVE-2023-30179,0,1,46744e8234f672d70fe2e5e5fb2b6d1ce58497ee7875131f12c9e477e98e7940,2025-01-03T20:15:25.737000 CVE-2023-3018,0,0,be8083d871f0e1500a9cc749154dbf1ac3c7f3ac44dcf0f5e358fb220aa3b822,2024-11-21T08:16:15.200000 CVE-2023-30183,0,0,e1846a4fa9e53dcb00fb51e4b8a9797ac0adbf831a3e45923a3063bd321cd8e8,2023-11-07T04:13:40.023000 CVE-2023-30184,0,0,aa23ad03603f32953eb52318d0febb1b0efa5d93d4e5fd9d177ace4e31c130e0,2024-11-21T07:59:51.750000 @@ -223861,9 +223861,9 @@ CVE-2023-30758,0,0,69789da5f8f59db8a057dbcc738c84dadc223d98fbb066bd2249c87113264 CVE-2023-30759,0,0,e3f6846ace05560f9c09c1d35874a157f57ea7e2bc1faad6b9eb3ea11e876614,2024-12-12T21:15:07.260000 CVE-2023-3076,0,0,d008cda2cdfac6bbdcbeeb6338eac7a719e6e3a4220fd820508d02a6856e7e80,2024-11-21T08:16:23.437000 CVE-2023-30760,0,0,8ce1174080c412d47616cb62cc2689d1ae6e7692c25094a976eaf3d28ddfb223,2024-11-21T08:00:50.987000 -CVE-2023-30762,0,1,65230d50da39d5769884a23cea215c219f87d24b734bb6f203bdf38965635705,2025-01-03T18:15:14.630000 +CVE-2023-30762,0,0,65230d50da39d5769884a23cea215c219f87d24b734bb6f203bdf38965635705,2025-01-03T18:15:14.630000 CVE-2023-30763,0,0,bc7592b061aaf82c1eac06e9d5fa65a11d784ee282785556a956d5363d94499d,2024-11-21T08:00:51.257000 -CVE-2023-30764,0,1,3ee96bc9ee7f0e63a06bf407115b05d6719bf9b6a46c01fc40dabda0589d48f9,2025-01-03T18:15:14.867000 +CVE-2023-30764,0,0,3ee96bc9ee7f0e63a06bf407115b05d6719bf9b6a46c01fc40dabda0589d48f9,2025-01-03T18:15:14.867000 CVE-2023-30765,0,0,74e124605964f03fd6d00452514c12b5d209ca28601a39802d58daee3a6414be,2024-11-21T08:00:51.507000 CVE-2023-30766,0,0,35d2a8e4883f03f924111beeb4af36f6e8729f4f146fbf49386344345852dd0f,2024-11-21T08:00:51.633000 CVE-2023-30767,0,0,85457cbadee2e525e1d99b0cb12376880ce917319783a448267ff8f0d4c5aed3,2024-11-21T08:00:51.763000 @@ -224232,10 +224232,10 @@ CVE-2023-31191,0,0,49cf28a679c3f7994bc5a6cec65d2f594155e222d80095cfc73d422cdb980 CVE-2023-31192,0,0,f289dd19bb7bc55b5751fc0719912284ed18299d010e7ac796b6f77f6bbcddbf,2024-11-21T08:01:36.040000 CVE-2023-31193,0,0,c9f5da74557aee3f1f119275d2f1bb865657633c607cbe95027bdcfc69d1af16,2024-11-21T08:01:36.173000 CVE-2023-31194,0,0,bd9536ecfb60960b2c81523a5b7e757e7d2cfef345ca03ac315c54691b5db2f9,2024-11-21T08:01:36.293000 -CVE-2023-31195,0,0,6c5f620696fb0d6f189ccb96f9b541f5b6b31abacb9503ddce3ead13df1b5b41,2024-11-21T08:01:36.417000 -CVE-2023-31196,0,0,afba8e857bac74243e651150c509a8ac5532ac24e9678bc20c9f9bb10bb63326,2024-11-21T08:01:36.537000 +CVE-2023-31195,0,1,86b95427e2cfd3113082f48c7bddc547691ee5e8fba2922c7ed5970fcf49ab59,2025-01-03T20:15:25.963000 +CVE-2023-31196,0,1,d7481a4349f1c1a692ae50a6cc7380b64825f123ddb0a827886f8142b8bc52bb,2025-01-03T20:15:26.123000 CVE-2023-31197,0,0,8615bbc7bc7e5c744a42f78cff83eecbb1c2d9e16be38c2cf9fa484409df40c4,2024-11-21T08:01:36.660000 -CVE-2023-31198,0,0,e2cb5d752c43e76e51a2f10ce26e999e3938e14f44e23d7d1e06556aa519001f,2024-11-21T08:01:36.777000 +CVE-2023-31198,0,1,d174a95a189ed572520f823cbd4d12691fd6f722e2327c5642d4b99684dfaa85,2025-01-03T20:15:26.290000 CVE-2023-31199,0,0,f237394a7b6eb9717966d5e363873a0c9e44537ce74c1340fd742a6a9c71d2f0,2024-11-21T08:01:36.893000 CVE-2023-3120,0,0,c2dea732f6565cd3bd06512beb7d3c5ba3f0f39a81ff97f57a2e1ed3c3b2c077,2024-11-21T08:16:30.180000 CVE-2023-31200,0,0,2efc06994c921521bb3dd14ebfb2e03388a0928840f6489a734561365474811d,2024-11-21T08:01:37.003000 @@ -224379,7 +224379,7 @@ CVE-2023-31433,0,0,e853bdfb7020ea2a92d21da42b82667b28825f1f1af437ed84977203405c3 CVE-2023-31434,0,0,e6466f73c068ca988c4aa0d3014669f830341e3ddc209276de06b361a4f4a9a0,2024-11-21T08:01:51.303000 CVE-2023-31435,0,0,37c39b6907f581eb4f26a0dea86921348548633fc814a9b3440ec7a77dd847ad,2024-11-21T08:01:51.440000 CVE-2023-31436,0,0,236b8d7c5c60c87c0a3fa3d17d411ff5711f6da9af190ca4ef240e060af935b0,2024-11-21T08:01:51.587000 -CVE-2023-31437,0,0,14c1654f81affae7e8538cacf816ea27e0820582d8028ec76c3797b241b54d3c,2024-11-21T08:01:51.810000 +CVE-2023-31437,0,1,c5e7ed934c3f95337e0d6747d269ce2e9b68f3156ad84cfdd526ed7bfce9f109,2025-01-03T20:15:26.457000 CVE-2023-31438,0,0,3726b6e286f72d60d8d2a50ce86e3f9f77d34b7c0ec484f35df8ee9bcadc8009,2024-11-21T08:01:51.953000 CVE-2023-31439,0,0,71c5ca81c263f26893e008a16a18cf6cc6811e232fe39b6b1d8b56ee72d485bd,2024-11-21T08:01:52.097000 CVE-2023-3144,0,0,13312dea69babaa16688124c8963ccc0c3d3042ee3236638219215f53f650b10,2024-11-21T08:16:33.300000 @@ -224448,7 +224448,7 @@ CVE-2023-3153,0,0,3dac5c9e8c7817f4c5ff144086a66d106b21472b1e694119f96778f0a879c8 CVE-2023-31530,0,0,2fae295d708fe580539ddbe172e0574a57800334543cb377133ab29a7f73122f,2024-11-21T08:02:00.513000 CVE-2023-31531,0,0,73f329f7740113f85ca0db0dd2e76e4ab86419f88f4d4df1f7434223fcae5c73,2024-11-21T08:02:00.643000 CVE-2023-3154,0,0,f12e79b0edab5b714c3672e66ee998459e9439b4017d2975377b5b58e2779e92,2024-11-21T08:16:34.857000 -CVE-2023-31541,0,0,1c0248f6892264097b921de2d9403851724b3f07fc622f6bea0489dfecf7c05a,2024-11-21T08:02:00.770000 +CVE-2023-31541,0,1,5f43e93f9e91573768aef010f2dd479600781481967290b27c7d23c3054e2642,2025-01-03T20:15:26.650000 CVE-2023-31543,0,0,acd89f7ff8a60ad3a333e41c168630c9a8d84d8099d0facfb6903608880a21ec,2024-11-21T08:02:00.923000 CVE-2023-31544,0,0,e273758133b9f3abc065124f5524504b0cf7bfc5f128e0fe45fa429f759c9ba0,2024-11-21T08:02:01.090000 CVE-2023-31546,0,0,faa5a82d881c7bb84a5271c0c1fb9420fe48cae8e3c55c72e84bb201bd4b5ee1,2024-11-21T08:02:01.237000 @@ -224828,11 +224828,11 @@ CVE-2023-32128,0,0,351371711dcd0924a05633b3a806a78e4a64303dcf4d1d1f077be5555b520 CVE-2023-32129,0,0,f6036eed8c822378466766e97055fd3362e88e1ff3b62d72fe9ce2c4f234ef49,2024-11-21T08:02:45.703000 CVE-2023-3213,0,0,732ec288b3124f8999f48bf3157d6bbe59b4d93ab1b045aa885be66f7f5d2674,2024-11-21T08:16:42.647000 CVE-2023-32130,0,0,b0ca05cce95f457301fa8f30d2c98f0d70850f73d328ca29f5faa4bd15f1369c,2024-11-21T08:02:45.810000 -CVE-2023-32131,0,0,7524e7b2741980db004ac7928f8d6f46ecfab2dd248cbee820a043956f383eae,2024-11-21T08:02:45.930000 -CVE-2023-32132,0,0,07a701241a3b53514928527609bf5a81a7783f0cd6d68c8c313616c889f966c1,2024-11-21T08:02:46.040000 -CVE-2023-32133,0,0,9918cba62a8e4e03569d0e92c2f29d3a67539ff4265efa67526deae16a5796d2,2024-11-21T08:02:46.150000 -CVE-2023-32134,0,0,9124f03249c2954a5fb1928bd82009c649d6a9e44825881b6870da458f65b909,2024-11-21T08:02:46.263000 -CVE-2023-32135,0,0,26a6be7860f748d24cb15a7d44950c6e37314407f1c86368141d397484ab1b97,2024-11-21T08:02:46.377000 +CVE-2023-32131,0,1,90bde551511870970dc97313f71bf7a96f99c2f26f77b7a9778aec032eb4ba4a,2025-01-03T20:30:12.467000 +CVE-2023-32132,0,1,8eda680a8769660a78f7a865fd61837fc70198a940a0a44041a43f606decd7c8,2025-01-03T20:30:32.507000 +CVE-2023-32133,0,1,0b94d390c897b7a5594b92e2500e353ec5f516bf19b069c9136654e0c20f8d2f,2025-01-03T20:32:13.727000 +CVE-2023-32134,0,1,d8a8a3063ac9831958b30eb56a1cb48467d4b0f63d647a9c1d1ae84a13f79e96,2025-01-03T20:32:33.060000 +CVE-2023-32135,0,1,781c5ae40467add1471ca7b33fa5e5eab9f1496c0998138d06505f5cfe80585e,2025-01-03T20:33:16.957000 CVE-2023-32136,0,0,7f8fe9be1da42fef4cc9ac1062bf9f87864ad8770631baa4d6dc23b2e624751b,2024-11-21T08:02:46.487000 CVE-2023-32137,0,0,9cbaa1a1a3e22c4d26224c56737f1e58de087af58c53f9ebf8f0be734c54ae9f,2024-11-21T08:02:46.593000 CVE-2023-32138,0,0,c76a58199542624770c21561a961f01c79cbfb21498e4723e148b99f72916b9a,2024-11-21T08:02:46.707000 @@ -225252,9 +225252,9 @@ CVE-2023-32542,0,0,83ef65e090b57a2c2b9a78fbd02e1e9bf8524342decd6b2eb3b2d2227b986 CVE-2023-32543,0,0,6b7c856eb90d8ff36ba370b53cf806fd93f89fc2233529cc17e7fbf9e8945e1a,2024-11-21T08:03:33.983000 CVE-2023-32544,0,0,5235e9d5c03fd345a2942b371475441b21e5a245b23128ce86135efb6ef8317e,2024-11-21T08:03:34.110000 CVE-2023-32545,0,0,fdb06c5c9462689f2d14e76c64852fc37a46ea69d49d4ed3c282d0ecb18935c3,2024-11-21T08:03:34.233000 -CVE-2023-32546,0,0,7e98aa6aed97e6e7cf9766cda6f0a7d14a52818d402bd22a899a76bf73b824f8,2024-11-21T08:03:34.360000 +CVE-2023-32546,0,1,926949f24a18aa4e26cecd9c78e6d526a52b1aebb9f1f789a628ab0e6d586203,2025-01-03T20:15:26.840000 CVE-2023-32547,0,0,627f0675f69d1f13be016dbfc55dc82a3c5ad6a2315d7671c7e4619cd7694e5e,2024-11-21T08:03:34.483000 -CVE-2023-32548,0,0,08c24939b01d178af96fe566fa8d350a3bc1320ccbc865f9c72f784190292969,2024-11-21T08:03:34.613000 +CVE-2023-32548,0,1,7811ed870a6a6f80a74cb42f85bbf0a8be17590d6578f107c15be89304c72ef0,2025-01-03T20:15:26.993000 CVE-2023-32549,0,0,0ba7bf639fcefa06ed376ac6393d90b1259acc4ef699004eb139a57271f9c18f,2024-11-21T08:03:34.730000 CVE-2023-3255,0,0,263b0242429c4037859153d9921f6733deb946360547fce9cce8e5f9ae27f575,2024-11-21T08:16:48.617000 CVE-2023-32550,0,0,5ec3985e70142faa1a31c61ea6710df31ac34d8d4a420bd79bd94533c8f74c0f,2024-11-21T08:03:34.880000 @@ -225384,8 +225384,8 @@ CVE-2023-3267,0,0,8913b949b4eab10183609320c13c519f524e04fee46edda94ab2756b4648e7 CVE-2023-32670,0,0,322cee038672d309feed5c353a890822fe4035390b26a1f1718875a8c5a0d2c5,2024-11-21T08:03:49 CVE-2023-32671,0,0,360ae9ce20fd1ba3da541032e872707229ca33996642e64bfc86cc97f45e17c5,2024-11-21T08:03:49.133000 CVE-2023-32672,0,0,a918c8e1fc0007ccbef110275612e931c83b59d2da0ba244b6e1aa87d2c49e9b,2024-11-21T08:03:49.267000 -CVE-2023-32673,0,0,72cc2acd3550564b3de6f47deefc8e52112b328089a6eabaf8dc09b8ee33ca4e,2024-11-21T08:03:49.397000 -CVE-2023-32674,0,0,4a04c5435aa986dbaa909244b108690b429c34360b674d09d6f0e178c147ef52,2024-11-21T08:03:49.517000 +CVE-2023-32673,0,1,56158f50594e2e0cc7c421aac160b6fe924f3124f3c7d9656fab0a3ab0bd61fc,2025-01-03T19:15:09.823000 +CVE-2023-32674,0,1,9f326c824b0c9c6beb7fca47319a940f873e11d26682ae559870e558b85ae762,2025-01-03T19:15:09.997000 CVE-2023-32675,0,0,0f765f78debaf5ad2249e77d886e646aa08bac1a09e73ee0eebcdbf0690f8b24,2024-11-21T08:03:49.630000 CVE-2023-32676,0,0,5189b035440283ec39891623bbb2317368f5fd2359f30593287634d20e6e4503,2024-11-21T08:03:49.753000 CVE-2023-32677,0,0,629ae0e2710ad52a1609f41917b9a6ed3d5583cf36fc8722876b9d9f6f6ebe2c,2024-11-21T08:03:49.880000 @@ -226702,9 +226702,9 @@ CVE-2023-3428,0,0,5786e3133542d2ffc57a239bc9d1982cdfd50b733fc929a02d34507e43d3c5 CVE-2023-34280,0,0,a76067e43e348a17421992ed108888fd13378207ee64103b6cfcaca0a64432ce,2024-11-21T08:06:55.433000 CVE-2023-34281,0,0,a0b5b4b34bd140d0c2a8beb652178aac2e7e3412e698a87fb3adec68b249745a,2024-11-21T08:06:55.550000 CVE-2023-34282,0,0,10f0799a96b19de4d957a29424f81c6225061c25010096eed33b37a66ce664ed,2024-11-21T08:06:55.660000 -CVE-2023-34283,0,1,b44d4dbabf3ec4de712896cbf751df66ce740a7380d8d3a376d827ea8fe08719,2025-01-03T17:03:08.457000 -CVE-2023-34284,0,1,11acfb051deb2ba057c5ae4a9e00e752e4638d39d8a055ba098e9567573a6442,2025-01-03T17:03:38.247000 -CVE-2023-34285,0,1,4dc03d9f4c940ecce2ae58f618995132b3279f169911d83af4b6920a577b9c94,2025-01-03T17:04:04.607000 +CVE-2023-34283,0,0,b44d4dbabf3ec4de712896cbf751df66ce740a7380d8d3a376d827ea8fe08719,2025-01-03T17:03:08.457000 +CVE-2023-34284,0,0,11acfb051deb2ba057c5ae4a9e00e752e4638d39d8a055ba098e9567573a6442,2025-01-03T17:03:38.247000 +CVE-2023-34285,0,0,4dc03d9f4c940ecce2ae58f618995132b3279f169911d83af4b6920a577b9c94,2025-01-03T17:04:04.607000 CVE-2023-34286,0,0,b838d1a2546e1a150ee392a90e0d53a66cfdaf658d5fd5ab9a67af080f68578d,2024-11-21T08:06:56.153000 CVE-2023-34287,0,0,b03a990052befecfa566a34cd7bec6390e02fdd8c8788a3ee11fddc25c78257d,2024-11-21T08:06:56.280000 CVE-2023-34288,0,0,dbaf03ceb0e27f0f1387d1ec2c465bbe47c6a25f542c264e92a9dc017702caf4,2024-11-21T08:06:56.397000 @@ -226713,10 +226713,10 @@ CVE-2023-34290,0,0,89c51dc9689e80ee5e61931153c43f55067c16551d000d2db51875a8e2fef CVE-2023-34291,0,0,2787c2709f56d986cce8f53f8b33444bfd2c7dcc4b58e5e08302c1eaa073cec3,2024-11-21T08:06:56.773000 CVE-2023-34292,0,0,01da714bdae162c25053d8fcc573f288e45e8002f02661263eb5e6a743bd280c,2024-11-21T08:06:56.900000 CVE-2023-34293,0,0,20c9084bad3f605f0fa9df91c54ad52639c0ed25a3c2bbbb0041b326e711413a,2024-11-21T08:06:57.017000 -CVE-2023-34294,0,0,66dbfd1aa6d115b314bce2435f3f227a8edaaca7ba37c6571331622bf6d60d73,2024-11-21T08:06:57.140000 -CVE-2023-34295,0,0,e7231fb7bbfab5b64d7672f4cb256503361ff2c9ed693b1f68525df3a4c818ba,2024-11-21T08:06:57.307000 -CVE-2023-34296,0,0,0ed59b6cdaaf1e674c6d0adf1e4ac21766695effd6a1a69ec35b831241e8129e,2024-11-21T08:06:57.423000 -CVE-2023-34297,0,0,492b66dcd0ddcac846d518d961b8a2a9cb89b25d49fd54610ce92d2d05855164,2024-11-21T08:06:57.547000 +CVE-2023-34294,0,1,7eb4ed6fc61cd0eeb3a009c96b5b8ce0cf292ae1a83aa3f3c84762e5e562d3ce,2025-01-03T20:33:50.987000 +CVE-2023-34295,0,1,98dac0c48e44bc41781a1595ab65929717ca71cf4354478702e27549a95d76be,2025-01-03T20:34:11.603000 +CVE-2023-34296,0,1,3ec2effff4a3c73014da669255348718342d48ee402194c3999ed203b106520b,2025-01-03T20:35:30.463000 +CVE-2023-34297,0,1,928ecc1b344af51e95361f09f1a530722e0514bda69d045a8c4c55ba18e351da,2025-01-03T20:35:46.607000 CVE-2023-34298,0,0,825d73d9cb6207f1da4d2667e800dcde5677e4c2723c719fad93bc1b1dfc6e1f,2024-11-21T08:06:57.667000 CVE-2023-34299,0,0,499ddd41a5717b1b9008439dc2bc479f8ea277c44a33d707d0d40c5c09f3f559,2024-11-21T08:06:57.797000 CVE-2023-3430,0,0,d115ce20f6bc8b3eab0270d83b601f59080de37d6f423b10c90d4b7b6daf9023,2024-11-21T08:17:14.940000 @@ -227152,7 +227152,7 @@ CVE-2023-35032,0,0,5daa9913c3eec51f113a41f6923f07bc01ee982d59b9c406ee34a56ecafa7 CVE-2023-35033,0,0,7ff74b9d4eab9c6d71fe0788f644ff195caa9f2362a1dcbc34729deff27dbecf,2024-11-21T08:07:51.173000 CVE-2023-35034,0,0,fa53980548ac3904321fbfcfb82c5ebaf5169185a3cb858da3dcbff74af0e23d,2024-11-21T08:07:51.330000 CVE-2023-35035,0,0,24f488f710736b292b67f7e0ccee8f6d6c7e5a3d2ae1a45c19429e3a08c6bd6b,2024-11-21T08:07:51.490000 -CVE-2023-35036,0,0,c73903460b356b46e9a0b1cddf4cb885a7929ac5a9a52ad33cca9034b60f3584,2024-11-21T08:07:51.630000 +CVE-2023-35036,0,1,8658a6fbc442990135a1aa1c98922d83375c7c2470ac781635a9d5c216201f12,2025-01-03T19:15:10.400000 CVE-2023-35037,0,0,02214d08e7c4c30c711ad4aeb21edefe0633af78df084263c4b7a1b3428d793e,2024-12-13T15:15:15.563000 CVE-2023-35038,0,0,b960c6e638718f03f41f1c3de182cb7575ff15e1fbb2b30d84947d10bddfae71,2024-11-21T08:07:51.787000 CVE-2023-35039,0,0,608a7d0bd27e817ad948ac8138a7e07d3fbdb27451666bc4d65a05a57f9e6bee,2024-11-21T08:07:51.910000 @@ -227525,7 +227525,7 @@ CVE-2023-35719,0,0,a9cda21c99b0e6f756fcb8836e3016894ae2f67b8598cc1c520b7c0c7425e CVE-2023-3572,0,0,980040bbce763fe884b6be17e19bd63f311bfc64b19ed84ca86bfbaff056e41a,2024-11-21T08:17:34.587000 CVE-2023-35720,0,0,e48a245311cab40e1cfe9ae3f2dfdb3dd22bbc0b3968554f2310b6c9e95d26e8,2024-11-21T08:08:34.357000 CVE-2023-35721,0,0,16d6f0ef8a5339f677b5ecc107201310c86768c4113147d53f1594f233c63b2a,2024-11-21T08:08:34.530000 -CVE-2023-35722,0,1,0a74388fdf0b93cb9d55cb4f84a46c1f53e80eafb448fcad1739db4267d7edfc,2025-01-03T17:04:45.290000 +CVE-2023-35722,0,0,0a74388fdf0b93cb9d55cb4f84a46c1f53e80eafb448fcad1739db4267d7edfc,2025-01-03T17:04:45.290000 CVE-2023-35723,0,0,673dea25115f9409607961625be95e3fc1df29167a41a38e89e540f00fa7c501,2024-11-21T08:08:34.800000 CVE-2023-35724,0,0,f2a0745e3c07f6928b19f01b9fdea5daf29946ff0aa7e0d4a61c75505fd9ffc7,2024-11-21T08:08:34.927000 CVE-2023-35725,0,0,9d14242e4fc52d393a7b5af4a349655c5eeb78b72c6b6081397b5b0039b6fcb3,2024-11-21T08:08:35.050000 @@ -227538,7 +227538,7 @@ CVE-2023-35730,0,0,0c73645d69a6d2233080a199539b1861df738aed8a8e2b4b4c5304a9d5220 CVE-2023-35731,0,0,34a12be69fb6120ae23d0c309e5d0bb88d559bdcb558f118cef328783ab8a5b0,2024-11-21T08:08:35.893000 CVE-2023-35732,0,0,073c4fbbaacd9355e769734148401ed635b6580a7ad5b3c6627fb36e39495624,2024-11-21T08:08:36.020000 CVE-2023-35733,0,0,a2ff42b251d1cf022c5e19366cc0598be458e8d3c800e4f88ae4045b63421387,2024-11-21T08:08:36.147000 -CVE-2023-35734,0,0,c35d3cf230839aeeb68980b8b2d36f6734c11604a8e0bd552b52fe343f5f1e75,2024-11-21T08:08:36.280000 +CVE-2023-35734,0,1,9e4abded78837aca0d917571d4e52c3b15e9cfeacfb54c5d6cd00d6538ea02f0,2025-01-03T20:36:02.703000 CVE-2023-35735,0,0,7abc7cd2d78b170b9f3db0dc643819a1335722cc81f6aec36187b32da587732e,2024-11-21T08:08:36.400000 CVE-2023-35736,0,0,2567b35cb5d45750d6c9be6ca347d0ac48fa63034ba7265322ebb503977fd2b8,2024-11-21T08:08:36.530000 CVE-2023-35737,0,0,f3eabec97c31fbc53fe9fd96a22c66544efaabf338c58557b9e0673a26ae561f,2024-11-21T08:08:36.667000 @@ -230164,7 +230164,7 @@ CVE-2023-38940,0,0,4d407c208c0898e96935ca49b8f65aaad1ffd57a44f1cd2fc6757db70eb54 CVE-2023-38941,0,0,f42f2dd234548ad3bcfc87ebbb40bb1737da50e91b3d54994b775a6e31240df3,2024-11-21T08:14:29.567000 CVE-2023-38942,0,0,82aee0951d543d730982b7bc343b25fa2f97d6709e4b9187b4aac5e20178cbe5,2024-11-21T08:14:29.713000 CVE-2023-38943,0,0,e695fcf2ae5d518077dea7995f85cff2c02d0b248aadd31a7a9abfe0adbfadd7,2024-11-21T08:14:29.850000 -CVE-2023-38944,0,0,74fc9f6bd5a93ba5d1fd3b31b486ed382f33479da73f7b51ce092e03d3f2da2f,2024-11-21T08:14:29.993000 +CVE-2023-38944,0,1,d49d604e9fb29439b39f01f4ddda0ad5f164f7103a704a0a4ba2af50691bb1a5,2025-01-03T20:12:34.917000 CVE-2023-38945,0,0,cfb0beb2169b377bc8e7833c8a2b8e23275e8bcffd74de868556e0a8bbd91325,2024-11-21T08:14:30.217000 CVE-2023-38946,0,0,a833f68630e51cc2aba67579fec7d5e9f6dc434407bc00c1e57e40662f077f9c,2024-11-21T08:14:30.423000 CVE-2023-38947,0,0,4b170c719db2192efd9102401f3f6cc979e345599bd9ddb234da0273152742ba,2024-11-21T08:14:30.630000 @@ -239344,18 +239344,18 @@ CVE-2023-51634,0,0,24101bc2264cc1d448351081d51aca13350b240728cd6ffe57bce0b6bf872 CVE-2023-51635,0,0,ee4330766282efd840c60d0e4f3a92ff9e46233947ba1ea3659971c9610fc910,2025-01-03T16:40:28 CVE-2023-51636,0,0,064e8a3fd5ea55d58d985476470cd6b3909b601adaac084b871f121b88b13dd9,2024-11-21T08:38:31.923000 CVE-2023-51637,0,0,29910b96acccc169a530531b3226da84a2d56d602569491908f5d6d939690c9d,2024-11-21T08:38:32.047000 -CVE-2023-51638,0,0,c47880b226fd2bb90e8785fb684e320705afc8c0487e8ff5fc296835b0d1191b,2024-11-22T20:15:06.283000 -CVE-2023-51639,0,0,fbdc2ad0932b61c0f240984c5949ecf011a00ed20efc1245b433facfbcd00288,2024-11-22T20:15:06.400000 +CVE-2023-51638,0,1,1f8bb6fada64e2c6a4d757917c0cffb48a9990af5234b7fcae60e035c188c0fb,2025-01-03T20:19:29.350000 +CVE-2023-51639,0,1,88ea5281c15c051e4c6adbb02cb12674abd9671541743094fd20eb066c120436,2025-01-03T20:19:50.817000 CVE-2023-5164,0,0,199614649d50cde0aac75dfa6fa9bd33d7e02bddb554eb7142bfa98dfc4068eb,2024-11-21T08:41:12.770000 -CVE-2023-51640,0,0,aaacaffe346289def343201e4ad89a4ffc3af5ee11f196ebb079b5b8ad279208,2024-11-22T20:15:06.523000 -CVE-2023-51641,0,0,892c4499728ed595d0b2230fc52b844044108c28a7e723ad640bd37410555b4e,2024-11-22T20:15:06.643000 -CVE-2023-51642,0,0,5317fd54971aa5749bb3df3ddecf420d3bf4eae65792a59275a2986946602a2d,2024-11-22T20:15:06.757000 -CVE-2023-51643,0,0,6ad782cc8b8e68fa1bb9361ec4f10390dad75db03fab8fa910b53738b03339e3,2024-11-22T20:15:06.870000 -CVE-2023-51644,0,0,a9e2786e8a5dcfaf55913fbbde3dbb79a723ae238df6896fb614f2cc6799fec1,2024-11-22T20:15:06.987000 -CVE-2023-51645,0,0,267ed14cbbba2530ec7566819f9ff0821bed31c17a3d77a8f152d268b227ce7f,2024-11-22T20:15:07.103000 -CVE-2023-51646,0,0,6218300d313faa8e6c49d21bb352265c96c1ec4e33001f52bc8d227de3164191,2024-11-22T20:15:07.230000 -CVE-2023-51647,0,0,715980492bda72f5a3480b2958ec876a7b82505f095c47e5303520e5ee8ce2cf,2024-11-22T20:15:07.337000 -CVE-2023-51648,0,0,0230db1e90a540607aebc157524711672eb8462a95488069aafc55279f48a840,2024-11-22T20:15:07.447000 +CVE-2023-51640,0,1,b43f31ef68c8a8a48321e9c905d6568c592f47555256bd7dec988370e4fcd28d,2025-01-03T20:21:13.907000 +CVE-2023-51641,0,1,fdb649c1d2569e87900c5aa99d8b2590b19e3ff3a6a81fc236dc7d60b9e52761,2025-01-03T20:22:19.210000 +CVE-2023-51642,0,1,9938af45ca54ed1fcc1c094379ef07fb75e77646274f1c25bdbeb118b5bd431b,2025-01-03T20:23:03.470000 +CVE-2023-51643,0,1,870565dcf1b9e34a7c79aab456f181178934e381eea94bf4ccd1cea0007c5e79,2025-01-03T20:06:29.260000 +CVE-2023-51644,0,1,149c5ffc65f00aca62e0c31133481c33c050dbe606855e32220be36b55022ddf,2025-01-03T20:08:18.827000 +CVE-2023-51645,0,1,3dabbf069295b2a1e138c9a1048dcd2b97912834bfb5c8ea6401d6bb8b2a79bd,2025-01-03T20:09:25.893000 +CVE-2023-51646,0,1,2bd2612925192b3d32c3896f66e0929c28bc6d8318162f9b00f8aa75f4364067,2025-01-03T20:15:14.997000 +CVE-2023-51647,0,1,e075ea7dcb7713c08d87f50b232f97a3fd475c55570d4212ad5d2787a6183a28,2025-01-03T20:18:04.053000 +CVE-2023-51648,0,1,a2d6a9b99df66855a23ad0fac49c687ea3ad131a483b67befd9865fd659a6fd7,2025-01-03T19:28:29.197000 CVE-2023-51649,0,0,022ef6f2381d5dd38178783656dbe44fe576376d529ba3b43494520910cb5817,2024-11-21T08:38:32.163000 CVE-2023-5165,0,0,3f5a6cd169442941a89e708d426d91665dc5259f42e8672e9b08aba1ff9c59b5,2024-11-21T08:41:12.893000 CVE-2023-51650,0,0,2f216a8a35441793fd8c040b6a5f4d1e641706a4eddb5c6f2648582bb8371f1e,2024-11-21T08:38:32.290000 @@ -239830,9 +239830,9 @@ CVE-2023-52329,0,0,a004108f5dec698da3445c22156a25c0905c095ac77fbcbf47586a25dfd8d CVE-2023-5233,0,0,a570340c5d21a2e43bb2751db7fdb9c8db3d4a296bd64b600ba4abeb833a5faa,2024-11-21T08:41:20.597000 CVE-2023-52330,0,0,edae5aa2846da33acb4a55ae81651e74f8653528d76bac83894b7c0b43b49e7e,2024-11-21T08:39:34.823000 CVE-2023-52331,0,0,62ef0031155309b76bb1f307755a4bd733642066bdc308fc86dafb7e927b85ae,2024-11-21T08:39:34.940000 -CVE-2023-52332,0,0,bcc36e4be9499f9a88c8a5104a50bac9cc710df68160e60d9a91f5f867f16413,2024-11-22T20:15:07.560000 -CVE-2023-52333,0,0,6ba0153ae98d57f8986329ed2bfe61e7e0b1cbe00b08b6ae1457b4f83bcece30,2024-11-22T20:15:07.670000 -CVE-2023-52334,0,0,601e5970bb6aaee65ddca03e4125bfc7740151224231ab8a162f25baabce0c40,2024-11-22T20:15:07.793000 +CVE-2023-52332,0,1,8e6f1fc64aa83640f459fb8fd857ece347956e5cc83ab68fd06d6a37232c65a6,2025-01-03T19:29:05.487000 +CVE-2023-52333,0,1,a8f9329a651dddc94300c25b63ddcd98738fb66152c065975b86094d0524712e,2025-01-03T19:49:29.147000 +CVE-2023-52334,0,1,414d78dfbc068faf1ec26bd6ac4b7d3e27d68eaaed571e69547d9e8cff27fd0b,2025-01-03T19:54:44.617000 CVE-2023-52335,0,0,e90e9640f4ad35a4ff69bd71cdaefc7be72dbd9e2971e3eed654b8e8e98e1144,2024-11-22T20:15:07.927000 CVE-2023-52337,0,0,5d30b2e795d30af25a7c2557afed1bcb45315c4a68f523353a17c18460ac449a,2024-11-21T08:39:35.070000 CVE-2023-52338,0,0,a8379d6b9439ab072316828f426542121a26cdd77617df5ce049082cb5dd92bc,2024-11-21T08:39:35.220000 @@ -240674,7 +240674,7 @@ CVE-2023-5523,0,0,d55dc6f04ae6e1c89a6e7478b4c4572336b3f3b75eabf56216f5863ee37827 CVE-2023-5524,0,0,0f532a989c3486a4d2c61825e20543b2831c1c5abb5c83ac991038b4824cc43d,2024-11-21T08:41:56.367000 CVE-2023-5525,0,0,c0993f8ad571781ea9aa00f3742607e3f37f76113f24f18bfceaf9f40aa7e752,2024-11-21T08:41:56.493000 CVE-2023-5527,0,0,e147e1de4d331505fd0590ca9e87df81eae48e1abeb13f7dbc51e51298e71d5f,2024-11-21T08:41:56.680000 -CVE-2023-5528,0,0,fb241d4f5d38757d48a6ad7eb9d9b3304763d31d55899384b701306184e689bf,2024-11-21T08:41:56.820000 +CVE-2023-5528,0,1,1ad3953419bc7f23d6bf75f7f9b1657dfd9eafb8c68723b0c8a3a899201f6ec1,2025-01-03T19:42:12.633000 CVE-2023-5530,0,0,73e640583639fd7193044c4d5d3919376b6c034cf338fb791b771da3db98c996,2024-11-21T08:41:56.960000 CVE-2023-5531,0,0,390279cdf754d475f7fa56b95f1eaf84aa80140b1f0bcf47e630dfb8c4f34baa,2024-11-21T08:41:57.063000 CVE-2023-5532,0,0,d28c988ab676ddcf26d3100e8b1e725b56bd89a7b5be6cf1b76b9ed38ab481ad,2024-11-21T08:41:57.180000 @@ -243282,14 +243282,14 @@ CVE-2024-10136,0,0,1687e7cebd4edca0b737a65982fb9c424de87cc15acb38175a53b82a71807 CVE-2024-10137,0,0,f8f7215d3ce93e92144f6efe5a55c5ac5044b5c034241100e379f4163f66dd21,2024-10-22T14:17:31.527000 CVE-2024-10138,0,0,b55d0a2514636d98877966409f2919e65547e4eeafd1d900c75d88c763738105,2024-10-22T14:16:51.547000 CVE-2024-10139,0,0,a46ec81f772febd4a2634b4660ef65a5595694d8d1440f2dfd233785d6da934c,2024-10-22T14:18:12.087000 -CVE-2024-1014,0,0,3b68d16ac7b67593d321fe9ae9e77edfd7762ecf7bffc2a9653df88b5ebfc53b,2024-12-26T14:47:20.980000 +CVE-2024-1014,0,1,9dd00a3546b6b3a32340fe0a0352b9d22a36854921d628e6327061d98d8693eb,2025-01-03T19:15:10.863000 CVE-2024-10140,0,0,5c8d3582a9e1cf69741010665609bb47843d809bedccb1b62254ed0f178666e0,2024-10-22T14:19:08.420000 CVE-2024-10141,0,0,9f480f5e4cde435173bb5b248bf28ae1efa97ee859e6fa4ed20730ab18f55365,2024-10-23T20:27:09.370000 CVE-2024-10142,0,0,b21f3b0b970a8f035562ca65d7166416ad40a1b3d1b0f2ed6d773f0caf719d22,2024-10-22T18:11:20.450000 CVE-2024-10146,0,0,5e07a63dc9cb998c12f2ef5f735047cdc411acb65308532570ff1ef11f2b6ae8,2024-11-15T13:58:08.913000 CVE-2024-10147,0,0,a56a79fe5a06b98cc0b76112510f81c153284d047893303acf550d79857bb9ca,2024-11-18T17:11:17.393000 CVE-2024-10148,0,0,db0d5db25a1f49f9ba7e42a06491994c37a2b37e9a76e3ae4cc30f2bbf70efeb,2024-11-06T16:02:22.120000 -CVE-2024-1015,0,0,f5106ef87a8ce490640958ad18e87b170d3461b5088dc4b1c5335fd41b68ef46,2024-12-26T14:47:20.980000 +CVE-2024-1015,0,1,be928180cb003f6a5eec5ab2bae4726bcad9bf29373863ff5830478d50997929,2025-01-03T19:15:53.587000 CVE-2024-10150,0,0,fac5f7de9492af33015847edbbaf4e66b672db3781dc50dc161c61d03c3e187d,2024-11-05T17:47:35.353000 CVE-2024-10153,0,0,205337601504c6a6060c88aa213139cbdb5096813b7204f786c736b1a09bbbe9,2024-10-22T14:45:04.670000 CVE-2024-10154,0,0,8bc22a596ba6d08db60619a5118141d0b00a385670008138b09554e9c573f4a2,2024-10-22T14:44:47.807000 @@ -244469,7 +244469,7 @@ CVE-2024-11574,0,0,c0c507d43857d57ee99aa16b84b597bf67d6a714c3740721e43431423a970 CVE-2024-11575,0,0,5e1acfdb2c1dcb5dcda0fe7dfbf70613b34f2e92ce4befb7a1e3c62571d21e54,2024-11-25T18:52:56.080000 CVE-2024-11576,0,0,a8e0825213ef4c9c0f1c6d5ae79fb6ce1feb72964e892a902e8877ef0fbe759e,2024-12-20T17:36:12.133000 CVE-2024-11577,0,0,030cc7ceccd9c1f1c0576f6eef9270acaa630d083b3c15257887f33704fc9630,2024-12-20T17:36:00.887000 -CVE-2024-11578,0,1,3949bbadfcf8e803d9af59cc77849a55a262b9e95c93b371e5299de46c360cc1,2025-01-03T17:42:27.113000 +CVE-2024-11578,0,0,3949bbadfcf8e803d9af59cc77849a55a262b9e95c93b371e5299de46c360cc1,2025-01-03T17:42:27.113000 CVE-2024-11579,0,0,a092ff7ef536e96be080e898d8d872006835463f8afc1ac75354cd0671a55eda,2024-12-20T17:35:51.253000 CVE-2024-1158,0,0,cc758ded81eb4716575c03ddb54fc317f50917a2b43ee2a36cb438fc8fb74732,2024-11-21T08:49:55.723000 CVE-2024-11580,0,0,2902a2896d70a09162eab174719b1f937a00063abe723be1bb8861e8aaeb5891,2024-12-20T17:35:39.513000 @@ -245220,11 +245220,11 @@ CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73 CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000 CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000 CVE-2024-12828,0,0,28c200a13b14baa13804e935d3333b64f6d1e673d0788df4553ec7bcec7ebadb,2024-12-30T17:15:07.717000 -CVE-2024-12829,0,1,b6def8373fb939ecec35d929ec57c311d0480519af7a0919a5038b5b832e9ed5,2025-01-03T17:46:48.507000 +CVE-2024-12829,0,0,b6def8373fb939ecec35d929ec57c311d0480519af7a0919a5038b5b832e9ed5,2025-01-03T17:46:48.507000 CVE-2024-1283,0,0,b1c9571efecc70819ed9018aef1b79e079809dddea59c76e732d84247ac1db52,2024-11-21T08:50:13.640000 -CVE-2024-12830,0,1,18bcb0e40539df86d5019b2e3a08e03e4a9e7df31568fecf257a302c1fc01bc8,2025-01-03T17:47:52.397000 -CVE-2024-12831,0,1,ff4242668f135de6fc9c699db6062145287dcf5202b9f05a586e3bb6a651bf5f,2025-01-03T17:48:53.940000 -CVE-2024-12832,0,1,46214a3c8f752d4a2eed28a89cf2d84504348b14c7a5e391464558b4113950be,2025-01-03T17:50:27.337000 +CVE-2024-12830,0,0,18bcb0e40539df86d5019b2e3a08e03e4a9e7df31568fecf257a302c1fc01bc8,2025-01-03T17:47:52.397000 +CVE-2024-12831,0,0,ff4242668f135de6fc9c699db6062145287dcf5202b9f05a586e3bb6a651bf5f,2025-01-03T17:48:53.940000 +CVE-2024-12832,0,0,46214a3c8f752d4a2eed28a89cf2d84504348b14c7a5e391464558b4113950be,2025-01-03T17:50:27.337000 CVE-2024-12834,0,0,42c1eae502d28c98db195f540a9c8f4947fcef6a936ce9383d090aeedf31e01d,2024-12-30T17:15:07.857000 CVE-2024-12835,0,0,456551b469a3e0837a51a7b87cad89a81e52a63efb0e82cd825df7f15bc00b7a,2024-12-30T17:15:08 CVE-2024-12836,0,0,947a6526b2f3576c89b08ea6819418230607e057855f6bcd272df393ac987473,2024-12-30T17:15:08.137000 @@ -245383,16 +245383,16 @@ CVE-2024-13039,0,0,5fcf5529e0f60e939c342e8ff9bcb8e9371ea109f210669df3b0c791fd94e CVE-2024-1304,0,0,7f3d377d10786bd7b29e3437adfa1f791151a43db698785def3901d685804d14,2024-11-21T08:50:16.717000 CVE-2024-13040,0,0,a1b5d05401cf418a59b0f679ad1dde1d9e5e2bdf3e303602eafaafe8d09ac44b,2024-12-31T02:15:06.303000 CVE-2024-13042,0,0,79d3038a3776ed8900f4502faeed80d95c375db4f2c3ae792b7f1b6168d6c4e8,2024-12-30T21:15:06.523000 -CVE-2024-13043,0,0,a57d8becfe9ca92a82190ea64963a694c6040f83cb00135ce055f57002bf8d4c,2024-12-30T21:15:06.713000 -CVE-2024-13044,0,1,2a60dae76075d731a7a10d4f5dd3f064d1a9a7527f55b8c35dfff24662fef8aa,2025-01-03T17:38:23.907000 -CVE-2024-13045,0,1,1f934630021b4e488823382e82fbebf720404ebaf4be3e7e4ace7215a3b3f593,2025-01-03T17:38:40.123000 -CVE-2024-13046,0,1,35275f9a1905bf96e4e1684ba5d3f6626f89557b39062caeff5f3de4b4134c45,2025-01-03T17:38:53.197000 -CVE-2024-13047,0,1,e5e3e82dc0817240cfd025b6744f7c1d0854c0545b4774331d183644815fdaf6,2025-01-03T17:39:08.300000 -CVE-2024-13048,0,1,195c98d0e70762e0af183cee0b8e784aebf14124ed765666bd0013567348a595,2025-01-03T17:39:16.277000 -CVE-2024-13049,0,1,2d2507515be5458df46966a9b46d7f8d93676a0df14e2574f8b8c0b1de3c0b04,2025-01-03T17:39:26.240000 +CVE-2024-13043,0,1,d417b605205dbe84f83258ea316ba45f837391250bcff3253069ffacb1fd1864,2025-01-03T20:56:34.317000 +CVE-2024-13044,0,0,2a60dae76075d731a7a10d4f5dd3f064d1a9a7527f55b8c35dfff24662fef8aa,2025-01-03T17:38:23.907000 +CVE-2024-13045,0,0,1f934630021b4e488823382e82fbebf720404ebaf4be3e7e4ace7215a3b3f593,2025-01-03T17:38:40.123000 +CVE-2024-13046,0,0,35275f9a1905bf96e4e1684ba5d3f6626f89557b39062caeff5f3de4b4134c45,2025-01-03T17:38:53.197000 +CVE-2024-13047,0,0,e5e3e82dc0817240cfd025b6744f7c1d0854c0545b4774331d183644815fdaf6,2025-01-03T17:39:08.300000 +CVE-2024-13048,0,0,195c98d0e70762e0af183cee0b8e784aebf14124ed765666bd0013567348a595,2025-01-03T17:39:16.277000 +CVE-2024-13049,0,0,2d2507515be5458df46966a9b46d7f8d93676a0df14e2574f8b8c0b1de3c0b04,2025-01-03T17:39:26.240000 CVE-2024-1305,0,0,61bd2e20ff0aa394ece1e84d5d848dafdcba1e6f1c6375393ac194bd0f52a153,2024-11-21T08:50:16.840000 -CVE-2024-13050,0,1,2f95f49a98ee2b927873c8a4799939050fe5a4ead743b8ced8639ef709fc00cc,2025-01-03T17:41:08.837000 -CVE-2024-13051,0,1,e2bfef788998fb155c81675dd1f28141983b9837968453cab2c4ec820298fc19,2025-01-03T17:41:21.100000 +CVE-2024-13050,0,0,2f95f49a98ee2b927873c8a4799939050fe5a4ead743b8ced8639ef709fc00cc,2025-01-03T17:41:08.837000 +CVE-2024-13051,0,0,e2bfef788998fb155c81675dd1f28141983b9837968453cab2c4ec820298fc19,2025-01-03T17:41:21.100000 CVE-2024-13058,0,0,91396049ed5baf4a6f156f57d5990485463c9e52e997b4c7fdc31249002c7bf7,2024-12-30T22:15:05.957000 CVE-2024-1306,0,0,0542247252f536db3d3f5f372f6b06cf8f9322e7de2b3d2f5040c13d3f80547b,2024-11-21T08:50:17.053000 CVE-2024-13061,0,0,f0d229ddc53c34e4105e6b89d4e6cbe6fcae50e1fc38e3eb92bb7d84d07d1623,2025-01-02T02:15:19.897000 @@ -245794,8 +245794,8 @@ CVE-2024-1698,0,0,a3817713801dcdd2b6948f039ebd5bf82047ee39d455ae9db40460bcb81f0e CVE-2024-1700,0,0,c890221edc7d723da200984cd50788ad3f9477e6671e40a4826dd37ab78bdf87,2024-11-21T08:51:06.933000 CVE-2024-1701,0,0,999a1855aff758dd3bea1c889c669b741d70388f4ca26ec930896a676a7eec80,2024-11-21T08:51:07.080000 CVE-2024-1702,0,0,b6175d9dc80a18f6f7cfdc8d7ccd672b051b17d818dc95fbcd9de4275081d0be,2024-11-21T08:51:07.220000 -CVE-2024-1703,0,0,3aad4ed0e55dd45f2fcfafb3b7e528269d5ff888e1f41d3cb887f3e688b3bb19,2024-12-04T22:33:29.567000 -CVE-2024-1704,0,0,a084a76f320cbc43e676d94ec902c38a761c40480af7221e8f6a974a7d5f9be7,2024-12-04T22:24:16.043000 +CVE-2024-1703,0,1,967f5b800879b74b8a5834ee2ca69d6ccd277ef7fdf67155513b4a3e4c5c9375,2025-01-03T19:11:33.877000 +CVE-2024-1704,0,1,ade83be8825a88be560eefedd4a80ce29b73b997a3bc381116fac086a8487d74,2025-01-03T19:11:28.830000 CVE-2024-1705,0,0,ad32b21169f7c0aec2508592ac71c9a3cbc133038583310c8d0382d12d1f6d23,2024-11-21T08:51:07.757000 CVE-2024-1706,0,0,bb2fa26be71c93f252750ad503aa5f22cf00468ca8b87351c6c26fbbe19a743a,2024-11-21T08:51:07.893000 CVE-2024-1707,0,0,a9020d35f22c4489f7cfd2297cfe28080eadd0f70b288122f51ccc5023ec8af1,2024-11-21T08:51:08.030000 @@ -245952,8 +245952,8 @@ CVE-2024-1863,0,0,2458870e577036f8a527ffe6fedc1f5705014e9e40ac75930eea1e073fcc83 CVE-2024-1864,0,0,7540eb10c79c4178ff1d3d38ada50b4803bad985e5def6b198e727bc83e258b4,2024-02-27T22:15:14.807000 CVE-2024-1865,0,0,f956c1fb13f7d8ccb79f0523d8afbbb427264aa98fd91d26d435a4ac5b2b57df,2024-02-27T22:15:14.847000 CVE-2024-1866,0,0,b664e93f02eb3409a7f947b52c90652e506a03ffc3ea2701191144838f6db8e6,2024-02-27T22:15:14.887000 -CVE-2024-1867,0,0,9b4271a3a7d6febd93b9c61dcafa3bcc754cf33f856280f4bca0804db682b406,2024-11-22T20:15:08.163000 -CVE-2024-1868,0,0,fb3bb9f9d3d2a3a19d1c2959a09614e7602cf3f8eb3d753e02f960fe4050c4bc,2024-11-22T20:15:08.280000 +CVE-2024-1867,0,1,d984156e3a7f0459fdbbda503365d5f7b0c320270f1fd30089d6ff85383de9cb,2025-01-03T20:47:30.137000 +CVE-2024-1868,0,1,e0dafdec2bc4abc8301723b83fc4c123e01040f233ac59814398289789f9b74e,2025-01-03T20:47:05.937000 CVE-2024-1869,0,0,f8c69f612e814c4bd9b0f3c1664eca33f449de845c31ce2038b5c1d00298a8db,2024-11-21T08:51:29.133000 CVE-2024-1870,0,0,6d6d6ee7f5ab5452814e8c5a0d8fcee96177fee451cf6d8baa8b58ec9c14573d,2024-11-21T08:51:29.330000 CVE-2024-1871,0,0,ee81c97983aa7443f5b5c8df7b73a58bc5b442ad6448ba9043e72031ddc435ff,2024-12-23T16:33:20.680000 @@ -247409,7 +247409,7 @@ CVE-2024-21488,0,0,245c5473def4aa0191be5f10fc6baa18aab621fbebc3bdd6b8cb4be4ebd3a CVE-2024-21489,0,0,53515493089291e8b9d6b5d5cf7c7875e7663716ffd514b330d3e4a5f3efaa4f,2024-10-04T13:51:25.567000 CVE-2024-2149,0,0,a4385ff42223f96af4c025272df4d976e9442140c453601aef2ec945a18dd09b,2024-11-21T09:09:08.230000 CVE-2024-21490,0,0,b14e68113c71fc42ffaebf92dce9c2c5c2817d0b73b87d0c0f7ad029f8fb63f9,2024-11-21T08:54:32.410000 -CVE-2024-21491,0,0,c76ed61a3c451016c9d3a6b9351078ee98e7d5258558b2099602b36b4783febf,2024-11-21T08:54:32.553000 +CVE-2024-21491,0,1,ed885d0621c9afa15f31ced4c11fa76b30b44086a27ec3bd748a089ebf894a3b,2025-01-03T19:40:54.883000 CVE-2024-21492,0,0,41784e48d5d56f935bbe9f5a3d60c45053ca0d5f0bf8670ce081293e9f26c581,2024-12-06T19:15:11.520000 CVE-2024-21493,0,0,61999d493cd2305b20c93c1b5df9c6afe2ff45a18f04f175f85548997207ee5f,2024-11-21T08:54:32.820000 CVE-2024-21494,0,0,35297f25eaa32b03c6bad3cd49cc92146b943905ce0fe0568371000866add10f,2024-11-21T08:54:32.973000 @@ -252269,12 +252269,12 @@ CVE-2024-27927,0,0,a452b1cf7dafd2bef249a2f01cb521b04ba244564b2fb3675d7c7bbdabb96 CVE-2024-27929,0,0,55be7d5487612f331a20293a9178c49765e1a92dcb14c57365dae12024c39afb,2024-11-21T09:05:26.350000 CVE-2024-2793,0,0,9b327cc1fdacc7cc5f850fea327aaf45963768df531540f1159edf3a404743c0,2024-11-21T09:10:31.853000 CVE-2024-27930,0,0,92ce1fe6287cad56709fa2b1d8ae7680dfbad1747c194ce71052a96abfbad241,2025-01-02T16:19:42.813000 -CVE-2024-27931,0,0,47d439c4ac5d295e59d8f6742d57aec1b7daec0668176eaff689d4578efd8a5a,2024-11-21T09:05:26.613000 -CVE-2024-27932,0,0,a785b0daa649276069282abc2399233812ae1f81254b4607f5e7dd7c10100da9,2024-11-21T09:05:26.747000 -CVE-2024-27933,0,0,b6746d996a77f9b6357a966d40a2251e1d64d4e40867e807eb5c922fbad290d6,2024-11-21T09:05:26.873000 -CVE-2024-27934,0,0,e80532b3604c1165c7895d93a5ad9dec73f346c7af8baad7a865d0be52b5ca02,2024-11-21T09:05:27.020000 -CVE-2024-27935,0,0,72ee8c794d05e52891f1882d8f7b5a2a5080c66019242eee66d30a5c314a0a0f,2024-11-21T09:05:27.147000 -CVE-2024-27936,0,0,b7fec3e99365f73be64b7cae6045da129e906469fd7ae04282ce5a92b0a5a64b,2024-11-21T09:05:27.273000 +CVE-2024-27931,0,1,1cc72fa5d2887e8e3601ddbbdde0113c5c077ca8c57d34274859284fc3cc72d1,2025-01-03T19:29:35.223000 +CVE-2024-27932,0,1,e2df227cfc40bc796466c9dbe6bf7363ce76da4bf8d83917121d2a392a587710,2025-01-03T19:19:52.197000 +CVE-2024-27933,0,1,1d2d09c494cb520fbf6a8180d2377c091b3009ccc20d84caf76da73bf3ed9424,2025-01-03T19:23:04.357000 +CVE-2024-27934,0,1,9297d1f91d2d4c4da21b3c2ee5d403945d60f5b3cc59b814110d9ad7cb584158,2025-01-03T19:23:57.387000 +CVE-2024-27935,0,1,a818d438fc92cb3829b80e0c20360d6755dd4a7e2d490856f973009bf50a4648,2025-01-03T19:25:19.090000 +CVE-2024-27936,0,1,2099c76d277ac21c38cfc54bbc485707bce8fc86e66cd1bed544e652cab80946,2025-01-03T19:27:46.510000 CVE-2024-27937,0,0,82e87c7e48ea4409826e73644eb6a015968a77c77ade52ed938f8f3395a1fbf4,2025-01-02T16:20:03.713000 CVE-2024-27938,0,0,f3fa24107d64f072de2a337377f22dc2fedd62e7046e2b3f6a494579c82cdd75,2024-11-21T09:05:27.543000 CVE-2024-27939,0,0,5f5bf460c1e0d247ddd4a3052d67c96e98684c7803854fd41ed3196f3193dcff,2024-11-21T09:05:27.690000 @@ -254049,12 +254049,12 @@ CVE-2024-30369,0,0,599260f9174352b9416cc6f9cfed9edaa7863cf92779bf720e6ddbe354fef CVE-2024-3037,0,0,dba643d38d073858c63613a52375c845958bc4dd249ee56729108cbd508ab8bf,2024-11-21T09:28:44.220000 CVE-2024-30370,0,0,697bf20924afe8b36303c898ef8193332c6a6b99547fd6cb6a16dd7e9336646e,2024-11-21T09:11:47.807000 CVE-2024-30371,0,0,b5d6ce17f5315b9b23c2419b0bbf5646c23ef4a918d0050ba7180e7ce4f7a988,2024-11-21T09:11:47.943000 -CVE-2024-30372,0,0,f61498f9a24809c2da1328fc4465b2274ebd72bf4c822906db46b387faac3314,2024-11-22T20:15:08.550000 +CVE-2024-30372,0,1,cc111a41a90afb5fb01651ed5cface3e07f85983fe25bdcc33097ca3684ea095,2025-01-03T19:55:22.060000 CVE-2024-30373,0,0,9aa804b663226d2c5c0255450ac5233ace75b175ef0ffbf44c9face8120c6703,2024-11-21T09:11:48.073000 CVE-2024-30374,0,0,5750c84f0dfce3e388704bb4ab938fe04de20050b059190da07191e8eeb9bf3e,2024-11-21T09:11:48.220000 CVE-2024-30375,0,0,cb0368348c49f86546e5f7857b0c0a61bb5922fbcf3db6a88e5f77172355ae24,2024-11-21T09:11:48.357000 CVE-2024-30376,0,0,2c6a76c5c7f191a547ec1e1024b72b21c9def28f00438affcdda082a3bb0ea44,2024-11-22T20:15:08.667000 -CVE-2024-30377,0,0,73887ffb65a02a09a8af20ac408d0020b4cd88b7451400351492046a339f4df3,2024-11-22T20:15:08.780000 +CVE-2024-30377,0,1,c1637b0bb9b02bf842bc41c511caa3392e14bbac51b8d2b26a6fe7be7336a1d3,2025-01-03T20:46:41.177000 CVE-2024-30378,0,0,d71d4638dbc6eba8bae8051ca94bfce66728e9312382c0209d27d8a1be3871f7,2024-11-21T09:11:48.497000 CVE-2024-30380,0,0,2611db369fb1a4933375909a458b47d2fdc6172e2784489f3b06efa4c4c70424,2024-11-21T09:11:48.667000 CVE-2024-30381,0,0,16af65d0f620fa329a4ee8e3a262a00f313455370e8bb1cae2f8a98e8cb8cb80,2024-11-21T09:11:48.810000 @@ -257200,7 +257200,7 @@ CVE-2024-34597,0,0,177e74cc84ab26472ddf89ba13c1485437043f4639b469fea00e41634d3ec CVE-2024-34599,0,0,cf7052458c0d0767f934707d8abbd559c0875986c94ac6693429963460f92f50,2024-11-21T09:19:02.963000 CVE-2024-3460,0,0,3cd4376d921ca23c37d76493dee331d65b07368d8d3fe1d522aaec8d4a5a3ff4,2024-11-21T09:29:38.773000 CVE-2024-34600,0,0,acc93e75e2c654676889731158073e66b5724f27e6fde33a2de4352805d7c486,2024-11-21T09:19:03.100000 -CVE-2024-34601,0,0,9481bc42e900a9e11d4adaeec1b4a2f36ef73999dce6ce7a7223e3f585e0b695,2024-11-21T09:19:03.247000 +CVE-2024-34601,0,1,25a332c4a579011bb0c18e1d4a21b19636411ff6f28cbf9020b3962c90461a30,2025-01-03T19:15:49.823000 CVE-2024-34602,0,0,4d7ed54c46dcade2e8696d5e18f840ba7f0df79c7f91cdd2a16daad9d77e4421,2024-11-21T09:19:03.373000 CVE-2024-34603,0,0,aeee381e21bddfbffd5c1bf58d4ffaa67f0f67b9f96a6f50af4b1c14904edf98,2024-11-21T09:19:03.520000 CVE-2024-34604,0,0,eef485d7c9aa94afecaeaddea6e3c15831fd61bef78c7f3b906234e5d61a2055,2024-08-12T18:34:09.443000 @@ -257741,7 +257741,7 @@ CVE-2024-35359,0,0,ebd79174dfb7ac257fb41388eea21839910657d0184b40fdf6359090d4089 CVE-2024-3536,0,0,f61f758feff8e86a26533bd96329f276bdabc00164a17283a9ca7edca8ea810e,2024-11-21T09:29:48.253000 CVE-2024-35361,0,0,ba078c8fe5aa2f3cfaede9b86bade7ec878c218d84d169b517462fabd4369970,2024-11-21T09:20:13.143000 CVE-2024-35362,0,0,c9ceca7447b8a557451b5967fa218d930b5f59694547d29930113b4859836719,2024-11-21T09:20:13.357000 -CVE-2024-35365,1,1,a3c1cdb962da02ac55af18c80b8822190547206e08e4db57d65b6b742bd2e4b6,2025-01-03T18:15:15.177000 +CVE-2024-35365,0,0,a3c1cdb962da02ac55af18c80b8822190547206e08e4db57d65b6b742bd2e4b6,2025-01-03T18:15:15.177000 CVE-2024-35366,0,0,cce3847e362944647524f42f8c96161fb821767a34a431ba81a662d8d164730d,2024-12-03T14:15:20.107000 CVE-2024-35367,0,0,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000 CVE-2024-35368,0,0,9627ef41704bb16e68693f5c6e18e4ed8b2de5952a37d343cc0e72735c6da4fd,2024-12-02T17:15:10.860000 @@ -258750,7 +258750,7 @@ CVE-2024-3661,0,0,11a579560faa5cc1a7695ecebefa36af8b143192151784b4c1d37ba82796f9 CVE-2024-36610,0,0,086f8f5b46926c0d5b801e2f18812ba0aac4c04dd5f1ff997c802b3134a682c8,2024-12-24T21:15:18.280000 CVE-2024-36611,0,0,8ae1129d2c6d7f04820dc25a51b35eeb79c0ea9714d3891bb92ee90d865f9805,2024-12-03T21:15:06.783000 CVE-2024-36612,0,0,2e5bae787232529157776124a9b65f7f3416dd8775c93aff3efc637bb8af407f,2024-12-02T17:15:11.420000 -CVE-2024-36613,1,1,db0b1df5290aeb542d04730a0127057d87a417a51282e071403c3c78a9b9ab60,2025-01-03T18:15:15.343000 +CVE-2024-36613,0,0,db0b1df5290aeb542d04730a0127057d87a417a51282e071403c3c78a9b9ab60,2025-01-03T18:15:15.343000 CVE-2024-36615,0,0,c3893c90b5581100f420f26ee0ccf784458a2107b295d3c77defc3849a0f0672,2024-12-03T16:15:22.197000 CVE-2024-36616,0,0,296a4798d6d750743bea7f8c9bd5c284519a9999e91edf6d3d9b49bc20d67d94,2024-12-02T18:15:09.857000 CVE-2024-36617,0,0,f14a7d3b346fdf72174febe1311327593886e5ab37642fdc9a403f2c9c27d4e2,2024-12-02T18:15:10.270000 @@ -267234,7 +267234,7 @@ CVE-2024-48807,0,0,a763796bbe84709db2996b18e1ed107315b165fb8245eca95257cb100e859 CVE-2024-48809,0,0,89c64378ba71cdec8bda78ac432f0505d060e9c4a712bdefd0c0360dbcd52353,2024-11-06T19:33:54.977000 CVE-2024-4881,0,0,1c031fd2c38a767f783cce3b716ba92a0bccdca18b325ac245c51367e8857d89,2024-11-21T09:43:46.897000 CVE-2024-48813,0,0,531834e27f6a6bc0c9381cd9781162753c49dc1f29a9e6d0b2f2fb460ee278b0,2024-10-15T12:58:51.050000 -CVE-2024-48814,0,0,a57915293639cd2f22fd5536bfef2016bbd90a552c63261df4228ec0f44a246e,2025-01-03T15:15:10.570000 +CVE-2024-48814,0,1,46471728da40407ff11123dfcb472e75a476a6005b270a33821b6c23b2956a42,2025-01-03T20:15:27.807000 CVE-2024-4882,0,0,415f96cc42f39d5a62242781ac68568d1b60333c23c5a2a5227f986f314b970a,2024-11-21T09:43:47.037000 CVE-2024-48821,0,0,4896dd6ac80918ca5a6581c0f1374f01a9628402f48179089cf11ce291dadb67,2024-10-15T15:35:21.620000 CVE-2024-48822,0,0,118b043493af5b9e81bfea3d9d49d263053f84c00f596289e418351e3f2a583f,2024-10-15T15:35:21.887000 @@ -267851,7 +267851,7 @@ CVE-2024-49660,0,0,6a24715eb8def69570958288bf82d1fe317bcad71783659feefb650fe345b CVE-2024-49661,0,0,ef24d9fec700c58d1812d78b3d6d7666361bbaa18a341ba7331c982ab12fc26f,2024-11-01T18:56:50.637000 CVE-2024-49662,0,0,dde9ca392192ae6d8233bf6e40e8e6f0846328594962244d4767eadb16203c67,2024-11-01T18:56:19.253000 CVE-2024-49663,0,0,3a8e439baee3adb77712fe2a8a40d1a3f2d9db21deb11c5af7169fb7213f0a2e,2024-11-01T18:55:51.143000 -CVE-2024-49664,0,1,6f119370bd4e250be2090b50e650fcc745daa9be0199ef2ec2c8da7fae217515,2025-01-03T17:42:09.330000 +CVE-2024-49664,0,0,6f119370bd4e250be2090b50e650fcc745daa9be0199ef2ec2c8da7fae217515,2025-01-03T17:42:09.330000 CVE-2024-49665,0,0,481fa6d35194d6fe2f569ea080f77f62c2730b07a289c7d51c66af9df5e96295,2024-11-01T18:55:01.773000 CVE-2024-49667,0,0,9b3b9d25907047dc12cf012cf030c8db73d4d456b33bdaa74b91d8a7ee70a4ed,2024-11-01T18:48:48.797000 CVE-2024-49668,0,0,94eddff54af31179a0c5ecabdbdd71d8d6dcea45c4f840188de246a365bfee2e,2024-10-25T12:56:36.827000 @@ -270426,7 +270426,7 @@ CVE-2024-5347,0,0,de874d6aa2a2a8b66720e1c81529adf22617cbfacec3535c9a6e8a145e10f5 CVE-2024-53470,0,0,7e717d458d3e971476fce58f4e759acfb3653594788d9bb4f7ef6a8cad1dbc8b,2024-12-10T22:15:25.010000 CVE-2024-53471,0,0,dea70dfafbf7c115f6b9fc5aab8fa383b86b6c8d65d06c11e3049e5b3d3b885e,2024-12-10T22:15:25.277000 CVE-2024-53472,0,0,f62f01117567dfa980810b663addc9d4b9e324fc111266531f31ef2f0fb28372,2024-12-11T17:15:19.720000 -CVE-2024-53473,0,1,55ff9c6d19b5ada689c03ed8de8af56d64bc3343c20ff588c0e8a24db205901f,2025-01-03T17:15:08.243000 +CVE-2024-53473,0,0,55ff9c6d19b5ada689c03ed8de8af56d64bc3343c20ff588c0e8a24db205901f,2025-01-03T17:15:08.243000 CVE-2024-53476,0,0,1000f6416155c52d1da19e6dc9557a007310c3d11f9d581a9eab03f7acd41c61,2024-12-28T19:15:06.880000 CVE-2024-53477,0,0,3dfbb52637bb052a793d1b67a024cd50b899929ad7fee8a9366a9aa6e069e388,2024-12-11T16:15:14.150000 CVE-2024-5348,0,0,0c3454114961657672c2409af3f9f2f3bb9995c6579ea15f7d29552347b906f3,2024-11-21T09:47:28.240000 @@ -271243,7 +271243,7 @@ CVE-2024-55058,0,0,87b2026e0371667b97fc0d238239f420fb30954db814c22844fef43709f0f CVE-2024-55059,0,0,8104722ac1b347e422b015b1bcea370832dc93b077cc722f4435b9c43328db84,2024-12-18T16:15:14.560000 CVE-2024-5506,0,0,3a939cb8d1b19c0888bb3cd98071317aca0cf323e5a9cf329a9932ae18f6a99c,2024-11-21T09:47:50.193000 CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000 -CVE-2024-55078,0,0,46727a306da0a5074789ceec48cc91a7cb0ca2cd0e29ed08f6dbed84909b6912,2025-01-03T15:15:10.697000 +CVE-2024-55078,0,1,8eb9312455772284be54b89bbeea033d2eec085b86a20c1aba6e71ebb83bda08,2025-01-03T20:15:27.957000 CVE-2024-5508,0,0,115a25c08f43d4b8fec19f2a1d9db4d23c6ce2518b2cd0371fc64ad26ff5bfe0,2024-11-21T09:47:50.463000 CVE-2024-55081,0,0,bc880d1fb0754a9a047f5f48c261b5410277472979a1a968b8556724a801b088,2025-01-02T20:16:05.530000 CVE-2024-55082,0,0,46e334548c0cc47791b6e59ad0b24cbe40324b7098a9a04eafe4a9b8f6aa2dd8,2025-01-02T20:16:05.813000 @@ -271691,20 +271691,20 @@ CVE-2024-56361,0,0,a863853c28abb760ff32686655bb3bc5a550f20943cb34e8a3a18ee0b2e5a CVE-2024-56362,0,0,6c11627d17fd0c98131328b72e24d3fe9b01f90190167be28f8c83514e2d2986,2024-12-23T18:15:07.617000 CVE-2024-56363,0,0,7b130d481442d6564973e2a7227b43f5a030ae8a41341bb70189f5abec825a62,2024-12-23T18:15:07.767000 CVE-2024-56364,0,0,6115dedb84ebd874c4c0a6694d1fb784d8502b3a627aacf7ea4fc74186ea1ff2,2024-12-23T16:15:07.770000 -CVE-2024-56365,1,1,976a8b84a9ca0c97e2b4c76cce7628d653e8d0c1a908ac0825da9253e5173a6e,2025-01-03T17:15:08.407000 -CVE-2024-56366,1,1,53d6397cd509d3ef52f77944b3ff8151eb5fa820a2ab3859e21df066dd8b6580,2025-01-03T17:15:08.550000 +CVE-2024-56365,0,1,c5b2dbd1a5c652a33591aa7ae09b57eedaa2b08f679f5493d59f5f8c048bc0d1,2025-01-03T19:15:12.340000 +CVE-2024-56366,0,1,48479ea8f55db434c5c7ac53217ddf9dfe727218e3e7377f3d536e1c0f97ca5d,2025-01-03T19:15:12.443000 CVE-2024-5637,0,0,a5e32b0dfdcc3b00fa1c534a6efa8caef39b80f083f1c956c246ad8a83c6df00,2024-11-21T09:48:04.030000 CVE-2024-56375,0,0,1aeae50409e14309fb31af7dcf320eae7189e473177b68d63698866c2c62cd0b,2024-12-26T06:15:06.203000 CVE-2024-56378,0,0,fab67c7f7143f85c88660814de01440f680c12a24f807e1e2e38a3d85020bb03,2024-12-26T20:15:23.270000 CVE-2024-5638,0,0,4a64496852c4ee147220588b5d1940917ce749a1b3dd56d16a77a8cf3ed54b84,2024-11-21T09:48:04.153000 CVE-2024-5639,0,0,78123d59d6ff1062d5cdcc1456c84b89eb240e57bd822aee818d4edc5bb804e5,2024-11-21T09:48:04.290000 CVE-2024-5640,0,0,01c62801966d56f9308a985efd017779bd36dfe950ad675d920936fb65a56c1f,2024-11-21T09:48:04.440000 -CVE-2024-56408,0,1,da6167fdf5a8679960fbdbdf5d7355682321de37402f71d087e95568563786b8,2025-01-03T18:15:15.860000 -CVE-2024-56409,1,1,ed1ceb0f0984ce142d44cc517d11b3e5f338bb0cd6108e411caadc168a0e0ab7,2025-01-03T17:15:08.687000 +CVE-2024-56408,0,1,cd4b6b211e0a160b70acb972ac8ce8a8f58fca4bf287c8875ce7a1ecf63f672e,2025-01-03T19:15:12.533000 +CVE-2024-56409,0,1,d99656fa69c650421ca8cbabcdd83e678caa5cfb8b9a6a9a68c5e4694cb43a45,2025-01-03T19:15:12.627000 CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000 -CVE-2024-56410,1,1,bacb93602d8c8e968416a257f98c97367ba43bcd962c9fb7ca1599077e6ebee1,2025-01-03T18:15:15.987000 -CVE-2024-56411,1,1,d520d39d2728c6661a63e679ea00870498cc041f14a81399120c6c5ace601ae5,2025-01-03T18:15:16.203000 -CVE-2024-56412,1,1,7ed733bbffe237b9cbc747cbba38f4b908e9d7eb10b7d53914ac34ca4f2c496a,2025-01-03T18:15:16.380000 +CVE-2024-56410,0,0,bacb93602d8c8e968416a257f98c97367ba43bcd962c9fb7ca1599077e6ebee1,2025-01-03T18:15:15.987000 +CVE-2024-56411,0,0,d520d39d2728c6661a63e679ea00870498cc041f14a81399120c6c5ace601ae5,2025-01-03T18:15:16.203000 +CVE-2024-56412,0,0,7ed733bbffe237b9cbc747cbba38f4b908e9d7eb10b7d53914ac34ca4f2c496a,2025-01-03T18:15:16.380000 CVE-2024-56413,0,0,80435b57c7c9048773680d783c015ac26d2a1a27538e161c950af9d463318406,2025-01-02T16:15:08.570000 CVE-2024-56414,0,0,b4af03f514aa1e91d591d44d03066c9da0634ab7a11c7f36aef3d99223087fa5,2025-01-02T16:15:08.693000 CVE-2024-5642,0,0,272b3c46f017079f5e7a4c3a57dae457f6d7a543b129faf9804cec24715f8735,2024-11-21T09:48:04.713000 @@ -271723,8 +271723,8 @@ CVE-2024-56509,0,0,9eaeae1f7b8c8e75d17552f014dec0e2f8e3eb274c4a7605543f4a62406c3 CVE-2024-5651,0,0,1b52d2c21baa1eebb0031be2e17eaf5cabf9f1b7ab486745a4d7c4c1e8ed2d60,2024-08-30T14:15:16.820000 CVE-2024-56510,0,0,455df6502629948cebf0de2208b49dba0ad1ef07f23a212f1e45f8c101d4f935,2024-12-26T21:15:06.743000 CVE-2024-56512,0,0,fb4379c8a390a1b759f4166891b605054b948310a82def3157334ebd2bad532f,2024-12-28T17:15:07.967000 -CVE-2024-56513,1,1,e0e8b23e867dd2fedfa6292a9f6e4f6e7d594e32b87188bcf1d5118a60e5d592,2025-01-03T17:15:08.840000 -CVE-2024-56514,1,1,a29a245bf7111fc32d6ffa0ea95ba0f183d7806dc8dc045e9fb230c1a6b8fdda,2025-01-03T17:15:09.017000 +CVE-2024-56513,0,0,e0e8b23e867dd2fedfa6292a9f6e4f6e7d594e32b87188bcf1d5118a60e5d592,2025-01-03T17:15:08.840000 +CVE-2024-56514,0,0,a29a245bf7111fc32d6ffa0ea95ba0f183d7806dc8dc045e9fb230c1a6b8fdda,2025-01-03T17:15:09.017000 CVE-2024-56516,0,0,e289a49884350d8e97e9919ccb1e372d3094ed3378a92522ef92eda6cf2f092f,2024-12-30T17:15:09.687000 CVE-2024-56517,0,0,65c6507911433d4cc6f529fa655b3eded381be11e52e2d7cbe5b07f95e44efda,2024-12-30T17:15:09.840000 CVE-2024-56519,0,0,3c5a6d8f19f54d6c861bfc224498ef149ba17c594e43f18b02fc8f106d9f1bb2,2025-01-02T20:16:07.080000 @@ -273117,8 +273117,8 @@ CVE-2024-6939,0,0,bdde7e7b61111b33a7b595deeb04858167e1a20e37be011de3249e663c7e4c CVE-2024-6940,0,0,608adc6414f49466477ed28b2a55982e54712f3dc4cc089717cde65eedf0a87e,2024-11-21T09:50:35.793000 CVE-2024-6941,0,0,05ffe96ddffc74da2cf2d596ac5ac9164177245bd8c29542e5e7c888542917da,2024-11-21T09:50:35.957000 CVE-2024-6942,0,0,d14132e898ff239d20fb024f42d063a8475ad0e68fe693129591082975ec85d1,2024-11-21T09:50:36.107000 -CVE-2024-6943,0,0,5942037a491021bed5567466297d060354a7148e09c5c66757243784b7dad390,2024-11-21T09:50:36.260000 -CVE-2024-6944,0,0,c9f3f8473fa7f7ab8f1c08ec2d8fef6e637ea5f5335a8bcbff80ba98e59e53dd,2024-11-21T09:50:36.410000 +CVE-2024-6943,0,1,c6415b928bac30bf13ed4acbb71cdd85fa579584db1a2c4baa6f16a7a49bd8f4,2025-01-03T19:11:26.513000 +CVE-2024-6944,0,1,0b7f37116c0c89063f20b11b92b896e5fa16f3f87ffc8cdc2be02f4b976ff6dc,2025-01-03T19:11:23.650000 CVE-2024-6945,0,0,d5313b90690dbc12ddf5bf9750fea68ab45817f83e4abfe62a80bcd2a8d826eb,2024-11-21T09:50:36.563000 CVE-2024-6946,0,0,c8954a6bc08a810a3ec554eede1a0f7ee1b2d63eb54feb03b654cf7ec68ddd85,2024-11-21T09:50:36.727000 CVE-2024-6947,0,0,44f935f1f20f65270d17562d45f064f6357dccb8299dc678994eea4f68cef26f,2024-11-21T09:50:36.883000 @@ -274017,7 +274017,7 @@ CVE-2024-7967,0,0,0862728975ae07138d419922906301e86ca32bf8f0f5b6bf3d830d6ecb4188 CVE-2024-7968,0,0,c8ae0654c4852518a4b4b26d46428918e6a896dc4df2d02bf2b05416e098d419,2024-08-27T13:35:04.780000 CVE-2024-7969,0,0,df0425e2c8afa92cea17d6a7c308901b9f2aa9730959661a91bb505a1ab8888d,2024-08-28T23:15:05.320000 CVE-2024-7970,0,0,65dd451c1edbcdd226d9027f456b77e1785aa0fa20bde4ad16184c696d224a23,2025-01-02T17:40:45.077000 -CVE-2024-7971,0,0,cbe2daa931187e1258dbe5911fe5622967ef34542556be9e6ad2a0b769c2720b,2024-11-27T17:21:35.077000 +CVE-2024-7971,0,1,ecec74ddb7af4878aefac4ef21f57409da40ad73713e53a29ce6aa1c32ec2d54,2025-01-03T19:39:45.157000 CVE-2024-7972,0,0,e046834a8c6cd3f2b72f3d7f61eb5f863b641d5ca124b733b481256c6229b63a,2024-08-26T15:11:35.017000 CVE-2024-7973,0,0,15d0c9d63211801347ebed9db5c78827e841609bd1672901b17ef57d9247996c,2024-10-24T20:35:14.967000 CVE-2024-7974,0,0,4b66e256a6f6934bb179b28118ca74ebb40323952eeb372f726a845c45c282c8,2024-10-30T21:35:13.293000 @@ -275661,8 +275661,10 @@ CVE-2025-0173,0,0,7e3fc99444e621658643e55cf01044b7a151c6ec6043aaa26a942f36cc25b7 CVE-2025-0174,0,0,9d66653b35dce22a5e13bcd4d218f8b859e23f7e6e6c85f7fc84bbc507e489f5,2025-01-03T02:15:07.480000 CVE-2025-0175,0,0,ac95c9697b04739d886090fb337a8da173389b48ecd5972d04d24955935380d8,2025-01-03T02:15:07.680000 CVE-2025-0176,0,0,762135cafd60f24293f16082ad1fa3ab2ac7264ff4dd90fdc233deab7e68191b,2025-01-03T15:15:11.360000 -CVE-2025-0195,1,1,3a317c51726170702316fa33d45de8f3fef3184ae45ef5e02dd449cbd27af8d0,2025-01-03T18:15:17.317000 -CVE-2025-21609,1,1,debac97612532639eda73000ed423c6055a43cea29689a043be2143f9409c2e8,2025-01-03T17:15:09.147000 -CVE-2025-21610,1,1,91f58e52c41e26ee8c782751f380f5e6f82b9b51c281135ca06080d1bc5407a4,2025-01-03T17:15:09.290000 +CVE-2025-0195,0,0,3a317c51726170702316fa33d45de8f3fef3184ae45ef5e02dd449cbd27af8d0,2025-01-03T18:15:17.317000 +CVE-2025-0196,1,1,fb71521e255dd853610214509345a55ba2b3e12d37e32c94fc1c20cb4b643ab6,2025-01-03T19:15:12.793000 +CVE-2025-0197,1,1,8050294c8ecdc49228ce7833915570638c5758146d0bd01628204a571b88b989,2025-01-03T20:15:28.873000 +CVE-2025-21609,0,0,debac97612532639eda73000ed423c6055a43cea29689a043be2143f9409c2e8,2025-01-03T17:15:09.147000 +CVE-2025-21610,0,0,91f58e52c41e26ee8c782751f380f5e6f82b9b51c281135ca06080d1bc5407a4,2025-01-03T17:15:09.290000 CVE-2025-22214,0,0,e2cc6e4f91ccc0784ce6c5e7f203a7b7ecf1116a49ea9d5798e3ff93276eaeec,2025-01-02T04:15:06.277000 CVE-2025-22275,0,0,ae7bb36b063c3378386b214c3e5016593366cb52d21141261157b091c3ceba6a,2025-01-03T07:15:25.297000