diff --git a/CVE-2020/CVE-2020-294xx/CVE-2020-29444.json b/CVE-2020/CVE-2020-294xx/CVE-2020-29444.json index f29532d76e2..84f7ad773cb 100644 --- a/CVE-2020/CVE-2020-294xx/CVE-2020-29444.json +++ b/CVE-2020/CVE-2020-294xx/CVE-2020-29444.json @@ -2,7 +2,7 @@ "id": "CVE-2020-29444", "sourceIdentifier": "security@atlassian.com", "published": "2021-05-07T06:15:09.040", - "lastModified": "2024-11-21T05:24:01.033", + "lastModified": "2025-02-12T21:15:09.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-294xx/CVE-2020-29445.json b/CVE-2020/CVE-2020-294xx/CVE-2020-29445.json index 1f5ac416c42..e2df189d903 100644 --- a/CVE-2020/CVE-2020-294xx/CVE-2020-29445.json +++ b/CVE-2020/CVE-2020-294xx/CVE-2020-29445.json @@ -2,7 +2,7 @@ "id": "CVE-2020-29445", "sourceIdentifier": "security@atlassian.com", "published": "2021-05-07T06:15:09.090", - "lastModified": "2024-11-21T05:24:01.170", + "lastModified": "2025-02-12T21:15:10.103", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-260xx/CVE-2021-26073.json b/CVE-2021/CVE-2021-260xx/CVE-2021-26073.json index 13a03fdc2be..3c1c7432e06 100644 --- a/CVE-2021/CVE-2021-260xx/CVE-2021-26073.json +++ b/CVE-2021/CVE-2021-260xx/CVE-2021-26073.json @@ -2,7 +2,7 @@ "id": "CVE-2021-26073", "sourceIdentifier": "security@atlassian.com", "published": "2021-04-16T03:15:12.033", - "lastModified": "2024-11-21T05:55:49.020", + "lastModified": "2025-02-12T21:15:10.297", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 4.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-260xx/CVE-2021-26074.json b/CVE-2021/CVE-2021-260xx/CVE-2021-26074.json index 046fb7af06f..683b83dfe1e 100644 --- a/CVE-2021/CVE-2021-260xx/CVE-2021-26074.json +++ b/CVE-2021/CVE-2021-260xx/CVE-2021-26074.json @@ -2,7 +2,7 @@ "id": "CVE-2021-26074", "sourceIdentifier": "security@atlassian.com", "published": "2021-04-16T03:15:12.113", - "lastModified": "2024-11-21T05:55:49.150", + "lastModified": "2025-02-12T21:15:10.530", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-260xx/CVE-2021-26077.json b/CVE-2021/CVE-2021-260xx/CVE-2021-26077.json index 9ac8ba12751..3a1fcf194ba 100644 --- a/CVE-2021/CVE-2021-260xx/CVE-2021-26077.json +++ b/CVE-2021/CVE-2021-260xx/CVE-2021-26077.json @@ -2,7 +2,7 @@ "id": "CVE-2021-26077", "sourceIdentifier": "security@atlassian.com", "published": "2021-05-10T00:15:07.543", - "lastModified": "2024-11-21T05:55:49.523", + "lastModified": "2025-02-12T21:15:10.730", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 5.3 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-441xx/CVE-2021-44168.json b/CVE-2021/CVE-2021-441xx/CVE-2021-44168.json index b24f8f39b77..7f4912056ac 100644 --- a/CVE-2021/CVE-2021-441xx/CVE-2021-44168.json +++ b/CVE-2021/CVE-2021-441xx/CVE-2021-44168.json @@ -2,8 +2,8 @@ "id": "CVE-2021-44168", "sourceIdentifier": "psirt@fortinet.com", "published": "2022-01-04T13:15:07.957", - "lastModified": "2024-11-21T06:30:29.387", - "vulnStatus": "Modified", + "lastModified": "2025-02-12T21:32:00.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31631.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31631.json new file mode 100644 index 00000000000..b76902a9a20 --- /dev/null +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31631.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-31631", + "sourceIdentifier": "security@php.net", + "published": "2025-02-12T22:15:29.007", + "lastModified": "2025-02-12T22:15:29.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before 8.2.2 when using PDO::quote() function to quote user-supplied data for SQLite, supplying an overly long string may cause the driver to incorrectly quote the data, which may further lead to SQL injection vulnerabilities." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@php.net", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@php.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "references": [ + { + "url": "https://bugs.php.net/bug.php?id=81740", + "source": "security@php.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-376xx/CVE-2022-37660.json b/CVE-2022/CVE-2022-376xx/CVE-2022-37660.json index a1152c07d0e..1ebb89b97fd 100644 --- a/CVE-2022/CVE-2022-376xx/CVE-2022-37660.json +++ b/CVE-2022/CVE-2022-376xx/CVE-2022-37660.json @@ -2,8 +2,8 @@ "id": "CVE-2022-37660", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T23:15:08.140", - "lastModified": "2025-02-11T23:15:08.140", - "vulnStatus": "Received", + "lastModified": "2025-02-12T22:15:29.167", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In hostapd 2.10 and earlier, the PKEX code remains active even after a successful PKEX association. An attacker that successfully bootstrapped public keys with another entity using PKEX in the past, will be able to subvert a future bootstrapping by passively observing public keys, re-using the encrypting element Qi and subtracting it from the captured message M (X = M - Qi). This will result in the public ephemeral key X; the only element required to subvert the PKEX association." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-323" + } + ] + } + ], "references": [ { "url": "https://link.springer.com/article/10.1007/s10207-025-00988-3", diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25213.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25213.json index 0f4a2c4f6cb..d543ed8990d 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25213.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25213.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25213", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:07.907", - "lastModified": "2024-11-21T07:49:19.203", + "lastModified": "2025-02-12T22:15:29.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25214.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25214.json index d858dd46eb6..76712ac4a53 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25214.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25214.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25214", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:07.940", - "lastModified": "2024-11-21T07:49:19.367", + "lastModified": "2025-02-12T21:15:11.117", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25215.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25215.json index 6903016d82f..764cd350895 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25215.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25215.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25215", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:07.980", - "lastModified": "2024-11-21T07:49:19.500", + "lastModified": "2025-02-12T21:15:11.290", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25216.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25216.json index cd1ec97ca0b..902a09844ec 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25216.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25216.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25216", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:08.017", - "lastModified": "2024-11-21T07:49:19.630", + "lastModified": "2025-02-12T21:15:11.453", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25217.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25217.json index 9cd57bfd996..96802a12f30 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25217.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25217.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25217", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:08.053", - "lastModified": "2024-11-21T07:49:19.763", + "lastModified": "2025-02-12T21:15:11.623", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25218.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25218.json index fa2e56256a0..4acfc873ab9 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25218.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25218.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25218", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:08.100", - "lastModified": "2024-11-21T07:49:19.893", + "lastModified": "2025-02-12T21:15:11.810", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25219.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25219.json index c361d510e73..57d922a01f1 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25219.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25219.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25219", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:08.140", - "lastModified": "2024-11-21T07:49:20.033", + "lastModified": "2025-02-12T21:15:11.973", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25220.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25220.json index d842082494e..d158fe78840 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25220.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25220.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25220", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:08.177", - "lastModified": "2024-11-21T07:49:20.157", + "lastModified": "2025-02-12T21:15:12.137", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-268xx/CVE-2023-26817.json b/CVE-2023/CVE-2023-268xx/CVE-2023-26817.json index 5ff86a30b1b..2852cd6a2ac 100644 --- a/CVE-2023/CVE-2023-268xx/CVE-2023-26817.json +++ b/CVE-2023/CVE-2023-268xx/CVE-2023-26817.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26817", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T03:15:06.953", - "lastModified": "2024-11-21T07:51:58.307", + "lastModified": "2025-02-12T21:15:12.297", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-268xx/CVE-2023-26820.json b/CVE-2023/CVE-2023-268xx/CVE-2023-26820.json index bec0cd0cf14..7c371632f30 100644 --- a/CVE-2023/CVE-2023-268xx/CVE-2023-26820.json +++ b/CVE-2023/CVE-2023-268xx/CVE-2023-26820.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26820", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T03:15:06.993", - "lastModified": "2024-11-21T07:51:58.593", + "lastModified": "2025-02-12T21:15:12.463", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29164.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29164.json new file mode 100644 index 00000000000..9976c49a135 --- /dev/null +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29164.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2023-29164", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:29.520", + "lastModified": "2025-02-12T22:15:29.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in BMC Firmware for the Intel(R) Server Board S2600WF, Intel(R) Server Board S2600ST, Intel(R) Server Board S2600BP, before version 02.01.0017 and Intel(R) Server Board M50CYP and Intel(R) Server Board D50TNP before version R01.01.0009 may allow an authenticated user to enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00990.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31276.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31276.json new file mode 100644 index 00000000000..9fd9281d4d6 --- /dev/null +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31276.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2023-31276", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:29.687", + "lastModified": "2025-02-12T22:15:29.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in BMC Firmware for the Intel(R) Server Board S2600WF, Intel(R) Server Board S2600ST, Intel(R) Server Board S2600BP, before version 02.01.0017 and Intel(R) Server Board M50CYP and Intel(R) Server Board D50TNP before version R01.01.0009 may allow a privileged user to enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00990.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32277.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32277.json new file mode 100644 index 00000000000..757dc391bd0 --- /dev/null +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32277.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2023-32277", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:29.837", + "lastModified": "2025-02-12T22:15:29.837", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Untrusted Pointer Dereference in I/O subsystem for some Intel(R) QAT software before version 2.0.5 may allow authenticated user to potentially enable information disclosure via local operating system access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01124.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34440.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34440.json new file mode 100644 index 00000000000..fbd5c9c30d9 --- /dev/null +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34440.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2023-34440", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:30.000", + "lastModified": "2025-02-12T22:15:30.000", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43758.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43758.json new file mode 100644 index 00000000000..3ed0406c2b8 --- /dev/null +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43758.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2023-43758", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:30.153", + "lastModified": "2025-02-12T22:15:30.153", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in UEFI firmware for some Intel(R) processors may allow a privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48267.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48267.json new file mode 100644 index 00000000000..81e38fe4ef1 --- /dev/null +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48267.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2023-48267", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:30.303", + "lastModified": "2025-02-12T22:15:30.303", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper buffer restrictions in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", + "baseScore": 7.9, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.5, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01203.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48366.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48366.json new file mode 100644 index 00000000000..2a00e59d071 --- /dev/null +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48366.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2023-48366", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:30.463", + "lastModified": "2025-02-12T22:15:30.463", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Race condition in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable information disclosure via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01203.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-496xx/CVE-2023-49603.json b/CVE-2023/CVE-2023-496xx/CVE-2023-49603.json new file mode 100644 index 00000000000..e6db4fc9121 --- /dev/null +++ b/CVE-2023/CVE-2023-496xx/CVE-2023-49603.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2023-49603", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:30.623", + "lastModified": "2025-02-12T22:15:30.623", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Race condition in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01203.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-496xx/CVE-2023-49615.json b/CVE-2023/CVE-2023-496xx/CVE-2023-49615.json new file mode 100644 index 00000000000..e5d3b82d395 --- /dev/null +++ b/CVE-2023/CVE-2023-496xx/CVE-2023-49615.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2023-49615", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:30.773", + "lastModified": "2025-02-12T22:15:30.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01203.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-496xx/CVE-2023-49618.json b/CVE-2023/CVE-2023-496xx/CVE-2023-49618.json new file mode 100644 index 00000000000..ba9a0774cd2 --- /dev/null +++ b/CVE-2023/CVE-2023-496xx/CVE-2023-49618.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2023-49618", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:30.917", + "lastModified": "2025-02-12T22:15:30.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper buffer restrictions in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01203.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12673.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12673.json new file mode 100644 index 00000000000..8c8537b7259 --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12673.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-12673", + "sourceIdentifier": "psirt@lenovo.com", + "published": "2025-02-12T21:15:12.697", + "lastModified": "2025-02-12T21:15:12.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper privilege vulnerability was reported in a BIOS customization feature of Lenovo Vantage on SMB notebook devices which could allow a local attacker to elevate privileges on the system.\n\nThis vulnerability only affects Vantage installed on these devices:\n\n * Lenovo V Series (Gen 5)\n * ThinkBook 14 (Gen 6, 7)\n * ThinkBook 16 (Gen 6, 7)\n * ThinkPad E Series (Gen 1)" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "psirt@lenovo.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@lenovo.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://support.lenovo.com/us/en/product_security/LEN-183176", + "source": "psirt@lenovo.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21830.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21830.json new file mode 100644 index 00000000000..4510a12dd9c --- /dev/null +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21830.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-21830", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:31.073", + "lastModified": "2025-02-12T22:15:31.073", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path in some Intel(R) VPL software before version 2023.4.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01044.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21859.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21859.json new file mode 100644 index 00000000000..d37908be8eb --- /dev/null +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21859.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-21859", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:31.227", + "lastModified": "2025-02-12T22:15:31.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper buffer restrictions in the UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01198.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24582.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24582.json new file mode 100644 index 00000000000..ce2625eb867 --- /dev/null +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24582.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-24582", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:31.367", + "lastModified": "2025-02-12T22:15:31.367", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in XmlCli feature for UEFI firmware for some Intel(R) processors may allow privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24852.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24852.json new file mode 100644 index 00000000000..823423f6c44 --- /dev/null +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24852.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-24852", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:31.513", + "lastModified": "2025-02-12T22:15:31.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path in some Intel(R) Ethernet Adapter Complete Driver Pack install before versions 29.1 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01144.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25571.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25571.json new file mode 100644 index 00000000000..f30dcbc05aa --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25571.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-25571", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:31.667", + "lastModified": "2025-02-12T22:15:31.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in some Intel(R) SPS firmware before SPS_E5_06.01.04.059.0 may allow a privileged user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01120.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26021.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26021.json new file mode 100644 index 00000000000..302edb9935e --- /dev/null +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26021.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-26021", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:31.830", + "lastModified": "2025-02-12T22:15:31.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper initialization in the firmware for some Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01152.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28047.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28047.json new file mode 100644 index 00000000000..446436a24a2 --- /dev/null +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28047.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-28047", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:31.983", + "lastModified": "2025-02-12T22:15:31.983", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28127.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28127.json new file mode 100644 index 00000000000..32b820ffd66 --- /dev/null +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28127.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-28127", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:32.137", + "lastModified": "2025-02-12T22:15:32.137", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29214.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29214.json new file mode 100644 index 00000000000..9b12b208f62 --- /dev/null +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29214.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-29214", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:32.283", + "lastModified": "2025-02-12T22:15:32.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in UEFI firmware CseVariableStorageSmm for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29223.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29223.json new file mode 100644 index 00000000000..60f325cbb60 --- /dev/null +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29223.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-29223", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:32.433", + "lastModified": "2025-02-12T22:15:32.433", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path for some Intel(R) QuickAssist Technology software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01124.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30211.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30211.json new file mode 100644 index 00000000000..5a718c7685c --- /dev/null +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30211.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-30211", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:32.587", + "lastModified": "2025-02-12T22:15:32.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) ME driver pack installer engines before version 2422.6.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01152.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31068.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31068.json new file mode 100644 index 00000000000..961c2b6c446 --- /dev/null +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31068.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-31068", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:32.747", + "lastModified": "2025-02-12T22:15:32.747", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Finite State Machines (FSMs) in Hardware Logic for some Intel(R) Processors may allow privileged user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1245" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31153.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31153.json new file mode 100644 index 00000000000..031321f1219 --- /dev/null +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31153.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-31153", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:32.900", + "lastModified": "2025-02-12T22:15:32.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation for some Intel(R) QuickAssist Technology software before version 2.2.0 may allow an authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01124.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31155.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31155.json new file mode 100644 index 00000000000..415d1a3a61c --- /dev/null +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31155.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-31155", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:33.050", + "lastModified": "2025-02-12T22:15:33.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper buffer restrictions in the UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01198.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31157.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31157.json new file mode 100644 index 00000000000..bbb36cfbe87 --- /dev/null +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31157.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-31157", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:33.197", + "lastModified": "2025-02-12T22:15:33.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper initialization in UEFI firmware OutOfBandXML module in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31858.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31858.json new file mode 100644 index 00000000000..bac42916d6d --- /dev/null +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31858.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-31858", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:33.340", + "lastModified": "2025-02-12T22:15:33.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds write for some Intel(R) QuickAssist Technology software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01124.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32938.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32938.json new file mode 100644 index 00000000000..877f28d5317 --- /dev/null +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32938.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-32938", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:33.490", + "lastModified": "2025-02-12T22:15:33.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path for some Intel(R) MPI Library for Windows software before version 2021.13 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01207.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32941.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32941.json new file mode 100644 index 00000000000..4e4c6c81cd3 --- /dev/null +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32941.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-32941", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:33.643", + "lastModified": "2025-02-12T22:15:33.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NULL pointer dereference for some Intel(R) MLC software before version v3.11b may allow an authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", + "baseScore": 7.9, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 5.3 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01238.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32942.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32942.json new file mode 100644 index 00000000000..dbc57b44ce6 --- /dev/null +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32942.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-32942", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:33.800", + "lastModified": "2025-02-12T22:15:33.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect default permissions for some Intel(R) DSA installer for Windows before version 24.2.19.5 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01156.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33469.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33469.json index 799805b9874..122a8aa5516 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33469.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33469.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33469", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T23:15:08.903", - "lastModified": "2025-02-11T23:15:08.903", - "vulnStatus": "Received", + "lastModified": "2025-02-12T22:15:33.940", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "An issue in Team Amaze Amaze File Manager v.3.8.5 and fixed in v.3.10 allows a local attacker to execute arbitrary code via the onCreate method of DatabaseViewerActivity.java." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/blackbeard666/security-research/tree/main/CVE-2024-33469", diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36262.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36262.json new file mode 100644 index 00000000000..8f122d50b91 --- /dev/null +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36262.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-36262", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:34.110", + "lastModified": "2025-02-12T22:15:34.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Race condition in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01203.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36274.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36274.json new file mode 100644 index 00000000000..bcaba7670c6 --- /dev/null +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36274.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-36274", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:34.267", + "lastModified": "2025-02-12T22:15:34.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds write in the Intel(R) 800 Series Ethernet Driver for Intel(R) Ethernet Adapter Complete Driver Pack before versions 29.1 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01144.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36280.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36280.json new file mode 100644 index 00000000000..a441ef4d241 --- /dev/null +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36280.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-36280", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:34.437", + "lastModified": "2025-02-12T22:15:34.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path for some Intel(R) High Level Synthesis Compiler software before version 24.2 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01214.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36283.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36283.json new file mode 100644 index 00000000000..4c134f97ec4 --- /dev/null +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36283.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-36283", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:34.590", + "lastModified": "2025-02-12T22:15:34.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path for the Intel(R) Thread Director Visualizer software before version 1.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01232.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36285.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36285.json new file mode 100644 index 00000000000..b0d17a4d708 --- /dev/null +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36285.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-36285", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:34.737", + "lastModified": "2025-02-12T22:15:34.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Race condition in some Intel(R) PROSet/Wireless WiFi and Killer\u00e2\u201e\u00a2 WiFi software for Windows before version 23.80 may allow an authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01224.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36291.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36291.json new file mode 100644 index 00000000000..9ed8e220039 --- /dev/null +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36291.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-36291", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:34.890", + "lastModified": "2025-02-12T22:15:34.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path for some Intel(R) Chipset Software Installation Utility before version 10.1.19867.8574 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01184.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36293.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36293.json new file mode 100644 index 00000000000..39a0265a23f --- /dev/null +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36293.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-36293", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:35.040", + "lastModified": "2025-02-12T22:15:35.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in the EDECCSSA user leaf function for some Intel(R) Processors with Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37020.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37020.json new file mode 100644 index 00000000000..9428357bb59 --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37020.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-37020", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:35.190", + "lastModified": "2025-02-12T22:15:35.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sequence of processor instructions leads to unexpected behavior in the Intel(R) DSA V1.0 for some Intel(R) Xeon(R) Processors may allow an authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", + "baseScore": 3.8, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.0, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1281" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37355.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37355.json new file mode 100644 index 00000000000..ff63467ec1b --- /dev/null +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37355.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-37355", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:35.330", + "lastModified": "2025-02-12T22:15:35.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) Graphics software may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01235.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38307.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38307.json new file mode 100644 index 00000000000..9549159ebc3 --- /dev/null +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38307.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-38307", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:35.480", + "lastModified": "2025-02-12T22:15:35.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in the firmware for some Intel(R) AMT and Intel(R) Standard Manageability may allow an authenticated user to potentially enable denial of service via network access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01152.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38310.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38310.json new file mode 100644 index 00000000000..c89fa38c60a --- /dev/null +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38310.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-38310", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:35.630", + "lastModified": "2025-02-12T22:15:35.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) Graphics Driver software installers may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01235.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39271.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39271.json new file mode 100644 index 00000000000..2744ccb430a --- /dev/null +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39271.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39271", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:35.777", + "lastModified": "2025-02-12T22:15:35.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper restriction of communication channel to intended endpoints in some Intel(R) PROSet/Wireless WiFi and Killer\u00e2\u201e\u00a2 WiFi software before version 23.80 may allow an unauthenticated user to potentially enable information disclosure via adjacent access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "ADJACENT", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 2.6, + "baseSeverity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-923" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01224.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39279.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39279.json new file mode 100644 index 00000000000..dfc3181c700 --- /dev/null +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39279.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39279", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:35.937", + "lastModified": "2025-02-12T22:15:35.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient granularity of access control in UEFI firmware in some Intel(R) processors may allow a authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1220" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39284.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39284.json new file mode 100644 index 00000000000..7d2eb68a6b8 --- /dev/null +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39284.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39284", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:36.083", + "lastModified": "2025-02-12T22:15:36.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path for some Intel(R) Advisor software before version 2024.2 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01208.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39286.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39286.json new file mode 100644 index 00000000000..02097db570e --- /dev/null +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39286.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39286", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:36.223", + "lastModified": "2025-02-12T22:15:36.223", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect execution-assigned permissions in the Linux kernel mode driver for the Intel(R) 800 Series Ethernet Driver before version 1.15.4 may allow an authenticated user to potentially enable information disclosure via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-279" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01236.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39355.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39355.json new file mode 100644 index 00000000000..6b65d7a37c9 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39355.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39355", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:36.380", + "lastModified": "2025-02-12T22:15:36.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper handling of physical or environmental conditions in some Intel(R) Processors may allow an authenticated user to enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1384" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39356.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39356.json new file mode 100644 index 00000000000..f11cef37079 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39356.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39356", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:36.527", + "lastModified": "2025-02-12T22:15:36.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NULL pointer dereference in some Intel(R) PROSet/Wireless WiFi and Killer\u00e2\u201e\u00a2 WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01224.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39365.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39365.json new file mode 100644 index 00000000000..8df744666f1 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39365.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39365", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:36.670", + "lastModified": "2025-02-12T22:15:36.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path for the FPGA Support Package for the Intel(R) oneAPI DPC++/C++ Compiler software for Windows before version 2024.2 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01218.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39372.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39372.json new file mode 100644 index 00000000000..776a09fbc7a --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39372.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39372", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:36.820", + "lastModified": "2025-02-12T22:15:36.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path for the Intel(R) XTU software for Windows before version 7.14.2.14 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01215.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39606.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39606.json new file mode 100644 index 00000000000..eebc1ee5989 --- /dev/null +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39606.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39606", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:36.960", + "lastModified": "2025-02-12T22:15:36.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer\u00e2\u201e\u00a2 WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01224.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39779.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39779.json new file mode 100644 index 00000000000..d9864b47485 --- /dev/null +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39779.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39779", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:37.117", + "lastModified": "2025-02-12T22:15:37.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Stack-based buffer overflow in some drivers for Intel(R) Ethernet Connection I219 Series before version 12.19.1.39 may allow an authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00590.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39797.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39797.json new file mode 100644 index 00000000000..007180762c7 --- /dev/null +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39797.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39797", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:37.270", + "lastModified": "2025-02-12T22:15:37.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some drivers for Intel(R) Ethernet Connection I219 Series before version 12.19.1.39 may allow an authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00590.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39805.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39805.json new file mode 100644 index 00000000000..336d1746d43 --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39805.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39805", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:37.420", + "lastModified": "2025-02-12T22:15:37.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient verification of data authenticity in some Intel(R) DSA software before version 23.4.39 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01030.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39813.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39813.json new file mode 100644 index 00000000000..3daf87402c5 --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39813.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-39813", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:37.567", + "lastModified": "2025-02-12T22:15:37.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path for some EPCT software before version 1.42.8.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01227.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40887.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40887.json new file mode 100644 index 00000000000..ddd5bc45466 --- /dev/null +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40887.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-40887", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:37.710", + "lastModified": "2025-02-12T22:15:37.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Race condition in some Intel(R) PROSet/Wireless WiFi and Killer\u00e2\u201e\u00a2 WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01224.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41166.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41166.json new file mode 100644 index 00000000000..8ef8a0f0c03 --- /dev/null +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41166.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-41166", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:37.870", + "lastModified": "2025-02-12T22:15:37.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Stack-based buffer overflow in some Intel(R) PROSet/Wireless WiFi and Killer\u00e2\u201e\u00a2 WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01224.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41168.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41168.json new file mode 100644 index 00000000000..e932149d2fa --- /dev/null +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41168.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-41168", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:38.020", + "lastModified": "2025-02-12T22:15:38.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in some Intel(R) PROSet/Wireless WiFi and Killer\u00e2\u201e\u00a2 WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01224.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41917.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41917.json new file mode 100644 index 00000000000..46f08e6c541 --- /dev/null +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41917.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-41917", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:38.160", + "lastModified": "2025-02-12T22:15:38.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Time-of-check time-of-use race condition for some Intel(R) Battery Life Diagnostic Tool software before version 2.4.1 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01230.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41934.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41934.json new file mode 100644 index 00000000000..ebd0e3307cf --- /dev/null +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41934.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-41934", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:38.313", + "lastModified": "2025-02-12T22:15:38.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in some Intel(R) GPA software before version 2024.3 may allow an authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01233.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42405.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42405.json new file mode 100644 index 00000000000..7c59c04e83f --- /dev/null +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42405.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-42405", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:38.477", + "lastModified": "2025-02-12T22:15:38.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path for some Intel(R) Quartus(R) Prime Software before version 23.1.1 Patch 1.01std may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01231.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42410.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42410.json new file mode 100644 index 00000000000..a21a6d2e8a8 --- /dev/null +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42410.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-42410", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:38.627", + "lastModified": "2025-02-12T22:15:38.627", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable denial of service via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01235.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42419.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42419.json new file mode 100644 index 00000000000..a50b9a29d7a --- /dev/null +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42419.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-42419", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:38.780", + "lastModified": "2025-02-12T22:15:38.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect default permissions for some Intel(R) GPA and Intel(R) GPA Framework software installers may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01233.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42492.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42492.json new file mode 100644 index 00000000000..e230c293d35 --- /dev/null +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42492.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-42492", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:38.923", + "lastModified": "2025-02-12T22:15:38.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path element in some BIOS and System Firmware Update Package for Intel(R) Server M50FCP family before version R01.02.0002 may allow a privileged user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01237.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44336.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44336.json index 0034628e82b..d6a155e8de7 100644 --- a/CVE-2024/CVE-2024-443xx/CVE-2024-44336.json +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44336.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44336", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T23:15:09.020", - "lastModified": "2025-02-11T23:15:09.020", - "vulnStatus": "Received", + "lastModified": "2025-02-12T22:15:39.070", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "An issue in AnkiDroid Android Application v2.17.6 allows attackers to retrieve internal files from the /data/data/com.ichi2.anki/ directory and save it into publicly available storage." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/blackbeard666/security-research/tree/main/CVE-2024-44336", diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46922.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46922.json new file mode 100644 index 00000000000..d2dfb71a60d --- /dev/null +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46922.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-46922", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T22:15:39.230", + "lastModified": "2025-02-12T22:15:39.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The absence of a null check leads to a Denial of Service at amdgpu_cs_parser_bos in the Xclipse Driver." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46923.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46923.json new file mode 100644 index 00000000000..92497b37d7d --- /dev/null +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46923.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-46923", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T22:15:39.347", + "lastModified": "2025-02-12T22:15:39.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. The absence of a null check leads to a Denial of Service at amdgpu_cs_ib_fill in the Xclipse Driver." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47006.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47006.json new file mode 100644 index 00000000000..61249ce8b91 --- /dev/null +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47006.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-47006", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:39.453", + "lastModified": "2025-02-12T22:15:39.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path for the Intel(R) RealSense D400 Series Universal Windows Platform (UWP) Driver for Windows(R) 10 all versions may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01240.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51122.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51122.json new file mode 100644 index 00000000000..885c47aae0a --- /dev/null +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51122.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-51122", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T22:15:39.603", + "lastModified": "2025-02-12T22:15:39.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in Zertificon Z1 SecureMail Z1 CertServer v.3.16.4-2516-debian12 alllows a remote attacker to execute arbitrary code via the ST, L, O, OU, CN parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/MVRC-ITSEC/CVEs/blob/main/CVE-2024-51122", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51123.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51123.json new file mode 100644 index 00000000000..11302473209 --- /dev/null +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51123.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-51123", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T22:15:39.717", + "lastModified": "2025-02-12T22:15:39.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Zertificon Z1 SecureMail Z1 SecureMail Gateway 4.44.2-7240-debian12 allows a remote attacker to obtain sensitive information via the /compose-pdf.xhtml?convid=[id] component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/MVRC-ITSEC/CVEs/blob/main/CVE-2024-51123", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51324.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51324.json index bd88c80fcc2..eeabaf6ce9f 100644 --- a/CVE-2024/CVE-2024-513xx/CVE-2024-51324.json +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51324.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51324", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T22:15:28.440", - "lastModified": "2025-02-11T22:15:28.440", - "vulnStatus": "Received", + "lastModified": "2025-02-12T22:15:39.830", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the BdApiUtil driver of Baidu Antivirus v5.2.3.116083 allows attackers to terminate arbitrary process via executing a BYOVD (Bring Your Own Vulnerable Driver) attack." + }, + { + "lang": "es", + "value": "Un problema en el controlador BdApiUtil de Baidu Antivirus v5.2.3.116083 permite a los atacantes finalizar procesos arbitrarios mediante la ejecuci\u00f3n de un ataque BYOVD (Bring Your Own Vulnerable Driver)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 3.8, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/magicsword-io/LOLDrivers/issues/204", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51440.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51440.json new file mode 100644 index 00000000000..1ecab3fa625 --- /dev/null +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51440.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-51440", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T22:15:39.990", + "lastModified": "2025-02-12T22:15:39.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Nothing Tech Nothing OS v.2.6 allows a local attacker to escalate privileges via the NtBpfService component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://sharedobject.blog/posts/nothing-bpf/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54772.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54772.json index d1ec033c7e1..064eeac3ecd 100644 --- a/CVE-2024/CVE-2024-547xx/CVE-2024-54772.json +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54772.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54772", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T23:15:09.117", - "lastModified": "2025-02-11T23:15:09.117", - "vulnStatus": "Received", + "lastModified": "2025-02-12T22:15:40.110", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "An issue was discovered in the Winbox service of MikroTik RouterOS v6.43 through v7.16.1. A discrepancy in response times between connection attempts made with a valid username and those with an invalid username allows attackers to enumerate for valid accounts." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-208" + } + ] + } + ], "references": [ { "url": "https://github.com/deauther890/CVE-2024-54772", diff --git a/CVE-2024/CVE-2024-552xx/CVE-2024-55212.json b/CVE-2024/CVE-2024-552xx/CVE-2024-55212.json index 007a25df100..6f5a29c536f 100644 --- a/CVE-2024/CVE-2024-552xx/CVE-2024-55212.json +++ b/CVE-2024/CVE-2024-552xx/CVE-2024-55212.json @@ -2,16 +2,55 @@ "id": "CVE-2024-55212", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T22:15:29.063", - "lastModified": "2025-02-11T22:15:29.063", - "vulnStatus": "Received", + "lastModified": "2025-02-12T22:15:40.263", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DNNGo xBlog v6.5.0 was discovered to contain a SQL injection vulnerability via the Categorys parameter at /DNNGo_xBlog/Resource_Service.aspx." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que DNNGo xBlog v6.5.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro Categor\u00edas en /DNNGo_xBlog/Resource_Service.aspx." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.invokesec.com/2025/01/13/a-real-world-example-of-blind-sqli/", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56938.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56938.json new file mode 100644 index 00000000000..ef6638779e0 --- /dev/null +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56938.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-56938", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T22:15:40.430", + "lastModified": "2025-02-12T22:15:40.430", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LearnDash v6.7.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the materials-content class." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/nikolas-ch/CVEs/tree/main/LearnDash_v6.7.1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56939.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56939.json new file mode 100644 index 00000000000..16897e0cc0e --- /dev/null +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56939.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-56939", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T22:15:40.530", + "lastModified": "2025-02-12T22:15:40.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LearnDash v6.7.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the ld-comment-body class." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/nikolas-ch/CVEs/tree/main/LearnDash_v6.7.1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56940.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56940.json new file mode 100644 index 00000000000..c4518fbc955 --- /dev/null +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56940.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-56940", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T22:15:40.643", + "lastModified": "2025-02-12T22:15:40.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the profile image upload function of LearnDash v6.7.1 allows attackers to cause a Denial of Service (DoS) via excessive file uploads." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/nikolas-ch/CVEs/tree/main/LearnDash_v6.7.1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57601.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57601.json new file mode 100644 index 00000000000..6f12a58fc11 --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57601.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-57601", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T22:15:40.747", + "lastModified": "2025-02-12T22:15:40.747", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in Alex Tselegidis EasyAppointments v.1.5.0 allows a remote attacker to execute arbitrary code via the legal_settings parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://hkohi.ca/vulnerability/13", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57602.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57602.json new file mode 100644 index 00000000000..a8b2dba0b60 --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57602.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-57602", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T22:15:40.867", + "lastModified": "2025-02-12T22:15:40.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Alex Tselegidis EasyAppointments v.1.5.0 allows a remote attacker to escalate privileges via the index.php file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://hkohi.ca/vulnerability/12", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57603.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57603.json new file mode 100644 index 00000000000..fabba3f0e2c --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57603.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57603", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T22:15:40.977", + "lastModified": "2025-02-12T22:15:40.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in MaysWind ezBookkeeping 0.7.0 allows a remote attacker to escalate privileges via the lack of rate limiting." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/mayswind/ezbookkeeping/issues/33", + "source": "cve@mitre.org" + }, + { + "url": "https://hkohi.ca/vulnerability/1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57604.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57604.json new file mode 100644 index 00000000000..dc6f7c2a33b --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57604.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57604", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T22:15:41.100", + "lastModified": "2025-02-12T22:15:41.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in MaysWind ezBookkeeping 0.7.0 allows a remote attacker to escalate privileges via the token component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/mayswind/ezbookkeeping/issues/33", + "source": "cve@mitre.org" + }, + { + "url": "https://hkohi.ca/vulnerability/2", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57605.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57605.json new file mode 100644 index 00000000000..e392d0e7116 --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57605.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-57605", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T22:15:41.210", + "lastModified": "2025-02-12T22:15:41.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in Daylight Studio Fuel CMS v.1.5.2 allows an attacker to escalate privileges via the /fuel/blocks/ and /fuel/pages components." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://hkohi.ca/vulnerability/3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json new file mode 100644 index 00000000000..3763eed46cd --- /dev/null +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0108.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-0108", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2025-02-12T21:15:16.290", + "lastModified": "2025-02-12T21:15:16.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS.\n\nYou can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\nThis issue does not affect Cloud NGFW or Prisma Access software." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2025-0108", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0109.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0109.json new file mode 100644 index 00000000000..a284a0c504c --- /dev/null +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0109.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-0109", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2025-02-12T21:15:16.470", + "lastModified": "2025-02-12T21:15:16.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated file deletion vulnerability in the Palo Alto Networks PAN-OS management web interface enables an unauthenticated attacker with network access to the management web interface to delete certain files as the \u201cnobody\u201d user; this includes limited logs and configuration files but does not include system files.\n\n\nYou can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\nThis issue does not affect Cloud NGFW or Prisma Access software." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-0109", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0110.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0110.json new file mode 100644 index 00000000000..f71d7857d8c --- /dev/null +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0110.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-0110", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2025-02-12T21:15:16.630", + "lastModified": "2025-02-12T21:15:16.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A command injection vulnerability in the Palo Alto Networks PAN-OS OpenConfig plugin enables an authenticated administrator with the ability to make gNMI requests to the PAN-OS management web interface to bypass system restrictions and run arbitrary commands. The commands are run as the \u201c__openconfig\u201d user (which has the Device Administrator role) on the firewall.\n\nYou can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 ." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2025-0110", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0111.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0111.json new file mode 100644 index 00000000000..77c1ce55b7f --- /dev/null +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0111.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-0111", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2025-02-12T21:15:16.793", + "lastModified": "2025-02-12T21:15:16.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the \u201cnobody\u201d user.\n\nYou can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\n\n\nThis issue does not affect Cloud NGFW or Prisma Access software." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2025-0111", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0113.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0113.json new file mode 100644 index 00000000000..93befe1680f --- /dev/null +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0113.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-0113", + "sourceIdentifier": "psirt@paloaltonetworks.com", + "published": "2025-02-12T21:15:16.950", + "lastModified": "2025-02-12T21:15:16.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A problem with the network isolation mechanism of the Palo Alto Networks Cortex XDR Broker VM allows attackers unauthorized access to Docker containers from the host network used by Broker VM. This may allow access to read files sent for analysis and logs transmitted by the Cortex XDR Agent to the Cortex XDR server." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:M/U:Amber", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "YES", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER" + } + } + ] + }, + "weaknesses": [ + { + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-424" + } + ] + } + ], + "references": [ + { + "url": "https://security.paloaltonetworks.com/CVE-2024-0113", + "source": "psirt@paloaltonetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1226.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1226.json new file mode 100644 index 00000000000..ac8887267fa --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1226.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-1226", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-12T21:15:20.470", + "lastModified": "2025-02-12T21:15:20.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in ywoa up to 2024.07.03. It has been declared as critical. This vulnerability affects unknown code of the file /oa/setup/setup.jsp. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/r1bbit/yimioa/issues/IBI7PG", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295216", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295216", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1227.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1227.json new file mode 100644 index 00000000000..0b37638c0e5 --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1227.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-1227", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-12T21:15:20.657", + "lastModified": "2025-02-12T22:15:41.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in ywoa up to 2024.07.03. It has been rated as critical. This issue affects the function selectList of the file com/cloudweb/oa/mapper/xml/AddressDao.xml. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/r1bbit/yimioa/issues/IBI7XH", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295217", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295217", + "source": "cna@vuldb.com" + }, + { + "url": "https://gitee.com/r1bbit/yimioa/issues/IBI7XH", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1228.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1228.json new file mode 100644 index 00000000000..22374a60d98 --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1228.json @@ -0,0 +1,133 @@ +{ + "id": "CVE-2025-1228", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-12T22:15:41.493", + "lastModified": "2025-02-12T22:15:41.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in olajowon Loggrove up to e428fac38cc480f011afcb1d8ce6c2bad378ddd6. Affected is an unknown function of the file /read/?page=1&logfile=LOG_Monitor of the component Logfile Update Handler. The manipulation of the argument path leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/olajowon/loggrove/issues/IBJSXS", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295218", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295218", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1229.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1229.json new file mode 100644 index 00000000000..b1038849462 --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1229.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-1229", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-12T22:15:41.667", + "lastModified": "2025-02-12T22:15:41.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in olajowon Loggrove up to e428fac38cc480f011afcb1d8ce6c2bad378ddd6. Affected by this vulnerability is an unknown functionality of the file /read/?page=1&logfile=eee&match=. The manipulation of the argument path leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + }, + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/olajowon/loggrove/issues/IBJT1K", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295219", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295219", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20097.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20097.json new file mode 100644 index 00000000000..ad8e0d19b9c --- /dev/null +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20097.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-20097", + "sourceIdentifier": "secure@intel.com", + "published": "2025-02-12T22:15:41.850", + "lastModified": "2025-02-12T22:15:41.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncaught exception in OpenBMC Firmware for the Intel(R) Server M50FCP Family and Intel(R) Server D50DNP Family before version R01.02.0002 may allow an authenticated user to potentially enable denial of service via network access." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "secure@intel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@intel.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-248" + } + ] + } + ], + "references": [ + { + "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00990.html", + "source": "secure@intel.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index cf27638392c..79929ba65f6 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-12T21:00:27.875970+00:00 +2025-02-12T23:00:20.727668+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-12T20:57:32.540000+00:00 +2025-02-12T22:15:41.850000+00:00 ``` ### Last Data Feed Release @@ -33,54 +33,66 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -281091 +281179 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `88` -- [CVE-2025-0937](CVE-2025/CVE-2025-09xx/CVE-2025-0937.json) (`2025-02-12T19:15:09.687`) -- [CVE-2025-1146](CVE-2025/CVE-2025-11xx/CVE-2025-1146.json) (`2025-02-12T19:15:09.840`) -- [CVE-2025-1215](CVE-2025/CVE-2025-12xx/CVE-2025-1215.json) (`2025-02-12T19:15:10.230`) -- [CVE-2025-1216](CVE-2025/CVE-2025-12xx/CVE-2025-1216.json) (`2025-02-12T19:15:10.427`) -- [CVE-2025-1224](CVE-2025/CVE-2025-12xx/CVE-2025-1224.json) (`2025-02-12T20:15:40.030`) -- [CVE-2025-1225](CVE-2025/CVE-2025-12xx/CVE-2025-1225.json) (`2025-02-12T20:15:40.203`) -- [CVE-2025-25201](CVE-2025/CVE-2025-252xx/CVE-2025-25201.json) (`2025-02-12T19:15:21.570`) -- [CVE-2025-25205](CVE-2025/CVE-2025-252xx/CVE-2025-25205.json) (`2025-02-12T19:15:21.717`) -- [CVE-2025-25283](CVE-2025/CVE-2025-252xx/CVE-2025-25283.json) (`2025-02-12T19:15:21.863`) -- [CVE-2025-25343](CVE-2025/CVE-2025-253xx/CVE-2025-25343.json) (`2025-02-12T19:15:22.003`) +- [CVE-2024-42492](CVE-2024/CVE-2024-424xx/CVE-2024-42492.json) (`2025-02-12T22:15:38.923`) +- [CVE-2024-46922](CVE-2024/CVE-2024-469xx/CVE-2024-46922.json) (`2025-02-12T22:15:39.230`) +- [CVE-2024-46923](CVE-2024/CVE-2024-469xx/CVE-2024-46923.json) (`2025-02-12T22:15:39.347`) +- [CVE-2024-47006](CVE-2024/CVE-2024-470xx/CVE-2024-47006.json) (`2025-02-12T22:15:39.453`) +- [CVE-2024-51122](CVE-2024/CVE-2024-511xx/CVE-2024-51122.json) (`2025-02-12T22:15:39.603`) +- [CVE-2024-51123](CVE-2024/CVE-2024-511xx/CVE-2024-51123.json) (`2025-02-12T22:15:39.717`) +- [CVE-2024-51440](CVE-2024/CVE-2024-514xx/CVE-2024-51440.json) (`2025-02-12T22:15:39.990`) +- [CVE-2024-56938](CVE-2024/CVE-2024-569xx/CVE-2024-56938.json) (`2025-02-12T22:15:40.430`) +- [CVE-2024-56939](CVE-2024/CVE-2024-569xx/CVE-2024-56939.json) (`2025-02-12T22:15:40.530`) +- [CVE-2024-56940](CVE-2024/CVE-2024-569xx/CVE-2024-56940.json) (`2025-02-12T22:15:40.643`) +- [CVE-2024-57601](CVE-2024/CVE-2024-576xx/CVE-2024-57601.json) (`2025-02-12T22:15:40.747`) +- [CVE-2024-57602](CVE-2024/CVE-2024-576xx/CVE-2024-57602.json) (`2025-02-12T22:15:40.867`) +- [CVE-2024-57603](CVE-2024/CVE-2024-576xx/CVE-2024-57603.json) (`2025-02-12T22:15:40.977`) +- [CVE-2024-57604](CVE-2024/CVE-2024-576xx/CVE-2024-57604.json) (`2025-02-12T22:15:41.100`) +- [CVE-2024-57605](CVE-2024/CVE-2024-576xx/CVE-2024-57605.json) (`2025-02-12T22:15:41.210`) +- [CVE-2025-0108](CVE-2025/CVE-2025-01xx/CVE-2025-0108.json) (`2025-02-12T21:15:16.290`) +- [CVE-2025-0109](CVE-2025/CVE-2025-01xx/CVE-2025-0109.json) (`2025-02-12T21:15:16.470`) +- [CVE-2025-0110](CVE-2025/CVE-2025-01xx/CVE-2025-0110.json) (`2025-02-12T21:15:16.630`) +- [CVE-2025-0111](CVE-2025/CVE-2025-01xx/CVE-2025-0111.json) (`2025-02-12T21:15:16.793`) +- [CVE-2025-0113](CVE-2025/CVE-2025-01xx/CVE-2025-0113.json) (`2025-02-12T21:15:16.950`) +- [CVE-2025-1226](CVE-2025/CVE-2025-12xx/CVE-2025-1226.json) (`2025-02-12T21:15:20.470`) +- [CVE-2025-1227](CVE-2025/CVE-2025-12xx/CVE-2025-1227.json) (`2025-02-12T21:15:20.657`) +- [CVE-2025-1228](CVE-2025/CVE-2025-12xx/CVE-2025-1228.json) (`2025-02-12T22:15:41.493`) +- [CVE-2025-1229](CVE-2025/CVE-2025-12xx/CVE-2025-1229.json) (`2025-02-12T22:15:41.667`) +- [CVE-2025-20097](CVE-2025/CVE-2025-200xx/CVE-2025-20097.json) (`2025-02-12T22:15:41.850`) ### CVEs modified in the last Commit -Recently modified CVEs: `62` +Recently modified CVEs: `22` -- [CVE-2024-21887](CVE-2024/CVE-2024-218xx/CVE-2024-21887.json) (`2025-02-12T19:55:33.273`) -- [CVE-2024-24684](CVE-2024/CVE-2024-246xx/CVE-2024-24684.json) (`2025-02-12T19:29:16.393`) -- [CVE-2024-27968](CVE-2024/CVE-2024-279xx/CVE-2024-27968.json) (`2025-02-12T19:06:01.943`) -- [CVE-2024-39689](CVE-2024/CVE-2024-396xx/CVE-2024-39689.json) (`2025-02-12T20:12:19.567`) -- [CVE-2024-49792](CVE-2024/CVE-2024-497xx/CVE-2024-49792.json) (`2025-02-12T19:00:51.357`) -- [CVE-2024-49793](CVE-2024/CVE-2024-497xx/CVE-2024-49793.json) (`2025-02-12T19:00:57.080`) -- [CVE-2024-49794](CVE-2024/CVE-2024-497xx/CVE-2024-49794.json) (`2025-02-12T19:01:05.303`) -- [CVE-2024-49795](CVE-2024/CVE-2024-497xx/CVE-2024-49795.json) (`2025-02-12T19:01:17.880`) -- [CVE-2024-49796](CVE-2024/CVE-2024-497xx/CVE-2024-49796.json) (`2025-02-12T19:01:28.537`) -- [CVE-2024-49797](CVE-2024/CVE-2024-497xx/CVE-2024-49797.json) (`2025-02-12T19:17:11.273`) -- [CVE-2024-49798](CVE-2024/CVE-2024-497xx/CVE-2024-49798.json) (`2025-02-12T19:19:30.360`) -- [CVE-2024-57004](CVE-2024/CVE-2024-570xx/CVE-2024-57004.json) (`2025-02-12T20:15:35.330`) -- [CVE-2024-57237](CVE-2024/CVE-2024-572xx/CVE-2024-57237.json) (`2025-02-12T20:15:35.483`) -- [CVE-2024-57238](CVE-2024/CVE-2024-572xx/CVE-2024-57238.json) (`2025-02-12T20:15:35.620`) -- [CVE-2024-8372](CVE-2024/CVE-2024-83xx/CVE-2024-8372.json) (`2025-02-12T20:14:39.330`) -- [CVE-2024-8373](CVE-2024/CVE-2024-83xx/CVE-2024-8373.json) (`2025-02-12T20:15:05.360`) -- [CVE-2025-0899](CVE-2025/CVE-2025-08xx/CVE-2025-0899.json) (`2025-02-12T19:00:59.227`) -- [CVE-2025-0901](CVE-2025/CVE-2025-09xx/CVE-2025-0901.json) (`2025-02-12T19:00:52.577`) -- [CVE-2025-0902](CVE-2025/CVE-2025-09xx/CVE-2025-0902.json) (`2025-02-12T19:00:34.533`) -- [CVE-2025-0903](CVE-2025/CVE-2025-09xx/CVE-2025-0903.json) (`2025-02-12T19:00:43.213`) -- [CVE-2025-0904](CVE-2025/CVE-2025-09xx/CVE-2025-0904.json) (`2025-02-12T19:00:25.500`) -- [CVE-2025-0911](CVE-2025/CVE-2025-09xx/CVE-2025-0911.json) (`2025-02-12T19:00:17.000`) -- [CVE-2025-0994](CVE-2025/CVE-2025-09xx/CVE-2025-0994.json) (`2025-02-12T19:29:30.383`) -- [CVE-2025-1214](CVE-2025/CVE-2025-12xx/CVE-2025-1214.json) (`2025-02-12T20:15:39.200`) -- [CVE-2025-21396](CVE-2025/CVE-2025-213xx/CVE-2025-21396.json) (`2025-02-12T19:15:20.880`) +- [CVE-2020-29444](CVE-2020/CVE-2020-294xx/CVE-2020-29444.json) (`2025-02-12T21:15:09.907`) +- [CVE-2020-29445](CVE-2020/CVE-2020-294xx/CVE-2020-29445.json) (`2025-02-12T21:15:10.103`) +- [CVE-2021-26073](CVE-2021/CVE-2021-260xx/CVE-2021-26073.json) (`2025-02-12T21:15:10.297`) +- [CVE-2021-26074](CVE-2021/CVE-2021-260xx/CVE-2021-26074.json) (`2025-02-12T21:15:10.530`) +- [CVE-2021-26077](CVE-2021/CVE-2021-260xx/CVE-2021-26077.json) (`2025-02-12T21:15:10.730`) +- [CVE-2021-44168](CVE-2021/CVE-2021-441xx/CVE-2021-44168.json) (`2025-02-12T21:32:00.900`) +- [CVE-2022-37660](CVE-2022/CVE-2022-376xx/CVE-2022-37660.json) (`2025-02-12T22:15:29.167`) +- [CVE-2023-25213](CVE-2023/CVE-2023-252xx/CVE-2023-25213.json) (`2025-02-12T22:15:29.340`) +- [CVE-2023-25214](CVE-2023/CVE-2023-252xx/CVE-2023-25214.json) (`2025-02-12T21:15:11.117`) +- [CVE-2023-25215](CVE-2023/CVE-2023-252xx/CVE-2023-25215.json) (`2025-02-12T21:15:11.290`) +- [CVE-2023-25216](CVE-2023/CVE-2023-252xx/CVE-2023-25216.json) (`2025-02-12T21:15:11.453`) +- [CVE-2023-25217](CVE-2023/CVE-2023-252xx/CVE-2023-25217.json) (`2025-02-12T21:15:11.623`) +- [CVE-2023-25218](CVE-2023/CVE-2023-252xx/CVE-2023-25218.json) (`2025-02-12T21:15:11.810`) +- [CVE-2023-25219](CVE-2023/CVE-2023-252xx/CVE-2023-25219.json) (`2025-02-12T21:15:11.973`) +- [CVE-2023-25220](CVE-2023/CVE-2023-252xx/CVE-2023-25220.json) (`2025-02-12T21:15:12.137`) +- [CVE-2023-26817](CVE-2023/CVE-2023-268xx/CVE-2023-26817.json) (`2025-02-12T21:15:12.297`) +- [CVE-2023-26820](CVE-2023/CVE-2023-268xx/CVE-2023-26820.json) (`2025-02-12T21:15:12.463`) +- [CVE-2024-33469](CVE-2024/CVE-2024-334xx/CVE-2024-33469.json) (`2025-02-12T22:15:33.940`) +- [CVE-2024-44336](CVE-2024/CVE-2024-443xx/CVE-2024-44336.json) (`2025-02-12T22:15:39.070`) +- [CVE-2024-51324](CVE-2024/CVE-2024-513xx/CVE-2024-51324.json) (`2025-02-12T22:15:39.830`) +- [CVE-2024-54772](CVE-2024/CVE-2024-547xx/CVE-2024-54772.json) (`2025-02-12T22:15:40.110`) +- [CVE-2024-55212](CVE-2024/CVE-2024-552xx/CVE-2024-55212.json) (`2025-02-12T22:15:40.263`) ## Download and Usage diff --git a/_state.csv b/_state.csv index bae06e540d0..7030ca8747c 100644 --- a/_state.csv +++ b/_state.csv @@ -52284,7 +52284,7 @@ CVE-2012-0514,0,0,9863c21447c4bbdca46909de0adce8496095319ad66961b1fa0451948cd1f4 CVE-2012-0515,0,0,ee77b14a057a287e5f6da9fed43499f7f1c5e79713ccce86efba5a02cb2a56c6,2024-11-21T01:35:09.620000 CVE-2012-0516,0,0,54a1342d9a21906b88376c8f246d786d1aed5149279ed3bdbebf108d7ec80818,2024-11-21T01:35:09.750000 CVE-2012-0517,0,0,cb78e462368555069b1bb32dd482340aaedf468ff5aa57636d9621d447a2981b,2024-11-21T01:35:09.857000 -CVE-2012-0518,0,1,7eec2520777ab26a7b7423d685dd38c6483ead68b06e1337e6bc26201cf81960,2025-02-12T20:57:24.603000 +CVE-2012-0518,0,0,7eec2520777ab26a7b7423d685dd38c6483ead68b06e1337e6bc26201cf81960,2025-02-12T20:57:24.603000 CVE-2012-0519,0,0,d86ec7050443aa703846ffa452edbd894ba1cf6f7f8fdbb501c81b8c19b7ed77,2024-11-21T01:35:10.093000 CVE-2012-0520,0,0,d9cbfba5814438134896af1687ddf96983520fd32bc0c9159d08520fab54fabf,2024-11-21T01:35:10.197000 CVE-2012-0521,0,0,5353f52a472b9cd6058e1ff211132e84c8b7c4317c12ad86980fdbf9f7c30e86,2024-11-21T01:35:10.303000 @@ -61388,7 +61388,7 @@ CVE-2013-3988,0,0,32e7bb16d3cc6c2d6fa9be685b6d556611ac04e22f9603b389ff244d35104a CVE-2013-3989,0,0,5c43656deff50011a537a7ebea7b26a875471ef7d4ae6bce53a6d9cbcc9651dc,2024-11-21T01:54:40.370000 CVE-2013-3990,0,0,df32498b655fbfb8ccdfb0e2b04b708b3b91008d4789e7f8b3767b0684d00ea0,2024-11-21T01:54:40.477000 CVE-2013-3992,0,0,56bb2d0349fa2872b773d0acde9ff5007921784aa1fb44af79624f99881b7ff5,2024-11-21T01:54:40.587000 -CVE-2013-3993,0,1,3c2533ad082805bf88a106ab074c1db15614871476ec0ea72b69fea66f6ed5fe,2025-02-12T19:28:16.717000 +CVE-2013-3993,0,0,3c2533ad082805bf88a106ab074c1db15614871476ec0ea72b69fea66f6ed5fe,2025-02-12T19:28:16.717000 CVE-2013-3995,0,0,714937e2f1cb143331d3f0f7437a2403af7ef92ec6754de5dbe1b91c731fae8b,2024-11-21T01:54:40.807000 CVE-2013-3996,0,0,4878f157101348b226f7c20b378a3d3553e7d1b36313bd1918a52635757d1408,2024-11-21T01:54:40.917000 CVE-2013-3997,0,0,d074fbc335b163542f1aad4940897017082ec1649bf1d20d3dfd9c930c1ef8af,2024-11-21T01:54:41.020000 @@ -62157,7 +62157,7 @@ CVE-2013-4806,0,0,d6ab43befeb0460d6d0cb211ed9a560e9560502b794026cdfb38c507644cbf CVE-2013-4807,0,0,eabeb13b578a727658a68ab268fd179aac102d1c391926bbbbd2b2f75d506bb6,2024-11-21T01:56:27 CVE-2013-4808,0,0,532612b4d3d958709bd065dc9eaae55b20c001ecc58deb9b65f185f1c18745ef,2024-11-21T01:56:27.127000 CVE-2013-4809,0,0,c20253258b71cd63ae208e254516b3ac0d99413fa88fe9c37b7ad954e2c79389,2024-11-21T01:56:27.240000 -CVE-2013-4810,0,1,926778cbef68eb08ecb6a26cc908d36bf8f38f1af1cb27f86a2c9f556b21d3c2,2025-02-12T19:44:19.780000 +CVE-2013-4810,0,0,926778cbef68eb08ecb6a26cc908d36bf8f38f1af1cb27f86a2c9f556b21d3c2,2025-02-12T19:44:19.780000 CVE-2013-4811,0,0,89b74b6e80696992ac0adf75f65e9d34b6955d7301cabfa9571a80c3c66695d1,2024-11-21T01:56:27.480000 CVE-2013-4812,0,0,70955b8b7aca7136cb32b9d9314f244fe58a29c886df2470ebb99f4fc1aa8c06,2024-11-21T01:56:27.593000 CVE-2013-4813,0,0,48c52f43103ed7b3755f0258bd058cd1ced7714684c7d66a702b12dcf0057a31,2024-11-21T01:56:27.707000 @@ -65235,7 +65235,7 @@ CVE-2014-0775,0,0,1701042689349422b74af1e6edac4354c9fddeb4e7f51961e90601f90439b9 CVE-2014-0777,0,0,908f809ab3809f235c1ad43c59e58cb3fdb4d7cea7e129a7d7bfc00105c64696,2024-11-21T02:02:47.240000 CVE-2014-0778,0,0,5e112ac8361fe2b9acd441c2021494a2a8b8a4dace93d9b5813a5fd321454576,2024-11-21T02:02:47.337000 CVE-2014-0779,0,0,ee2629ec9d1afe6813b3ca06209db528db38a16165fa03981be0b650bb47f33a,2024-11-21T02:02:47.440000 -CVE-2014-0780,0,1,252e2105f9466ec6cf9736f3b8c306e87d0536137ae848a5c8671f089aa10c71,2025-02-12T20:56:51.197000 +CVE-2014-0780,0,0,252e2105f9466ec6cf9736f3b8c306e87d0536137ae848a5c8671f089aa10c71,2025-02-12T20:56:51.197000 CVE-2014-0781,0,0,6b23cec1a928c767fbda30291838638d2fee809231703a524b54720a32f7ed17,2024-11-21T02:02:47.663000 CVE-2014-0782,0,0,74355f3999a90ff6b9bbe58125f41b323ade28a322386c4033406c9f708783c9,2024-11-21T02:02:47.770000 CVE-2014-0783,0,0,39fced76a944e1c9146186ab5c18d439da0aab33e542e9614cf5be65f34c4449,2024-11-21T02:02:47.877000 @@ -80279,7 +80279,7 @@ CVE-2015-7446,0,0,4408d712db309590000f8d49d950570c16d9b38717ddc8a65189cc89f0454d CVE-2015-7447,0,0,e55faf4adb449699acf0a3d77f9db0047f28bdb1e1048058843d6b5bd14981a8,2024-11-21T02:36:48.397000 CVE-2015-7448,0,0,a2240599ef822032be2565a57d10c55f47d70c56a1531ccbf00381d739347477,2024-11-21T02:36:48.513000 CVE-2015-7449,0,0,05e00f69fd9fbf840052a09d02c3f32ac18eab63dff52173a175355f4ec6eb26,2024-11-21T02:36:48.630000 -CVE-2015-7450,0,1,2aa71ad8ae462bea6fc662158a65dc574420e6fc2b4fa0f181bae09fba290d80,2025-02-12T19:25:19.023000 +CVE-2015-7450,0,0,2aa71ad8ae462bea6fc662158a65dc574420e6fc2b4fa0f181bae09fba290d80,2025-02-12T19:25:19.023000 CVE-2015-7451,0,0,3cb8a45f37ce10b54da691c117905594e5f8a702160d03215807ca198d92be66,2024-11-21T02:36:48.880000 CVE-2015-7452,0,0,bf345883402eaad8adbd20fbae43b92aaaaf0c2e9ccbc4c71e2d4f902a4eb4fd,2024-11-21T02:36:48.987000 CVE-2015-7453,0,0,910457479a0baa218b21460a837949bffa30b5886fff7532f7329978bf5a0077,2024-11-21T02:36:49.100000 @@ -87760,7 +87760,7 @@ CVE-2016-4519,0,0,c5b70b67666a961a00804327e40f3ac1c218a36fbf31a37786da9ea1bc01e2 CVE-2016-4520,0,0,2406e24abd34f637b10673f224bb644210fcab7420eb1d51c73a53ab9a51c0c5,2024-11-21T02:52:23.400000 CVE-2016-4521,0,0,89e83db1ab938a9e35786e70470ce5eb8f6651900996864d67458602d00dc929,2024-11-21T02:52:23.513000 CVE-2016-4522,0,0,c2e058d2d5e6bdcf8d345e7d61fe6080df60daa1accca7b33edf50985354bd96,2024-11-21T02:52:23.627000 -CVE-2016-4523,0,1,753db9614a106ceeffdaba25d39ff27109ebb560f78c07abeba48e81bd757e70,2025-02-12T20:56:56.413000 +CVE-2016-4523,0,0,753db9614a106ceeffdaba25d39ff27109ebb560f78c07abeba48e81bd757e70,2025-02-12T20:56:56.413000 CVE-2016-4524,0,0,e081aaab2695eea668ff43171cb10bdd554ba5b142cb107070098389777276ac,2024-11-21T02:52:23.873000 CVE-2016-4525,0,0,8af5b6d43f0aeb0096ca96002db5f1138ef1573038074ff94eea8117e26741b2,2024-11-21T02:52:24.450000 CVE-2016-4526,0,0,0a0f5ec0c3eb07585f38f677ba557bc11c43c3c5749b8c6b32655a871e9c3705,2024-11-21T02:52:24.560000 @@ -109623,7 +109623,7 @@ CVE-2017-9818,0,0,b6c4054d5b5049e3521fc8b75f1a35037c7f3f9f724c80ca337865cdf69237 CVE-2017-9819,0,0,faf21bdf8f0e34aafaa891fba94824a6473cfa61d27c736db383bbcbdce2c17f,2024-11-21T03:36:55.533000 CVE-2017-9820,0,0,7862875c350e3e138d964ecc42041d08185dd8f2fdb5177d7874767918fc30b8,2024-11-21T03:36:55.683000 CVE-2017-9821,0,0,9edcdf1513f9cfdea6252be124b0f5583c44c4f42d815730ab21a392e103550a,2024-11-21T03:36:55.827000 -CVE-2017-9822,0,1,5518cf0b721536f339962b7c6b3e7421cf0e9b26f0ba80be61a8582dd21a36eb,2025-02-12T19:55:01.717000 +CVE-2017-9822,0,0,5518cf0b721536f339962b7c6b3e7421cf0e9b26f0ba80be61a8582dd21a36eb,2025-02-12T19:55:01.717000 CVE-2017-9828,0,0,2b1e28db4b016e8fb7bdd2cc6f79600538f2b592068c76006835c1fac2325341,2024-11-21T03:36:56.083000 CVE-2017-9829,0,0,372ab7e7648f5f60d61ef574d04b751584127dfa75a5ad90d9128c1af879828f,2024-11-21T03:36:56.230000 CVE-2017-9830,0,0,4cd364c25f0ee5800e54fd20ae0a246ea31115fac47546d43b7d7cf16b0f7f67,2024-11-21T03:36:56.373000 @@ -118743,7 +118743,7 @@ CVE-2018-18805,0,0,2db81a01612ed9e3856f356a3c3acc08d34cd7fc3cde4b581bcd34fbfedf1 CVE-2018-18806,0,0,73874c1f55650c40c9168d198e4836e0f63cefb447851013592ce8a915a8755a,2024-11-21T03:56:39.300000 CVE-2018-18807,0,0,b1989c9fe62e7e09dd964f1d78e89e460ce9aeabc99e266ef78548b2dd93bbfc,2024-11-21T03:56:39.450000 CVE-2018-18808,0,0,448721dd4dd376be6c2c2ac2714db93123c38306ceb5b77980ed8091dea0390c,2024-11-21T03:56:39.583000 -CVE-2018-18809,0,1,0a36e0f21221f96f7d08b7a6d607a030c4a215152fe0f1997ae29f619d91800d,2025-02-12T20:44:37.493000 +CVE-2018-18809,0,0,0a36e0f21221f96f7d08b7a6d607a030c4a215152fe0f1997ae29f619d91800d,2025-02-12T20:44:37.493000 CVE-2018-18810,0,0,dbacb0866951533402200f938befb045e87532480da01c1259ecd77a7e5bf78e,2024-11-21T03:56:39.890000 CVE-2018-18811,0,0,5432be0ac9513880419f866c84d31f792d10091b9b65e0385e612badf8a3a45e,2023-11-07T02:55:22.050000 CVE-2018-18812,0,0,65337f9ba540463ab0da5797a8618af9d81acece865b0cad227cb9e09724139e,2024-11-21T03:56:40.053000 @@ -123934,7 +123934,7 @@ CVE-2018-5426,0,0,5c86f78c95d64d99ee13bc0eb04558a03181c21ae0ccd76d03a3e95e1f4840 CVE-2018-5427,0,0,eff3de2d29d9c27066ecf833c6aea084dc430b5f16c6fe51710c41318079d04c,2023-11-07T02:58:46.400000 CVE-2018-5428,0,0,4eb683e6a458eebbda39355ee8a6fb9e9587aab9cdea4049bc3104b1e4ceab91,2024-11-21T04:08:46.903000 CVE-2018-5429,0,0,1e246edbac1f486e528309fddf4b0247ed6dbdfb97630f02a8bd73f4e12b5260,2024-11-21T04:08:47.023000 -CVE-2018-5430,0,1,c321643ed42b17e21576f698d2cbc489be0816e9f45799a0393f001491f2d371,2025-02-12T20:44:41.357000 +CVE-2018-5430,0,0,c321643ed42b17e21576f698d2cbc489be0816e9f45799a0393f001491f2d371,2025-02-12T20:44:41.357000 CVE-2018-5431,0,0,8cb99d2762d255d097c5085085f866ae2cd363570ee5478f727325bb38f8f36d,2024-11-21T04:08:47.320000 CVE-2018-5432,0,0,6622b09a3493c525f62a4518e9a638198e465f706e141a41e8920aa672f76d11,2024-11-21T04:08:47.450000 CVE-2018-5433,0,0,dbe836c4b4af21ebb7dfbee3c3186cca4bd884900129667d6bbeacfe8fb5a327,2024-11-21T04:08:47.570000 @@ -125090,7 +125090,7 @@ CVE-2018-6957,0,0,f8ef43e0ab44cd9a14ef94c4bf28b549e2549864125d99232c5ed00240a81e CVE-2018-6958,0,0,5058115ce9c91397d4a976d0ea7a9bde5c7b101b9c6933e5339ccc74ad9781ec,2024-11-21T04:11:28.967000 CVE-2018-6959,0,0,2fababa30e235648e63ff7e79db99507b7a3d1f3b1656b7f39a1efebe678e214,2024-11-21T04:11:29.077000 CVE-2018-6960,0,0,33c162acc4b1bed97886ac651edef2e0087336cc559b952caaea18585560ad25,2024-11-21T04:11:29.180000 -CVE-2018-6961,0,1,70bb311bd17037411e7fe844398788519d50394fff215ff2d3532f01c505a51b,2025-02-12T20:05:57.833000 +CVE-2018-6961,0,0,70bb311bd17037411e7fe844398788519d50394fff215ff2d3532f01c505a51b,2025-02-12T20:05:57.833000 CVE-2018-6962,0,0,e2d66a14bc85c71a8afa4e0ad442df178fb31c9b106ccf4a037fdf4334ebd7a2,2024-11-21T04:11:29.413000 CVE-2018-6963,0,0,2f6e7504c38564122d43d832765c2a860c200abd390ca1dfe1607704fb0f596f,2024-11-21T04:11:29.537000 CVE-2018-6964,0,0,e4aae838a8dad98ed0585bb3ce05202cc701c4593b5faf5f3f99df3f566dcf99,2024-11-21T04:11:29.643000 @@ -134225,7 +134225,7 @@ CVE-2019-16274,0,0,4d1db37e85d1523ac01b69fdee1fd17813da9e5fabd3e4e1416baf7b59111 CVE-2019-16275,0,0,090427faed6f179aa848a53b12a16232546ae94c360dca09e9f8990718b8a180,2024-11-21T04:30:26.003000 CVE-2019-16276,0,0,ab525e6466bef4756f1a1b7d04ee52ded4d1d67d64d35a4dbbf6d48284f0fa20,2024-11-21T04:30:26.170000 CVE-2019-16277,0,0,bca2a082edc45b172ee6e421cc3f9a248c513949df7187629f46bf1f88607469,2024-11-21T04:30:26.343000 -CVE-2019-16278,0,1,e89ffccab7388d6f377e3da9e36e5edf6a35fe58e9bb77c975fa1c7b22cabecf,2025-02-12T20:54:35.107000 +CVE-2019-16278,0,0,e89ffccab7388d6f377e3da9e36e5edf6a35fe58e9bb77c975fa1c7b22cabecf,2025-02-12T20:54:35.107000 CVE-2019-16279,0,0,cf72393fbff796f9a03980b1ea4fce135ee432f26ba459c93f4ae2e23cb5fddb,2024-11-21T04:30:26.733000 CVE-2019-1628,0,0,41c2cfd4cd5a2c51615726790851f9c9c000f7c717133241e21816a375f68c1f,2024-11-21T04:36:57.933000 CVE-2019-16281,0,0,938304d26885864d59e3d34885772edab6902031b9fa4910a0d9dfe0c6ff0440,2024-11-21T04:30:26.883000 @@ -135479,7 +135479,7 @@ CVE-2019-18181,0,0,1656454c0d2687493ac76aa070298449a5da6d4b40f2ae5444253bd22e14a CVE-2019-18182,0,0,04250e5a887b634592ba1352e15d2c548963c2241206493229b867a445e4219e,2024-11-21T04:32:47.003000 CVE-2019-18183,0,0,18512348379b57dde5c02901c5fd2a320ca6cbbfdfa44d383d23e710f8266797,2024-11-21T04:32:47.153000 CVE-2019-18184,0,0,5d859ad092521d26c338f6609490ceeebe37f7c18beed00dbeab79cfa93f9ea6,2024-11-21T04:32:47.297000 -CVE-2019-18187,0,1,6cc5d135394283c0de068308ba2cfc09b0070abaf1ad2f2763f7599b59142f69,2025-02-12T20:44:22.337000 +CVE-2019-18187,0,0,6cc5d135394283c0de068308ba2cfc09b0070abaf1ad2f2763f7599b59142f69,2025-02-12T20:44:22.337000 CVE-2019-18188,0,0,f6271eee764dee49e854ca8eded1cc3fd6f73a0c6120b5c66d0caca59d262d4a,2024-11-21T04:32:47.540000 CVE-2019-18189,0,0,794fb25f653b440af7195bd2a42eebf2de7fa3d595035bce07155902c2f8886a,2024-11-21T04:32:47.640000 CVE-2019-1819,0,0,6d5e6840e0b1ba9cef4b125b4cd10078d08be2060c74e294d223abdc0835ba44,2024-11-21T04:37:27.780000 @@ -154341,7 +154341,7 @@ CVE-2020-24552,0,0,1974aa5798b97d5af3005bead2d65863378d448eb2930536119619a840fba CVE-2020-24553,0,0,794507510c1b8fbf022c2aa66ef5674d489bc5b8fd5dd42a31083e76a010d268,2024-11-21T05:14:58.743000 CVE-2020-24554,0,0,81e5da161e1601529273be24ce04aac9f313fdfa435d5c16ded4dbf1cef6dc3d,2024-11-21T05:14:58.953000 CVE-2020-24556,0,0,2dcc0a4846d9d454bb26f5d615b79c696fd873ffb0b08462988e6f680628abd7,2024-11-21T05:14:59.090000 -CVE-2020-24557,0,1,74653a2f058a276b7002dee2419240a70124c983a004c27df5d9818c4dd43567,2025-02-12T20:44:32.793000 +CVE-2020-24557,0,0,74653a2f058a276b7002dee2419240a70124c983a004c27df5d9818c4dd43567,2025-02-12T20:44:32.793000 CVE-2020-24558,0,0,4acb630873dd14cec59fff6c2989351c2737c1cedb8395139186cc2ea869c05a,2024-11-21T05:14:59.333000 CVE-2020-24559,0,0,0ff8ca064554cac5615429c2baa8b35abaa51793dbb0eb9b4a6d3974c923ba96,2024-11-21T05:14:59.447000 CVE-2020-24560,0,0,6f2d207aad3d827b98b7b978ff5ffc5d367f5fde5edd5b352292c1ecd4b0c462,2024-11-21T05:14:59.570000 @@ -157640,8 +157640,8 @@ CVE-2020-2944,0,0,833c39ea2fa28f34cee6fb220ec1d2ecf9f8c79202bce9398d820fde408b87 CVE-2020-29440,0,0,b8eaaddf6f07b8fd2da68a9e20e5d3190d7ba51d58c4e8a3ef93c108e66da9ac,2024-11-21T05:24:00.523000 CVE-2020-29441,0,0,cd019880498f4d47eb6ab8aaed150f1d010e7ee97d3e6bce90830c3783014a75,2024-11-21T05:24:00.680000 CVE-2020-29443,0,0,dc62d1e8bbea6ebd78a807368b388acf212f335fa95ee908a93700c415e4f1dc,2024-11-21T05:24:00.847000 -CVE-2020-29444,0,0,1ea25168d86b91d1b1c4f746f4a5d9d977521d44b1718eb81e958d014c5bbf3e,2024-11-21T05:24:01.033000 -CVE-2020-29445,0,0,5534c73fe264369eba07355a880da0baa79716a5008fc86d524bd82d5bd42335,2024-11-21T05:24:01.170000 +CVE-2020-29444,0,1,3472d416361d5c7cb73da98393ce19562db64ffcd0cc9830749e1cb4cea51b55,2025-02-12T21:15:09.907000 +CVE-2020-29445,0,1,e2555bf92ae121ee915a3bf27021187cdd606d69da3641b6eff6a751906a056e,2025-02-12T21:15:10.103000 CVE-2020-29446,0,0,21d9c906325a47b7455e5dac443e062c2e602dafd1aa6500a068efa9e909dc24,2024-11-21T05:24:01.307000 CVE-2020-29447,0,0,e32643c0d8a0c42617058c4c8148ffd8e84a45d99d3680443f3ee44191567241,2024-11-21T05:24:01.437000 CVE-2020-29448,0,0,0633211d4fafe44ba14b8e22d6bed3d31f18c9e339efc08be4b063c93097ebc8,2024-11-21T05:24:01.560000 @@ -160178,10 +160178,10 @@ CVE-2020-4419,0,0,a90da9fc7c17cc9e68937566bad3ca45f2e03af0a7a0720d55537344a8c86b CVE-2020-4420,0,0,faa3afbad372fdd397e94d129b2307036087c7739293bb399126836b7f4aa17b,2024-11-21T05:32:43.227000 CVE-2020-4421,0,0,f79a3be8aee50cfa14dfdb70af13757aa7ba948d8cd1bbfe44e738377368f970,2024-11-21T05:32:43.347000 CVE-2020-4422,0,0,ac42840c6fd9a29a50b3b9b1fa08a256487821e83757bec477f57787cfd336d0,2024-11-21T05:32:43.457000 -CVE-2020-4427,0,1,2f689c22d5bcc4d1d6c7590021972bfce7a98f0e0f11dad01e09f46c597f3eed,2025-02-12T19:34:16.450000 -CVE-2020-4428,0,1,9a5c3bb7348293cda872e97d307e7a9d896a4e2c46f5081dbbe24435b287cb79,2025-02-12T19:32:39.547000 +CVE-2020-4427,0,0,2f689c22d5bcc4d1d6c7590021972bfce7a98f0e0f11dad01e09f46c597f3eed,2025-02-12T19:34:16.450000 +CVE-2020-4428,0,0,9a5c3bb7348293cda872e97d307e7a9d896a4e2c46f5081dbbe24435b287cb79,2025-02-12T19:32:39.547000 CVE-2020-4429,0,0,1a6ff4ee2fabe97601839111206e3eeca5aeb8f0b48396d66508de4d13bd8961,2024-11-21T05:32:43.820000 -CVE-2020-4430,0,1,645de8f0d6fc015b7c2585ec980ad681455779abace342d95cce4b5e1f7c62f5,2025-02-12T19:34:08.293000 +CVE-2020-4430,0,0,645de8f0d6fc015b7c2585ec980ad681455779abace342d95cce4b5e1f7c62f5,2025-02-12T19:34:08.293000 CVE-2020-4431,0,0,358e1c74a9e24bd3816e328907997193310f05ca56eb08e0568d1ae4938ee2ea,2024-11-21T05:32:44.050000 CVE-2020-4432,0,0,b47e3343af78ce78d5b50d9cb5381defb3b797bc10a7df9618da6337f44453e0,2024-11-21T05:32:44.153000 CVE-2020-4433,0,0,a57297e4353805c2c17d96225e939eabea6b58de70f1069938fd6a7fdf03744c,2024-11-21T05:32:44.287000 @@ -163345,7 +163345,7 @@ CVE-2020-8214,0,0,15090eba9b4ff995d5caa329368f5e374fe8b70c028dcc8366c1b7c8e5ff56 CVE-2020-8215,0,0,6a449d3b8d9239c5405f991b83fb70262970c6e85d687cdcfe5c1f1081a8199e,2024-11-21T05:38:31.193000 CVE-2020-8216,0,0,c0422a4edd4ed25f1b546e671d25f19ef1b86fc169c78bf77f0e4c207ede71ec,2024-11-21T05:38:31.307000 CVE-2020-8217,0,0,9a3610687fa9135716cbd0b889945940d2854952f414f372db54210fafc53ca2,2024-11-21T05:38:31.430000 -CVE-2020-8218,0,1,2818b15f41bb8ff7c977650d1feb1be12d309f8b2c167c09f57b1d0504d66416,2025-02-12T19:57:11.623000 +CVE-2020-8218,0,0,2818b15f41bb8ff7c977650d1feb1be12d309f8b2c167c09f57b1d0504d66416,2025-02-12T19:57:11.623000 CVE-2020-8219,0,0,cf00903b00f587fac296fcdf3279c48f4a8d5e54eb83fc1ed921873a14f016e2,2024-11-21T05:38:31.670000 CVE-2020-8220,0,0,0ec0c2bbeee2d1270c26416aa29650d3e020ff9660755c674ba4c9b802129371,2024-11-21T05:38:31.800000 CVE-2020-8221,0,0,268f9e8961b08667fd469eb1408f16902b61d09a7c32369219137dac4c3da875,2024-11-21T05:38:31.913000 @@ -163370,7 +163370,7 @@ CVE-2020-8239,0,0,bcad4c333c538055acf0400dd1b7d0f64c8301b0a94af658b110016e154a79 CVE-2020-8240,0,0,38c03dfd248d917265fa8a3c6f3f8362a78af8ae3eb4eafa24bd922adcea1127,2024-11-21T05:38:34.300000 CVE-2020-8241,0,0,927de5b3090d688dac31dcf806d58d9f9a1d89a12cab5e7323ed68b7349ba309,2024-11-21T05:38:34.420000 CVE-2020-8242,0,0,8c760cfbef7570b5d99072946c9832d11281e5b6b456b0d5d3011a71627dc10a,2024-11-21T05:38:34.533000 -CVE-2020-8243,0,1,eb9bd1aeb55070c84f57ebca29c86275f7e2328b822b12bca45cfaddcb6d04bc,2025-02-12T19:56:52.180000 +CVE-2020-8243,0,0,eb9bd1aeb55070c84f57ebca29c86275f7e2328b822b12bca45cfaddcb6d04bc,2025-02-12T19:56:52.180000 CVE-2020-8244,0,0,906a946577edda5cebca267b253813563447c528ccff738d7a692e6f6d519608,2024-11-21T05:38:34.760000 CVE-2020-8245,0,0,397cf6bb21ab6699ff79a1ca4b3b54d90efeec11c8b0bf43cc3e1d1e112998ea,2024-11-21T05:38:34.877000 CVE-2020-8246,0,0,9049e180233bdccbfbf85b427a0d6cb05280d7e30045dc6c1ed50c783cd19b4b,2024-11-21T05:38:34.983000 @@ -163387,7 +163387,7 @@ CVE-2020-8256,0,0,b7fc292951b1715112f2987bd5848396c43479e413462396f1945c18f4f8a6 CVE-2020-8257,0,0,7fa8a72d156a278c36380c098e71c975c22c66b49c4020e731268cc26c433ed3,2024-11-21T05:38:36.257000 CVE-2020-8258,0,0,b4d77ad95df7e9949e1361d2d94068d265dfabf3b07b9bd6a2727d43e67e0b05,2024-11-21T05:38:36.363000 CVE-2020-8259,0,0,8867e863e070e294760e630b13fb1d90fd3db1569f2eddea2567a9cee29278ea,2024-11-21T05:38:36.463000 -CVE-2020-8260,0,1,d9cc420a7c5b36518b7a00ee925398078de35e24bb82c3ff3fb59db1316c8a50,2025-02-12T19:59:29.137000 +CVE-2020-8260,0,0,d9cc420a7c5b36518b7a00ee925398078de35e24bb82c3ff3fb59db1316c8a50,2025-02-12T19:59:29.137000 CVE-2020-8261,0,0,2d1704a2b12e4ef9b2409b8134b6058509e281813c0ee8ff9c2a71b953e1282f,2024-11-21T05:38:36.697000 CVE-2020-8262,0,0,e655f70b84dd37c005d8062e3609a3902bf211b66c3133957f86789326c09e26,2024-11-21T05:38:36.810000 CVE-2020-8263,0,0,54173da0423f517a134a2c43aa677b5b1a2391dcce2726fe39ba6f7ccd112b15,2024-11-21T05:38:36.913000 @@ -163668,7 +163668,7 @@ CVE-2020-8595,0,0,fd192ca939a41d67f3acd87be2300bc3bd41f44c0fbdbe14a249497e90b888 CVE-2020-8596,0,0,2966462342572daaf4fe90a6e987c0229db37f6fd8ce8ecc867bfc88266b8d83,2024-11-21T05:39:05.823000 CVE-2020-8597,0,0,7d20d0e8f5d2a1db9dc54fe1c599a83bcd73e7eac9e119823ba6469498c11ff2,2024-11-21T05:39:05.957000 CVE-2020-8598,0,0,395b36dc49342d805f95eb9dd642f07259761b66b9011aec0d6f87c2a2c8b72c,2024-11-21T05:39:06.147000 -CVE-2020-8599,0,1,ef6c587c9c3cc86a8ad49bc90c2fab843087f7c2c41f44932f40842fc21313ac,2025-02-12T20:44:17.437000 +CVE-2020-8599,0,0,ef6c587c9c3cc86a8ad49bc90c2fab843087f7c2c41f44932f40842fc21313ac,2025-02-12T20:44:17.437000 CVE-2020-8600,0,0,e5e4a9bc6f84e53a55323bc0ba218fa79d05073e4086c2bcb6e00d024302fccb,2024-11-21T05:39:06.347000 CVE-2020-8601,0,0,92af00ee6a6667cef6b62495af2ca9a2103499b72397754a1721914f64a2ac10,2024-11-21T05:39:06.447000 CVE-2020-8602,0,0,37b92b6764cb2dac41bac07fa80c6f268abaa326227e38cee1e0b3c5173c278c,2024-11-21T05:39:06.543000 @@ -169355,12 +169355,12 @@ CVE-2021-22890,0,0,b070522bf25344ce3f1f36ff4bb9e2b3083a07d1d0f51ae7b2b353856f978 CVE-2021-22891,0,0,f1375f40f883e827bf954d816430dab2da18924ceee385303e34e274ec76665e,2024-11-21T05:50:51.160000 CVE-2021-22892,0,0,ed6ed3f15ea68b0c996a949c8c3e1fd78c0607ed69e70e2bd692094d3e09e915,2024-11-21T05:50:51.297000 CVE-2021-22893,0,0,71bce8b802a04cd87060204645ada06756f2b033efb95b5448eef9205ca67c93,2025-02-04T20:15:40.053000 -CVE-2021-22894,0,1,38d7cd5439c29f669b90e6334d5279bbd430babba84187e08ce626c3e720c9a7,2025-02-12T20:00:49.773000 +CVE-2021-22894,0,0,38d7cd5439c29f669b90e6334d5279bbd430babba84187e08ce626c3e720c9a7,2025-02-12T20:00:49.773000 CVE-2021-22895,0,0,30ac68f6be63438396a0462875cc9f9f8f9e40842ca410d3d92335e7a77e0178,2024-11-21T05:50:51.690000 CVE-2021-22896,0,0,88a15b138df68bc2a8949795a527448e66f8c592f21449636430638999cdd4c6,2024-11-21T05:50:51.803000 CVE-2021-22897,0,0,fc717ef450a94baa694373bc4fd1267e7b274a7a872b4b90df18bac7da5698e3,2024-11-21T05:50:51.927000 CVE-2021-22898,0,0,9fbab0d4a513750bf359c0e12bd986b4c9540dc9285e3d48b100b7682d1ed352,2024-11-21T05:50:52.103000 -CVE-2021-22899,0,1,2f7ac670f6c442a04d85997c6dc026f02d22a618413d53fa4db74b28542ee105,2025-02-12T19:59:55.813000 +CVE-2021-22899,0,0,2f7ac670f6c442a04d85997c6dc026f02d22a618413d53fa4db74b28542ee105,2025-02-12T19:59:55.813000 CVE-2021-2290,0,0,08b11f23883d632a59b5347d5c6ed1dff3aaa280989f8af71ed64ac2442d9629,2024-11-21T06:02:49.130000 CVE-2021-22900,0,0,4a60ec3f47e262e3581e031f92bd8af7ea68015a919e420ef10047078960cdd5,2025-02-04T19:15:23.927000 CVE-2021-22901,0,0,57da9b916c3fd39a138031279933cd5f728afc0f726a4734b90404a3eab3afb7,2024-11-21T05:50:52.580000 @@ -171929,11 +171929,11 @@ CVE-2021-26069,0,0,cc4f54be2fa6a75faeca062b676a61a8d1956443c55481e31f937c9d125fb CVE-2021-26070,0,0,2c81d76e35809accd35f88c1c67d68092870f166c513c16970725b465b74a536,2024-11-21T05:55:48.650000 CVE-2021-26071,0,0,7b6b74fa3aa5c429a789f06a087ab2a97f46bdec9d5ea01fd64d41f5721cc510,2024-11-21T05:55:48.767000 CVE-2021-26072,0,0,3f90965d7a59798ede86dc0cf6a6e467bf8b7bbe3f94e18618561490a35d38dd,2024-11-21T05:55:48.897000 -CVE-2021-26073,0,0,a694f252d758a0124343d395095e4bae40e85da773d05423b7cc7d6fbcd0e76e,2024-11-21T05:55:49.020000 -CVE-2021-26074,0,0,e1ba63d713be081f59531c5b2ef88c94d8f7ed85c4af232d03e447a638b83bae,2024-11-21T05:55:49.150000 +CVE-2021-26073,0,1,0c55269f5247b320d18929924e97e7517790d873cfb1c1aebc2982990469f6b2,2025-02-12T21:15:10.297000 +CVE-2021-26074,0,1,77e13733b5e72e839148e375871f1f4fa41e196932079e8d7d978d50f72d3d3a,2025-02-12T21:15:10.530000 CVE-2021-26075,0,0,a24d9b92799c4a8c89b0681fa67ac0be8dd52a4a49bd884463ae16279e310571,2024-11-21T05:55:49.273000 CVE-2021-26076,0,0,5c37a44a964e3a53a7f41832db248375841ccd15114032830a6c894621ead0e1,2024-11-21T05:55:49.403000 -CVE-2021-26077,0,0,80401413745b2794812251a0d0eddfb31899d7cb08d5e97d7b04d1890e5ef825,2024-11-21T05:55:49.523000 +CVE-2021-26077,0,1,27abe6e0619d616ca3c73ea158c67fa2cc6ca0f1e638219df0e594c80d0141e6,2025-02-12T21:15:10.730000 CVE-2021-26078,0,0,229a1a0014d2dc4d46dd9bc44f8b5b3681acbed0e051549d555faa3be02db4b8,2024-11-21T05:55:49.653000 CVE-2021-26079,0,0,2d6100e3aedf24551340076353fc193cb6b709121a352d26efad0ea6eaba8f6f,2024-11-21T05:55:49.773000 CVE-2021-26080,0,0,9d1851518e72abfea418fcd3eb6de8729a30f11b4c207e08bae1111c1c1f47fd,2024-11-21T05:55:49.907000 @@ -179574,7 +179574,7 @@ CVE-2021-36738,0,0,532bf9d28cbc5dc3b0045b7d28e87db70b9ffbc8759ba1ede54a382f8b26a CVE-2021-36739,0,0,f26d0be0a721fbe6be03df43ffbc9b3042175c6173cfb23d10478df22eda26d0,2024-11-21T06:13:59.493000 CVE-2021-3674,0,0,a6ebe839edba8d8408e2ebc11b394ca63ccd563a6d74c07ce22a05a02c5340d4,2024-11-21T06:22:08.007000 CVE-2021-36740,0,0,54bc6cdf23940c08f7f28324a9e8120c825654c24d2b52459fcb9fe03320bbf6,2024-11-21T06:13:59.623000 -CVE-2021-36741,0,1,d280b45653300f468a60e6fac9bd749827b184c0e1831b0373fcedbae7e2d3c9,2025-02-12T19:23:38.797000 +CVE-2021-36741,0,0,d280b45653300f468a60e6fac9bd749827b184c0e1831b0373fcedbae7e2d3c9,2025-02-12T19:23:38.797000 CVE-2021-36742,0,0,dcba81fe88dc54b97cf90c1f2c6387ebd72106975a6c3eada24afe9024c87bc4,2025-02-06T20:15:37.530000 CVE-2021-36744,0,0,d45285bc3db76c0d6dab50f059ca546f427f4488393c91f33c651825cfcee74a,2024-11-21T06:14:00.137000 CVE-2021-36745,0,0,1cce952eb8dd2370e5aefef31e1a86c4ba7f1e524f793d1e889818873e30880d,2024-11-21T06:14:00.293000 @@ -180902,7 +180902,7 @@ CVE-2021-38402,0,0,e78f01f49bfaa5f6839ce516bd9dd907e24d43d2bab7418620beedfa82bc1 CVE-2021-38403,0,0,5c3b0a465d4b274cf4f9499b6eedf66fe7305a04c2c3191652c63826879bcbd0,2024-11-21T06:17:00.727000 CVE-2021-38404,0,0,d19316d6fbb32f85f185bd4896a510d4a1c3cd8bac4b8db17da47400d3464949,2024-11-21T06:17:00.870000 CVE-2021-38405,0,0,e2903df9093b4667e6ec12fe8b71ac9e7f2dda818c0010aef73d4084dc14dde2,2024-11-21T06:17:01.010000 -CVE-2021-38406,0,1,775f8890dce17730e56d34cda7485a7a4d014e2d256b347af95bc1637ca98470,2025-02-12T19:22:02.523000 +CVE-2021-38406,0,0,775f8890dce17730e56d34cda7485a7a4d014e2d256b347af95bc1637ca98470,2025-02-12T19:22:02.523000 CVE-2021-38407,0,0,33e2e9801bab52630d9c70e90a5c25cd149369ba148536bfc5ef30d1479f99aa,2024-11-21T06:17:01.330000 CVE-2021-38408,0,0,1fe64e91cb330546d69190a93a7fe755053c83fa4c4e5989043ae91afacf4169,2024-11-21T06:17:01.487000 CVE-2021-38409,0,0,13662e204d03e6db762b8bc0b42c789b9fa8166df1c6faa644b25cf1c3b11209,2024-11-21T06:17:01.630000 @@ -185364,7 +185364,7 @@ CVE-2021-44164,0,0,90a7e13ce341232768dce186931e5a293ce67120c527e3aad6a4d61f858e3 CVE-2021-44165,0,0,9e6b8969167747101f2683272e7c00480b18cb5804c25894b54b104acee0b890,2024-11-21T06:30:28.937000 CVE-2021-44166,0,0,6fc0c231699a828c829291d5a7ac65f7d9069dc32d176a2b2f79485f413f1559,2024-11-21T06:30:29.077000 CVE-2021-44167,0,0,160c8147b028d22a3a0588b1956714e60c665dfc8deb46907d3e48a177057a9f,2024-11-21T06:30:29.220000 -CVE-2021-44168,0,0,de001a533de2d04a21e435f1edca77f5dbfea58ba9bc509d17f39804da63ce5e,2024-11-21T06:30:29.387000 +CVE-2021-44168,0,1,998feb18b428307fed4da4b992f6a41cc2e9b5ad171190f3e0edeab11096be33,2025-02-12T21:32:00.900000 CVE-2021-44169,0,0,e607b4423cf58084def3cd0b04d58cf51f9c8c91988a9924c9ed5584a642163f,2024-11-21T06:30:29.597000 CVE-2021-4417,0,0,688ee08cb0c2a905c3b9236881f5b83ddb921975f651a564f0e6c03fc8a94d58,2024-11-21T06:37:40.420000 CVE-2021-44170,0,0,7a4012ca9d42617eac562894c0525c55d5ae29c001c1a327bb0f3bc05e8b21da,2024-11-21T06:30:29.760000 @@ -192584,7 +192584,7 @@ CVE-2022-22957,0,0,b0c7ae55c47567082fa7a7b659b94c25d83554ac934992e33eec14a73ce48 CVE-2022-22958,0,0,78df1b77282213ebb5c84bf08425ee4bb3dbfde1e1c700636036d0aa0f098170,2024-11-21T06:47:41.140000 CVE-2022-22959,0,0,d45a0241fea5cd58ac78984d157bd0f0b1a1a80f1c1eb4c833a66867facf5bf1,2024-11-21T06:47:41.243000 CVE-2022-2296,0,0,203764c4893e3815a72d0010905bdf44988dbbc1a5e972bb29158bbd551d58a4,2024-11-21T07:00:42.837000 -CVE-2022-22960,0,1,2e63638fc80bed2115e096cdf1da14b2111eb73656891c8ee8cb6b067ce87855,2025-02-12T20:03:03.430000 +CVE-2022-22960,0,0,2e63638fc80bed2115e096cdf1da14b2111eb73656891c8ee8cb6b067ce87855,2025-02-12T20:03:03.430000 CVE-2022-22961,0,0,4df4249aa384bc5c303bf56e165d8c208e52da70c39bd98e93c99ac3d61532d8,2024-11-21T06:47:41.487000 CVE-2022-22962,0,0,1200fae1aa3bb636fb016654aa93c75263f5f85480b3cbb3b68f140439f5664b,2024-11-21T06:47:41.600000 CVE-2022-22963,0,0,b46afd408176c0161cce0999d0472c4c5cab0f65273c9cad98c8b2dd36e5eb6a,2025-01-29T18:15:43.813000 @@ -196516,7 +196516,7 @@ CVE-2022-27586,0,0,acaf5833b97cf821d83e1e70a10b0e8472c51832a383c23d0ec62bf9a0f94 CVE-2022-27588,0,0,e72027d89654f135db3db6f99675b1340cbb683d5e9ffbe5521a83287f348313,2024-11-21T06:55:59.950000 CVE-2022-2759,0,0,af54001bd84c5c70c872de2adf8b866ea8c2f4fc75d5260c2d307ee5e117f4fd,2024-11-21T07:01:39.210000 CVE-2022-27592,0,0,602948998008ffcb0bcc872d887b9ecf179dfa7e086b2f1d57d49b8f0556857b,2024-09-24T16:44:35.460000 -CVE-2022-27593,0,1,9a3aad86fa9112be2a192f645fd5a37b6d83a1271cbcd26307d6a10ad9656830,2025-02-12T20:57:32.540000 +CVE-2022-27593,0,0,9a3aad86fa9112be2a192f645fd5a37b6d83a1271cbcd26307d6a10ad9656830,2025-02-12T20:57:32.540000 CVE-2022-27595,0,0,8d994a6f2810c09e5f19d08c3448f5ef2b8df0abbe0dcd7779da06b2d22b058e,2024-12-19T02:15:21.300000 CVE-2022-27596,0,0,de91c479a58e4c99a5ce57a7602dd2488878bd799e4aa4ab33cd7aa89f6dadf9,2024-11-21T06:56:00.390000 CVE-2022-27597,0,0,23f30da02fb388a756c6553184d09d3c3fbd10d0bb61b2bbed572a178725a39b,2024-11-21T06:56:00.510000 @@ -199890,6 +199890,7 @@ CVE-2022-31627,0,0,7988c7987107767faa26c91c4891892d0041cc614c7a6d1a3a06deb7caf95 CVE-2022-31628,0,0,ddf8d9d176ca572281725bcb1b547da70694f62f03744783ee8e12be7f37ea23,2024-11-21T07:04:53.293000 CVE-2022-31629,0,0,5ef862df04f8d255ed02bf719beeb80649437a92cf9e67e9f3f71844fbe16d82,2024-11-21T07:04:53.460000 CVE-2022-31630,0,0,048f94737739e9ec1f539180d01531111b8a9b6e3fb03b23f54e62135c59134e,2024-11-21T07:04:53.693000 +CVE-2022-31631,1,1,9bf5f005f2b746d87b39182879f77fed11efb842a6f7e86e0bfef2c615cd517a,2025-02-12T22:15:29.007000 CVE-2022-31635,0,0,f33cce5b1e193c9081577f172af1b88917acd23104921caa053576c10bfcf687,2025-01-03T15:15:06.873000 CVE-2022-31636,0,0,dc5d48671ff8c8359b8ab236feb93a3c4723a165b95081331578932b6b185c1e,2025-01-03T15:15:08.580000 CVE-2022-31637,0,0,30c8596251895654f5e10b1d0756a872401cb82752723a34976c21eb08a2360a,2025-01-03T20:15:24.413000 @@ -204650,7 +204651,7 @@ CVE-2022-3763,0,0,c2299b9c134ab1c6cdc29ea9bb0d35812068c7827af0b605982e68cbb64811 CVE-2022-3764,0,0,ec247594a5e83915ba6098faf7bda0926c3802dc302b6ea5fc586fe275d41890,2024-11-21T07:20:12.047000 CVE-2022-3765,0,0,55d4910aeb7e21447906423f7a9ff627183c7bc0e9d3c6b6eb67cc428a00617d,2024-11-21T07:20:12.173000 CVE-2022-3766,0,0,632191e742f432ebfc8c7e158ebc5aec2e0cf696db2bc4f54bff144bc238f89c,2024-11-21T07:20:12.303000 -CVE-2022-37660,0,0,706da5f82e3e20762b65ebef634761bd18a7d103e1bba95b01495248679e0311,2025-02-11T23:15:08.140000 +CVE-2022-37660,0,1,a8517b39afb8eef34cfd637cfcc57ae2a9b35b1f54581c063073ec13bd645e74,2025-02-12T22:15:29.167000 CVE-2022-37661,0,0,aabf45886c066567135fb17b01f6d8fdfa9a25c171f31720d62ad8227e48a8df,2024-11-21T07:15:04.177000 CVE-2022-3767,0,0,4e5d8fb3c9ad7d92e363d8284cf09f4ef86f4da536880a591d9b22149d210ced,2024-11-21T07:20:12.433000 CVE-2022-37679,0,0,30163e65f6c85937f7e28a683176b09d9eb146c2cfb64fbb7a583e8bbaaa62f6,2024-11-21T07:15:04.353000 @@ -206440,7 +206441,7 @@ CVE-2022-40135,0,0,968d3412c3513cc8612410a147e8673f28b4117704204d33b6ae4a895947f CVE-2022-40136,0,0,2804c0e17cb3d5f2190a682eb99c2cd275c4b142efb949e116f50ea4d6184403,2024-11-21T07:20:56.740000 CVE-2022-40137,0,0,0d8f702638539434dd93694c85cb70be8479fef59883cca3a0fb5679d49df7e6,2024-11-21T07:20:57.040000 CVE-2022-40138,0,0,cf6237fe6c82cd67271d86c2694f31ed4480d16ad2c7f3213f8c43f57eb6a9b2,2024-11-21T07:20:57.487000 -CVE-2022-40139,0,1,6131e12f38e9b5e78ab526b62831fadeabe9958ae8c1276a91c13b7c60387998,2025-02-12T20:44:10.163000 +CVE-2022-40139,0,0,6131e12f38e9b5e78ab526b62831fadeabe9958ae8c1276a91c13b7c60387998,2025-02-12T20:44:10.163000 CVE-2022-4014,0,0,68a3624d5619fbedd49b379cdcfbee9105ea9b40218b3ab440ba344136ae9b66,2024-11-21T07:34:26.960000 CVE-2022-40140,0,0,8aea0f64b801d6ad1f9586f864283c06d326b7b43c72766463a4f41a175e0d16,2024-11-21T07:20:57.767000 CVE-2022-40141,0,0,5ddd156c1cc8b48effc77aed2ae9bf8dcd0549a3eee4c971b09bbb1d5b62bce6,2024-11-21T07:20:57.933000 @@ -215760,7 +215761,7 @@ CVE-2023-20883,0,0,7cab49bc516226b6c1fb7481af063e5cac32e4611c74a54a0dc91fd7f2b94 CVE-2023-20884,0,0,b542ae1ea197f6a83956405861656e65fc906b8e995ce857358b3a1f7aff2fa4,2025-01-10T19:15:31.997000 CVE-2023-20885,0,0,0dfdf492922f0b854de542b4e33abc881f21c058cd2a01cc3c31dff463cde87b,2024-12-16T20:15:06.557000 CVE-2023-20886,0,0,7a982823666f96ea57050e3be9fa8d457665501ecee354ebbfe73207a1794a5a,2024-11-21T07:41:45.290000 -CVE-2023-20887,0,1,8ef183f9ba9700dfb1fc689c93a1bbeda04acc72a200914415244267874649d8,2025-02-12T20:10:18.427000 +CVE-2023-20887,0,0,8ef183f9ba9700dfb1fc689c93a1bbeda04acc72a200914415244267874649d8,2025-02-12T20:10:18.427000 CVE-2023-20888,0,0,d713a2875d180635eba29edc6936b1cffede28ba882bf72c4e051b9b84ccc7fa,2025-01-07T16:15:29.400000 CVE-2023-20889,0,0,5b048b4730c770f57986fed04260e31b816f31eaf7108b4ee24f65d46a19b529,2025-01-07T16:15:29.613000 CVE-2023-2089,0,0,71b86ef69634c1f1cecb80679171d8c1d18cdf2b9a712b87a474c4a7b660ee38,2024-11-21T07:57:54.870000 @@ -219533,15 +219534,15 @@ CVE-2023-2521,0,0,b02212fdb6b8803c29eeb43546b04e8b2a6aa0b55495089a864a6db0c5feba CVE-2023-25210,0,0,61dbd59825de081394929661a58ef96ad92d993913e30770d2111263581b78f3,2024-11-21T07:49:18.817000 CVE-2023-25211,0,0,1ae33074e7894c183a645976c93dc30ecd9636c069a879841ed321e2eaf5a38f,2024-11-21T07:49:18.947000 CVE-2023-25212,0,0,ea3f540bdfec12618313d4de4b0916913743ea3d7ce295602d48552d72e4f2f2,2024-11-21T07:49:19.073000 -CVE-2023-25213,0,0,c60d1ade5c6a0a85e17b7bc1542637010f1190389fe79ce53198173f84417f85,2024-11-21T07:49:19.203000 -CVE-2023-25214,0,0,d4a0e4dde416941c57ed012fa890cfa813c29a70f26ef4b8fdbbddb9bf074d1a,2024-11-21T07:49:19.367000 -CVE-2023-25215,0,0,d37f604d219f4da289e72a802ce281121fc59caded989d66c537714e3e9a7e7e,2024-11-21T07:49:19.500000 -CVE-2023-25216,0,0,1f6507cf21b5fac62933c9affa4576b34c39e86ef4acbed115e11a9ef659f6a9,2024-11-21T07:49:19.630000 -CVE-2023-25217,0,0,3e4936a7dfe0097d6303bb598a07ed11b292cd1a0643a0087cd4fd9af2301da1,2024-11-21T07:49:19.763000 -CVE-2023-25218,0,0,1704e4e42b693c139c93ae883568e03b6d21081b7eadcba7e1bf31e65b9d41d7,2024-11-21T07:49:19.893000 -CVE-2023-25219,0,0,3e9f609d463448bd2a21fe320c5c4835e9d991969e517a1af59f60734e358b61,2024-11-21T07:49:20.033000 +CVE-2023-25213,0,1,8ef9e846887220dda6a2fab9ba4f83e22b3d57462bc47ea49ad73172378cb791,2025-02-12T22:15:29.340000 +CVE-2023-25214,0,1,93c765abbb403b20ed42e193aa35af5e2cf191cbede52fb58a839a9fb9305d11,2025-02-12T21:15:11.117000 +CVE-2023-25215,0,1,099f8dd0326d29d64c3f7a387cf3756a7e61f9b24726004e7abb98973fb67d6a,2025-02-12T21:15:11.290000 +CVE-2023-25216,0,1,ae98550bc49a88a709d09a5b3c2beae52b78e45626e54b5cb8dca9834d7044e7,2025-02-12T21:15:11.453000 +CVE-2023-25217,0,1,6f56af6be7548a8ac1ddf1ea4e06bf7f8b058778978505d29c500e9132ebca6c,2025-02-12T21:15:11.623000 +CVE-2023-25218,0,1,c13243b1e4856c1d8b462fb42716ef3ebdae81587d883d74ecc70af96e31c51a,2025-02-12T21:15:11.810000 +CVE-2023-25219,0,1,a2d24a883d38a92bc0d31a097f098c0237abc8af517e98038a1d18615f6de00b,2025-02-12T21:15:11.973000 CVE-2023-2522,0,0,d26a5d65f68e595ad349090c37d8d53e828da03e8e04481ad741154edc31888f,2024-11-21T07:58:46.273000 -CVE-2023-25220,0,0,bee09236aaa28773bdaaa0cb811c32ce7039e893f13e553a45cc624e01c91d93,2024-11-21T07:49:20.157000 +CVE-2023-25220,0,1,360e5bc70b74d8295b45f92b0bb55e6e2afb24e820e8b771b591e1a761fdcdfa,2025-02-12T21:15:12.137000 CVE-2023-25221,0,0,dba0f8224901a4b584260906fa8ce101f492002e94aef33e718dc4e3c685a287,2024-11-21T07:49:20.293000 CVE-2023-25222,0,0,8088846710b2df8e157581112043c8bc6d9756975531b6619999896dc395f58e,2024-11-21T07:49:20.423000 CVE-2023-25223,0,0,c378829a1b744ea0995e1d888e19bb3510bab9780a7262c0abebc0478c000c25,2024-11-21T07:49:20.550000 @@ -220793,10 +220794,10 @@ CVE-2023-26806,0,0,babcc5c77aec0f87a51bb5e19872c5e8f5513e1dfb0fd09e61e470a5bcedf CVE-2023-2681,0,0,41cbb61ca9a35485083109dc074905f734b530fc114e7942a6caf79bd39c2500,2024-11-21T07:59:04.433000 CVE-2023-26812,0,0,405afcd0d18a0ea560dd97c3f75aa90f8bace35b4b99f4dead56b89234a96ab1,2023-11-07T04:09:42.520000 CVE-2023-26813,0,0,11a48edd361ce82d55979cd322e105c7033d8d2b582c11ad569e0eed6257a0e0,2025-01-31T17:15:10.587000 -CVE-2023-26817,0,0,f8edc25173a549b3f29de504f53c2bc2fcc39d7fa335f22e484d9208ed7a554c,2024-11-21T07:51:58.307000 +CVE-2023-26817,0,1,a28fc1e8c9a47c85d7691afd6b53809be9ed42bf60b3014c09fb3e76588e5632,2025-02-12T21:15:12.297000 CVE-2023-26818,0,0,b63145fb84ce562cc723a09a012de7a28b2829ff563282d82a15395b053b2245,2025-01-21T20:15:28.950000 CVE-2023-2682,0,0,883bce2206d03db51cea0ab1d843f03b819277c9a2a2455a2e8add44a10db5ca,2025-01-24T16:15:31.980000 -CVE-2023-26820,0,0,182ac862113fcb9d0cf4004fb66a49fe830229688194874f8f89f805ed1e0bc3,2024-11-21T07:51:58.593000 +CVE-2023-26820,0,1,c1b2df4f3d711036f9d1df790a72ba4148e747b21132588a6d5e5e60b93d8021,2025-02-12T21:15:12.463000 CVE-2023-26822,0,0,962ffff9470d823e1ee37e85ddd889c14bbf8c919a0b61f3b268dbcf52cf811b,2025-02-11T18:15:24.467000 CVE-2023-26823,0,0,204a407be7e9bf57ccaff49b561752927f6e7e4b0c05759cf501f80604a92154,2023-11-07T04:09:42.597000 CVE-2023-26829,0,0,71868b4f394c052ce5116670118792d9ee7b0b9eef37549e7082cbaae0b0a680,2024-11-21T07:51:58.887000 @@ -220811,7 +220812,7 @@ CVE-2023-26843,0,0,2a09f8324564001c90d6481ed70826717cdacca44c9297f9c816b11256377 CVE-2023-26845,0,0,851a747e264da2f8673a9c1c784e0c836ffaab4df6d73e4e4af848889046c13c,2025-02-10T16:15:33.530000 CVE-2023-26846,0,0,4dd01dd7137384e7dcc6a3a460ffc3af5b7fccb0213741a91b26866156bcb04a,2025-02-11T16:15:36.373000 CVE-2023-26847,0,0,ef024e2d5eb446f2cec6c70e54dd3725d3b3bdd9f23966ce68106d4e18023799,2025-02-11T16:15:36.570000 -CVE-2023-26848,0,1,886a60f66ad9f04f6d10c0612a3254d9072b8015f8d7d8f0d2dccea232273114,2025-02-12T20:15:30.547000 +CVE-2023-26848,0,0,886a60f66ad9f04f6d10c0612a3254d9072b8015f8d7d8f0d2dccea232273114,2025-02-12T20:15:30.547000 CVE-2023-2685,0,0,d0466b05a2d01e3b4fdb994ec0db3a9d87a0f5a346bbbcf50fed2446d0b31731,2024-11-21T07:59:04.900000 CVE-2023-26852,0,0,92473505fbecdaca1afc72f8b22055c72b6a07c64a2c882c9140469f3f36924b,2025-02-10T16:15:33.720000 CVE-2023-26855,0,0,d318c0f2979803a6938a814b8b1db4c9411d2b380158228bd9dc2593c4bf9fa0,2024-11-21T07:52:00.573000 @@ -220884,7 +220885,7 @@ CVE-2023-26969,0,0,c1a5d9c52adbb2cc58e2c37ebbdb569a934dad998bd6280039a8b9d57768b CVE-2023-2697,0,0,e0c08e3755d3fb0093fcfafbdb7613c26088cf801338d9a8460a4c709b6d3a70,2024-11-21T07:59:06.423000 CVE-2023-26974,0,0,794d623fd8c36129ee81b4d75b0c9798c8f7f5f90f71c522ba5636ed5af2385b,2024-11-21T07:52:08.363000 CVE-2023-26976,0,0,c0043fa84a3ad4f2a466492c3ea909dbe38fb37334b4265daf4440153309e135,2024-11-21T07:52:08.503000 -CVE-2023-26978,0,1,1e5a4cdd358294c4ce748cd3a6ab7cc151dfc85b05367acce6f3359789075607,2025-02-12T20:15:31.160000 +CVE-2023-26978,0,0,1e5a4cdd358294c4ce748cd3a6ab7cc151dfc85b05367acce6f3359789075607,2025-02-12T20:15:31.160000 CVE-2023-26979,0,0,66b0efdaa6eb21ceb345e2387325cc8f012679d8c4c8371b71a022bac4b7d79c,2024-11-21T07:52:08.813000 CVE-2023-2698,0,0,b001f4b031b6063b45565e8d502999daf8f00d862b243efe1ea83c90afe19edf,2024-11-21T07:59:06.553000 CVE-2023-26980,0,0,3adfbfabf81989e2cd93911180b3b4c022ef04ed0522f4ac8d4766babdcf918f,2024-11-21T07:52:08.977000 @@ -220902,11 +220903,11 @@ CVE-2023-27001,0,0,3ac29dffc9689e6b71694979be6cfa0bad2c5d91addbadb78a74143a10316 CVE-2023-27008,0,0,966e0ad8470614ad457da5ec0fa9421d6ba81c40af729c99be173c8fdbdcdefb,2024-11-21T07:52:10.577000 CVE-2023-2701,0,0,359ca3cd85c5ad292c6eb2e38c8d6f254861fc7eec8105a5b114d5cb8ef3d322,2024-11-21T07:59:06.923000 CVE-2023-27010,0,0,9ec2689a56d9a51f6035a2f37afcde9da7bf8e824dcb8cac3c33623f06dfcf40,2024-11-21T07:52:10.720000 -CVE-2023-27012,0,1,8fb65310570a50514b75afe7000e6e9ef36a598183353ee72217dda16108e491,2025-02-12T20:15:32.317000 -CVE-2023-27013,0,1,1604c38b98312bcac4b2d79a7158aae9f9527f7b5271c3d76f6415940eb26348,2025-02-12T20:15:32.477000 -CVE-2023-27014,0,1,a32a81fd3c7dcb00ad93453db64e871c651a593ef7078ef0bc276a1e49f4801f,2025-02-12T20:15:32.640000 -CVE-2023-27015,0,1,ccf0f6a1eb710d11ab024d6409e1c1bd67eab38b562bea44dea28c609d21ec81,2025-02-12T20:15:32.807000 -CVE-2023-27016,0,1,a19a7e7112916932418a97ef4fd365cfd413b3904d5794d4ffbdc722c47c2dda,2025-02-12T20:15:32.973000 +CVE-2023-27012,0,0,8fb65310570a50514b75afe7000e6e9ef36a598183353ee72217dda16108e491,2025-02-12T20:15:32.317000 +CVE-2023-27013,0,0,1604c38b98312bcac4b2d79a7158aae9f9527f7b5271c3d76f6415940eb26348,2025-02-12T20:15:32.477000 +CVE-2023-27014,0,0,a32a81fd3c7dcb00ad93453db64e871c651a593ef7078ef0bc276a1e49f4801f,2025-02-12T20:15:32.640000 +CVE-2023-27015,0,0,ccf0f6a1eb710d11ab024d6409e1c1bd67eab38b562bea44dea28c609d21ec81,2025-02-12T20:15:32.807000 +CVE-2023-27016,0,0,a19a7e7112916932418a97ef4fd365cfd413b3904d5794d4ffbdc722c47c2dda,2025-02-12T20:15:32.973000 CVE-2023-27017,0,0,4ca20ec91958f2e051cb6e32a5be98b3406e3cca564b0eac86394b49ce567f75,2024-11-21T07:52:11.573000 CVE-2023-27018,0,0,23a6e7dbbe8f85d69c5a7a9590756a3d992be4710e503f0be402a27b40b4642b,2025-02-12T17:15:14.883000 CVE-2023-27019,0,0,6ae87986cd7cb7c06ebb70007c3caccf5a8f318951fb08179c2547d9bef2afba,2025-02-12T18:15:20.300000 @@ -222829,6 +222830,7 @@ CVE-2023-29160,0,0,90cdb364b9f59b891f577b51f1a47efe44108a1bb1f4b09369f322cf5f660 CVE-2023-29161,0,0,5b1e47c04c48e3ea1336e82805801b0c1e10ade49f6d9266884d11fc74b88a63,2024-11-21T07:56:38.390000 CVE-2023-29162,0,0,fc28511a9719aa19e64a9b38fb6b29e7ab41ba9bfec25fae87ebdae7a06b9409,2024-11-21T07:56:38.497000 CVE-2023-29163,0,0,6fe755248c7818416bda58be22dd7bac179c1b8424232d05103993a92144726d,2024-11-21T07:56:38.597000 +CVE-2023-29164,1,1,db2e21e0f627bb38d2fc63aaadf9708639052758e773cccf73f8be5fd01387b6,2025-02-12T22:15:29.520000 CVE-2023-29165,0,0,513a382e25d229a444bf0100c637a4c3c0cf34fbe4e610f1518192cfb01a884a,2024-11-21T07:56:38.713000 CVE-2023-29166,0,0,781d1c4cdc98c38865af67de3e342edcdaa26bab1d1d367be9bc1b6a262c4326,2024-11-21T07:56:38.820000 CVE-2023-29167,0,0,50bbb020d2d5b15cdc81b400e0346114ca39038d0cdf9c0f42bad8ef9e761e0f,2025-01-03T21:15:12.217000 @@ -224393,6 +224395,7 @@ CVE-2023-31272,0,0,248bbd0188eb5bc99415842b4ed153bc83411aa0cb90ab25d35e75e3d02ae CVE-2023-31273,0,0,4524ae58ca14d20067b3c53434664cf4ee02fd40d5001bcc35f96b30738c794e,2024-11-21T08:01:42.830000 CVE-2023-31274,0,0,74afa62a283dbe8ee897d4684b002928801b1434298f025431cf2215ed9ebda1,2024-11-21T08:01:42.947000 CVE-2023-31275,0,0,a92d3352c973a3a3fd9bc60ccb9e2753c16b2828bbbe4829cdff3477cabdfe3e,2024-11-21T08:01:43.077000 +CVE-2023-31276,1,1,d5f393854e2b3d8577207904d880fc0e85866ddb6f78527a7ba76f8979e97ee7,2025-02-12T22:15:29.687000 CVE-2023-31277,0,0,08b8bbd32f98210a6c89cdb288c882b1eec4c5daab627210049a204ca7a7af75,2024-11-21T08:01:43.197000 CVE-2023-31278,0,0,3a937d5f89c611487800cf4bcb80ec191a0e2f133a03c75f450ca19d48989abe,2024-11-21T08:01:43.317000 CVE-2023-31279,0,0,68068f5854913ace2f0d1369a245a577b6d11aa7976e7a1b388c4382a773d2eb,2024-12-21T00:15:27.100000 @@ -225080,6 +225083,7 @@ CVE-2023-32273,0,0,dbc475022c89175f11fdad4ca43f4540448222863dd4e5d16f2a947690dc5 CVE-2023-32274,0,0,0b7b3dec85916257fb59243b4648f3caacde127983ed50fc26b64e840ee62cdc,2024-11-21T08:03:01.410000 CVE-2023-32275,0,0,a799c362e16c2f920ef3849f9d4df53d0b136c22ea7da7a5b665b880c2c629bf,2024-11-21T08:03:01.530000 CVE-2023-32276,0,0,d02be46d62a3471b014f25ffbe8b8d0f2be5aaea76861955d2fd7d73e93de101,2024-12-23T22:15:07.457000 +CVE-2023-32277,1,1,a7a68730411cf5302494bc0d9ebd2a100e15e964841703cd53868edf61c8718b,2025-02-12T22:15:29.837000 CVE-2023-32278,0,0,3857fac1d586d0ab69b68ddf5e1412a8c03e72178ea8bcbe5480bea560ced136,2024-11-21T08:03:01.780000 CVE-2023-32279,0,0,292951eab2d522ee2c24e4aa1c375e0a56b8a7247fc54c421f69234c131e6dce,2024-11-21T08:03:01.910000 CVE-2023-3228,0,0,766e4cd19f2ab52c2e633f49961af6674b7d054cbfc6685e87b050fdb49e45ee,2024-11-21T08:16:44.790000 @@ -226966,6 +226970,7 @@ CVE-2023-34437,0,0,ffb79324976fbf84ac4d9e947b2be353dc963e1d633e0950540b6e05b6d48 CVE-2023-34438,0,0,b1351877679d083cdea48520114a3ba271110b3005df5aeab817e94a4af9fed6,2024-11-21T08:07:14.577000 CVE-2023-34439,0,0,12d92365a2152a8a9155546ccf2a86cf9c93fef7291f80b49dd113e259a0090a,2024-11-21T08:07:14.773000 CVE-2023-3444,0,0,45ea1c2874b1f19720cd5cdadd30774e072dfbb3393fd7d1cf9abcbdc45755bd,2024-11-21T08:17:16.947000 +CVE-2023-34440,1,1,35485055d832a9d9d24e7ccef65cd202252bd63d11ac4eb54001cfebd345bbce,2025-02-12T22:15:30 CVE-2023-34441,0,0,709e6ca0756a1b647c79a79106806eec5ec48800f14208889233880446473911,2024-11-21T08:07:14.900000 CVE-2023-34442,0,0,c2b230e98e8578d0642c5ca12d198416aa93a1d597dd2fbe9c88cb899c4d004e,2024-11-21T08:07:15.040000 CVE-2023-34443,0,0,617c269eeda354c21943fffb49606bb198fed49066fafcf1c8d196d78c97b766,2024-11-06T14:25:00.830000 @@ -227024,7 +227029,7 @@ CVE-2023-34545,0,0,d149765cd47581e0c018a5fef10b99dc070520c9f77eca7e784a8ee9b0bf2 CVE-2023-34548,0,0,be055145d848eb90bc396ead9b0e18e9d0db3bd588fe25ca1c4182f4dc548089,2024-12-12T16:15:08.857000 CVE-2023-3455,0,0,73c465cbcef5cd0588a3e26b03ab84e4211d2405900b5bb0833b4ea3414a2411,2024-11-21T08:17:18.313000 CVE-2023-34551,0,0,34d1cde3941d4b6fedc88c27b7d6a2ed8795823dc2e337521109f50f2776c209,2024-11-21T08:07:22.150000 -CVE-2023-34552,0,1,cd26d81c5f99572b386d14dcac992d4252125161343b5175952e6d18be6168f9,2025-02-12T19:15:08.787000 +CVE-2023-34552,0,0,cd26d81c5f99572b386d14dcac992d4252125161343b5175952e6d18be6168f9,2025-02-12T19:15:08.787000 CVE-2023-34553,0,0,c3dc3117fc22f4d3771f0b85667203568647390d2f96fcd115fb7e33e780392e,2024-11-21T08:07:22.497000 CVE-2023-3456,0,0,1f42b42560b31d5e8f57fe33239d380519430d99c6dcd0ee9847e42883cc222b,2024-11-21T08:17:18.460000 CVE-2023-34561,0,0,e37eb94a0d2b4c84f2b2ebb2781bf7251aa88bf0f07e0dc4400e88bb9ff38d82,2024-11-21T08:07:22.640000 @@ -229394,7 +229399,7 @@ CVE-2023-37917,0,0,51c759821fc20c5b2c69e11c0e017e5ffebe80f98cd2eae5673deec44edee CVE-2023-37918,0,0,6f0880e032fa0d82b5e0d452ab365518bdbe0117ecd986fa899a39dc18be7c61,2024-11-21T08:12:28.140000 CVE-2023-37919,0,0,4fbb86481c3cfb031e8a503bb71b218ec50f136c41aa7a3d29b77cd8590c2348,2024-11-21T08:12:28.270000 CVE-2023-3792,0,0,3afa82c6f554a716ffba2d2f86a382a3375d5636ac47c6f5be56ea62511da55f,2024-11-21T08:18:04.510000 -CVE-2023-37920,0,1,02565647290fb951dfcfb3cc6454dc756bcd060fd6195ec5b58407c09db2841d,2025-02-12T19:55:47.327000 +CVE-2023-37920,0,0,02565647290fb951dfcfb3cc6454dc756bcd060fd6195ec5b58407c09db2841d,2025-02-12T19:55:47.327000 CVE-2023-37921,0,0,2e13620c16e9e4a10da39a426c7aeb74e8b6ac6fdaa368d98e3a9b0d340c9455,2024-11-21T08:12:28.557000 CVE-2023-37922,0,0,b017b26be93e63740acf4bbe8bb2bc33108e05f42ab3096fa52f2660c269d37d,2024-11-21T08:12:28.683000 CVE-2023-37923,0,0,7668498e9eacdeda89a99b6447aa39342c9b7ac764bc7c290e69466faa436f38,2024-11-21T08:12:28.813000 @@ -233997,6 +234002,7 @@ CVE-2023-43754,0,0,71f002f331806dfa9b6e8805d3258c2c5f01412d621aec5af63e405d2463b CVE-2023-43755,0,0,8e8150e0b994eb18a50c3504f60c03c91dd5fe130926eade00e6415f3b3ecd8d,2024-11-21T08:24:43.350000 CVE-2023-43756,0,0,61fde12fb5f080294a756377d177abe6a45478ee5fd1594137965fb54afd8f8b,2024-11-21T08:24:43.483000 CVE-2023-43757,0,0,a909ff9b0eff6438b85f276689c98ef73e562427cb41ca9e9696eb6b1201c8d9,2024-11-21T08:24:43.627000 +CVE-2023-43758,1,1,773b9ab1e6cc5689a89f5b1c8dfd369d0b2e6ff6710201ce0abc4e426614c5fa,2025-02-12T22:15:30.153000 CVE-2023-4376,0,0,7dd297ea0aab8429e56e17fc1d50fc1b851b55690736aacaa9c9a5d771b42a8a,2024-11-21T08:34:57.833000 CVE-2023-43760,0,0,2c1d02b36fd094fc6030d1ee93adfd300100ce2062c5046cb3daa7aebf1befa2,2024-11-21T08:24:43.807000 CVE-2023-43761,0,0,c994fda7e5db631ae020ebecacb298bac745fde41a6f1cbc443e84268079e0dc,2024-11-21T08:24:43.953000 @@ -237130,6 +237136,7 @@ CVE-2023-48263,0,0,5cd17b43c6572cf707058ff25b5882dc78817d65af663319afb531bd3ae3e CVE-2023-48264,0,0,155ac9cd802d1046ea7aa31346b2075c14152026a738330e825a741016831192,2024-11-21T08:31:22.033000 CVE-2023-48265,0,0,2bea0a9635b42a840374fcc62e841df94025667525112ce8947a065348a4d6c7,2024-11-21T08:31:22.270000 CVE-2023-48266,0,0,a5ebc4fd128da8ba40df09e59f808a8ef4eadc63c455d176f9e5b19592a03776,2024-11-21T08:31:22.483000 +CVE-2023-48267,1,1,ef99ead67a835fcc2307044dd43aa85f7a624bb50936bd1e3770f4aabd4e4680,2025-02-12T22:15:30.303000 CVE-2023-48268,0,0,34faada8369af81879e19a7212273a737c58c40355ee2a27467ad63b345f4880,2024-11-21T08:31:22.667000 CVE-2023-4827,0,0,b3fa4da8e9b789c286c2be37f616f6b01debdcd12cf0ca51c587068604adefa3,2024-11-21T08:36:03.350000 CVE-2023-48270,0,0,e8261175d23a5e78bdd45066e6211ad0efc45adde88e39f5b46cede3696e82c3,2024-11-21T08:31:22.810000 @@ -237235,6 +237242,7 @@ CVE-2023-48362,0,0,3cd50e001ed24165cae9366a527aac2f2ef1363120075593a4fe81fd587b0 CVE-2023-48363,0,0,a3ea177f1e519b7d99d7072ae11eeb8c132c1942b1bf876d7af5aee0084834b5,2024-11-21T08:31:34.337000 CVE-2023-48364,0,0,ef5b6a7f1b5f63ceff3cc5ea4e55867a9ab70d4c0184faa8a809aa56956461b3,2024-11-21T08:31:34.503000 CVE-2023-48365,0,0,0cf05bae78dadc6627cfea99a37485b23ebd41a7c3c964bbfb778822775c4d60,2025-01-14T02:00:02.073000 +CVE-2023-48366,1,1,cadf173def996d77d23578ea747d434348278bdafde194b5e62714cdcdee51df,2025-02-12T22:15:30.463000 CVE-2023-48368,0,0,609d5997260e1bf6b7c4819f19ca84ad3af18f45f72775092f010450f27a00c1,2024-11-21T08:31:34.887000 CVE-2023-48369,0,0,bc61a6d508a3d6393563c443989dec4ec8e15dd321df9cef5f23fb090edc2248,2024-11-21T08:31:35.023000 CVE-2023-4837,0,0,c8afe2fee5c13febea92459e564b09ca1f5abef723590cea9bf7906012fbc634,2024-11-21T08:36:04.613000 @@ -238218,6 +238226,7 @@ CVE-2023-49599,0,0,d1843241f8db11fafc599c0daba9e074b74894e48b5aec8ec283f1589c2f8 CVE-2023-4960,0,0,4efdb33cc3b8c9e490e625ca3e4a0d80c52b3418324639edab36acb9b27c0262,2024-11-21T08:36:20.780000 CVE-2023-49600,0,0,e8cd8de4b2ab88bf4f8aa920e4b463bde1ee47923e6fd2d0106580cacd664710,2025-02-12T16:14:59.787000 CVE-2023-49602,0,0,a12c06e1c2027365532346b2edbb24aca3a0ac358acd9f611803ef679cef3d63,2024-12-16T19:59:21.097000 +CVE-2023-49603,1,1,ad4bd01af0b43aee12d94a3056c8d163f593d7f5fb8d20a71c667799e139f4c3,2025-02-12T22:15:30.623000 CVE-2023-49606,0,0,de58395e940a854debd455905f39ce7fb5cb86ec9f5107aaa70b928793a75cdb,2024-11-21T08:33:37.743000 CVE-2023-49607,0,0,c1d47d2485033d1538c7cfb6f323c8c3e048cbbcf85417d72c0ec588b46db7a8,2024-11-21T08:33:37.887000 CVE-2023-49609,0,0,b73f422c5984e5dd46d62810faadf6b16f12bf840c2578305d1ce83f9f9cc28b,2024-02-14T18:15:46.380000 @@ -238225,7 +238234,9 @@ CVE-2023-4961,0,0,4fd30b7ce60140a70719e18b694005001db9514006d55fc73b4a295c09f84e CVE-2023-49610,0,0,71fa000ee51fd7f605090a98b88cca1255c14527fbb8bcbc39fb0b834efc0b50,2024-11-21T08:33:38.053000 CVE-2023-49611,0,0,768a4d0409bf84bd5c110db296cfb4a7b0f92b989ee5deb66a754da2033af3e0,2024-02-14T18:15:46.413000 CVE-2023-49614,0,0,e29c18258ae1b06a6c9782f0621b997de6655548fc8f11c8f466a4cfa23918f0,2024-11-21T08:33:38.213000 +CVE-2023-49615,1,1,1839adaebacd14d9c361f14bd6c6569080c24febd024a9491b322f34ac95cf5c,2025-02-12T22:15:30.773000 CVE-2023-49617,0,0,d3a002973c9a4ddc022d8462107464bfb6b27fe93ecc15957d61de8dc16eb8d3,2024-11-21T08:33:38.343000 +CVE-2023-49618,1,1,df6e52f9d70df89fe897dbf6d4a669430bb588d5b345f50caf7238036345f059,2025-02-12T22:15:30.917000 CVE-2023-49619,0,0,91d99ac6770adf42d5a2393116d753c25e8951d1e45403cc4685e42752df398d,2024-11-21T08:33:38.477000 CVE-2023-4962,0,0,a5ac70c805f5be56b3f3d66b9497960b85416fcbebeb42a261820fd2b375a7f5,2024-11-21T08:36:21.057000 CVE-2023-49620,0,0,bb69bbb8f134bb94ef5ec332906255bbe83f7d4a8fc04bd38b957390172cf1c1,2024-11-21T08:33:38.597000 @@ -245852,6 +245863,7 @@ CVE-2024-1267,0,0,0747778ead3832a4ca40a6166ab0347567f6883def83eef1d70067a8b72b33 CVE-2024-12670,0,0,9f9e9a972c818427164d5a512ee821794945d0e32c670f3566ae0a957d76dd82,2025-01-29T17:15:28.263000 CVE-2024-12671,0,0,441fb4f886bb1a3c921dca3496ca3677fba560ac91d2b335dc3087f471044b0d,2025-02-10T21:15:16.977000 CVE-2024-12672,0,0,00e4571ac5db391d0331dd0f9a276714a2a8b762e3ba5c7d99196d198ee4680e,2024-12-20T18:15:27.537000 +CVE-2024-12673,1,1,3a8f2c4d64c92710a1cac26d5719a9f62bb1bbae7a324855d61b62c8dc357d10,2025-02-12T21:15:12.697000 CVE-2024-12677,0,0,ccd8b506bfacb9c40e488bb490cdd9ad4a8e9ff8c396c0cc1a946f127ae87a52,2024-12-20T17:15:07.757000 CVE-2024-12678,0,0,28e0a51eba0e228488d0a1909669e7638d8e1e56059290aeac6b07f40c822b06,2024-12-20T02:15:05.500000 CVE-2024-1268,0,0,8e96a69266d469b252e6c6ee082354a5ae4d9bc7d7daa2e17d8f5480121bca0a,2024-11-21T08:50:12.083000 @@ -248899,6 +248911,7 @@ CVE-2024-21827,0,0,c36386bd432c8750e8234f9244bc193acdc52668f3a181b754e89d9943e1c CVE-2024-21828,0,0,b164b76bc7cd799a77840173af04b2a57766f14977ac417f1dd4a3e0cffb84c1,2024-11-21T08:55:04.850000 CVE-2024-21829,0,0,a3890329332bbdcce67fee09f03e9c5301416e681ea55a6663f4bd36bb9063a7,2024-09-16T18:03:16.707000 CVE-2024-2183,0,0,c646a897725dabe5bcb9009da3bad9a6c059b95445a34a278392561629394b06,2025-01-09T17:18:25.953000 +CVE-2024-21830,1,1,e78d9f1d1be06435b245d72caeb31ed36d510fcaa93fd2ede2f9d98048e593be,2025-02-12T22:15:31.073000 CVE-2024-21831,0,0,ffab4fc0733292e4ab0051dfbbe5d66d4a29c6dfbff84c323978b1e919252979,2024-11-21T08:55:05.050000 CVE-2024-21832,0,0,a543193ce14a2f6105c329e10215b4a1a984fbb7cf333eb98ef6c70d95fdbee0,2024-11-21T08:55:05.190000 CVE-2024-21833,0,0,5474c8e97495795e56bb5529245d9c4477df95df31071d5afcbaf12bbac86e23,2024-11-21T08:55:05.320000 @@ -248923,6 +248936,7 @@ CVE-2024-21852,0,0,74a89e8ad5e242dcaa69632c98166ec72cd5d0a1eabe8107cc899068b6ea0 CVE-2024-21853,0,0,03873964bacd463823aea35d75df2179a268a9ee8ab035ecc0200603d0f2ddea,2024-11-15T14:00:09.720000 CVE-2024-21855,0,0,b5c9a274a6224ddacae3da8acd4d32ac5bd000acaa7f8868ebcff0034ce6f2f5,2024-12-20T17:05:24.753000 CVE-2024-21857,0,0,c575350fcef843725e7ef275d0f3a96677c72165608cfb91eba4d11094a1a3f8,2024-08-14T17:49:14.177000 +CVE-2024-21859,1,1,41d3b6eb39d5f20fc5a581695e58504951c3dee461c4e4a467a981631c9dce2e,2025-02-12T22:15:31.227000 CVE-2024-2186,0,0,e7b9bc33689c26748efbb2d9800c342e319e02f8dc6c3d554b2a80d535cba19e,2025-01-07T20:42:22.523000 CVE-2024-21860,0,0,c33a33edbd83b6963f5e370eb0c3bd18861faf04570d72f488d2420923622b3b,2024-11-21T08:55:07.907000 CVE-2024-21861,0,0,3a7f9befc113ffb23875efbe3d70cf01c22adb8b0631739aca4be1bb65b609fe,2025-01-23T18:36:34.593000 @@ -248946,7 +248960,7 @@ CVE-2024-21880,0,0,44b78f7c19ec1e5a1720334bd906abd260dab014dac74a6c4c891bf334308 CVE-2024-21881,0,0,8ac19f5824689be436863f1785911186ea865c1dec2c40c0fddb33facfdcba79,2024-08-12T13:41:36.517000 CVE-2024-21885,0,0,0abc0ca6c5c644c00982ac6a6772e7953280a0a20111fbe8443f818a00dbba54,2024-11-21T08:55:11.417000 CVE-2024-21886,0,0,1201cd3f4bc20f7f316f43dcca7f10d17cc8b7b0922b4eaacd28c4e8fb8348b6,2024-11-21T08:55:11.603000 -CVE-2024-21887,0,1,b9669760be45a106dfc4e1df4ad83e221bed750bc2d6975f6f3dc0c2da90aeba,2025-02-12T19:55:33.273000 +CVE-2024-21887,0,0,b9669760be45a106dfc4e1df4ad83e221bed750bc2d6975f6f3dc0c2da90aeba,2025-02-12T19:55:33.273000 CVE-2024-21888,0,0,b45f885651aff86683860af6eb8a8226cada34955674ec263b53ac2cbb747474,2024-11-21T08:55:11.993000 CVE-2024-2189,0,0,7ea3e523e8b9e6befbc8a00f5933ce691dcd1de1f6fc8d37f688f1333e38d41b,2024-11-21T09:09:13.347000 CVE-2024-21890,0,0,9ae110de2e6967c7a92f074f40cb8816fc9b5a0773b7f387b9e2d10a53376472,2025-02-12T14:59:58.097000 @@ -250863,6 +250877,7 @@ CVE-2024-24579,0,0,5b750dc9276586545591c5f17c685da900cca7fa18a626d3a0cea44f176e0 CVE-2024-2458,0,0,d3a43945b002bbe4dbcc775cd2d9094cda2834583bb42f76f13ae769b4a19a8f,2024-11-21T09:09:47.697000 CVE-2024-24580,0,0,e9b3c63c841b56484e9a7cf6be12569b58937f5d37eaaf95d5cdb644623e864d,2024-08-23T18:51:20.207000 CVE-2024-24581,0,0,36fae7d53f9afffd69c2bce98990b53d6cc54ce63ef6e7416027a1f6696d8f33,2025-01-27T18:00:59 +CVE-2024-24582,1,1,631b617f4e07e5e2b30f1ff6679924bc05fc602050c95d81cae94f75e9c9950d,2025-02-12T22:15:31.367000 CVE-2024-24583,0,0,bcc0d97b1272a178e3384040a9e79397ecf386dff5ae4277decbfeb02e16846d,2025-02-11T22:25:31.757000 CVE-2024-24584,0,0,6aa61e7cb66d06f7ba7f81956e3714ba73bfe1296669178782f9d4955fc09571,2025-02-11T22:29:21.440000 CVE-2024-2459,0,0,25a3e13292c0e654cb7fca3dafd8a2a21d524bd7d615cdbca42cdbb547eef683,2024-11-21T09:09:47.813000 @@ -250887,7 +250902,7 @@ CVE-2024-2468,0,0,ee79c285973462515e70d1cd2da5bd3b8fd4566e8905e23739ea0319c22a04 CVE-2024-24680,0,0,474c362fefe258eca65be82ee02746cd95560765418ab406dcac5f7813a26c14,2024-11-21T08:59:29.843000 CVE-2024-24681,0,0,daaafc6083a3baa0f3954624170a5674e6c403704d454c369d62666209a35b0b,2024-11-21T08:59:30.023000 CVE-2024-24683,0,0,8f2ae4428ee5c111dfe0471d0522ee8f0f1aa241441321a4a91466595b31d3c7,2024-11-21T21:15:18.530000 -CVE-2024-24684,0,1,5c4d6a8c735fe8f9a2e12a43934c034c7be834c4472e9e150a372b743281853b,2025-02-12T19:29:16.393000 +CVE-2024-24684,0,0,5c4d6a8c735fe8f9a2e12a43934c034c7be834c4472e9e150a372b743281853b,2025-02-12T19:29:16.393000 CVE-2024-24685,0,0,3141fff8f24bf2ab2c3307a086354d8cc7343106fcd5ec98ef301e624bc6a830,2025-02-11T22:29:31.567000 CVE-2024-24686,0,0,1c814552698bce1028a0b9ed2191003402d783f25a0e4442d7b9574b7e0d820f,2025-02-11T22:29:42.443000 CVE-2024-2469,0,0,64cfef5974ac04d8e1d219bffdbf7345a68085414e30bec48058697bc816803a,2024-11-21T09:09:49.290000 @@ -251050,6 +251065,7 @@ CVE-2024-24849,0,0,d6fa97d34a9f8ee5cd27ec0b205f20369d7c9f2e74bdce13f8ada0b878bef CVE-2024-2485,0,0,adb1797256b1beed5858dfc25960a724942db9de19f1b038e5acd84a4e61c2a0,2025-01-14T15:04:40.223000 CVE-2024-24850,0,0,358a48632f493dca7103f0e0c7ddd1ca29e6043f56e8ec4ac8435732328792c6,2024-11-21T08:59:51.027000 CVE-2024-24851,0,0,8a0de2d372cc00e0501058469de2ba4c4c3dd1c300c2bacaa49d22d23637a75b,2025-02-12T17:30:47.617000 +CVE-2024-24852,1,1,cacb9a3cc601a743270c3e9f2019f093018be83f1abcc74f92020f16b2ce18fc,2025-02-12T22:15:31.513000 CVE-2024-24853,0,0,cabcc981e6fa2d934ba79408b0a2d2dcaaaa86c51cc576fd027cf73ab1548003,2024-08-14T17:49:14.177000 CVE-2024-24855,0,0,2d2cc7e7d5fb06a33f26ef44e1f1e7a2395fd03f1ba9c19687037bbddaf43e03,2024-11-21T08:59:51.400000 CVE-2024-24856,0,0,edb9e16ab701f1d81ac7cd6a8857e1142fec8ecd54bd3157273d221937841e28,2024-11-21T08:59:51.540000 @@ -251548,6 +251564,7 @@ CVE-2024-25567,0,0,2479aae2067cb8e8b74bd9f271cad1b096929a79210b4dd2452e7fb7b11fb CVE-2024-25568,0,0,333fdb1a883138fafe3ec5ef5628a51adf91d816de772be7c9870a36d4af4fbb,2024-11-21T09:01:00.057000 CVE-2024-25569,0,0,b037d1dac321d0fad4f682820302460ba3789c0955cd0c11614e35160f41fd7d,2024-11-21T09:01:00.260000 CVE-2024-2557,0,0,67a259b4af3e70193e67c621b23a4258c6c329ffc2454edde4f3adef49c00463,2024-11-21T09:10:00.307000 +CVE-2024-25571,1,1,f0bcb01ece624fce0bdc9c6484f12f05f24eff40c38402114790b7e6b0c4e24e,2025-02-12T22:15:31.667000 CVE-2024-25572,0,0,3b91a9b2b3340e450f0ace2854bb810c9267cbdf3d9a3da323e758f101a51695,2024-11-21T09:01:00.427000 CVE-2024-25574,0,0,31c112accbf17d2b994dbb76497de7bac711140b2a7549d57fd0373c5604c7bb,2024-11-21T09:01:00.637000 CVE-2024-25575,0,0,1018bd05e409a13236c5dcb2237c77906e7f23238c36cbe4ff25ea1f8323e117,2024-11-21T09:01:00.773000 @@ -251897,6 +251914,7 @@ CVE-2024-26018,0,0,2ce937190f1a3d6a5b32ac3dc44844a76544d21abc3c13edb30e7e9f1ae3e CVE-2024-26019,0,0,47740102c6ff96f7cdf82a61ec34d114a985da5f23a4590422c0d7ffc1d08c5f,2024-11-25T19:15:08.683000 CVE-2024-2602,0,0,b857460336cfaac03a8a27b20498855f2d404a18cc4025919d0ba50a6e4b42f9,2024-11-21T09:10:05.910000 CVE-2024-26020,0,0,c98643c2f54952d5dbaf94e38093f64912c8ba6dd48c8f46422b5568790b1c7e,2024-11-21T09:01:46.630000 +CVE-2024-26021,1,1,d3d7563a706b88712310e97a1ac3145ad544c19bd53641b9802aae7b008a583e,2025-02-12T22:15:31.830000 CVE-2024-26022,0,0,62def4391953a1347cbd7cb8238b342a4564ced73a07832771fb61c2cae55a69,2024-09-06T20:16:27.330000 CVE-2024-26023,0,0,ecca437928ab5939dcb72afcd1f9882735a76a4700af515a957792560ea24f83,2024-11-21T09:01:46.910000 CVE-2024-26024,0,0,9a14a4249aa54720419704a007104a85741c0e50b67ccf19857114c30b57ec4b,2024-11-21T09:01:47.107000 @@ -253559,7 +253577,7 @@ CVE-2024-27964,0,0,c4d48fb3430214a0af3551bb31df3d1385daa504823a9afa863a7d3fe7927 CVE-2024-27965,0,0,1e299ef67621ddb39e5902d8f364307d3f524b136ad263f1c8e557808d11ef36,2024-11-21T09:05:31.357000 CVE-2024-27966,0,0,986bc0e47f8c1c0f4ed2c9a6fb07f0506a233d36678f2a967592d44ed4ed5c77,2024-11-21T09:05:31.503000 CVE-2024-27967,0,0,e56b52e9e5ea4f14ee58c30c908937b7bb0140e9f50cdd47a5ea303d5cdbe917,2024-11-21T09:05:31.653000 -CVE-2024-27968,0,1,15c65a67f6e3f535b3fd3256542bee4865b046c0bf20a9c8d77b1f5116d23acb,2025-02-12T19:06:01.943000 +CVE-2024-27968,0,0,15c65a67f6e3f535b3fd3256542bee4865b046c0bf20a9c8d77b1f5116d23acb,2025-02-12T19:06:01.943000 CVE-2024-27969,0,0,3548a75b8b05025bda10bd5cb7decbc5425fc3152ecb2be8151f3cd078a3654e,2024-11-21T09:05:31.910000 CVE-2024-2797,0,0,bb65b7eb8aee12c6f9b4d07d6172de8119c9c734cf807586fdebfc4a92795d5a,2024-11-21T09:10:32.410000 CVE-2024-27970,0,0,6f965c47af12f9d81cdabcb24c9ffd090ea0ee423a8ee84e0b5e5b9f9e2bddf0,2024-11-21T09:05:32.037000 @@ -253635,6 +253653,7 @@ CVE-2024-28042,0,0,2fdf5e585680de3ff17efb3bc78e29135378fbfa431dd23f958a353437d44 CVE-2024-28044,0,0,4321e66e9abad9bc2815f064d2409efc5b717b87741f240009dbca664117840a,2024-09-04T17:12:54.973000 CVE-2024-28045,0,0,3250b5241cb3eb30591229d8a728ec2919682fc73063bc0b93558e23a7537d7d,2024-11-21T09:05:41.680000 CVE-2024-28046,0,0,08ac6a41262a30c05ef763f8296b9175ae9831f9fdea62d8c95f9945b9c74715,2024-09-06T18:40:14.330000 +CVE-2024-28047,1,1,82f00ca6926a78b73a90c039458578b5796d1628d998244fb56b1d23d5eabd71,2025-02-12T22:15:31.983000 CVE-2024-28048,0,0,166375921280a7285874abcdec0584c225aafe530cd2ca9bad02a6525a8cff07,2024-11-21T09:05:41.997000 CVE-2024-28049,0,0,4191140b72d68518c43bb961f8171d2b3da1a3878f82c679e5f952ecd7437a12,2024-11-15T14:00:09.720000 CVE-2024-2805,0,0,fe8f764c46018c0437f3ff224d0879dfaff251abe0ca32544a20cce1c4a57b33,2025-01-24T18:45:05.873000 @@ -253708,6 +253727,7 @@ CVE-2024-28122,0,0,e3d16868d7774e283044aa0f03af6142658f7d2fd8130130495f2d2fa9dfb CVE-2024-28123,0,0,5099212f57d318f83757e71a466b9bdf4be2bbcb864e78e89326cbc09e003e14,2024-11-21T09:05:51.980000 CVE-2024-28125,0,0,a964f3be7fbf693cabfab1cab21a25243643637360f3b4dfc76dfcb0e2a98c0a,2024-11-21T09:05:52.107000 CVE-2024-28126,0,0,bdca6710977b6c4816da9b6611740c12aabc24c1dc8b3f05e1f936957ab23ed5,2024-11-21T09:05:52.337000 +CVE-2024-28127,1,1,7a8d1745b63aa80e27efe7ef0ec060a273762cb546f254d6b5030c4c878e6ead,2025-02-12T22:15:32.137000 CVE-2024-28128,0,0,905e2e65bd3c88d0062f27c4d32549f77f596cb69c56f5abf237d71a5aec9ff8,2024-11-21T09:05:52.533000 CVE-2024-2813,0,0,f6cf44b143c45f427a4e19d3a3c84fafa892be9cdc350a85d194bce1d00ab565,2024-11-21T09:10:35.157000 CVE-2024-28130,0,0,69640234ddd8399b998b711ea548de6aa4b7b8289789fb11379a6d5513f1b0f0,2024-11-21T09:05:52.640000 @@ -254482,6 +254502,7 @@ CVE-2024-29210,0,0,0b9e1da3e79f2303b1e56f9a5c9d0f9d5677bc9bee283f6034952eed6ce58 CVE-2024-29211,0,0,0331567c6af8fd83b1e0a24feaf54333b88f51ecbe3f9d759c864c4433a7edc5,2024-11-14T19:09:01.213000 CVE-2024-29212,0,0,57ad6f456ad8c4e58aee0ad243fdb4a1692ad3d121ea88d523c26b7fe273ad46,2024-11-21T09:07:49.800000 CVE-2024-29213,0,0,61bda94bb80bd9efe67a9b541d0650b3359ce1773787183c478a7e9e9ab5bce6,2024-10-21T18:35:11.263000 +CVE-2024-29214,1,1,75163c16789f5e60becacd1eed045be4ae4ffb02f6cfcde6415050636375c295,2025-02-12T22:15:32.283000 CVE-2024-29215,0,0,a59670544aeab731fa7af3698a433038d405eac09c2d1eca820d543764a65d04,2024-11-21T09:07:50.043000 CVE-2024-29216,0,0,e44e229411bd5856010008f153d4c35e919f7a6598100ee6516223b5fee2cda5,2024-11-21T09:07:50.187000 CVE-2024-29217,0,0,9425036cfe73efbec83194733f43408b1a603733c789135a9d92a2488b60d079,2024-11-21T09:07:50.370000 @@ -254490,6 +254511,7 @@ CVE-2024-29219,0,0,6cb3862cf8e230d62963f8de8034eafbf8d60054c65832a91b376f342bd42 CVE-2024-2922,0,0,83a5afc25d53992abc547c7cb27befd6cb6f77e10eac60e242613cf364f65aa9,2024-11-21T09:10:50.853000 CVE-2024-29220,0,0,d56b29bab759f632fe7a8d7605fc23ec1fd1d59c76310b000cb1d69498dd3c7f,2024-11-26T18:15:19.007000 CVE-2024-29221,0,0,719f02c93cb7da40e2b1e83286b78d24631abaf4b186686cd86793f230a27b56,2024-12-13T16:21:08.447000 +CVE-2024-29223,1,1,346935bf8be6a1801700e935fe905a0ecc30223e58861338986e37df973a2458,2025-02-12T22:15:32.433000 CVE-2024-29224,0,0,51a97a451d23c0ecf1555d53913f72b7a59110c340a56174e31f0dd604a53a88,2024-12-17T22:20:34.167000 CVE-2024-29225,0,0,987e1bbdbd14475e79c4662d58c64e48774254cfe2bcd4f86e976712c6a388f6,2024-11-21T09:07:51.173000 CVE-2024-29227,0,0,31b77c1c8f454c07924ac023a7c3d78c956f56b867623e641096ede40d6734c2,2025-01-14T20:13:16.757000 @@ -255147,6 +255169,7 @@ CVE-2024-30208,0,0,321298c6b7af7d77c3325579105e5107ec9351301112fceb4ec5139171fc7 CVE-2024-30209,0,0,ba2e037ae866c0f8e19f9a3711c41a43737060d5df5e6b04219eb9e16ecf5cf2,2024-11-21T09:11:27.037000 CVE-2024-3021,0,0,c64d16447d9dcc7f24589371d3498df62e6ba0c645dedef2f89fdf67b3627425,2024-11-21T09:28:42.063000 CVE-2024-30210,0,0,3a08b9c96cb03cec454cac12dbca9a8c5edd82e12a8c0690eea58e499f6599f9,2024-11-21T09:11:27.183000 +CVE-2024-30211,1,1,6d912e2ee56955c03be8f1ca2e037f419007030ce2098a5c7261f09b8fd8bd57,2025-02-12T22:15:32.587000 CVE-2024-30212,0,0,c6295405f4ab389a3bff2b8965d1c9443fc59d1654ed4157dd33277efb1bc9c4,2024-11-21T09:11:27.310000 CVE-2024-30213,0,0,81cccf16a59749811319b7d8ccdb8da9e5d700a9f128f9fa6df5d2fe3870fe29,2024-11-21T09:11:27.447000 CVE-2024-30214,0,0,b906288fafe2f4886559fc63d602d720565c2a460e6118d70191a96450bb8edb,2024-11-21T09:11:27.673000 @@ -255782,6 +255805,7 @@ CVE-2024-31062,0,0,13e4515ecf9fcb213077f696f7680dde95f02f5a87629595a47a0df0986fe CVE-2024-31063,0,0,b1a298bb0ba6c4c6d6137ab2a5b0c69d571b1288ce8f85730331fa203124c17c,2024-11-21T09:12:46.863000 CVE-2024-31064,0,0,4412d32292f4f1a606e86dde19af7fec75a1aa99b33a1873a73f9908346823b3,2024-11-21T09:12:47.083000 CVE-2024-31065,0,0,a00112f4528754b8c1afee754696d282ee5e69a60575a305b812e8485c2614ed,2024-11-21T09:12:47.320000 +CVE-2024-31068,1,1,a6cea92f6f7dc33b55815e41684c6e2e1ec47a8e7ccc61330f0590ec34f88609,2025-02-12T22:15:32.747000 CVE-2024-31069,0,0,fb53502e6d7be7a5a82d5cf9033afaa2c76b005b5ac9eb9741b945f53d80a4ae,2024-11-21T09:12:47.533000 CVE-2024-3107,0,0,c22762523eba600b4dbc1b069854272268244e515078d9e612846739a0b99f1f,2025-02-06T18:05:03.810000 CVE-2024-31070,0,0,1c611948de1365114224205017306826df6e14c3741670ceac64efb86dc1f19e,2024-11-21T09:12:47.663000 @@ -255854,8 +255878,11 @@ CVE-2024-31146,0,0,f936f8b5375e47cb092f8aa6bf5893d1570fca2bfcf5c7722e061d7922c4e CVE-2024-3115,0,0,024eb87cadd8b40aad338eb052d3545e6328aa34b164f2cfa51cbda6bfdbee78,2024-11-21T09:28:56 CVE-2024-31151,0,0,c8e26cb5ed6978918a8d1613d27ab52104f4526b7030bbf53b06c79c6dc8c489,2024-11-13T18:19:26.453000 CVE-2024-31152,0,0,cc4117e6b18b0ecba71b54acacc4e5dadac3f57360de9df64e46f495cb1e444f,2024-11-21T09:12:55.860000 +CVE-2024-31153,1,1,c7e29e67243d6990737706f6c42c25c1b02a37d3f23d78a88c6cd098e3bf0638,2025-02-12T22:15:32.900000 CVE-2024-31154,0,0,3de23bec22ca3d834838adfb94cfbba600144a24e0ed4809e5c78539a55fdaa0,2024-11-15T14:00:09.720000 +CVE-2024-31155,1,1,6a095fda672da021d98fd0b5f249799f361ba3ee00dcce1af3ee1f49c6b0e058,2025-02-12T22:15:33.050000 CVE-2024-31156,0,0,3a0b783c9ac720f743a65169c3dbf3b752abca84fb06686f38385be2e0b538ff,2024-11-21T09:12:56.110000 +CVE-2024-31157,1,1,0f021729c454de975a4b1d4bcf66adc4a955ec021e86d37439770e38bf6b698d,2025-02-12T22:15:33.197000 CVE-2024-31158,0,0,f9e7f4412c1dd1ebd0eb0da31e4b498df17e718a8cc7086161634ea84816114f,2024-11-15T14:00:09.720000 CVE-2024-31159,0,0,03c6968dc84b6c9c621449721b8162808e91282b21ae57f781c1a323ad26b62c,2024-11-21T09:12:56.343000 CVE-2024-3116,0,0,d62b0822129767f725aefd31e879f31bc5c835d20bdad7e59bc93ea06f247e4e,2025-02-11T16:28:41.357000 @@ -256373,6 +256400,7 @@ CVE-2024-31851,0,0,e45f336d82b2d3d9adbf3a8bac0b970c5266b3cdbe6939aeace9733f93a83 CVE-2024-31852,0,0,ba9051f6bc6d3b5aba3b4d7f2092d68c6a17eb29edddb549caa75380b0b647ce,2024-12-04T21:15:23.467000 CVE-2024-31856,0,0,b0ae28b2cf04a3d57b1162c504882bace010687db30d97cb579a93bed060de40,2024-11-21T09:14:01.757000 CVE-2024-31857,0,0,8ccaeff2e48a5a06dc8b607f81d3ae85f8bd08deb2ade42799168b9bafd37d10,2024-11-21T09:14:01.880000 +CVE-2024-31858,1,1,19a8d3c53c07de5bbd97f861e89b140f050f0b324d7a80b37145aefc827be5ec,2025-02-12T22:15:33.340000 CVE-2024-31859,0,0,5188bfcb73daa943c532580bcafd9e1ae4e11ae27457e4083ab53378c72ba6e7,2024-11-21T09:14:02.070000 CVE-2024-3186,0,0,6a202e3b12d67ed267f46ad36df1ad5893d1c9a9eec4366d9174b91b675690fe,2024-10-18T12:52:33.507000 CVE-2024-31860,0,0,da16d4a6ec395bb1c3502760a20f156b762cb90074f84a379ca30f6140bdf6a1,2024-11-21T09:14:02.200000 @@ -257279,8 +257307,11 @@ CVE-2024-32931,0,0,7262373b6131b09140041a357633a042862c3c2d05bdb15c6102f74b1aa6f CVE-2024-32932,0,0,03fb6e4c4b12271acd1aacd7a0e3a7846b170d0f71885b34358047364915e7a4,2024-11-21T09:16:04.437000 CVE-2024-32936,0,0,a920e2eaad4cb1078b59e395f36060b6b4406460276e884b945b0c064520d87e,2024-11-21T09:16:04.560000 CVE-2024-32937,0,0,b6ab1f5425f3b1e104bf451b1bab49b4053a822f8579f494a4b154b8379a897a,2024-11-21T09:16:04.697000 +CVE-2024-32938,1,1,5fbc5aecf1bb3bd17204edf1f38e31d25405985ec6d5e0c0e558f01dc48afc8e,2025-02-12T22:15:33.490000 CVE-2024-32939,0,0,c463a196aa4ffbfb5d2a4b3e459b316ded0f7f6c6516bb76ad5ef95da42520da,2024-08-23T16:17:54.027000 CVE-2024-32940,0,0,9f62ba9ea89d9593b83c13575e4294425bc96ea23edbba9e716ed10164e27514,2024-09-23T14:44:21.763000 +CVE-2024-32941,1,1,b869289b5ffa47719d86e2a373eb11663a831001185766c0af4b6c0f4ac18e2e,2025-02-12T22:15:33.643000 +CVE-2024-32942,1,1,21d25e1a288b7b2777f7e0a2a19f461215ce9ba4728ff74410ec00ba7577cea5,2025-02-12T22:15:33.800000 CVE-2024-32943,0,0,c559b36f29631d781d7f0fb512e91a929507292fb2de31b044f3ca7e33ca72f4,2024-11-21T09:16:04.987000 CVE-2024-32944,0,0,c428ec58cbbca7922580b86a8a87f1543307386b8440bdea49f79c12be73d56d,2024-11-21T09:16:05.130000 CVE-2024-32945,0,0,205936e7d9cd889187ee5e83510c414305d028e03cfb5a9dfb07b21ca62b8455,2024-11-21T09:16:05.340000 @@ -257590,7 +257621,7 @@ CVE-2024-33453,0,0,1fbe82c644fb8bbe113912cb00a4a5d1a1c94bafa8eab10745ce875253c5c CVE-2024-33454,0,0,828c3154586cb9467c595c29d55b5edffb58459441e838ece7c4b76998774cd3,2024-11-21T09:16:59.873000 CVE-2024-3346,0,0,59b56dd3f76b482f3f46a4f5168e1d1df055d74f08cce67e579a69f871f78046,2024-11-21T09:29:25.567000 CVE-2024-33465,0,0,028b0b409a1d692a647c2520d19ecf0970cde52f7911daddec0b497be9b02421,2024-11-21T09:17:00.083000 -CVE-2024-33469,0,0,495c710f8d26a286929310ebe6bba90cf8d173cc5d9918b7540497a710f68650,2025-02-11T23:15:08.903000 +CVE-2024-33469,0,1,cf79f0ff14229dd6ea85037083e4eb71d760f3031431b118be57e42499e47d3f,2025-02-12T22:15:33.940000 CVE-2024-3347,0,0,84580b9ac972f7e1b9b68290f45a4841524b704cb60fa893b96efa9e425529ef,2024-11-21T09:29:25.703000 CVE-2024-33470,0,0,08742a77635184295f1eb4cd590862e27d57823d4ad2e85bd8bf65959a85d00d,2024-11-21T09:17:00.293000 CVE-2024-33471,0,0,70fd7f1f07be12a7e1cc088009fc2e2ec3d705634ba21a89ed0b1fc39d5857b1,2024-11-21T09:17:00.520000 @@ -259834,6 +259865,7 @@ CVE-2024-36258,0,0,9cc8c4c4751ce585d0e2c1f7f3567f7c439f589095db18218e1b06914b868 CVE-2024-3626,0,0,78aad9ff73ee6ab23b960b55469d89a68f0d505ac995edf1a620964e508201ae,2024-11-21T09:30:01.217000 CVE-2024-36260,0,0,b666f10d8bb05b7b6ced715e15f1322e5ece66bcfb203e66e5a571b76c472ecd,2024-11-21T09:21:56.977000 CVE-2024-36261,0,0,f5ff682881b9b6abafdae2b09997e2a3b3a9cf4a5388d69f9f28f1bab883cae3,2024-09-23T14:16:44.273000 +CVE-2024-36262,1,1,30d0810e6955ad486de6ccc2c338b9b2a41f50ad343bed22cfcc26352fdbd6f0,2025-02-12T22:15:34.110000 CVE-2024-36263,0,0,a94558c341ef4e4daa860a56d013159ac2cb9a9243ca8eb92debec98f28cc5f0,2024-11-21T09:21:57.163000 CVE-2024-36264,0,0,1183540ced40f2999375d457c8902ecd0c4e6588a721ea9cf51f8e304905c117,2024-11-21T09:21:57.363000 CVE-2024-36265,0,0,221e61764487f10fa435928c744fde9c32151e08bb1ac4f214c71f0c815686c8,2024-11-21T09:21:57.503000 @@ -259843,21 +259875,27 @@ CVE-2024-36268,0,0,6bd7f2a08d60f857a812fd35ccc84177256999f3bb9a77410d2e76736e372 CVE-2024-3627,0,0,ef339dc21a5b1fd1421fb7d91956f750751521bfa12e27bf4e270f0ad2130a0b,2024-11-21T09:30:01.343000 CVE-2024-36270,0,0,acaf2ccc273dd2e6490c172039e027026cc310fbeda3126ff89ca0ef8ad854e9,2024-11-21T09:21:58.203000 CVE-2024-36272,0,0,a7dbc0cbeae123fa36835ce40bba69633c7e84046585c1b19cb882cc5e2500b6,2025-01-14T16:15:29.360000 +CVE-2024-36274,1,1,569e52028323169cc3f8ea738ce7c1f32ecb7775f090c5a54eb9f40b7f7e9aeb,2025-02-12T22:15:34.267000 CVE-2024-36275,0,0,a220a1a2c9428b373009c8eab26f07177e45f382eb9f965967e2c51f4b4ce45a,2024-11-15T14:00:09.720000 CVE-2024-36276,0,0,6c89873627f11666f7742f2615181900d2baf2a5e434ededbc3f14578e7fd943,2025-02-04T18:28:18.110000 CVE-2024-36277,0,0,badb4cc53c7202f17ca4e4f181b5ea1b2e562b954d3fa837092b06388881e158,2024-11-21T09:21:58.537000 CVE-2024-36278,0,0,823563aeddfd98d3e93f22c26b562542e8ad7cf7063e2491371a5c535851f7e4,2024-11-21T09:21:58.730000 CVE-2024-36279,0,0,301b02b4e0a70f551decb44b8d794050e356973281cfe9dbc17669b0dba3b799,2024-11-21T09:21:58.870000 CVE-2024-3628,0,0,d9122ea95c68760f6c82e514b7bf2614f4957fff6146aa16ce6a105c301b1be9,2024-11-21T09:30:01.490000 +CVE-2024-36280,1,1,7f5ce874f020cff1c8527a0ef81de7bf1cfb263d21d264884b84bc06d9332ddc,2025-02-12T22:15:34.437000 CVE-2024-36281,0,0,fc8e6e44e243630297f09f054a7c0a2dabfee41c676b2a632e48ca708c74a3cc,2024-11-21T09:21:59.083000 CVE-2024-36282,0,0,a2590150cfca5dfddf6e889ff7dbd39d67cfcaf459962141a39b085d34dfcd1d,2024-11-15T14:00:09.720000 +CVE-2024-36283,1,1,d15f0948b0763b60d1750b15f13762029b453f41577153dd99ac227b4dba8a23,2025-02-12T22:15:34.590000 CVE-2024-36284,0,0,68deabc42822058ffe26432b6898ed761bb9edadc01c7c7df784af68b0c22ce5,2024-11-15T14:00:09.720000 +CVE-2024-36285,1,1,46e0d712b15aa8796b2dd3ca6655ac6ca90adf768ea5c72ded792678c381e9d0,2025-02-12T22:15:34.737000 CVE-2024-36286,0,0,bac102403e45fda8132277c6a8c936743611fe7ec3db2c756aa2121a9f9c29ed,2025-01-07T17:08:25.580000 CVE-2024-36287,0,0,454ffb39c6631203600464ecb505365d9728982dd5fbfd6048bea7e40482bfdb,2024-11-21T09:21:59.527000 CVE-2024-36288,0,0,541c28d0151ea2628599b96895a2d3701ce11da4847adc16a1712449dea92513,2024-11-21T09:21:59.667000 CVE-2024-36289,0,0,9a4e2e8c22c877a7229e5ef67cd4e3937f178f5664cb9107f76a5fa80df78b1a,2024-11-21T09:21:59.813000 CVE-2024-3629,0,0,df403ccbf1837e11a032a9bb80d87536760e2eeafe99d76ff9b043ef1d743b24,2024-11-21T09:30:01.633000 CVE-2024-36290,0,0,8298f0d1642987ec9c63c5254514e0267d57f00f7a058acac2c0e8b01a55797a,2025-01-14T16:15:29.473000 +CVE-2024-36291,1,1,5a9889606f41bbb4d2800cd39de94ee7c22074fc6f9f789abe8bec05040a833a,2025-02-12T22:15:34.890000 +CVE-2024-36293,1,1,052c97f873894d106eaa916c1d8d33a703fe12790ca8373b94101f1103603faf,2025-02-12T22:15:35.040000 CVE-2024-36294,0,0,eb134be872ea12d25047633ce9f4e6d06cf7b25c0b58ceeff6fc0a24899cd955,2025-02-04T18:32:48.410000 CVE-2024-36295,0,0,3c7252205fab8389ff604c7c9e106ade710abf8f2bfb98226da656ac02a8adb2,2025-01-14T16:15:29.580000 CVE-2024-3630,0,0,77fcc9a4ab1f0f4362906fbc77c6b3cee6304fb38c0fff6803c856751be26cdb,2024-11-21T09:30:01.833000 @@ -260349,6 +260387,7 @@ CVE-2024-37017,0,0,9e9e7d245ae7636635d8fb9b7646e69ff4740b4aee32b577e749a761315fc CVE-2024-37018,0,0,dcf2b63abe61db319847b5d7e942c36af68b31f1cafe8b47e5200c9fd8419d58,2024-12-16T21:15:07.897000 CVE-2024-37019,0,0,019f9cadac30cdb47b60ef4c54cc291462b2bdbecfeff69d16099a4eb4863742,2024-11-21T09:23:03.357000 CVE-2024-3702,0,0,7b265a49b93baeb4226bb63cb9a4acc5f9eb7332525eeb6794bb581c436a4163,2025-02-11T02:15:34.710000 +CVE-2024-37020,1,1,a3da1514aa3f2d6ea69b8456661b012ad07221105d0f12fc2bb4c254636168b8,2025-02-12T22:15:35.190000 CVE-2024-37021,0,0,1fef4ba12d503003c90d0df6f25b17bd91d92aaa79eec5ce352058e2de190264,2025-02-03T15:56:26.340000 CVE-2024-37022,0,0,58e15183af3d32942869fe6953f465d4e55099ab2b6c8139c4c8d08e686f90ce,2024-11-21T09:23:03.690000 CVE-2024-37023,0,0,f4f53709e1be08c5fe3fca36aa5104850c438460730a24ef5245adc14ca5b232,2024-08-20T17:12:03.330000 @@ -260684,6 +260723,7 @@ CVE-2024-37351,0,0,9a7dc59a36afb09dc3d9fccfe9a0ce93419c46a4d31b061e10fc20ad6e4bd CVE-2024-37352,0,0,3f023f1fb2a769ea46547b210828a58497c5cf6630361c558ccbc529aea792d8,2024-11-21T09:23:42.400000 CVE-2024-37353,0,0,7ff7b7453550602b650cfdec5ef1242f502029e3779b416a04c17939bc6e63d5,2024-08-22T00:15:05.760000 CVE-2024-37354,0,0,8714660eea3ed91e9b81cd464e3754efc32fe0d558dd6abd8ab964c32e5c5bd4,2024-11-21T09:23:42.537000 +CVE-2024-37355,1,1,9decaa094fea143b53b0cfc7c2f75302b7a98c145dce66517118c4d928ca2557,2025-02-12T22:15:35.330000 CVE-2024-37356,0,0,4fe4d4a17eafd229e9050e6753d570a71ec28698aaa6438baa1abb86c96de84d,2024-11-21T09:23:42.667000 CVE-2024-37357,0,0,fc7134e6eb69001209ce08e10f760d544b4fb396e8ea209636530f56b5eb787e,2025-01-14T16:15:30.027000 CVE-2024-37358,0,0,b8e0b6a893852de0dcf56fed78f0d082b71a965f679c8be9f89a9809a8a79f11,2025-02-06T12:15:26.343000 @@ -261466,9 +261506,11 @@ CVE-2024-38303,0,0,48f740ae5336dea6993e1df6502cbae19e1e53f943bf40615f10bf1afa498 CVE-2024-38304,0,0,93fc20945861e381c6a93babdafb378ffefe909e70fe03228cef160c3626e6fd,2024-12-20T14:41:01.273000 CVE-2024-38305,0,0,b50204d0d2adbfeee4304f94e93a151274edb07a1881b5e4d7cf38bf07c62bde,2024-11-25T18:16:27.450000 CVE-2024-38306,0,0,923ef8f5750ef5dc8b1aa0f80ec3ec7f20d2a05cc416d49512377e1d2196c5c7,2024-11-21T09:25:20.867000 +CVE-2024-38307,1,1,524368a473d51931866c40a5c1f1d3365ccd90b6323a7959563d510b3f9f749b,2025-02-12T22:15:35.480000 CVE-2024-38308,0,0,aa0e1dcb340f88b60a097b1f78e4419b606f07980132596118f63e0ca049be13,2024-10-07T15:24:34.517000 CVE-2024-38309,0,0,c1db647894461fb62d3b4308d8d05a2e39c8d0f31c7a0d9ba995ad235729362c,2024-11-29T21:15:05.287000 CVE-2024-3831,0,0,5e708a1e6973c6b70cfbb375324ac255e6a5b9f7cfb486bea916fa269c4f84cf,2025-01-28T03:13:30.017000 +CVE-2024-38310,1,1,b4b50080a4a69ab2d065a230e3e92479b4698618771c786fe6a03b13fcb3b079,2025-02-12T22:15:35.630000 CVE-2024-38312,0,0,71e3649445240de28e850a435dc82d1d3d363c5ab712373016bf34e6f709156c,2024-11-21T09:25:21.193000 CVE-2024-38313,0,0,b4fccf4bc32a428a2ed3da857e5610d03364deeda806c6ba074978d77fa6902f,2024-11-21T09:25:21.687000 CVE-2024-38314,0,0,7f72becf752c493d63d9011af9e40e717b070fb953c18b5df93807710a713461,2024-10-25T12:56:07.750000 @@ -262183,6 +262225,7 @@ CVE-2024-39250,0,0,21b05446dfdc54cf0c98fe165562927c7c8516143bc3a042c68b6df4fcb55 CVE-2024-39251,0,0,436e36fb029e96f3eeb340649f39e7025990c183f0b0096b87a3f46c8d1727ae,2024-11-21T09:27:22.573000 CVE-2024-3926,0,0,fa19456efa357b066885387799b645bd8aa9371a065efe590ac8cd9be31edae6,2024-11-21T09:30:42.947000 CVE-2024-3927,0,0,c5a7a83540dd0108e0c95456e196911f953d1c089ad9153186ac7abf5eac21fd,2024-11-21T09:30:43.063000 +CVE-2024-39271,1,1,3af5cf36f37cb3e144a8a2f7b73da6ced963d03a83949aff6eab11692207c03a,2025-02-12T22:15:35.777000 CVE-2024-39272,0,0,f8e9336eb1899af6a9546b5b8faf6552c3341b9738bb42d5b5f9d7b3cf623fd9,2025-02-06T19:15:19.357000 CVE-2024-39273,0,0,5181699ccf93ef18ef6af16c2c5b39bedb60a9d8446642e1b83f04b362725f80,2025-01-14T16:15:30.227000 CVE-2024-39274,0,0,6e7d1a33b0e5d020249e1265d5c2fe803a054c23d02db7f7ac41bcc85d95ece2,2024-08-23T14:39:29.247000 @@ -262190,12 +262233,15 @@ CVE-2024-39275,0,0,3a30aa64f40c900af2046a32b51bca26459d15ed56339ef5c87dcb823873a CVE-2024-39276,0,0,dd977f122c99547ae4b07eb5192e163e6e3e61789006652d41f5a5fbe512a712,2024-11-21T09:27:23.107000 CVE-2024-39277,0,0,26080347ae1771d5f6c59abbd813475f28a4e34b16949734c9b3cb30c815c0b6,2024-11-21T09:27:23.317000 CVE-2024-39278,0,0,08afeea0ff66f11774d46076ab58f2f6cb47799fe9878a2833101dc3a7d96dd6,2024-10-04T14:36:35.340000 +CVE-2024-39279,1,1,2fad314fd1001cfade5c663da24f2233013ce1c2dc23d374c006254eb80ea848,2025-02-12T22:15:35.937000 CVE-2024-3928,0,0,80eb80995ed734a4fd6c40cf49e2905ed9643c2a1a0d85ff1158531da5501ded,2024-11-21T09:30:43.180000 CVE-2024-39280,0,0,c9a29d8ab16a066b50b7f63816b23b3ffbca89715f819ee07f0b80811e3858e3,2025-01-14T16:15:30.337000 CVE-2024-39281,0,0,276b9ae8e8a9a0b79ee7952c2bd6307cb0cf6b8e0cfe907b0f872eb5eba37a27,2025-01-10T13:15:09.467000 CVE-2024-39282,0,0,8d19a62ea2208ee549ce1ae639673f7c6307b394f865aae3ba768260c976d255,2025-01-15T13:15:09.740000 CVE-2024-39283,0,0,4522f3bbc438abcd81e221b08edda070f395b85d336b168a4b5ca1c5829a00dc,2024-09-12T19:15:46.390000 +CVE-2024-39284,1,1,bf29e3976b7c47cc358bc0a4008cac0bd13f578b0f3fade923a176e2a8aab00c,2025-02-12T22:15:36.083000 CVE-2024-39285,0,0,f0043fe58d02ea22fa80a21b1fba2440c49cfc1f78daf98e76e53f25d8a76df4,2024-11-15T14:00:09.720000 +CVE-2024-39286,1,1,e87f9a1366b5486c21fda38f7a23259387a9ca453f0304fe29eeb97a8d350588,2025-02-12T22:15:36.223000 CVE-2024-39287,0,0,7582a54b2388a70164c9564ee1f85653aced547dff036f41aa22b6e50b81804d,2024-08-29T14:23:31.807000 CVE-2024-39288,0,0,f17532d8db758c901d7f2d2b6827cf0283adb1c05ec9834da20a939a636a4990,2025-01-14T16:15:30.460000 CVE-2024-3929,0,0,2f3799dad2b99454ece752aad0330957941062a860c2df3b38dbd9ef124282e2,2024-11-21T09:30:43.337000 @@ -262261,6 +262307,8 @@ CVE-2024-39351,0,0,327607e1cddd67f4054754427f899db1dcdfcaad597984bb096ea9ebdc5a5 CVE-2024-39352,0,0,aa50c4c28f76901b5df9c043ad69006e02bf1ae5bd879b2160fb058e608db73a,2024-11-21T09:27:31.870000 CVE-2024-39353,0,0,2c8be227a8d14887935bc4ae5bc19a7fe2b7ee08444dca7ad981049635b23810,2024-11-21T09:27:31.997000 CVE-2024-39354,0,0,af101bbb8efba9998575417346801b06fdd7cd798a6138b798891ff644c42a6c,2025-01-30T14:35:18.047000 +CVE-2024-39355,1,1,67ce69f8d190cac8a35e3e8a44ffb847f26721d8f1861f540b2f9bbdf03b0374,2025-02-12T22:15:36.380000 +CVE-2024-39356,1,1,80c3b2398bec88da672edbf5c26f208c09a33566c506a84e231428163c68aee0,2025-02-12T22:15:36.527000 CVE-2024-39357,0,0,05fad288b05b59e33d648c9eb1d2ff76c0f6af7b551634c79403f1312cc01de6,2025-01-14T16:15:30.793000 CVE-2024-39358,0,0,9eeef3abb2f61d58ed8e2122c0c3bcbb04e69452c7ee95ad547df8b791b1e391,2025-01-14T16:15:30.907000 CVE-2024-39359,0,0,f4e024801aa8b60419c874a361b414fdc2ec7dcbf103c85ee43bf099477a1ea3,2025-01-14T16:15:31.010000 @@ -262270,11 +262318,13 @@ CVE-2024-39361,0,0,477116428326d7bdec5ce562e55d21a285643227ebfe2e1fbe27a873152d5 CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000 CVE-2024-39363,0,0,1532df8dbaa164222937f85b082fd3798ad305753bec49cec27dedc9a5faf8f6,2025-01-14T16:15:31.223000 CVE-2024-39364,0,0,5c70137712c5b899f4bd053db2949ead7489ac81f5ead35b90cbcb1bbca7521a,2024-09-30T12:45:57.823000 +CVE-2024-39365,1,1,b9626713747d18c7c603182e8d642cb455c2f1bcd6a684b8635179e2e27c6320,2025-02-12T22:15:36.670000 CVE-2024-39367,0,0,2a0d1a1735ad2eb38f3dc83b04bfe1b4b45a382d6c816a4b8ec5c2288c0135b9,2025-01-14T16:15:31.330000 CVE-2024-39368,0,0,8d0beb90981772e56cdc456383e0ad76416c3ac8910086fb0eb28318814c835a,2024-11-15T14:00:09.720000 CVE-2024-3937,0,0,45bcfbffb0cc9dbb6ee7014f6348017c5f9d7762fdf9bb269b80a174f4d59cc1,2024-11-21T09:30:44.430000 CVE-2024-39370,0,0,2831f53cf04707a9b504d0a70bf0135e102149552b32023438e88a1fa030a808,2025-01-14T16:15:31.430000 CVE-2024-39371,0,0,720a71ad5bece19f2267d5063ec8544c29d6cc9e6cdf7e6a5c5d88623672c625,2024-11-21T09:27:32.667000 +CVE-2024-39372,1,1,0ca683254c72864cea49b2c1c27b7005490feeb14daa5c214c0cae671ecc1614,2025-02-12T22:15:36.820000 CVE-2024-39373,0,0,c9f21aedca8aeb11477ede49acfb175851a5381d7367fa191f175fef22650e7e,2024-11-21T09:27:32.823000 CVE-2024-39374,0,0,a4c07ccaadb829fd966842f0cd7fd5f4d48639b87a267dd4b005f9ad138e642b,2024-11-21T09:27:33.003000 CVE-2024-39375,0,0,844fb48648151d2959893b2eeef45a29c5411771e91fd583d1710323ce8a3a2d,2024-11-21T09:27:33.173000 @@ -262505,6 +262555,7 @@ CVE-2024-39602,0,0,27041e41974104fd1b79b4ac803ed5fde80beca6cb3dd96452797a458af7b CVE-2024-39603,0,0,1437983f8883ed245799b0e5c1e1953f598b12b478ace10cadcd2f37e9d67a15,2025-01-14T16:15:31.640000 CVE-2024-39604,0,0,88257eaba5c332ff2d127c02fbeac9934efd2fc6ba8e017d75c36c5cef181610,2025-01-14T16:15:31.747000 CVE-2024-39605,0,0,3d15565b47da01f09220518de7967c2695d8eac811d4af1b8240b665e7ca3c87,2025-01-30T14:34:40.630000 +CVE-2024-39606,1,1,30fdb0cdeaf411929dd4809218555971308583412ca84168568fb0cadd00a2c5,2025-02-12T22:15:36.960000 CVE-2024-39607,0,0,aadcaab0bf1d7729e38b88e8516ae68565ef10bef4190422593ee5df929d784f,2024-11-26T09:15:06.277000 CVE-2024-39608,0,0,9ffd9e93083b666f0e42c9a03d32cf85ab205f595971f01f7b69deb9e34455e8,2025-01-14T16:15:31.853000 CVE-2024-39609,0,0,2a17afe0616a352707ec6d7a4b1c89eb322f40e85f4e6ff34b51561aff3d09f0,2024-11-19T19:58:29.653000 @@ -262589,7 +262640,7 @@ CVE-2024-39685,0,0,5faae2a25966aa52e2cdc427c23df743b7059f0aadb369dfd40104df0f6d3 CVE-2024-39686,0,0,4c0d49815593c35be978e09a72cc87820f4cb6eb19ea107476f4468b42201e33,2024-11-21T09:28:13.253000 CVE-2024-39687,0,0,6daec355ba8d9309d84985ca38250f557314d9605500a68e97c5d735d50244d8,2024-11-21T09:28:13.397000 CVE-2024-39688,0,0,92b40e81a4e45212cad1ec83479d93654e385447eb80a07a0e0954e364304b50,2024-11-21T09:28:13.527000 -CVE-2024-39689,0,1,85b44c6f6a473c1c713e739fafad20be1bc06aa4d4e537ca3b3bf4f5185557cb,2025-02-12T20:12:19.567000 +CVE-2024-39689,0,0,85b44c6f6a473c1c713e739fafad20be1bc06aa4d4e537ca3b3bf4f5185557cb,2025-02-12T20:12:19.567000 CVE-2024-3969,0,0,c92e5893eff833660050ef319d5015b767225d3ac964faa141f6af68ea4272f4,2025-01-21T17:46:17.103000 CVE-2024-39690,0,0,b661fd8f43de83677a203418566dba2bd5bbe113e197d794258e80a53ef57727,2024-08-21T16:01:47.157000 CVE-2024-39691,0,0,8df0217594fa0829a0044535217c02128356b5a7892a2c657f2ee9dc4a138ddc,2024-11-21T09:28:13.943000 @@ -262678,6 +262729,7 @@ CVE-2024-39775,0,0,9755b0d11cb128cbd71f3ab95f30a15bff4bad6969790236412ac10cc2cc2 CVE-2024-39776,0,0,47015231b132d702adc5e908b384445bac8e422abb123c6994d64454c8ef88a3,2024-09-04T18:25:51.920000 CVE-2024-39777,0,0,d544fb5c8af3d11cc0bf86238933c07737b24f611dcb10d9d356ddde3e445899,2024-08-23T14:36:48.817000 CVE-2024-39778,0,0,54090db86e8d38e017cd2ddd1031fafce658bb8e4578d3d0c24cf22544ca372d,2024-08-19T16:20:52.980000 +CVE-2024-39779,1,1,fb815f0c3f399a427da6b109cf267bbdd896e9e96d02bbd66608ffd9edeb3cb9,2025-02-12T22:15:37.117000 CVE-2024-3978,0,0,482c21d01e49c69bca4dc15aede6173bfc8d79c5700a49fac23ff27e1403ed25,2024-11-21T09:30:48.857000 CVE-2024-39781,0,0,cd7ec078c3d17c622583b3e23660ac213bd8eadef2f1c6639a74be6e2f789062,2025-01-14T15:15:22.900000 CVE-2024-39782,0,0,2c4a0c996115cb53bacadccd26e56de9d86433511bcf2ca9387251a8d2006990,2025-01-14T15:15:23.090000 @@ -262695,6 +262747,7 @@ CVE-2024-39792,0,0,a0e01fb34a5f6d0b714b844b637779a453bc01fac9209900d57b56253997c CVE-2024-39793,0,0,41497e9b4532e6ba7660bf3fd4412ba05d0cc12136a31e4a2d487c533d2f3ce2,2025-01-14T15:15:24.510000 CVE-2024-39794,0,0,837f4f6ff378c23c3ca990a9eece931e17432e19bc82c2ef37c2593d934ff0f1,2025-01-14T15:15:24.663000 CVE-2024-39795,0,0,5b42de05552f2a4e48bd5faa081f43d44850af50223f52ce7a4eafbf5f864221,2025-01-14T15:15:24.817000 +CVE-2024-39797,1,1,20343ff0c5034c98d43bee9b5ca12ba56b22cb94ba024b43b848c23784b55e1a,2025-02-12T22:15:37.270000 CVE-2024-39798,0,0,e93b265d472121bc280dc37329e6e8e82ae098059ce87403ae85505fc8c92de1,2025-01-14T15:15:24.983000 CVE-2024-39799,0,0,8289bf452953f094a08219ab8c654ff0bfcc5c545dcae60ec2de1540806f29e8,2025-01-14T15:15:25.167000 CVE-2024-3980,0,0,5ed554dffef87bebecad0e1e92147ec3b9a94d4293f1f5208c881e426d70aa58,2024-10-30T15:33:12.697000 @@ -262703,12 +262756,14 @@ CVE-2024-39801,0,0,91ddbbca5bd46d44f56f74a71907defef9881e8952c8cd461d8441278f032 CVE-2024-39802,0,0,4e08d5343d9311b0c46e76a6590e6658a6bcfaae0a93fb3c5fc18c7f14912bb3,2025-01-14T15:15:25.677000 CVE-2024-39803,0,0,d0e062b8d8498e7853bac6593c0ac81a9efaf7a0824ffd8f4776c9c517e1a2a7,2025-01-14T15:15:25.840000 CVE-2024-39804,0,0,970bbd5e70b5a1ae4ce845ef93df8f5df4fa3a408ddbe562f3bc62cf1c781211,2024-12-18T23:15:07.640000 +CVE-2024-39805,1,1,8280f20df5ffd4e9d6f8dceb7c9cd5ea39a422ef7095f1ea5c0351240710402d,2025-02-12T22:15:37.420000 CVE-2024-39806,0,0,820d3b5181086101e827009cfe4b737213c68e8e8373d5aee74b56640c974b56,2024-10-16T16:49:41.507000 CVE-2024-39807,0,0,a5f08786585e608d689a1daeac36093e7823985001ef9fadb52054fa4e796736,2024-11-21T09:28:22.227000 CVE-2024-39808,0,0,f44d7f3e590dfdbfb77ca6963705a1e0f6bb459c634421293e8d3ebd1b9fa7f1,2024-09-11T16:26:11.920000 CVE-2024-39809,0,0,7c54e67dade0b44ea0efd84f17f0a49ecf802216ccdeab5d2cb569e5a1301da5,2024-08-19T16:19:52.530000 CVE-2024-39810,0,0,ae56d32909e36911a442ad2179b927c261a96c3ffcecf73d313c3dd6bca2e235,2024-08-23T16:16:36.907000 CVE-2024-39811,0,0,8060988dc9d75c60307c25925c80ec36adf3bc7d704c5c319322e3f2e53536e2,2024-11-15T14:00:09.720000 +CVE-2024-39813,1,1,2c7f964f503038f8fd86fe95ce732180b69000bc6cfa2fd3548733f08d699657,2025-02-12T22:15:37.567000 CVE-2024-39815,0,0,3f08218977fde87b3bdca90e96b54b8d24d5f2b2ffe03ad2c9604b5683266229,2024-08-20T17:14:18.587000 CVE-2024-39816,0,0,bf31642010ea8072be479ec01a800fdc54bc0950923af17d98b842b9cf37feb3,2024-09-04T16:30:42.197000 CVE-2024-39817,0,0,e0dce784c323c74627b1c8ac6158ae7d1d8ab303285570726585ad73c67e00be,2024-09-11T19:36:18.050000 @@ -263283,6 +263338,7 @@ CVE-2024-40883,0,0,e322f6133df143969f657d9cc6a7d6b368bf5e5b48f0fbcf0c8a3964addaa CVE-2024-40884,0,0,ed9954ff74e93284dab776e5f85f657d7b2f3e463ef905e91d917d70faae6ca7,2024-10-17T14:05:16.247000 CVE-2024-40885,0,0,c819fb6dd4b0136231d7f32857f3d24a5008c3818051b19ae2000f42a9494ee6,2024-11-15T14:00:09.720000 CVE-2024-40886,0,0,d6046df7f06d5f5712a2972118d791b3c29f6fc6001fad542f39cc79b75e1580,2024-08-23T16:09:31.887000 +CVE-2024-40887,1,1,661c5f8415a367df6222e2150be83f047a3eac222666221189b9b3ae12991a95,2025-02-12T22:15:37.710000 CVE-2024-4089,0,0,7a035608d08862b8a3927991cbc7bcfd8e0cb13815d39b3b58eaf685ec21d6c5,2024-10-17T19:41:36.467000 CVE-2024-40890,0,0,aa090ac05e8963e1ca90e2c05cdc3b230d4c12a97e1ac99273701898832d1be2,2025-02-12T18:12:16.130000 CVE-2024-40891,0,0,cd384657f2d111008bfd470fb69eb7ea4bde608b2882d3a0b77536f9c9b56dfa,2025-02-12T18:11:58.790000 @@ -263568,7 +263624,9 @@ CVE-2024-41162,0,0,977378981001bb41eb21ff3c8de57a2d971d0d349d42fb50bc854dc76c138 CVE-2024-41163,0,0,a875db94bd67413b4697a424258164328dfe7ad33e562b13cbadb5e9474a22e6,2024-12-18T15:15:10.730000 CVE-2024-41164,0,0,4c4d4ed9c8462fe5c1beb69a1e440cbfd7fca4e0230442b39f4f5b80ba178ccd,2024-08-19T18:39:06.157000 CVE-2024-41165,0,0,f2cd16e63216ab00fb4b5715186a0a48b1a1a4c2af03934e45bd74947acb94eb,2024-12-18T23:15:08.300000 +CVE-2024-41166,1,1,8b37a263066b6092311992a1e790156d8450683043907099955c2cca130e8027,2025-02-12T22:15:37.870000 CVE-2024-41167,0,0,99a054e656d3c12a5ab4c6034e2dfe4d200da81fdf05058d692b86b939cfb420,2024-11-19T19:45:02.660000 +CVE-2024-41168,1,1,66e6fb61440946775acfa45a5359980fa158f4b7526eea83ab34b73d764189d4,2025-02-12T22:15:38.020000 CVE-2024-4117,0,0,c6b705cffd774bf8f4b3a2f240f3907f970fa0e3e102d32f20420757d7159768,2025-01-15T18:42:42.367000 CVE-2024-41170,0,0,7c50c7e0ef992b5a3c278ba9993ae63d88ca15fcfd1b1982b492fe16db9c5784,2024-09-10T12:09:50.377000 CVE-2024-41171,0,0,0dca69f1495b394ad73f5a01f9a137638e2f9b54f6b0f4440abd7941e198b487,2024-09-10T12:09:50.377000 @@ -264030,6 +264088,7 @@ CVE-2024-41913,0,0,fce4e02642287f9e6160a6f8520e124ec69c6e3cdf971b0e3bd6764a9a59e CVE-2024-41914,0,0,b4cb30058ba7c15253a6b7af5171c10291a9eb5f90f7ea1c66073a44c58cafff,2024-11-21T09:33:16.507000 CVE-2024-41915,0,0,74f4b30a3490769bd45dc3bb1c6e58da7fcab263c0eccbe09541d45260e0a8a4,2024-11-21T09:33:16.650000 CVE-2024-41916,0,0,e26bbdb30f3e12989e8ba751536faaac62be571602a0259fbe27bdf53bba951f,2024-11-21T09:33:16.797000 +CVE-2024-41917,1,1,fb82d550b5782bb8f30fe151b3ef6dc7b3345cc0cd06aea8d57afaea295636a3,2025-02-12T22:15:38.160000 CVE-2024-41918,0,0,0025c02645b62e9a013f9a632cdf884d305e491a1529fcde2896b5f25d46b1f6,2024-08-30T16:05:23.737000 CVE-2024-4192,0,0,6f45d7ab3fa2e128e5ba0090b09e0efb99d62d4fa36ffa8103dd1a0f77ba887b,2024-11-21T09:42:21.737000 CVE-2024-41922,0,0,7e03c992eccbc90ea51a8983e0cf91681fc1323d95ecf135ada02c68d1fe41ab,2024-12-18T15:15:11.163000 @@ -264043,6 +264102,7 @@ CVE-2024-4193,0,0,2c348f7f2f87544d588812c852bddbfbf63c657e73a923d4b668c311de4e39 CVE-2024-41930,0,0,9970243747a2426495d5267f7aec4e4ab9cce4ad5c0b5449a838d166e239dacb,2024-11-04T22:35:07.177000 CVE-2024-41931,0,0,8055ba2b4f57b9b2835ae4697ec8b13da4a3ea06ed170c08866a5fcbc2836aec,2024-10-17T17:15:11.773000 CVE-2024-41932,0,0,1abe0cfce1ee58b08103c4b11983b06cf9d6d018f246ca811a21294fed0afb3f,2025-01-11T13:15:20.930000 +CVE-2024-41934,1,1,4f03c2e4a3142fcd6eb39ab0249f529e7c4b4e7264c2b901f9f1c381dcd6c50d,2025-02-12T22:15:38.313000 CVE-2024-41935,0,0,97e87f9da1b20b0c02c2d1055e7a663ebdcd03109f5d41c24a14b0c4db033df8,2025-01-11T13:15:21.083000 CVE-2024-41936,0,0,bc5263d793837e387ee98a53d893cb418781f457dbe691d4096c5aa745312359,2024-08-20T16:26:54.663000 CVE-2024-41937,0,0,908baea8d6075c024574b677758230bec5903572013c4b3c9a48a3ee7bf5b699,2024-11-21T09:33:18.477000 @@ -264497,16 +264557,19 @@ CVE-2024-42399,0,0,506142db09c821dd3d6ad2ff961d3e036eaba630fcdd840a57cad040888a4 CVE-2024-4240,0,0,0e5f31784b7162c087aca37e585256441c15b32a7e0d4b2098e6ff8a1565e011,2025-01-27T18:30:07.563000 CVE-2024-42400,0,0,b23dfd205967d309343e484e6eb5c901d62a0b3953c77493b57f0104c8430fad,2024-08-23T15:06:00 CVE-2024-42404,0,0,bb61ac33954fbd9cb789abfbcdde8b366f1c0c5dfe94d454dc594181179c8a15,2024-09-20T12:30:51.220000 +CVE-2024-42405,1,1,65bb04d7a1eac933a7204fdceaede6d7605ec22133e93cc003bb89e194db8891,2025-02-12T22:15:38.477000 CVE-2024-42406,0,0,27ec0815435bbda0c2431d4630bea0ca6b595a1297245017087d145f127b6444,2024-10-01T11:15:48.450000 CVE-2024-42407,0,0,f0d739bc84cee721cfefadcf95caf855718a30db3f3991b30a719354873792c9,2024-12-12T02:15:23.017000 CVE-2024-42408,0,0,fea0cc9e4f3c35832fcef20074d7bda9403a00e74d9e32437a4416b7b17d8e5d,2024-08-29T14:22:45.603000 CVE-2024-4241,0,0,7c626df675573c13887e12ea562d8d3f15e47e4402d7c6d9be6badebb23cf773,2025-01-27T18:29:59.080000 +CVE-2024-42410,1,1,a879a277f9a2be698868b822ae6fc8ddfb14ccae6707b07219a9f9e014bea6bb,2025-02-12T22:15:38.627000 CVE-2024-42411,0,0,4ade0497533c50e3de8b82e11fd54f8955ce17bc8d332a9a9a0d03574bff419f,2024-08-23T16:04:26.227000 CVE-2024-42412,0,0,25166e54538fd07ddb221cf849e12a37ba336aa564ff3a3b17a2568fe13b34b5,2024-11-26T08:15:07.073000 CVE-2024-42415,0,0,c1b377a5ad366a542f1771b25d0456c8b94faa8823ef3c03f81c602fe5a4ac6d,2024-11-21T09:34:00.623000 CVE-2024-42416,0,0,613a492b868ab9acf279167eee40f4fd55cddaf34a95f955477eda14651880ef,2024-09-05T21:25:09.273000 CVE-2024-42417,0,0,f1c80c711a679210ceb5e01a64e3cd4fa77e11abf5bc2a3fb017e31ac06ead65,2024-10-08T15:43:05.720000 CVE-2024-42418,0,0,d8c279b34a2436c7978f2dd5ccc38b1a5c29d1a2243b3f21749da924dbafbcdc,2024-09-04T18:22:22.583000 +CVE-2024-42419,1,1,6bd8150860595d7e3fa19075dbb3b8aa6c652b7011176f783238731d2a3ba1a2,2025-02-12T22:15:38.780000 CVE-2024-4242,0,0,4ff5a517ebe58f036a76713683ac8fcf9970f47f5a76e6ec9a8aba3ffb1d13d5,2025-01-27T18:29:46.497000 CVE-2024-42420,0,0,c141965d63744fc1061446ee1ae1162360d4790ebb601639ac109ac40f0d20d4,2024-11-05T19:39:31.913000 CVE-2024-42422,0,0,a234770e7b65a5a9c7aeea5fe74966a3b1bb651be5713a21eeec2a7c5dc12323,2025-02-03T14:40:15.143000 @@ -264576,6 +264639,7 @@ CVE-2024-42489,0,0,8e38c6dffabed3c3efb732ec4d9a919dc6b3fac404852967d434dd179919e CVE-2024-4249,0,0,a72dbba20503da07cc3ddcece24be97e2fd00bb72e6f5901be2b6b5c31c88060,2025-01-27T18:25:30.817000 CVE-2024-42490,0,0,550d80cfc0d653c4329d06e9e408c8c4e16317fcc8b2d04396c03c01ec573efc,2024-08-23T16:18:28.547000 CVE-2024-42491,0,0,8a9b0400d0c20078bd76bf8031432bcb00200f7bd0b355a435062fdc969a90d9,2024-09-06T12:08:21.290000 +CVE-2024-42492,1,1,0ceb33a4976fdafc3d4092fe85dd3265cadf8c6e5e4be9e0f28bb26ba5d10e9f,2025-02-12T22:15:38.923000 CVE-2024-42493,0,0,47a925cbc13f370892e423ab30b6f060aad684f013e0acd9d4deb7da7003a2d0,2024-08-29T14:24:14.373000 CVE-2024-42494,0,0,6197ed8a4b9a3b8482f87bacc041d69eb869be1ddf3ed684a5ffa276dc920cfc,2024-12-10T18:38:23.260000 CVE-2024-42495,0,0,ee3925134b1396bfaa53570094be7e292b01da9faa4b048760c4c0dc97507a2e,2024-10-04T14:37:36.703000 @@ -266095,7 +266159,7 @@ CVE-2024-44331,0,0,42b00072d48078e0b9a060027e505c6c6396591a3a5817312b42a22a13dd2 CVE-2024-44333,0,0,c5d624202dbc9a9b1670ac84eba11673bfacf2e3bd54495df9c00726b1f1c22f,2024-09-09T21:35:11.347000 CVE-2024-44334,0,0,2a3b81ccad3fcc31e1a06c0adb7939fa911851042ebf4e5dd5061206cc9f639c,2024-09-09T20:35:12.473000 CVE-2024-44335,0,0,4962d89eefd697dbe30866ff3edf68624ec476c2d20b191be41bf6d9942ab0b8,2024-09-09T20:35:17.330000 -CVE-2024-44336,0,0,b336e2ea7f1da09debaa046d4f249f821a074a273864f2d0a5e68a498672bb62,2025-02-11T23:15:09.020000 +CVE-2024-44336,0,1,186d91dd65d0e16a41d7eabfa389a4457219d4f135453c8a67141781ecfb28de,2025-02-12T22:15:39.070000 CVE-2024-44337,0,0,030514f9e40e38f59570e28e764a82624613b34238346a3330ba41ff1d541657,2024-11-14T16:35:14.613000 CVE-2024-4434,0,0,7c3e3d7c9744d63a28cc3bc3d3c440c5b3c9ccfe3f078d9d12a3b43c238ce6e4,2025-01-15T20:05:02.353000 CVE-2024-44340,0,0,83e58ea9785ebdf6a4101ac95bdee1fca6e905c550b6bbbcea8839f08b665ae8,2024-08-30T14:56:38.207000 @@ -267656,6 +267720,8 @@ CVE-2024-46919,0,0,caee3ec5db2611d5674f255e6e4093f56001d0cd40bf7d98b7791ae4b5538 CVE-2024-4692,0,0,23393761d23a527f075ec0ab23d8db8e227006f309d26221ac72121be686a8a6,2024-10-21T16:10:14.873000 CVE-2024-46920,0,0,b32520b4541741819e59354b8e0dcf0eef99f4c8b248bb03a8dc5b52b8a5f76d,2025-01-13T20:15:28.613000 CVE-2024-46921,0,0,71dee254cc2f309e1467d8fa6e97afa4a8c64f91201f645efed32b11d86fccc6,2025-01-31T17:15:14.113000 +CVE-2024-46922,1,1,f69f2297d529d2b758fdb61e6273f295a373427aaba7a2f2ea5a1c7ae6851bd9,2025-02-12T22:15:39.230000 +CVE-2024-46923,1,1,2a9e2d94401a8d69abb9d9f5cec13b8f32b474e93a8a89ce79b66b047f736647,2025-02-12T22:15:39.347000 CVE-2024-4693,0,0,a9c8482c3ea2d347585fc5de3f7febf7c02e48c514bcd2a505cc67d911f0408a,2024-11-21T09:43:23.560000 CVE-2024-46934,0,0,a6247ccfc7686585f1ad4c13508e51c74923607d7000191b941f9a6c77eca291,2024-09-26T17:41:09.580000 CVE-2024-46935,0,0,5cad8a9a95361aabd63f1624134999baecb2a4cd5a3fdbbc89b1eb92fa778d51,2024-09-26T17:39:33.123000 @@ -267721,6 +267787,7 @@ CVE-2024-47001,0,0,82512b739d599a177453c09e314861017847d0227aaef8b1ee95f2f0a3f45 CVE-2024-47002,0,0,5c919a7b5eed1045781701efd4624c6ef2b2f30ba79fe4aa6e689aa93aabf61c,2025-01-15T17:15:15.883000 CVE-2024-47003,0,0,525372da90b89830fd41e0c884d9afded05f7a8947d62cb01c2a85154f0d7a86,2024-09-26T18:42:29.383000 CVE-2024-47005,0,0,d90719cbe514c55464440f47622554265d33eea28544c444cfe482b6e25c483f,2024-11-05T19:36:41.127000 +CVE-2024-47006,1,1,fe2be82050e35ab3fd23ec2c1c4c4d51fb456392b8464b3d92ed967c4074fcdd,2025-02-12T22:15:39.453000 CVE-2024-47007,0,0,89fca0e021dd1dcdcc40431a1d37a47d29be0898f47767c4ce5f1f63d928d850,2024-10-16T13:23:03.467000 CVE-2024-47008,0,0,c3234378b4c9f9e8181fb1cd2d9194cd5eb402f69b194159ecc416569a5ef0ae,2024-10-16T13:24:32.130000 CVE-2024-47009,0,0,4ff1892829116a088472044089003c5524ee70bdbc79bf25ac8d489028da7a75,2024-10-16T13:26:39.990000 @@ -269706,13 +269773,13 @@ CVE-2024-49778,0,0,ce01f58133a3eca198de9ca85c44a1634d3ab246b582a1e70ee7b9bae211c CVE-2024-4978,0,0,de30ddfe983833699ad8e2f2543285ea22a567f389ca513dff29646a99a121fd,2025-01-27T21:42:09.123000 CVE-2024-49785,0,0,dcbbdbf2606fdedeb39b6a5ca475a1ee2b528c61106132a119120d628a37dbeb,2025-01-12T02:15:18.973000 CVE-2024-49791,0,0,436e3ec68e0463377f56d61753d1a9ed190ae95d7dd892d9e3c8a12bd564a16b,2025-02-12T18:59:58.627000 -CVE-2024-49792,0,1,a0e4ddf61c9d96412e29678542a33e746e861ad48c587ec37ecef9eff3dcd9cb,2025-02-12T19:00:51.357000 -CVE-2024-49793,0,1,fac1c55a65b5d3da27c6a329f82e430166d0b74adda812e4b78984a75cfb0d3a,2025-02-12T19:00:57.080000 -CVE-2024-49794,0,1,4188151a12ec309aa3d9591939eb9ec6161f375faaefbf12f00e48d0dbf555f6,2025-02-12T19:01:05.303000 -CVE-2024-49795,0,1,2488609fa172fd52eb1ebf78f585d1765abf8552c9dabc86a634a259eb443742,2025-02-12T19:01:17.880000 -CVE-2024-49796,0,1,b7bfd4c3884b82ac248c46b146158ab88310c5db2f7833537e8f79d8dc0b1827,2025-02-12T19:01:28.537000 -CVE-2024-49797,0,1,142e3c077cfb816fdf02e00e49040600ef6f61c85dd208b6f4e3dbd964c7d2f1,2025-02-12T19:17:11.273000 -CVE-2024-49798,0,1,586cc47b4ff15ea0e4cd830539c74d083debaf1034853fb6111b395ff5596189,2025-02-12T19:19:30.360000 +CVE-2024-49792,0,0,a0e4ddf61c9d96412e29678542a33e746e861ad48c587ec37ecef9eff3dcd9cb,2025-02-12T19:00:51.357000 +CVE-2024-49793,0,0,fac1c55a65b5d3da27c6a329f82e430166d0b74adda812e4b78984a75cfb0d3a,2025-02-12T19:00:57.080000 +CVE-2024-49794,0,0,4188151a12ec309aa3d9591939eb9ec6161f375faaefbf12f00e48d0dbf555f6,2025-02-12T19:01:05.303000 +CVE-2024-49795,0,0,2488609fa172fd52eb1ebf78f585d1765abf8552c9dabc86a634a259eb443742,2025-02-12T19:01:17.880000 +CVE-2024-49796,0,0,b7bfd4c3884b82ac248c46b146158ab88310c5db2f7833537e8f79d8dc0b1827,2025-02-12T19:01:28.537000 +CVE-2024-49797,0,0,142e3c077cfb816fdf02e00e49040600ef6f61c85dd208b6f4e3dbd964c7d2f1,2025-02-12T19:17:11.273000 +CVE-2024-49798,0,0,586cc47b4ff15ea0e4cd830539c74d083debaf1034853fb6111b395ff5596189,2025-02-12T19:19:30.360000 CVE-2024-4980,0,0,323b998d90112310b6dbc550d0fd2ce6571acbfdf9fd80fd9aad030f5e003b0f,2024-11-21T09:43:59.940000 CVE-2024-49800,0,0,c2e08020b86a0127deb4cad0f0d72546a923f7dec86c67481406e56d8f0cb7c3,2025-02-12T17:58:29.817000 CVE-2024-49803,0,0,dce2571c74ef2a0370fd776967085d9deabfc567ee6d4ba12e558c5f495e1b60,2025-01-29T21:23:51.343000 @@ -270759,6 +270826,8 @@ CVE-2024-51114,0,0,bb120dee5f82301bedd52f6a870fc78612d9b471bba9079cbb07365933b72 CVE-2024-51115,0,0,97924e30f339bc462ccaad1ee3c55c378e15485436cb0bc88676f0cde030376a,2024-11-06T18:17:17.287000 CVE-2024-51116,0,0,163c0d7988ca5329a27514b03075ee6d2fff2ef84e9d3dc466528f493b745f84,2024-11-06T18:17:17.287000 CVE-2024-5112,0,0,6fa0879d8573b55bb699ffd9db2627c7afd75bd2e7d239fd0cceb3b05bf24bd3,2024-11-21T09:46:59.737000 +CVE-2024-51122,1,1,8d7f8714f5f85a246af00bc880fa54ecb528503d494829283ffde699ad9da742,2025-02-12T22:15:39.603000 +CVE-2024-51123,1,1,ba78b170d31e1ee4ef7b69406ccf5942b77cd20acd802d7a760653500df989af,2025-02-12T22:15:39.717000 CVE-2024-51127,0,0,5c5f040ac9c1963b030c4696070e1ab6a5b9c29a6f9ce0ae7436199ee45f28e8,2024-11-21T09:45:17.017000 CVE-2024-5113,0,0,5f0d1848862cdf1df7ede964c3b4216fbb57f9b94204859b6a8da2ada96fab98,2024-11-21T09:46:59.870000 CVE-2024-51132,0,0,f5dcb22b7125a1b94089072dd6f184dd6f0e35c20d2f6ced62d92bb6eded7439,2024-11-06T20:35:34.173000 @@ -270834,7 +270903,7 @@ CVE-2024-51301,0,0,b66b641e4139e8ebaacd5ea6b531eed897a4506f18dea4aecced28d30671f CVE-2024-51304,0,0,1e110f5dd97c111e86ad4208bc6fd08aebd2d72d5bb280d26d0c29b8a309ef6b,2024-11-01T12:57:03.417000 CVE-2024-5131,0,0,da5e519e37c4c18d994f27345cf3977fa837f039bcfa4f9d0e1faf90c1e84ff4,2024-11-21T09:47:02.353000 CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97cb,2024-06-07T17:15:51.840000 -CVE-2024-51324,0,0,e2973655ebaf8b4b1eed94ce2804f19f02f235f516c8e912475c33a23ea8533b,2025-02-11T22:15:28.440000 +CVE-2024-51324,0,1,eae5779c3dbd2366931d9bbf9284e8b16a0b71d3d019224bd3ee356a90e26f8b,2025-02-12T22:15:39.830000 CVE-2024-51326,0,0,32849095581e0af021d41eb6c3bbf891e7ba8499eb2382e7af07f008ba32d1d0,2024-11-06T15:02:12.403000 CVE-2024-51327,0,0,5850f25922ddeec5e8ef2cdf5d18bbd20c5c5a49e7b4e65d69d89cf904135f25,2024-11-06T15:02:55.710000 CVE-2024-51328,0,0,c598eda234ee0eb68e5894b54bb2d2425a3f618d32de4ed43b4532e44e01e76b,2024-11-04T19:35:16.150000 @@ -270881,6 +270950,7 @@ CVE-2024-51431,0,0,828fd39fe0bf7bfec25d83e9c0a08cb7b9c4b5cc6704676ba7781e14660e7 CVE-2024-51432,0,0,90d6088b4b691a13d46bf67decae9a8dc78d3184ac661e87666bdc2bf7a4111b,2024-11-04T22:35:10.037000 CVE-2024-51434,0,0,fd0f2e493c6557b3a7b75698795afa3b125b8838b7989d6283ab0195617010c3,2024-11-08T19:01:03.880000 CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000 +CVE-2024-51440,1,1,c2a2db3bb34753f13b3578d79d926ef057dc249b8113a292988169a272cf5d07,2025-02-12T22:15:39.990000 CVE-2024-51442,0,0,663939a871d0d38a9b2a62d30b7d5c04a240d1619da5f372debf5ffd926c43c7,2025-01-08T20:15:28.137000 CVE-2024-51448,0,0,c4c37037bf93a1f94e04f7270f02afe30201acf9ed636bd7a8ba3baefef67f6e,2025-01-18T15:15:08.183000 CVE-2024-5145,0,0,026f2f79f883da59dbffb9dacf2ddcce01313f0fb97ba3b8dc804a5b33e0dd57,2025-02-10T13:57:18.723000 @@ -273224,7 +273294,7 @@ CVE-2024-54762,0,0,cb8e4aa44b5cf3cee838feac63d68a9bf187e0e1794dfb8457350541c6231 CVE-2024-54763,0,0,35fe6aeaf8ff2a2d9d1415d3e6f03dd3382c26dbe16edd942f9dacbafebc435a,2025-01-07T22:15:30.950000 CVE-2024-54764,0,0,7108368b95c8c33cd12f1a88712752ff55f9a1ed7ed83d67f4ddea2a12f4ec62,2025-01-07T22:15:31.113000 CVE-2024-54767,0,0,84c265d2aae9152ded289b8afe6572e4e60031d668299b365ef2804b7e7ac1df,2025-01-07T16:15:36.157000 -CVE-2024-54772,0,0,596a344d20e5016fe86f597976bbdf92a2ea5a5e50bbc7dbd6f918da880df294,2025-02-11T23:15:09.117000 +CVE-2024-54772,0,1,15ee2c55e7b8d4b5a34ddfd20373f69766975811e41631266ca6ca59f9bbcdb4,2025-02-12T22:15:40.110000 CVE-2024-54774,0,0,4ed84230e45b966235391401edd82584405ef683a3e2fc4ff18ea7ccdbfb6480,2024-12-28T18:15:10.397000 CVE-2024-54775,0,0,3fdaf8fe1f78335459cdc17721da7bdc51023f16b45ae3c005b68536d3244569,2024-12-28T17:15:07.733000 CVE-2024-5478,0,0,db0e3beae9848430f36a4effd5045d24657a32915031caa2ccdcaa2667957312,2024-11-21T09:47:45.637000 @@ -273352,7 +273422,7 @@ CVE-2024-55195,0,0,546a9e51a7867a35167c506a5c72d838220564687a80984ea6da5e4cdf030 CVE-2024-55196,0,0,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000 CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1ac4,2024-11-21T09:47:51.540000 CVE-2024-5521,0,0,2b6f458ccb1380159b254eccc510c8e2cee9041e86f89c2477b6805e666cde62,2024-11-21T09:47:51.653000 -CVE-2024-55212,0,0,344f8c23ecabf1887d9a975fbdfd5c7077f1f1e359ecaa23925c9945e17c7137,2025-02-11T22:15:29.063000 +CVE-2024-55212,0,1,a6af1d9be1703b0f0b2501aff2d7c70911c6d2698ddb1bb1c05cdf69cfd6a11e,2025-02-12T22:15:40.263000 CVE-2024-55213,0,0,8513bb831150e9b2f9c9331f3cff5332a4c865fee2137f33d93fa35cf6585b18,2025-02-11T16:15:42.720000 CVE-2024-55214,0,0,af8f46f257d87257d4e7d9c6b3b38d6b5afbf55bb0663eeb63d8323965dbc886,2025-02-11T16:15:42.910000 CVE-2024-55215,0,0,203ba3b88f1c1684dc8407da99d6c212d46fe9465840c31d9c317c1457f3dc9e,2025-02-08T03:15:11.687000 @@ -274301,7 +274371,10 @@ CVE-2024-56921,0,0,6774b39a988e50bba460b36475d3f9b61bedaeb83d3c538c52aba2bd62c30 CVE-2024-56923,0,0,e2647403e0cf85e5fccf746b53a51e00d5aac61312608ca59ffcd83f3ff65dd9,2025-01-28T23:15:08.067000 CVE-2024-56924,0,0,255fb5d959e1f1b6d9220b28e96e646f40e846b04df600718295ece436269b5a,2025-01-23T17:15:16.710000 CVE-2024-5693,0,0,21ec44ee8ed5f9de3ae93fab02d376513f10f0c9f8c82a8733146d6a99b0ff3a,2024-11-21T09:48:10.807000 +CVE-2024-56938,1,1,7311c2aa230afa98196c4cf1e8d469773d784c7a92ffc9973a7861855471227d,2025-02-12T22:15:40.430000 +CVE-2024-56939,1,1,4d68514f0e3e704b5c70a499eb5e3de186858e58c8f7d02e572fa5c557ed24a9,2025-02-12T22:15:40.530000 CVE-2024-5694,0,0,96312914234d61d70e9f2b2f2db102c559d8f68a0c34e1673db920a9b13837b6,2024-11-21T09:48:10.990000 +CVE-2024-56940,1,1,8602579e6e56defe6b3a07a307af514bc55d8d2f2cfde3bac72c0d4aa150905d,2025-02-12T22:15:40.643000 CVE-2024-56946,0,0,af9e881d063c5daf5a15e5df8041bc60d2da62760d3b549c99ac43411158444d,2025-02-03T20:15:33.743000 CVE-2024-56947,0,0,de2dbd42f02c6815b309904992c8d2e0ee10dbda0e015e0471bf9a8137017390,2025-01-28T20:15:51.500000 CVE-2024-56948,0,0,8742881b72f361dc2543476e98570b9c75cf607bb78be3d886dcff581e6d1279,2025-01-28T20:15:51.650000 @@ -274335,7 +274408,7 @@ CVE-2024-56997,0,0,b9e3b1a369f281014b3d6ae47db288812e253e2c05f0cfa169a74fad7957b CVE-2024-56998,0,0,f5f48efbc8b4fff5f7922bcdd7558331389f08761b2f0b3a0f88eaf8ce382ca8,2025-01-21T20:15:35.937000 CVE-2024-5700,0,0,03b60b2b2d02d40bfad068e0335a335857a618ee5b010c631028ca7b55a329d1,2024-11-21T09:48:11.903000 CVE-2024-57000,0,0,22ae1adeeb8dde49b9cab48884a03b2d82548286eed8225c13790358889d77d6,2025-02-12T16:15:42.317000 -CVE-2024-57004,0,1,33a0b0d1e68381c2f532216bd5b0302915286f3268a0db0f05849b63a54f698f,2025-02-12T20:15:35.330000 +CVE-2024-57004,0,0,33a0b0d1e68381c2f532216bd5b0302915286f3268a0db0f05849b63a54f698f,2025-02-12T20:15:35.330000 CVE-2024-5701,0,0,9915dfee3e359182f9adc135791d10f705664babe0d2fafe943bf47d66747252,2024-11-21T09:48:12.093000 CVE-2024-57011,0,0,e423cf8108eeaccf1a4a6a564034672c57143be7df30237f44f891951f76e1ce,2025-01-16T15:15:13.873000 CVE-2024-57012,0,0,9eeaeb247ea982bbb49160ccdf98082729e7cd26e86494fbb31016855f1607c5,2025-01-16T15:15:14.090000 @@ -274424,8 +274497,8 @@ CVE-2024-57226,0,0,13241ab5fcad4d8797ceadffb98a698582b96500669617b3e0cb2d147cf0e CVE-2024-57227,0,0,647d380c097e46d112c6c1fffa7a24d381c637a1d42abe27695321f81f5a0211,2025-01-16T18:15:25.373000 CVE-2024-57228,0,0,2b2ede4eee89a9d230ac4fe6f1506a12a678e5912df7ff0d6e847af20a26c5cd,2025-01-16T18:15:25.703000 CVE-2024-5723,0,0,e9a9bfbb365da81a3cbb0381b41b1530e9a21124d15e20f7ac8fec3dc25c5b02,2024-11-26T02:16:48.200000 -CVE-2024-57237,0,1,10a0a055ff6114ab5c31b296696f6a71ea30e20eb63b78fcf8047450271df36f,2025-02-12T20:15:35.483000 -CVE-2024-57238,0,1,a6b3be788c3bc4fc051e3d4d8b4703fb53567dec95099f9b84b95f6aa023a077,2025-02-12T20:15:35.620000 +CVE-2024-57237,0,0,10a0a055ff6114ab5c31b296696f6a71ea30e20eb63b78fcf8047450271df36f,2025-02-12T20:15:35.483000 +CVE-2024-57238,0,0,a6b3be788c3bc4fc051e3d4d8b4703fb53567dec95099f9b84b95f6aa023a077,2025-02-12T20:15:35.620000 CVE-2024-5724,0,0,3819aa5efba8f524b2e05daa0542d560ece04ca1ec3f26079bc1135d63d2a09c,2024-11-21T09:48:13.843000 CVE-2024-57241,0,0,5c64cff6bd474b14a868f65b3c5e4c58469f4a2f54ced72bf1adc091750b18fc,2025-02-11T22:15:29.233000 CVE-2024-57248,0,0,63bc83c581d829aea526a5d2b3021ae292975fb4c1ccbec5467f8650b7b23893,2025-02-10T18:15:32.563000 @@ -274547,6 +274620,11 @@ CVE-2024-57595,0,0,5ac192d4452b1b04f540486f14602420111ddc5ce9ebf1466c634ddcfa94e CVE-2024-57598,0,0,145a87ddac35d0fab6c2b623e0b0d68a323a745f638d00fa2e3ace232ac680ec,2025-02-06T16:15:41 CVE-2024-57599,0,0,3650e5d13310a5a98241782486c3741155577b25d34fc344734cf7f8392b2a8d,2025-02-06T21:15:21.760000 CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000 +CVE-2024-57601,1,1,287d52f462f4d565a43b772b5c56e83f4d59c2d7882d31265995dc0663c14bc1,2025-02-12T22:15:40.747000 +CVE-2024-57602,1,1,d53d2cf1c3fe8bff2fe33eb66efb3a4f78f0dd54e65783449a2283dd476a8227,2025-02-12T22:15:40.867000 +CVE-2024-57603,1,1,3f0917558bd52bcc3fe763e0d40e35d4c2f96ceb629a466a32d61351dd07a91f,2025-02-12T22:15:40.977000 +CVE-2024-57604,1,1,381be4592f3ea4a61ef133bff82feb8ada92edf1d76f04aee5a146b95025d403,2025-02-12T22:15:41.100000 +CVE-2024-57605,1,1,0d06ad77815fc03ce7f03efee24d3945693fd74ddc7697904d3d95c90ef79dda,2025-02-12T22:15:41.210000 CVE-2024-57606,0,0,9480535946f02c15350aecd5bbd6e6ae6034246858257c08d866403ff66c1f1b,2025-02-08T03:15:12.010000 CVE-2024-57609,0,0,7e89dbfffc522c22f84645f0c7d618897ea46d1866f82abe6573f3d9437ce18a,2025-02-10T22:15:36.660000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 @@ -277086,8 +277164,8 @@ CVE-2024-8368,0,0,9c55c9e28d2952b94e1493d052cf7ee5076d24a1d15543c845be2f39959260 CVE-2024-8369,0,0,a6d05ac94fd162bcee8803884a010b60435524cf6e0d9e13d056a1897ad22b6c,2024-09-26T15:43:20.720000 CVE-2024-8370,0,0,1b6bac9444369d568ddfbddb25744c951b88d06c10b7cf265c50fb8adce4fee7,2024-09-03T14:15:17.787000 CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e3907681,2024-09-03T13:15:05.500000 -CVE-2024-8372,0,1,44c699b1f3a3e29a193bc9101ff8d192db8f9758ab2c51fe9fafb4abd6243d71,2025-02-12T20:14:39.330000 -CVE-2024-8373,0,1,11487d08657f4ba3b88ea7448ca7eeca5854e7d9e363edc87b0e7b98253dceda,2025-02-12T20:15:05.360000 +CVE-2024-8372,0,0,44c699b1f3a3e29a193bc9101ff8d192db8f9758ab2c51fe9fafb4abd6243d71,2025-02-12T20:14:39.330000 +CVE-2024-8373,0,0,11487d08657f4ba3b88ea7448ca7eeca5854e7d9e363edc87b0e7b98253dceda,2025-02-12T20:15:05.360000 CVE-2024-8374,0,0,ca02cb1d8f9493301326b3f2ebcbf769706c4933bc89729cb22baf7e425cf724,2024-09-16T16:44:42.403000 CVE-2024-8375,0,0,4d78f1a2c02104b875b9478374ac70ac2e262ece5c36e6afeb9a4149af828c52,2024-09-20T12:30:17.483000 CVE-2024-8376,0,0,2a596cdf57a3c3c9b5e954b8f3ef3af6339157a4b697325d08d3921ae08e59f9,2024-11-15T17:21:02.327000 @@ -278484,6 +278562,11 @@ CVE-2025-0104,0,0,21c4318a0d99e7fa45fcf41d38940b721a051c25e3dcd31ab0543aa8393743 CVE-2025-0105,0,0,1d92b789c4ee5a1ce8b95be14f67c2ed638278c6036b1fd20d689cfe8ca07ce7,2025-01-11T03:15:22.317000 CVE-2025-0106,0,0,297e7d67cc0892af79dd6eab9f30b7cbc802b5a94f8e51453a83d44734601e5e,2025-01-11T03:15:22.490000 CVE-2025-0107,0,0,7d7cd1b21f8fb2e090759e9bfc5c26e45f105ad47403d57bcf7a1a7c6a786b02,2025-01-15T23:15:10.273000 +CVE-2025-0108,1,1,a98d521f6fc9815204a056a78c9140e8092ecd21a6bcd001c7853096139e3701,2025-02-12T21:15:16.290000 +CVE-2025-0109,1,1,8caad76d7819ec0b5a47e19b1ce8cfdb3c9152de9e16478c769300ecdcec8e09,2025-02-12T21:15:16.470000 +CVE-2025-0110,1,1,a5a85cc7dd76c25934da2148b2087b6f27ff9864879f33e74ecc0c60a8122be1,2025-02-12T21:15:16.630000 +CVE-2025-0111,1,1,2de04ba88c7fcc8a561411c0e867c1d1d2051d9c20764ea5714502330e66d77e,2025-02-12T21:15:16.793000 +CVE-2025-0113,1,1,8ce02cd2cdc039781a571f0925aba9d355070f046b78d2508b53e6375fd7f1e4,2025-02-12T21:15:16.950000 CVE-2025-0142,0,0,79348507832bccb3dfb1eba9563d5795fbadbc3e9e1a05cb5ea2a751abd30411,2025-01-30T20:15:33.853000 CVE-2025-0143,0,0,09ad13005701a80a3a5816ecb54ffa484521fbf4e695c8cfa61de5a2bf3b5e04,2025-01-30T20:15:34.050000 CVE-2025-0144,0,0,b469d06026fa315960ae1810bc5062e8f3147e0d9b9578adc31dd388525d8f25,2025-01-30T20:15:34.210000 @@ -278879,24 +278962,24 @@ CVE-2025-0880,0,0,c12e2a46de37af2c312b8e3728a724b2552e715b0e742ce54a8ac8366d35c8 CVE-2025-0881,0,0,c0b87ae49840b2495e4993b7143628de7aaa51e127538c05ffa700ec31c486f2,2025-01-30T22:15:09.950000 CVE-2025-0882,0,0,f8cdd5be4a5ead42b24a22ef4df5e88faf0b516030bc2a511e27ba50d819cc7f,2025-01-30T21:15:14.820000 CVE-2025-0890,0,0,68df14f89e9fe80a79d0a5c45e2ac7eb09be58559d3bae2cdceaf342154a05c6,2025-02-04T11:15:08.880000 -CVE-2025-0899,0,1,d8701cd2c405f04761906304023370caa539e5fcf15c63a9325dc062ea45abed,2025-02-12T19:00:59.227000 -CVE-2025-0901,0,1,8576e90f3f88086e5daf580b6c523f255280985c9bdf2649941334bc2c0fff8f,2025-02-12T19:00:52.577000 -CVE-2025-0902,0,1,d3b3b12c4b0c7e57e30c3d4cf431b37a3914287ec889acdcd9941b6c82bdf01c,2025-02-12T19:00:34.533000 -CVE-2025-0903,0,1,2442a443e125ef7e648498e7307ff2bb748d73f07ab60efb26ac0000960fd5cd,2025-02-12T19:00:43.213000 -CVE-2025-0904,0,1,bdde48f81925e998d185f86c2fd9e9e7cb1e2c90502e33a327989a6f3556c363,2025-02-12T19:00:25.500000 +CVE-2025-0899,0,0,d8701cd2c405f04761906304023370caa539e5fcf15c63a9325dc062ea45abed,2025-02-12T19:00:59.227000 +CVE-2025-0901,0,0,8576e90f3f88086e5daf580b6c523f255280985c9bdf2649941334bc2c0fff8f,2025-02-12T19:00:52.577000 +CVE-2025-0902,0,0,d3b3b12c4b0c7e57e30c3d4cf431b37a3914287ec889acdcd9941b6c82bdf01c,2025-02-12T19:00:34.533000 +CVE-2025-0903,0,0,2442a443e125ef7e648498e7307ff2bb748d73f07ab60efb26ac0000960fd5cd,2025-02-12T19:00:43.213000 +CVE-2025-0904,0,0,bdde48f81925e998d185f86c2fd9e9e7cb1e2c90502e33a327989a6f3556c363,2025-02-12T19:00:25.500000 CVE-2025-0905,0,0,05042d1b82a8283ae6d9b58778fea8255405ce7a45d2808e61c6bc4ac0008a31,2025-02-12T19:00:08.500000 CVE-2025-0906,0,0,ba048b418cbc6e80247d45c75bdcfa0e2acba473f2ff1dd8f83fc408203ab65d,2025-02-12T18:59:53.950000 CVE-2025-0907,0,0,f6fa15cad071a41b1978a4125f00263a945147c04484a51808242e3798d2c0a2,2025-02-12T18:59:44.813000 CVE-2025-0908,0,0,d299598e6a9f28ce78543471bc7557b8f443bf108ba075d719a9c0a22f15b664,2025-02-12T18:59:38.310000 CVE-2025-0909,0,0,1ff7d78519026d4b0df5324b5b84f781600c6266238b96b6e6fda4fafcd94e70,2025-02-12T18:59:31.043000 CVE-2025-0910,0,0,5441c161f7257bb6355c09b7b0bb2df312d9b6c6d59e58e837649ec8c68777c9,2025-02-12T18:59:18.447000 -CVE-2025-0911,0,1,b9aa939093c00e0782e255aa47e49c2cf1d4559eb848b6a9c47f1e00b8bd8fad,2025-02-12T19:00:17 +CVE-2025-0911,0,0,b9aa939093c00e0782e255aa47e49c2cf1d4559eb848b6a9c47f1e00b8bd8fad,2025-02-12T19:00:17 CVE-2025-0919,0,0,f3c40a8c3e9859b98dc4dbb233022019405b6bb3a32be39636bc5e978bd23a1b,2025-02-12T17:15:23.357000 CVE-2025-0925,0,0,96e6ae1415f7de21f9d2302b09edfb8f35c8ed2d838c20a02e0bb3cb8fbcd173,2025-02-12T17:15:23.437000 CVE-2025-0929,0,0,bcacb82faee52c17b22479d26474b4df04f76f99e634ac515f50cccea0dc9587,2025-01-31T14:15:34.130000 CVE-2025-0930,0,0,e48470a5aeaab134703b9f1449e9c6f114cca0e6b49cd331dee21f5acc590fd8,2025-01-31T14:15:34.293000 CVE-2025-0934,0,0,7e8683a58aa69f3607600fa24f0df4be73434b45019b29527732747368e49539,2025-01-31T20:15:32.893000 -CVE-2025-0937,1,1,c2febc39ba7039d7446b8084aab3d9ac16dd1d6ec21592225a9effa018bef79a,2025-02-12T19:15:09.687000 +CVE-2025-0937,0,0,c2febc39ba7039d7446b8084aab3d9ac16dd1d6ec21592225a9effa018bef79a,2025-02-12T19:15:09.687000 CVE-2025-0938,0,0,48d7b602c8da430d9ec862aa287f133d1b7490f6d69b5ae38b3ee95dfcfec97c,2025-02-04T21:15:27.543000 CVE-2025-0939,0,0,28d2406d605622b3fbc49fa6171276fa25760e3bd2ac1d84f70bc76790a21a34,2025-02-01T07:15:08.097000 CVE-2025-0943,0,0,812d30b4c0a4e8e8699f3b3fb871a6a6493f30967e63a2f74a7571847c91c34d,2025-02-07T14:03:39.237000 @@ -278917,7 +279000,7 @@ CVE-2025-0973,0,0,43196315f17909695c2c467d44bd1754687d87efefe1c24665042841ac303a CVE-2025-0974,0,0,ed110dbaf1b5b967bb38884e7ebb961da1c8692b7e1576cd2f418134ffba9e99,2025-02-03T02:15:26.433000 CVE-2025-0982,0,0,be714403c41df1b58b29dfa08b8493679736da0364fe42e9c8be69cf302eee77,2025-02-06T12:15:27.267000 CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000 -CVE-2025-0994,0,1,b317a7cd26062958ea654021aa4ef82b6a50be87030a20bb16c21acb6e3b9a13,2025-02-12T19:29:30.383000 +CVE-2025-0994,0,0,b317a7cd26062958ea654021aa4ef82b6a50be87030a20bb16c21acb6e3b9a13,2025-02-12T19:29:30.383000 CVE-2025-1002,0,0,097b693cf6e6da4f2efcfda18e249d6b1ec6f434d7395ccdf77c9535d2f5380a,2025-02-10T21:15:21.830000 CVE-2025-1003,0,0,a253a97b9e0ffcf187092a253ddad8abdb5c903dd7624752d4fb1eb824915a62,2025-02-04T00:15:33.940000 CVE-2025-1004,0,0,6f061b895500ed91cec90db1af15e345ede4eb7fac7c03b984a9a8579e8bc1ab,2025-02-06T21:15:22.247000 @@ -278973,7 +279056,7 @@ CVE-2025-1126,0,0,ac34739323025c4c7f854301a59aeb7a01e0044b8a614b1eb6ca04a3bf3e52 CVE-2025-1143,0,0,cf6829feb10345ea71b62432401971d49126684b4610feaa78056b6c8cd225ba,2025-02-11T06:15:20.100000 CVE-2025-1144,0,0,4ecaa810d4fd510349bbf6a68a8246e614640b7f5ecf5c631efab346c1784c83,2025-02-11T06:15:20.310000 CVE-2025-1145,0,0,291947fade0cffb129bd8c95706eb4204650daf54e10f06564bcad68383f4891,2025-02-11T06:15:20.510000 -CVE-2025-1146,1,1,e4906d3337db28bc1a8ae129536de37647cf6eaaacf09a8eed8d0f6cb4086a7d,2025-02-12T19:15:09.840000 +CVE-2025-1146,0,0,e4906d3337db28bc1a8ae129536de37647cf6eaaacf09a8eed8d0f6cb4086a7d,2025-02-12T19:15:09.840000 CVE-2025-1147,0,0,ac657af6dc6d253e9c6167f189e29837fb9d62d7a90238af71fb6d10e6bd5f18,2025-02-10T14:15:29.643000 CVE-2025-1148,0,0,090ea5122508cf63d924d66bccd727c583a85a801badd8a7175e0402840f7b59,2025-02-10T14:15:29.927000 CVE-2025-1149,0,0,26deaf1be61074c40ebd710b10a86f6e43cf48fb43cf9a56fb9546cd2180bbd0,2025-02-10T15:15:13.093000 @@ -279035,11 +279118,15 @@ CVE-2025-1210,0,0,2e292c0723726264658fe8f8f32c69df9a1b75b6c58f1e3892f3ec6ccd53e9 CVE-2025-1211,0,0,6ad766f197b6f1fef6e3f3a893bb15bcbebd409cf163deb595b57c10dde2bea9,2025-02-11T16:15:50.660000 CVE-2025-1212,0,0,98d80cb73dedae96f8bcc23c42b9fd82cdc0bbfed669e845fdc4caee22b5a462,2025-02-12T15:15:18.290000 CVE-2025-1213,0,0,68b0c9e37f46f9aec77275fa9abd0f6d730345a74d8832c46c0ff993ad281706,2025-02-12T18:15:22.180000 -CVE-2025-1214,0,1,d0dbf99c9d9079cfaedc03a146be5c033e583b05a5f5b5fb2e92a87431b49ac7,2025-02-12T20:15:39.200000 -CVE-2025-1215,1,1,84e403de23fb78c292061d6d436701f1a64eb200dbdbacdce627acd10765a8a5,2025-02-12T20:15:39.773000 -CVE-2025-1216,1,1,ea57dc514d69c23027ab2d968b2a1ca1d678c815cd32b6da97cf70f00e696c73,2025-02-12T20:15:39.907000 -CVE-2025-1224,1,1,389f17c7b34f59f858fa6a150d42995ba7f054550cc94d814c02b4f054197c97,2025-02-12T20:15:40.030000 -CVE-2025-1225,1,1,09d7de95f59443fefca73bfef618153faa9192255b899bb38153abdbf4ab6d78,2025-02-12T20:15:40.203000 +CVE-2025-1214,0,0,d0dbf99c9d9079cfaedc03a146be5c033e583b05a5f5b5fb2e92a87431b49ac7,2025-02-12T20:15:39.200000 +CVE-2025-1215,0,0,84e403de23fb78c292061d6d436701f1a64eb200dbdbacdce627acd10765a8a5,2025-02-12T20:15:39.773000 +CVE-2025-1216,0,0,ea57dc514d69c23027ab2d968b2a1ca1d678c815cd32b6da97cf70f00e696c73,2025-02-12T20:15:39.907000 +CVE-2025-1224,0,0,389f17c7b34f59f858fa6a150d42995ba7f054550cc94d814c02b4f054197c97,2025-02-12T20:15:40.030000 +CVE-2025-1225,0,0,09d7de95f59443fefca73bfef618153faa9192255b899bb38153abdbf4ab6d78,2025-02-12T20:15:40.203000 +CVE-2025-1226,1,1,6edf890439ca8443e37a6729af1ec322de0291abbd98bfd27e0f84c1db629762,2025-02-12T21:15:20.470000 +CVE-2025-1227,1,1,d3e1f70aa5ee09789935127068557d0d5efb43c517c0ad3cde41799b5688d9c9,2025-02-12T22:15:41.383000 +CVE-2025-1228,1,1,43a57e2306865443f0b8d3988d5208d10ad617b0dd70270672e7929f9fbcdad8,2025-02-12T22:15:41.493000 +CVE-2025-1229,1,1,5c65c46d85a4f9f71b77d266af370dabe4b2571fa85e455a46c4eae0ca016f5d,2025-02-12T22:15:41.667000 CVE-2025-1230,0,0,f5f2c5099eb280f9d04dd16fe504952a8bf38601f6c57755a8e738275e60ce0c,2025-02-12T11:15:11.230000 CVE-2025-1231,0,0,649e1b02ffb9b2bdea0c0d5302a32991e98ee2dd95c7154e6cc11a5ff00876a1,2025-02-11T15:15:20.643000 CVE-2025-1240,0,0,9246fa8e04ff02b401e811c0a0ea877726af12834c8315ffa6c43657c8f2f12a,2025-02-11T22:15:29.800000 @@ -279058,6 +279145,7 @@ CVE-2025-20072,0,0,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02 CVE-2025-20086,0,0,c718ee138c5d706935ee7319c465eb1db60c32a8ee92f074be268892106cc0d1,2025-01-15T17:15:19.107000 CVE-2025-20088,0,0,d069a0a8d0e55448ae448cb2d1bba620f97cc6785542779fdc1ef2f2206cb89e,2025-01-15T17:15:19.243000 CVE-2025-20094,0,0,e204a57f0b42357a3efdbbd9c78b2d6f4d02a510cb736699d3adac3b0a05dc60,2025-02-06T08:15:29.837000 +CVE-2025-20097,1,1,fd9eed4577e183674abbdfa5c9c0f05686f1fd64de63e8bcd2ea55d2a30d52ad,2025-02-12T22:15:41.850000 CVE-2025-20123,0,0,de0e2ee9204f4a04ceea1910b99fa9c19c34866a6ef4e69299265f979ffad510,2025-01-08T16:15:38.150000 CVE-2025-20124,0,0,c61be0600f9e75108d3058bd1baef93ee81e32f210f69479421489ea572c85f7,2025-02-05T17:15:22.457000 CVE-2025-20125,0,0,ed33092cfcef37dd0a157b5b9a9884d097795a37602ec9090176987ad141fb4e,2025-02-05T17:15:22.610000 @@ -279368,7 +279456,7 @@ CVE-2025-21392,0,0,faf0d0e3f0fb591c7fa30ae6371bf66c37572648e7b14e075224882a96d45 CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000 CVE-2025-21394,0,0,17cc60461eb9eb8df29e62503902c081c32c2e62dd8a0d75bc2ce09b707ad17e,2025-02-11T18:15:38.100000 CVE-2025-21395,0,0,285bdf7d424a0a4417061117147cedf81e1e126360de2186348f6c8fe5b92f8d,2025-01-17T15:46:01.927000 -CVE-2025-21396,0,1,02c0d56bd41ecdabdfe6ce22c5c5e978e70b99d6624ab2be1d0aabfacb417d10,2025-02-12T19:15:20.880000 +CVE-2025-21396,0,0,02c0d56bd41ecdabdfe6ce22c5c5e978e70b99d6624ab2be1d0aabfacb417d10,2025-02-12T19:15:20.880000 CVE-2025-21397,0,0,9ecb0c7d039fe2e63559eaf6ac83dc079616dbd9f0eb6678515bdbfd41ab0c31,2025-02-11T18:15:38.293000 CVE-2025-21399,0,0,f94f6647dfbca1fa188350cabbc49dc6fa4498708cee05fd2499c6da322431d0,2025-01-31T02:15:37.700000 CVE-2025-21400,0,0,9148012217da2acacd349e8961893cd2430baa039bda4458d9a5cd4939c44890,2025-02-11T18:15:38.483000 @@ -281013,16 +281101,16 @@ CVE-2025-25194,0,0,3cfb92d0adf1aa48727a5bef815057c2df69f4fc0b8dbd2b306994cdf6b88 CVE-2025-25198,0,0,d4f423b8575a2b0e0c47d1cd874c15fb2da6a6a46ceaec62c0bfc272e6cf57b7,2025-02-12T18:15:27.757000 CVE-2025-25199,0,0,55e40815cd021635d25d7610751f977ce7b772f67293cccb8c9a688735660385,2025-02-12T18:15:27.933000 CVE-2025-25200,0,0,d6d93214f4d6798953c0e0fa47b183b15bf44476b4a6776cbce9ace0bba1be52,2025-02-12T18:15:28.110000 -CVE-2025-25201,1,1,ede8016b22c20a5da1c3168daf6048debc3bf82c814cff603e6090c3dcc1680e,2025-02-12T19:15:21.570000 +CVE-2025-25201,0,0,ede8016b22c20a5da1c3168daf6048debc3bf82c814cff603e6090c3dcc1680e,2025-02-12T19:15:21.570000 CVE-2025-25202,0,0,44a9f4b6846ddccd75106a09a7d9e63e6d44f1833e59d9edfd1f84930b624155,2025-02-11T19:15:18.690000 CVE-2025-25203,0,0,fafc3c78a1f4e39a87b4d68e2295b38c2910ef2359dd9409bb1510258a4c87e7,2025-02-11T23:15:09.450000 -CVE-2025-25205,1,1,e11d363a7c34c04aeb358dd5ff34494ef66003966c6cc6b33481bd348b2d737c,2025-02-12T19:15:21.717000 +CVE-2025-25205,0,0,e11d363a7c34c04aeb358dd5ff34494ef66003966c6cc6b33481bd348b2d737c,2025-02-12T19:15:21.717000 CVE-2025-25241,0,0,3f1a5e9f52cb19b464445ba11bc8902290ee3de6281565f07fab135133fb799f,2025-02-11T06:15:24.120000 CVE-2025-25243,0,0,4a1fb2a2f647dbb24d92bc1eec2013806163e245973af288dc8e801924ea4b36,2025-02-11T06:15:24.330000 CVE-2025-25246,0,0,0ae0916aaea4283fe6ce79729127d0aa8edfdf07242f3416b5c2d5ec885c2c98,2025-02-05T05:15:11.663000 CVE-2025-25247,0,0,2690485555121cc3195beb93ff27e2a62b28c4f65e937f10f15ef11f9c4f824a,2025-02-10T15:15:13.333000 -CVE-2025-25283,1,1,418e2966a3d119d4f87e4a326f631343b9aaeb0f00ae68b4b613b17ef82e0256,2025-02-12T19:15:21.863000 -CVE-2025-25343,1,1,165ee3c898301f2db8f607c24a899fe7668a5762e7942c4695c7dfe0dda59857,2025-02-12T19:15:22.003000 +CVE-2025-25283,0,0,418e2966a3d119d4f87e4a326f631343b9aaeb0f00ae68b4b613b17ef82e0256,2025-02-12T19:15:21.863000 +CVE-2025-25343,0,0,165ee3c898301f2db8f607c24a899fe7668a5762e7942c4695c7dfe0dda59857,2025-02-12T19:15:22.003000 CVE-2025-25349,0,0,1719e1721d7487688b7bcc870b24d655aa6de7ad5dd7048ecc08987a1985507b,2025-02-12T16:15:46.323000 CVE-2025-25351,0,0,cdcd8e58bc2d04652968c3d47eedc1a7504f4c099db31cb878d22be60d38fffe,2025-02-12T16:15:46.453000 CVE-2025-25522,0,0,134d853c7acffe14f61ea9663eafcc5a3836051c19c8c173c6beae54efc4aa8e,2025-02-11T19:15:18.883000