diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20704.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20704.json index 455d4e991d0..42c4eb781e4 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20704.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20704.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20704", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.870", - "lastModified": "2024-11-21T07:41:23.280", + "lastModified": "2025-01-24T20:15:27.600", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20705.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20705.json index 2aa0d599fc3..cbbba82aac6 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20705.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20705.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20705", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.910", - "lastModified": "2024-11-21T07:41:23.380", + "lastModified": "2025-01-24T20:15:27.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20706.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20706.json index 5dc72f70c16..e74e69e1c9d 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20706.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20706.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20706", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.947", - "lastModified": "2024-11-21T07:41:23.507", + "lastModified": "2025-01-24T20:15:27.920", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20707.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20707.json index 71a7ff67c84..53b22938ceb 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20707.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20707.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20707", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.993", - "lastModified": "2024-11-21T07:41:23.620", + "lastModified": "2025-01-24T20:15:28.073", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20708.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20708.json index b3fda56f472..bbaa602538e 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20708.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20708.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20708", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.033", - "lastModified": "2024-11-21T07:41:23.737", + "lastModified": "2025-01-24T20:15:28.243", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20709.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20709.json index bf932644cac..396657f7f4d 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20709.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20709.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20709", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.073", - "lastModified": "2024-11-21T07:41:23.847", + "lastModified": "2025-01-24T20:15:28.400", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20710.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20710.json index 395d7bb6388..25151f1151e 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20710.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20710.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20710", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.113", - "lastModified": "2024-11-21T07:41:23.967", + "lastModified": "2025-01-24T19:15:11.013", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20711.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20711.json index d8584a5ff17..66475280067 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20711.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20711.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20711", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.150", - "lastModified": "2024-11-21T07:41:24.080", + "lastModified": "2025-01-24T19:15:11.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20722.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20722.json index 1298335ef12..bb02373a308 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20722.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20722.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20722", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.390", - "lastModified": "2024-11-21T07:41:25.093", + "lastModified": "2025-01-24T19:15:11.707", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25006.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25006.json index 55cbe49d39b..d8d189622f3 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25006.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25006.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25006", "sourceIdentifier": "psirt@autodesk.com", "published": "2023-05-12T21:15:09.267", - "lastModified": "2024-11-21T07:48:55.110", + "lastModified": "2025-01-24T20:15:28.567", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25007.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25007.json index 61e0b4b46be..3f27fecade2 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25007.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25007.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25007", "sourceIdentifier": "psirt@autodesk.com", "published": "2023-05-12T21:15:09.307", - "lastModified": "2024-11-21T07:48:55.217", + "lastModified": "2025-01-24T20:15:28.733", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-824" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-824" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25008.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25008.json index 00e90d3ee25..622a12e42e9 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25008.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25008.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25008", "sourceIdentifier": "psirt@autodesk.com", "published": "2023-05-12T21:15:09.343", - "lastModified": "2024-11-21T07:48:55.320", + "lastModified": "2025-01-24T20:15:28.890", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25009.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25009.json index 5ffa582003e..8840151f61b 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25009.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25009.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25009", "sourceIdentifier": "psirt@autodesk.com", "published": "2023-05-12T21:15:09.383", - "lastModified": "2024-11-21T07:48:55.420", + "lastModified": "2025-01-24T20:15:29.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25428.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25428.json index 54e88b7a2cd..dd9e993d4d5 100644 --- a/CVE-2023/CVE-2023-254xx/CVE-2023-25428.json +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25428.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25428", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T16:15:09.513", - "lastModified": "2024-11-21T07:49:29.863", + "lastModified": "2025-01-24T20:15:29.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-272xx/CVE-2023-27237.json b/CVE-2023/CVE-2023-272xx/CVE-2023-27237.json index fb3886f185d..7d6c64bc6af 100644 --- a/CVE-2023/CVE-2023-272xx/CVE-2023-27237.json +++ b/CVE-2023/CVE-2023-272xx/CVE-2023-27237.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27237", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T11:15:12.773", - "lastModified": "2024-11-21T07:52:30.230", + "lastModified": "2025-01-24T20:15:29.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27823.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27823.json index d32b1c78b00..4206ecc603a 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27823.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27823.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27823", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T14:15:09.727", - "lastModified": "2024-11-21T07:53:32.453", + "lastModified": "2025-01-24T20:15:29.567", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-296xx/CVE-2023-29657.json b/CVE-2023/CVE-2023-296xx/CVE-2023-29657.json index 811f6b1cf2c..a4c702b0670 100644 --- a/CVE-2023/CVE-2023-296xx/CVE-2023-29657.json +++ b/CVE-2023/CVE-2023-296xx/CVE-2023-29657.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29657", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T11:15:12.850", - "lastModified": "2024-11-21T07:57:22.643", + "lastModified": "2025-01-24T20:15:29.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29790.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29790.json index 45226f55aa3..bafcc41e322 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29790.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29790.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29790", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T01:15:09.667", - "lastModified": "2024-11-21T07:57:30.977", + "lastModified": "2025-01-24T20:15:29.987", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-302xx/CVE-2023-30247.json b/CVE-2023/CVE-2023-302xx/CVE-2023-30247.json index 61f1ec5cc4d..1e40a2a02ad 100644 --- a/CVE-2023/CVE-2023-302xx/CVE-2023-30247.json +++ b/CVE-2023/CVE-2023-302xx/CVE-2023-30247.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30247", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T19:15:08.907", - "lastModified": "2024-11-21T07:59:56.410", + "lastModified": "2025-01-24T20:15:30.177", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-303xx/CVE-2023-30330.json b/CVE-2023/CVE-2023-303xx/CVE-2023-30330.json index 00b511ba760..05e9deb812c 100644 --- a/CVE-2023/CVE-2023-303xx/CVE-2023-30330.json +++ b/CVE-2023/CVE-2023-303xx/CVE-2023-30330.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30330", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T01:15:09.903", - "lastModified": "2024-11-21T08:00:02.900", + "lastModified": "2025-01-24T20:15:30.353", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31913.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31913.json index ebaa8ca9c1c..c3e412b5e29 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31913.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31913.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31913", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T14:15:09.773", - "lastModified": "2024-11-21T08:02:23.093", + "lastModified": "2025-01-24T20:15:30.967", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-617" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31914.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31914.json index 8ce99d99363..15092eaef06 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31914.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31914.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31914", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T14:15:09.807", - "lastModified": "2024-11-21T08:02:23.230", + "lastModified": "2025-01-24T20:15:31.147", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31918.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31918.json index 014971418d9..7958af15b89 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31918.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31918.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31918", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T14:15:09.890", - "lastModified": "2024-11-21T08:02:23.490", + "lastModified": "2025-01-24T20:15:31.320", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-617" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31919.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31919.json index 8d3396ec93f..a730348deae 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31919.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31919.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31919", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T14:15:09.927", - "lastModified": "2024-11-21T08:02:23.620", + "lastModified": "2025-01-24T20:15:31.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-617" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37029.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37029.json index 7edfac21835..10de26c018e 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37029.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37029.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37029", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:10.117", - "lastModified": "2025-01-23T20:15:31.297", - "vulnStatus": "Modified", + "lastModified": "2025-01-24T19:10:35.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -91,8 +91,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:magmacore:magma:*:*:*:*:*:*:*:*", - "versionEndExcluding": "1.9", - "matchCriteriaId": "40C11F3D-EB3B-4706-8B9A-6B5BBA495DE6" + "versionEndIncluding": "1.8.0", + "matchCriteriaId": "D797176E-A66B-4A63-9D8F-26FE241EB255" } ] } diff --git a/CVE-2023/CVE-2023-464xx/CVE-2023-46400.json b/CVE-2023/CVE-2023-464xx/CVE-2023-46400.json index 7e25bf5441c..6117a05ac48 100644 --- a/CVE-2023/CVE-2023-464xx/CVE-2023-46400.json +++ b/CVE-2023/CVE-2023-464xx/CVE-2023-46400.json @@ -2,20 +2,63 @@ "id": "CVE-2023-46400", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T22:15:12.200", - "lastModified": "2025-01-23T22:15:12.200", - "vulnStatus": "Received", + "lastModified": "2025-01-24T20:15:31.663", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "KWHotel 0.47 is vulnerable to CSV Formula Injection in the add guest function." + }, + { + "lang": "es", + "value": "KWHotel 0.47 es vulnerable a la inyecci\u00f3n de f\u00f3rmulas CSV en la funci\u00f3n de agregar invitado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1236" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/6en6ar/5d39374d6ced8acbe489e0b1b932d056", "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/6en6ar/5d39374d6ced8acbe489e0b1b932d056", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11053.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11053.json index d983997cc5a..ee03cd93da9 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11053.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11053.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11053", "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2024-12-11T08:15:05.307", - "lastModified": "2024-12-15T17:15:05.273", + "lastModified": "2025-01-24T20:15:31.920", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2024/12/11/1", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250124-0012/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12117.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12117.json index 3de7b2661bf..0f089479d24 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12117.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12117.json @@ -2,20 +2,24 @@ "id": "CVE-2024-12117", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-22T07:15:14.987", - "lastModified": "2025-01-22T07:15:14.987", - "vulnStatus": "Received", + "lastModified": "2025-01-24T19:05:36.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Stackable \u2013 Page Builder Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title' parameter of the Button block in all versions up to, and including, 3.13.11 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Stackable \u2013 Page Builder Gutenberg Blocks para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'title' del bloque Button en todas las versiones hasta la 3.13.11 y incluida, debido a un escape de entrada y salida insuficiente de desinfecci\u00f3n. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -47,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gambit:stackable:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.13.12", + "matchCriteriaId": "17F45D7F-8462-402E-8A73-06E435F5D32A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3223387%40stackable-ultimate-gutenberg-blocks&new=3223387%40stackable-ultimate-gutenberg-blocks&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bedc2254-29aa-46c5-8f85-47dd6affb42b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12857.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12857.json index eb213bcdef4..e933656e50e 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12857.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12857.json @@ -2,19 +2,43 @@ "id": "CVE-2024-12857", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-22T07:15:16.237", - "lastModified": "2025-01-22T07:15:16.237", - "vulnStatus": "Received", + "lastModified": "2025-01-24T19:18:01.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AdForest theme for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.1.8. This is due to the plugin not properly verifying a user's identity prior to logging them in as that user. This makes it possible for unauthenticated attackers to authenticate as any user as long as they have configured OTP login by phone number." + }, + { + "lang": "es", + "value": "El tema AdForest para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en todas las versiones hasta la 5.1.8 y incluida. Esto se debe a que el complemento no verifica correctamente la identidad de un usuario antes de iniciar sesi\u00f3n como ese usuario. Esto hace posible que atacantes no autenticados se autentiquen como cualquier usuario siempre que haya configurado el inicio de sesi\u00f3n OTP por n\u00famero de tel\u00e9fono." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -38,23 +62,57 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-288" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:scriptsbundle:adforest:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.1.9", + "matchCriteriaId": "84F07AB5-D52E-4214-BB56-E64AEDF3E2DB" + } + ] + } + ] } ], "references": [ { "url": "https://themeforest.net/item/adforest-classified-wordpress-theme/19481695", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4ff3b4f1-dd36-43d0-b472-55a940907437?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13176.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13176.json index 31028d882a1..fa7a2c2f1ec 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13176.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13176.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13176", "sourceIdentifier": "openssl-security@openssl.org", "published": "2025-01-20T14:15:26.247", - "lastModified": "2025-01-20T17:15:07.667", - "vulnStatus": "Received", + "lastModified": "2025-01-24T20:15:32.150", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Issue summary: A timing side-channel which could potentially allow recovering\nthe private key exists in the ECDSA signature computation.\n\nImpact summary: A timing side-channel in ECDSA signature computations\ncould allow recovering the private key by an attacker. However, measuring\nthe timing would require either local access to the signing application or\na very fast network connection with low latency.\n\nThere is a timing signal of around 300 nanoseconds when the top word of\nthe inverted ECDSA nonce value is zero. This can happen with significant\nprobability only for some of the supported elliptic curves. In particular\nthe NIST P-521 curve is affected. To be able to measure this leak, the attacker\nprocess must either be located in the same physical computer or must\nhave a very fast network connection with low latency. For that reason\nthe severity of this vulnerability is Low." + }, + { + "lang": "es", + "value": "Resumen del problema: Existe un canal lateral de temporizaci\u00f3n que potencialmente podr\u00eda permitir recuperar la clave privada en el c\u00e1lculo de la firma ECDSA. Resumen del impacto: Un canal lateral de temporizaci\u00f3n en los c\u00e1lculos de firmas ECDSA podr\u00eda permitir que un atacante recupere la clave privada. Sin embargo, para medir el tiempo se necesitar\u00eda acceso local a la aplicaci\u00f3n de firma o una conexi\u00f3n de red muy r\u00e1pida con baja latencia. Hay una se\u00f1al de tiempo de alrededor de 300 nanosegundos cuando la palabra superior del valor nonce ECDSA invertido es cero. Esto puede suceder con una probabilidad significativa s\u00f3lo para algunas de las curvas el\u00edpticas admitidas. En particular, la curva NIST P-521 se ve afectada. Para poder medir esta fuga, el proceso atacante debe estar ubicado en la misma computadora f\u00edsica o debe tener una conexi\u00f3n de red muy r\u00e1pida con baja latencia. Por esa raz\u00f3n la severidad de esta vulnerabilidad es Baja." } ], "metrics": {}, @@ -60,6 +64,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/01/20/2", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250124-0005/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13447.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13447.json index b7bade32332..4296985542d 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13447.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13447.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13447", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-22T11:15:07.777", - "lastModified": "2025-01-22T11:15:07.777", - "vulnStatus": "Received", + "lastModified": "2025-01-24T20:53:40.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Hotel Booking plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the hotel_booking_load_order_user AJAX action in all versions up to, and including, 2.1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve a list of registered user emails." + }, + { + "lang": "es", + "value": "El complemento WP Hotel Booking para WordPress es vulnerable al acceso no autorizado a los datos debido a una verificaci\u00f3n de capacidad faltante en la acci\u00f3n AJAX hotel_booking_load_order_user en todas las versiones hasta la 2.1.6 y incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, recuperen una lista de correos electr\u00f3nicos de usuarios registrados." } ], "metrics": { @@ -47,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thimpress:wp_hotel_booking:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.7", + "matchCriteriaId": "D61D1CCB-7B92-4DAB-9BE2-5BEE05FF087C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-hotel-booking/trunk/assets/js/admin/admin.hotel-booking.js#L621", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3225879/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/wp-hotel-booking/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bc883e7e-af82-47e1-a0c0-122e6abd6b52?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13495.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13495.json index 62249613e8b..177c9aea17b 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13495.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13495.json @@ -2,19 +2,43 @@ "id": "CVE-2024-13495", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-22T11:15:08.193", - "lastModified": "2025-01-22T11:15:08.193", - "vulnStatus": "Received", + "lastModified": "2025-01-24T20:46:53.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The The GamiPress \u2013 Gamification plugin to reward points, achievements, badges & ranks in WordPress plugin for WordPress is vulnerable to arbitrary shortcode execution via the gamipress_ajax_get_logs() function in all versions up to, and including, 7.2.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes." + }, + { + "lang": "es", + "value": "El complemento GamiPress \u2013 Gamification plugin to reward points, achievements, badges & ranks en WordPress es vulnerable a la ejecuci\u00f3n de c\u00f3digos cortos arbitrarios a trav\u00e9s de la funci\u00f3n gamipress_ajax_get_logs() en todas las versiones hasta la 7.2.1 y incluida. Esto se debe a que el software permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que atacantes no autenticados ejecuten c\u00f3digos cortos arbitrarios." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -47,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gamipress:gamipress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.2.2", + "matchCriteriaId": "E7C164FD-CA8D-4D32-B4DE-BDF676987B32" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/gamipress/trunk/includes/ajax-functions.php#L39", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3226227/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/gamipress/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/55fa8423-9a41-4afe-9401-03d232caa656?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13496.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13496.json index 62b2fcbc46d..76c41096335 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13496.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13496.json @@ -2,19 +2,43 @@ "id": "CVE-2024-13496", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-22T11:15:08.373", - "lastModified": "2025-01-22T11:15:08.373", - "vulnStatus": "Received", + "lastModified": "2025-01-24T20:45:57.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The GamiPress \u2013 Gamification plugin to reward points, achievements, badges & ranks in WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018orderby\u2019 parameter in all versions up to, and including, 7.2.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento GamiPress \u2013 Gamification plugin to reward points, achievements, badges & ranks en WordPress es vulnerable a la inyecci\u00f3n SQL basada en tiempo a trav\u00e9s del par\u00e1metro \u2018orderby\u2019 en todas las versiones hasta incluida, 7.2.1 debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -47,26 +71,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gamipress:gamipress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.2.2", + "matchCriteriaId": "E7C164FD-CA8D-4D32-B4DE-BDF676987B32" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/gamipress/trunk/includes/ajax-functions.php#L39", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/gamipress/trunk/libraries/ct/includes/class-ct-query.php#L160", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3226227/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/gamipress/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ea54436c-b623-4049-af19-9995c312476e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13499.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13499.json index cfa44989216..7aa9857553f 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13499.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13499.json @@ -2,19 +2,43 @@ "id": "CVE-2024-13499", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-22T11:15:08.533", - "lastModified": "2025-01-22T11:15:08.533", - "vulnStatus": "Received", + "lastModified": "2025-01-24T20:37:12.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The The GamiPress \u2013 Gamification plugin to reward points, achievements, badges & ranks in WordPress plugin for WordPress is vulnerable to arbitrary shortcode execution via gamipress_do_shortcode() function in all versions up to, and including, 7.2.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes." + }, + { + "lang": "es", + "value": "El complemento GamiPress \u2013 Gamification plugin to reward points, achievements, badges & ranks en WordPress es vulnerable a la ejecuci\u00f3n de c\u00f3digos cortos arbitrarios a trav\u00e9s de la funci\u00f3n gamipress_do_shortcode() en todas las versiones hasta incluida, 7.2.1. Esto se debe a que el software permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que atacantes no autenticados ejecuten c\u00f3digos cortos arbitrarios." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -47,26 +71,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gamipress:gamipress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.2.2", + "matchCriteriaId": "E7C164FD-CA8D-4D32-B4DE-BDF676987B32" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/gamipress/trunk/includes/functions.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/gamipress/trunk/includes/functions.php#L645", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3226227/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/gamipress/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b30ab159-ff3c-4d46-b182-f8938097b837?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24423.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24423.json index c764d3a7b68..2f517157375 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24423.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24423.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24423", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:12.407", - "lastModified": "2025-01-23T16:15:35.253", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T19:07:57.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:magmacore:magma:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.8.0", + "matchCriteriaId": "D797176E-A66B-4A63-9D8F-26FE241EB255" + } + ] + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24442.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24442.json index e97d87d1c82..402d00b2581 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24442.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24442.json @@ -2,16 +2,55 @@ "id": "CVE-2024-24442", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T22:15:11.610", - "lastModified": "2025-01-21T22:15:11.610", - "vulnStatus": "Received", + "lastModified": "2025-01-24T19:15:12.470", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A NULL pointer dereference in the ngap_app::handle_receive routine of OpenAirInterface CN5G AMF (oai-cn5g-amf) up to v2.0.0 allows attackers to cause a Denial of Service (DoS) via a crafted NGAP message." + }, + { + "lang": "es", + "value": "Una desreferencia de puntero NULL en la rutina ngap_app::handle_receive de OpenAirInterface CN5G AMF (oai-cn5g-amf) hasta v2.0.0 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un mensaje NGAP manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://openairinterface.com", @@ -20,6 +59,10 @@ { "url": "https://cellularsecurity.org/ransacked", "source": "cve@mitre.org" + }, + { + "url": "https://cellularsecurity.org/ransacked", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24451.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24451.json index 0c1e4d3dd0f..808934e4aed 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24451.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24451.json @@ -2,16 +2,55 @@ "id": "CVE-2024-24451", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T22:15:12.013", - "lastModified": "2025-01-21T22:15:12.013", - "vulnStatus": "Received", + "lastModified": "2025-01-24T20:15:32.263", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack overflow in the sctp_server::sctp_receiver_thread component of OpenAirInterface CN5G AMF (oai-cn5g-amf) up to v2.0.0 allows attackers to cause a Denial of Service (DoS) by repeatedly establishing SCTP connections with the N2 interface." + }, + { + "lang": "es", + "value": "Un desbordamiento de pila en el componente sctp_server::sctp_receiver_thread de OpenAirInterface CN5G AMF (oai-cn5g-amf) hasta v2.0.0 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) al establecer repetidamente conexiones SCTP con la interfaz N2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://openairinterface.com", @@ -20,6 +59,10 @@ { "url": "https://cellularsecurity.org/ransacked", "source": "cve@mitre.org" + }, + { + "url": "https://cellularsecurity.org/ransacked", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38821.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38821.json index 78d146252d2..87776b12e1f 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38821.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38821.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38821", "sourceIdentifier": "security@vmware.com", "published": "2024-10-28T07:15:07.633", - "lastModified": "2024-10-28T13:58:09.230", + "lastModified": "2025-01-24T20:15:32.427", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "https://spring.io/security/cve-2024-38821", "source": "security@vmware.com" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250124-0006/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38827.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38827.json index 0f5c09d8cc5..0a63e74c21b 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38827.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38827.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38827", "sourceIdentifier": "security@vmware.com", "published": "2024-12-02T15:15:11.270", - "lastModified": "2024-12-02T15:15:11.270", + "lastModified": "2025-01-24T20:15:32.553", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "https://spring.io/security/cve-2024-38827", "source": "security@vmware.com" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250124-0007/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45296.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45296.json index 305498422cf..d4c69eeaf7c 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45296.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45296.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45296", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-09T19:15:13.330", - "lastModified": "2024-09-10T12:09:50.377", + "lastModified": "2025-01-24T20:15:32.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -63,6 +63,10 @@ { "url": "https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-9wv6-86v2-598j", "source": "security-advisories@github.com" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250124-0001/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52316.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52316.json index e284617aa54..706a1d69978 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52316.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52316.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52316", "sourceIdentifier": "security@apache.org", "published": "2024-11-18T12:15:18.600", - "lastModified": "2024-11-21T09:46:16.433", + "lastModified": "2025-01-24T20:15:32.803", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2024/11/18/2", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250124-0003/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52317.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52317.json index acd86b1f1f2..5ddda6a31e2 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52317.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52317.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52317", "sourceIdentifier": "security@apache.org", "published": "2024-11-18T12:15:18.727", - "lastModified": "2024-11-21T09:46:16.630", + "lastModified": "2025-01-24T20:15:32.963", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2024/11/18/3", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250124-0004/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-527xx/CVE-2024-52798.json b/CVE-2024/CVE-2024-527xx/CVE-2024-52798.json index 158212f77a2..0eb86abe1d2 100644 --- a/CVE-2024/CVE-2024-527xx/CVE-2024-52798.json +++ b/CVE-2024/CVE-2024-527xx/CVE-2024-52798.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52798", "sourceIdentifier": "security-advisories@github.com", "published": "2024-12-05T23:15:06.310", - "lastModified": "2024-12-05T23:15:06.310", + "lastModified": "2025-01-24T20:15:33.107", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -81,6 +81,10 @@ { "url": "https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-rhx6-c78j-4q9w", "source": "security-advisories@github.com" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250124-0002/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52807.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52807.json new file mode 100644 index 00000000000..9db65501445 --- /dev/null +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52807.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-52807", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-24T19:15:12.640", + "lastModified": "2025-01-24T19:15:12.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The HL7 FHIR IG publisher is a tool to take a set of inputs and create a standard FHIR IG. Prior to version 1.7.4, XSLT transforms performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag `( ]>` could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.publisher is being used to within a host where external clients can submit XML. A previous release provided an incomplete solution revealed by new testing. This issue has been patched as of version 1.7.4. No known workarounds are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/HL7/fhir-ig-publisher/compare/1.7.3...1.7.4", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/HL7/fhir-ig-publisher/security/advisories/GHSA-8c3x-hq82-gjcm", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53923.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53923.json index 8ece03bac07..32d5560611d 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53923.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53923.json @@ -2,13 +2,17 @@ "id": "CVE-2024-53923", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T22:15:14.017", - "lastModified": "2025-01-23T22:15:14.017", - "vulnStatus": "Received", + "lastModified": "2025-01-24T19:15:12.777", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Centreon Web 24.10.x before 24.10.3, 24.04.x before 24.04.9, 23.10.x before 23.10.19, 23.04.x before 23.04.24. A user with high privileges is able to achieve SQL injection in the form to upload media." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Centreon Web 24.10.x anterior a 24.10.3, 24.04.x ??anterior a 24.04.9, 23.10.x anterior a 23.10.19 y 23.04.x ??anterior a 23.04.24. Un usuario con privilegios elevados puede realizar una inyecci\u00f3n SQL en el formulario para cargar archivos multimedia." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/centreon/centreon/releases", diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55573.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55573.json index 7fcd38553d1..b370023ca85 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55573.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55573.json @@ -2,13 +2,17 @@ "id": "CVE-2024-55573", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T23:15:08.113", - "lastModified": "2025-01-23T23:15:08.113", - "vulnStatus": "Received", + "lastModified": "2025-01-24T19:15:12.923", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Centreon centreon-web 24.10.x before 24.10.3, 24.04.x before 24.04.9, 23.10.x before 23.10.19, 23.04.x before 23.04.24. A user with high privileges is able to inject SQL into the form used to create virtual metrics." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Centreon centreon-web 24.10.x anterior a 24.10.3, 24.04.x anterior a 24.04.9, 23.10.x anterior a 23.10.19, 23.04.x anterior a 23.04.24. Un usuario con privilegios elevados puede inyectar SQL en el formulario utilizado para crear m\u00e9tricas virtuales." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/centreon/centreon/releases", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57041.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57041.json new file mode 100644 index 00000000000..8a9a1aa5b8e --- /dev/null +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57041.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-57041", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-24T20:15:33.353", + "lastModified": "2025-01-24T20:15:33.353", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A persistent cross-site scripting (XSS) vulnerability in NodeBB v3.11.0 allows remote attackers to store arbitrary code in the 'about me' section of their profile." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://nodebb.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/NodeBB/NodeBB/commit/4e69bff72fd04779064d37e46a43080e6c328adf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.tonysec.com/posts/cve-2024-57041/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57095.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57095.json new file mode 100644 index 00000000000..637801980c8 --- /dev/null +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57095.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57095", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-24T20:15:33.473", + "lastModified": "2025-01-24T20:15:33.473", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL injection vulnerability in Go-CMS v.1.1.10 allows a remote attacker to execute arbitrary code via a crafted payload." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/wjlin0/ff3ee8afb8f8001faff89bbc03805605", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Xi-Yuer/GO-CMS/issues/6", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57277.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57277.json new file mode 100644 index 00000000000..cfa737c7bd3 --- /dev/null +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57277.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-57277", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-24T20:15:33.587", + "lastModified": "2025-01-24T20:15:33.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InnoShop V.0.3.8 and below is vulnerable to Cross Site Scripting (XSS) via SVG file upload." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/innocommerce/innoshop/issues/115", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yamerooo123/ResearchNBugBountyEncyclopedia/blob/main/Researches/Innocommerce/Findings.md", + "source": "cve@mitre.org" + }, + { + "url": "https://youtu.be/ved96wsIYlQ", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0428.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0428.json index cc28470ffd4..903422f7bd7 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0428.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0428.json @@ -2,13 +2,17 @@ "id": "CVE-2025-0428", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-22T08:15:09.013", - "lastModified": "2025-01-22T08:15:09.013", - "vulnStatus": "Received", + "lastModified": "2025-01-24T20:56:49.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The \"AI Power: Complete AI Pack\" plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.8.96 via deserialization of untrusted input from the $form['post_content'] variable through the wpaicg_export_prompts function. This allows authenticated attackers, with administrative privileges, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code." + }, + { + "lang": "es", + "value": "El complemento \"AI Power: Complete AI Pack\" para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en versiones hasta la 1.8.96 y incluida, mediante la deserializaci\u00f3n de la entrada no confiable de la variable $form['post_content'] a trav\u00e9s de la funci\u00f3n wpaicg_export_prompts. Esto permite a atacantes autenticados, con privilegios administrativos, inyectar un objeto PHP. No hay ninguna cadena POP presente en el complemento vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo." } ], "metrics": { @@ -47,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aipower:aipower:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.97", + "matchCriteriaId": "8C5CA64C-4781-4A74-AF0D-228633421634" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3224162/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/66a3abc1-0508-4ce3-952b-7dbf3738879a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0429.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0429.json index caf23026dff..ef6c2494c63 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0429.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0429.json @@ -2,13 +2,17 @@ "id": "CVE-2025-0429", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-22T08:15:09.173", - "lastModified": "2025-01-22T08:15:09.173", - "vulnStatus": "Received", + "lastModified": "2025-01-24T20:51:18.657", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The \"AI Power: Complete AI Pack\" plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.8.96 via deserialization of untrusted input from the $form['post_content'] variable through the wpaicg_export_ai_forms() function. This allows authenticated attackers, with administrative privileges, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code." + }, + { + "lang": "es", + "value": "El complemento \"AI Power: Complete AI Pack\" para WordPress es vulnerable a la inyecci\u00f3n de objetos PHP en versiones hasta la 1.8.96 y incluida, mediante la deserializaci\u00f3n de una entrada no confiable de la variable $form['post_content'] a trav\u00e9s de la funci\u00f3n wpaicg_export_ai_forms(). Esto permite a atacantes autenticados, con privilegios administrativos, inyectar un objeto PHP. No hay ninguna cadena POP presente en el complemento vulnerable. Si hay una cadena POP presente a trav\u00e9s de un complemento o tema adicional instalado en el sistema de destino, podr\u00eda permitir al atacante eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar c\u00f3digo." } ], "metrics": { @@ -47,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aipower:aipower:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.97", + "matchCriteriaId": "8C5CA64C-4781-4A74-AF0D-228633421634" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3224162/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bb927aba-a96d-47b9-ba35-60945ea5cfe5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0703.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0703.json new file mode 100644 index 00000000000..da6c0bef877 --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0703.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-0703", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-24T19:15:13.137", + "lastModified": "2025-01-24T19:15:13.137", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. This issue affects some unknown processing of the file src/main/java/io/github/controller/SysFileController.java. The manipulation of the argument name leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/JoeyBling/bootplus/issues/25", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/JoeyBling/bootplus/issues/25#issue-2786928618", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293231", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293231", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.480842", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0704.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0704.json new file mode 100644 index 00000000000..e921385dc05 --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0704.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0704", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-24T19:15:13.303", + "lastModified": "2025-01-24T19:15:13.303", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. Affected is the function qrCode of the file src/main/java/io/github/controller/QrCodeController.java. The manipulation of the argument w/h leads to resource consumption. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + }, + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/JoeyBling/bootplus/issues/26", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/JoeyBling/bootplus/issues/26#issue-2786934642", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293232", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293232", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.480843", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0705.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0705.json new file mode 100644 index 00000000000..9ebddff6a27 --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0705.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-0705", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-24T19:15:13.467", + "lastModified": "2025-01-24T19:15:13.467", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d and classified as problematic. Affected by this vulnerability is the function qrCode of the file src/main/java/io/github/controller/QrCodeController.java. The manipulation of the argument text leads to open redirect. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/JoeyBling/bootplus/issues/27", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/JoeyBling/bootplus/issues/27#issue-2786941847", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293233", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293233", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.480844", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0706.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0706.json new file mode 100644 index 00000000000..215ffb44295 --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0706.json @@ -0,0 +1,153 @@ +{ + "id": "CVE-2025-0706", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-24T20:15:33.830", + "lastModified": "2025-01-24T20:15:33.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/sys/admin.html. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "baseScore": 3.3, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/JoeyBling/bootplus/issues/28", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/JoeyBling/bootplus/issues/28#issue-2786945699", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293234", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293234", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.480845", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/JoeyBling/bootplus/issues/28", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://github.com/JoeyBling/bootplus/issues/28#issue-2786945699", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0707.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0707.json new file mode 100644 index 00000000000..37daa2b13ca --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0707.json @@ -0,0 +1,133 @@ +{ + "id": "CVE-2025-0707", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-24T20:15:34.020", + "lastModified": "2025-01-24T20:15:34.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Rise Group Rise Mode Temp CPU 2.1. It has been classified as critical. This affects an unknown part in the library CRYPTBASE.dll of the component Startup. The manipulation leads to untrusted search path. The attack needs to be approached locally." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 6.8, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.293235", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293235", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.481088", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0708.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0708.json new file mode 100644 index 00000000000..639e199208f --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0708.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-0708", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-24T20:15:34.200", + "lastModified": "2025-01-24T20:15:34.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in fumiao opencms 2.2. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/model/addOrUpdate of the component Add Model Management Page. The manipulation of the argument \u6a21\u677f\u524d\u7f00 leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/fumiao/opencms/issues/IBI2XM", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293236", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293236", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.482662", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21102.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21102.json index 2f59b9210b7..be8a0cffaea 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21102.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21102.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21102", "sourceIdentifier": "security_alert@emc.com", "published": "2025-01-08T12:15:22.850", - "lastModified": "2025-01-08T12:15:22.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-24T19:10:11.977", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,1278 @@ }, "exploitabilityScore": 0.8, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-256" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_d560_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "1B33332D-FCD9-40E0-A104-C61BE6E661E5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_d560:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B547BDB-12A9-40AC-B4CA-040F413C5F05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_d560f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "40B448B6-2FE8-4657-B175-25DB46AB48C3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_d560f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7755F292-5841-4751-AA28-2766B510F4B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e460_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "B98048B8-8FA0-4D3E-A79F-10ABA5248BF2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e460:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6D4A624-51DE-4845-81ED-7C724038C193" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e560_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "19C1A34D-C8CB-4300-9758-D318437F5028" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e560:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CE64387-28EC-4486-8B12-B89E00FF5422" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e560_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "E6ABE873-20AE-4D78-8D64-BF7132300B31" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e560_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33913EBB-9810-49BC-8060-F58A70323D31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e560f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "637FDF7C-AA6F-497A-8174-AA868A2FE431" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e560f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3297C6B-2729-44F8-AEEE-399FC791314D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e560f_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "6DF89BDF-645E-4626-809D-BBC824549A8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e560f_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AE2145A-79D2-4460-94AC-41D3A56FD6D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e560n_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "3746F27D-70AF-4444-A5CE-A9CAE686D7E3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e560n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "733EFA86-2D7E-40C4-BC2D-C8EC62BEDB40" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e560n_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "AC2AA15F-3303-4589-8009-908C158070F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e560n_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "221890FF-A440-4C02-8DE2-F3D5F2E36E30" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e660_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "CCD6EBBF-363F-431F-9E97-526DEC5BB666" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e660:-:*:*:*:*:*:*:*", + "matchCriteriaId": "207FAAA1-9560-4B17-8777-06135B6F68A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e660f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "D00D541D-7052-4686-AC71-7B7D289ADF4D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e660f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35B3A233-689C-422F-98F4-DEC197F5E01F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e660n_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "B7823DF4-10CA-4116-8C3F-A12C0BDAC7DC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e660n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BED8FF48-215F-437E-BC0E-CDF5B0D02961" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e665_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "72C5DFED-9B8B-4FBB-8E49-3875CD1F55C5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e665:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FFC45E9-D807-4184-8AEC-5C388E292D0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e665f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "E41569ED-4BA7-4CFF-8754-071E548C2D1B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e665f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F3C4556-A8F3-4AE4-8A6C-867BF069DBE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e665n_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "A82BCEB2-1B88-447A-BA8A-14F0F1784FAF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e665n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A820A4FE-3AF7-40AB-9E48-2A427BAEDD69" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_g560_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "CDDF98A4-58E5-4531-8666-4759ADE14F8B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_g560:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8F017FC3-0062-4AD5-83CA-64F3D753C342" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_g560_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "368260D3-12C2-485A-BAF2-7816C8D40FCF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_g560_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6683017-7A03-4B5F-BF84-B54FEED93C37" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_g560f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "EC9AF3D6-09F8-4332-BB91-8DBDAEFB9417" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_g560f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACAAF4CB-52A9-4859-AAD9-0B53608D3FFB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p470_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "277242E4-28F5-4226-83D3-EF888BDBDD93" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6ACC8277-A159-49F4-81E0-C3A73455FFCB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p570_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "E5533FA1-354D-46DC-B8D7-B840F80503B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F43E1BD6-A30F-4255-85FD-FA387B3C66AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p570_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "D5802B32-7149-46F0-BA35-FB2ADA99105A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p570_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFC1A83A-DEC7-4078-A8AA-C891DC386F93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p570f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "8B8BF16A-31CE-4E5D-8B79-36C274B84425" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p570f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "074180A7-BF66-4770-94E2-CA7C8C8AF7C8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p570f_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "80B97F18-A825-4107-B7A3-BAF42718B0BE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p570f_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C29E599-F792-4DE1-A689-36D97ABD08A1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p580n_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "4B3E00D2-14C0-4715-B8CF-B6209FEC367E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p580n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93C9ABE5-CE51-4089-A90B-EB5195C13298" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p580n_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "DDA2EE6D-0120-437A-A69E-19F8E9928F63" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p580n_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16C31369-A91C-435A-ABB1-568A3F7F59E0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p670f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "8472713D-1850-48EC-959F-E7A5F3E655C1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p670f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7E4817D-2161-4A9B-A31C-82AEDA3EE376" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p670n_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "0DA1EFAB-455A-44D2-A422-EDEC1C5815F4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p670n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4EA0A31-B29F-4FBF-8C84-3AA2517DF571" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p675f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "008C2BCE-1795-4320-B248-93C210222D2C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p675f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F5D18B7-9C39-4E54-9460-2494477DF883" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p675n_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "54CD5BD2-086C-4AD2-B2EE-60C1E6C7CBAB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p675n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6CE44D31-6A33-424E-AABF-6A011EFC06F7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_s470_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "8F5DA6E0-F641-44BD-A334-2043E6EDC3E9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_s470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE35EDFC-4608-42C1-A28F-5C2863BAA369" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_s570_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "1EA389BC-8F75-4EBE-A17C-9BE078C76BFB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_s570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFCB1C44-0865-499D-9845-DD726CE05C10" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_s570_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "0D32429B-302A-4A99-8603-83AA4AF722B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_s570_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDDBE07F-24D2-4492-B70C-8423952F8AE1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_s670_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "619F8B61-108D-460C-B9D4-48F04701BBCC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_s670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A8C1317-89EB-4901-BB2F-A1D5CA43B571" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_v470_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "6EB7F8F5-556B-4B20-942A-CE85F156B49D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_v470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D91B986-191E-4852-A0E9-FDBB39D935DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_v570_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "6508FB7A-4981-49F3-9A29-55BA31B63D86" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_v570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B462CA31-D81C-40C3-AC65-B21EF77C36EC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_v570_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "1A405980-02C1-4EE7-8A60-EDBC402C1A50" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_v570_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4866F37C-56EB-4AFE-B4C9-E4F33B342F27" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_v670f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "2DBD3967-7189-466D-AB7B-D579566A3EA8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_v670f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D6EF50B-67E1-4373-AD6F-39D53C73C1D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_vd-4000r_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "5F6E7E81-13F3-48D9-A971-B6654D95CE18" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_vd-4000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D45082F1-56AD-4A99-A628-8FDF02424879" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_vd-4000w_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "CF63F764-3586-45A8-A307-3B7DFCED6023" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_vd-4000w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB3AA886-1B65-4E89-BF68-E7FC5D3B7B65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_vd-4000z_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "5576FF4A-BC16-4DE5-A54D-2CDC49817C61" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_vd-4000z:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAD28E42-A52D-4CBF-A0BA-2206C8C7BD11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_vd-4510c_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "77F99BB6-F077-4EC7-8BF6-53CF3E5DAC45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_vd-4510c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EFF07A7-FF4D-42B1-95F7-A9D7F8CDF39A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_vd-4520c_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.000", + "versionEndExcluding": "7.0.533", + "matchCriteriaId": "3C96FB62-4F6D-48A4-B6DC-525177E2B012" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_vd-4520c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93C59E3C-CCD3-4E72-9E52-6B4D8FBEEFBB" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000269793/dsa-2025-027-security-update-for-dell-vxrail-for-multiple-vulnerabilities?ref=emcadvisory_000269793_High_null", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21111.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21111.json index 0570f07647f..5ffbfb31583 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21111.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21111.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21111", "sourceIdentifier": "security_alert@emc.com", "published": "2025-01-08T18:15:20.157", - "lastModified": "2025-01-08T18:15:20.157", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-24T19:11:42.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,1278 @@ }, "exploitabilityScore": 0.8, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "security_alert@emc.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-256" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_d560_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "2F908FB5-CFF4-4413-9D99-0862E8681D03" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_d560:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B547BDB-12A9-40AC-B4CA-040F413C5F05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_d560f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "E10693BA-84C3-4CBD-AE9D-96EB0093A886" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_d560f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7755F292-5841-4751-AA28-2766B510F4B1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e460_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "B1D7F195-2964-4D5C-8452-6F5C5EF0E9AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e460:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6D4A624-51DE-4845-81ED-7C724038C193" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e560_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "971D434A-9948-4577-8D61-E499673DBEFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e560:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CE64387-28EC-4486-8B12-B89E00FF5422" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e560_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "EACFF8D7-B800-42D5-B336-81E82B07CAD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e560_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33913EBB-9810-49BC-8060-F58A70323D31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e560f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "F36AEFD1-AA7A-460B-B1B6-9DAF259839A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e560f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3297C6B-2729-44F8-AEEE-399FC791314D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e560f_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "445D543D-A1CF-4294-95F5-128D9458552B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e560f_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AE2145A-79D2-4460-94AC-41D3A56FD6D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e560n_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "C1FD0AFD-675F-4799-BC3E-EC81DA689DD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e560n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "733EFA86-2D7E-40C4-BC2D-C8EC62BEDB40" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e560n_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "C23DFDDD-AFC1-4A2F-8A42-9C4229528373" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e560n_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "221890FF-A440-4C02-8DE2-F3D5F2E36E30" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e660_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "CC7CF5DB-036E-4F45-A2BF-1EA8DB2F5D71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e660:-:*:*:*:*:*:*:*", + "matchCriteriaId": "207FAAA1-9560-4B17-8777-06135B6F68A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e660f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "5D8D8C51-D5A9-4490-9192-2A25B81388F0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e660f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35B3A233-689C-422F-98F4-DEC197F5E01F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e660n_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "847C7B9F-0EED-444C-99E2-E330A719168A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e660n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BED8FF48-215F-437E-BC0E-CDF5B0D02961" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e665_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "10D25D38-7399-42D0-9884-045B5D517BEB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e665:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FFC45E9-D807-4184-8AEC-5C388E292D0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e665f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "8329BB1F-9B07-48DF-8635-9F6FCABEE783" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e665f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F3C4556-A8F3-4AE4-8A6C-867BF069DBE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_e665n_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "4B0C41EA-EA2C-4ECD-BC75-B101F662F319" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_e665n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A820A4FE-3AF7-40AB-9E48-2A427BAEDD69" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_g560_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "EF5C6572-26DE-4E5C-8A3C-2A25A8ECA055" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_g560:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8F017FC3-0062-4AD5-83CA-64F3D753C342" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_g560_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "F8CCBE90-5F2B-4D6F-8A1A-5EFD3FACC795" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_g560_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6683017-7A03-4B5F-BF84-B54FEED93C37" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_g560f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "2E086A39-EF4B-4BA2-B45A-FC8F8A2F5567" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_g560f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACAAF4CB-52A9-4859-AAD9-0B53608D3FFB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p470_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "E19D4F4C-78D6-44F9-A64F-8141732DC9C8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6ACC8277-A159-49F4-81E0-C3A73455FFCB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p570_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "87632AE0-443F-4F30-ACD5-01C5241EEE60" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F43E1BD6-A30F-4255-85FD-FA387B3C66AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p570_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "C67921B8-999B-4655-BAE6-F2F14E260D80" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p570_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFC1A83A-DEC7-4078-A8AA-C891DC386F93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p570f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "6350AF04-64B9-4645-8BC2-F1446A5E8795" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p570f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "074180A7-BF66-4770-94E2-CA7C8C8AF7C8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p570f_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "2D5CFE85-3AE9-40D9-B160-2A26CFADD99A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p570f_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C29E599-F792-4DE1-A689-36D97ABD08A1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p580n_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "17E1D5F3-D24C-4FB8-8E79-F718059B3273" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p580n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93C9ABE5-CE51-4089-A90B-EB5195C13298" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p580n_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "FF86659E-9A89-4C1A-97EB-BC8BA3B35DAA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p580n_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16C31369-A91C-435A-ABB1-568A3F7F59E0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p670f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "1E6FEBC6-DF0A-4D42-8FDB-A6BBBCBF4D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p670f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7E4817D-2161-4A9B-A31C-82AEDA3EE376" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p670n_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "6F6EAC68-F978-4C2D-BCC8-3FAC7291BE1A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p670n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4EA0A31-B29F-4FBF-8C84-3AA2517DF571" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p675f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "D437A0F0-9B5B-4116-BF48-F67EDA008540" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p675f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F5D18B7-9C39-4E54-9460-2494477DF883" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_p675n_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "588466D9-07B0-4DCB-A6B7-A36DEDF79F01" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_p675n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6CE44D31-6A33-424E-AABF-6A011EFC06F7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_s470_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "5FBEDA96-8546-4D77-8561-1906C4FDF5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_s470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE35EDFC-4608-42C1-A28F-5C2863BAA369" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_s570_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "E55574E4-7DAC-4303-A9AA-D45462366A61" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_s570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CFCB1C44-0865-499D-9845-DD726CE05C10" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_s570_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "8CB1C438-BAD2-4868-A8EE-2C601D21845F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_s570_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDDBE07F-24D2-4492-B70C-8423952F8AE1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_s670_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "279D9020-142A-4110-85A9-B3F5F7447E80" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_s670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A8C1317-89EB-4901-BB2F-A1D5CA43B571" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_v470_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "7614BF2A-7295-40BF-9105-32B0B6A8091D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_v470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D91B986-191E-4852-A0E9-FDBB39D935DC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_v570_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "8A88A24C-1448-4AB7-9B5E-D65EEF098B96" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_v570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B462CA31-D81C-40C3-AC65-B21EF77C36EC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_v570_vcf_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "50A67811-709A-483B-94CA-7F5105F64EF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_v570_vcf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4866F37C-56EB-4AFE-B4C9-E4F33B342F27" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_v670f_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "E08361B1-0173-4BC7-A58D-D2B666E7503F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_v670f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D6EF50B-67E1-4373-AD6F-39D53C73C1D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_vd-4000r_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "ADB2AE25-F314-4A94-BF47-D782872AEEB5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_vd-4000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D45082F1-56AD-4A99-A628-8FDF02424879" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_vd-4000w_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "6F066F9F-2815-4D7E-9BA9-A7F37F5C50D4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_vd-4000w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB3AA886-1B65-4E89-BF68-E7FC5D3B7B65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_vd-4000z_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "6F39C1B7-664E-4E3D-A585-C6A2E0A5545E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_vd-4000z:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAD28E42-A52D-4CBF-A0BA-2206C8C7BD11" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_vd-4510c_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "164B1FCE-18E1-45B7-A834-DC1862D3BFB5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_vd-4510c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EFF07A7-FF4D-42B1-95F7-A9D7F8CDF39A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:vxrail_vd-4520c_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.000", + "versionEndExcluding": "8.320", + "matchCriteriaId": "8A247217-9F1B-4C79-9A23-503D601DC108" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vxrail_vd-4520c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93C59E3C-CCD3-4E72-9E52-6B4D8FBEEFBB" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000269958/dsa-2025-025-security-update-for-dell-vxrail-for-multiple-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21492.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21492.json index 1221a5f114f..240ac2d7041 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21492.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21492.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21492", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:13.970", - "lastModified": "2025-01-23T20:15:32.163", + "lastModified": "2025-01-24T20:15:34.390", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", "source": "secalert_us@oracle.com" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250124-0011/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21502.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21502.json index 6b35a2bbc97..17f33eff94f 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21502.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21502.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21502", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:15.180", - "lastModified": "2025-01-23T17:15:23.830", + "lastModified": "2025-01-24T20:15:34.500", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", "source": "secalert_us@oracle.com" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20250124-0009/", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24363.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24363.json new file mode 100644 index 00000000000..a648cd28f2c --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24363.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-24363", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-24T19:15:13.633", + "lastModified": "2025-01-24T19:15:13.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The HL7 FHIR IG publisher is a tool to take a set of inputs and create a standard FHIR IG. Prior to version 1.8.9, in CI contexts, the IG Publisher CLI uses git commands to determine the URL of the originating repo. If the repo was cloned, or otherwise set to use a repo that uses a username and credential based URL, the entire URL will be included in the built Implementation Guide, exposing username and credential. This does not impact users that clone public repos without credentials, such as those using the auto-ig-build continuous integration infrastructure. This problem has been patched in release 1.8.9. Some workarounds are available. Users should ensure the IG repo they are publishing does not have username or credentials included in the `origin` URL. Running the command `git remote origin url` should return a URL that contains no username, password, or token; or users should run the IG Publisher CLI with the `-repo` parameter and specify a URL that contains no username, password, or token." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/HL7/fhir-ig-publisher/commit/d968694b7dd041640efab5414d7077d5028569f7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/HL7/fhir-ig-publisher/releases/tag/1.8.9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/HL7/fhir-ig-publisher/security/advisories/GHSA-6729-95v3-pjc2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 044fede15a1..37d8b252316 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-24T19:00:32.954520+00:00 +2025-01-24T21:00:29.567975+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-24T18:58:46.177000+00:00 +2025-01-24T20:56:49.767000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -278908 +278919 ``` ### CVEs added in the last Commit -Recently added CVEs: `120` +Recently added CVEs: `11` -- [CVE-2025-24717](CVE-2025/CVE-2025-247xx/CVE-2025-24717.json) (`2025-01-24T18:15:45.210`) -- [CVE-2025-24719](CVE-2025/CVE-2025-247xx/CVE-2025-24719.json) (`2025-01-24T18:15:45.360`) -- [CVE-2025-24720](CVE-2025/CVE-2025-247xx/CVE-2025-24720.json) (`2025-01-24T18:15:45.523`) -- [CVE-2025-24721](CVE-2025/CVE-2025-247xx/CVE-2025-24721.json) (`2025-01-24T18:15:45.667`) -- [CVE-2025-24722](CVE-2025/CVE-2025-247xx/CVE-2025-24722.json) (`2025-01-24T18:15:45.840`) -- [CVE-2025-24723](CVE-2025/CVE-2025-247xx/CVE-2025-24723.json) (`2025-01-24T18:15:46.000`) -- [CVE-2025-24724](CVE-2025/CVE-2025-247xx/CVE-2025-24724.json) (`2025-01-24T18:15:46.170`) -- [CVE-2025-24725](CVE-2025/CVE-2025-247xx/CVE-2025-24725.json) (`2025-01-24T18:15:46.357`) -- [CVE-2025-24726](CVE-2025/CVE-2025-247xx/CVE-2025-24726.json) (`2025-01-24T18:15:46.530`) -- [CVE-2025-24727](CVE-2025/CVE-2025-247xx/CVE-2025-24727.json) (`2025-01-24T18:15:46.707`) -- [CVE-2025-24728](CVE-2025/CVE-2025-247xx/CVE-2025-24728.json) (`2025-01-24T18:15:46.877`) -- [CVE-2025-24729](CVE-2025/CVE-2025-247xx/CVE-2025-24729.json) (`2025-01-24T18:15:47.037`) -- [CVE-2025-24730](CVE-2025/CVE-2025-247xx/CVE-2025-24730.json) (`2025-01-24T18:15:47.193`) -- [CVE-2025-24731](CVE-2025/CVE-2025-247xx/CVE-2025-24731.json) (`2025-01-24T18:15:47.370`) -- [CVE-2025-24732](CVE-2025/CVE-2025-247xx/CVE-2025-24732.json) (`2025-01-24T18:15:47.530`) -- [CVE-2025-24733](CVE-2025/CVE-2025-247xx/CVE-2025-24733.json) (`2025-01-24T18:15:47.697`) -- [CVE-2025-24736](CVE-2025/CVE-2025-247xx/CVE-2025-24736.json) (`2025-01-24T18:15:47.850`) -- [CVE-2025-24738](CVE-2025/CVE-2025-247xx/CVE-2025-24738.json) (`2025-01-24T18:15:48.017`) -- [CVE-2025-24739](CVE-2025/CVE-2025-247xx/CVE-2025-24739.json) (`2025-01-24T18:15:48.177`) -- [CVE-2025-24746](CVE-2025/CVE-2025-247xx/CVE-2025-24746.json) (`2025-01-24T18:15:48.437`) -- [CVE-2025-24750](CVE-2025/CVE-2025-247xx/CVE-2025-24750.json) (`2025-01-24T18:15:48.663`) -- [CVE-2025-24751](CVE-2025/CVE-2025-247xx/CVE-2025-24751.json) (`2025-01-24T18:15:48.810`) -- [CVE-2025-24753](CVE-2025/CVE-2025-247xx/CVE-2025-24753.json) (`2025-01-24T18:15:48.950`) -- [CVE-2025-24755](CVE-2025/CVE-2025-247xx/CVE-2025-24755.json) (`2025-01-24T18:15:49.160`) -- [CVE-2025-24756](CVE-2025/CVE-2025-247xx/CVE-2025-24756.json) (`2025-01-24T18:15:49.307`) +- [CVE-2024-52807](CVE-2024/CVE-2024-528xx/CVE-2024-52807.json) (`2025-01-24T19:15:12.640`) +- [CVE-2024-57041](CVE-2024/CVE-2024-570xx/CVE-2024-57041.json) (`2025-01-24T20:15:33.353`) +- [CVE-2024-57095](CVE-2024/CVE-2024-570xx/CVE-2024-57095.json) (`2025-01-24T20:15:33.473`) +- [CVE-2024-57277](CVE-2024/CVE-2024-572xx/CVE-2024-57277.json) (`2025-01-24T20:15:33.587`) +- [CVE-2025-0703](CVE-2025/CVE-2025-07xx/CVE-2025-0703.json) (`2025-01-24T19:15:13.137`) +- [CVE-2025-0704](CVE-2025/CVE-2025-07xx/CVE-2025-0704.json) (`2025-01-24T19:15:13.303`) +- [CVE-2025-0705](CVE-2025/CVE-2025-07xx/CVE-2025-0705.json) (`2025-01-24T19:15:13.467`) +- [CVE-2025-0706](CVE-2025/CVE-2025-07xx/CVE-2025-0706.json) (`2025-01-24T20:15:33.830`) +- [CVE-2025-0707](CVE-2025/CVE-2025-07xx/CVE-2025-0707.json) (`2025-01-24T20:15:34.020`) +- [CVE-2025-0708](CVE-2025/CVE-2025-07xx/CVE-2025-0708.json) (`2025-01-24T20:15:34.200`) +- [CVE-2025-24363](CVE-2025/CVE-2025-243xx/CVE-2025-24363.json) (`2025-01-24T19:15:13.633`) ### CVEs modified in the last Commit -Recently modified CVEs: `61` +Recently modified CVEs: `51` -- [CVE-2024-13091](CVE-2024/CVE-2024-130xx/CVE-2024-13091.json) (`2025-01-24T18:42:25.563`) -- [CVE-2024-13360](CVE-2024/CVE-2024-133xx/CVE-2024-13360.json) (`2025-01-24T18:58:46.177`) -- [CVE-2024-13361](CVE-2024/CVE-2024-133xx/CVE-2024-13361.json) (`2025-01-24T18:55:22.577`) -- [CVE-2024-13426](CVE-2024/CVE-2024-134xx/CVE-2024-13426.json) (`2025-01-24T18:37:38.503`) -- [CVE-2024-13584](CVE-2024/CVE-2024-135xx/CVE-2024-13584.json) (`2025-01-24T18:20:40.760`) -- [CVE-2024-13590](CVE-2024/CVE-2024-135xx/CVE-2024-13590.json) (`2025-01-24T18:09:26.147`) -- [CVE-2024-1603](CVE-2024/CVE-2024-16xx/CVE-2024-1603.json) (`2025-01-24T18:22:44.423`) -- [CVE-2024-24427](CVE-2024/CVE-2024-244xx/CVE-2024-24427.json) (`2025-01-24T18:47:28.570`) -- [CVE-2024-24428](CVE-2024/CVE-2024-244xx/CVE-2024-24428.json) (`2025-01-24T18:44:26.897`) -- [CVE-2024-25937](CVE-2024/CVE-2024-259xx/CVE-2024-25937.json) (`2025-01-24T18:42:26.510`) -- [CVE-2024-2805](CVE-2024/CVE-2024-28xx/CVE-2024-2805.json) (`2025-01-24T18:45:05.873`) -- [CVE-2024-29870](CVE-2024/CVE-2024-298xx/CVE-2024-29870.json) (`2025-01-24T18:18:36.670`) -- [CVE-2024-29871](CVE-2024/CVE-2024-298xx/CVE-2024-29871.json) (`2025-01-24T18:18:34.350`) -- [CVE-2024-29872](CVE-2024/CVE-2024-298xx/CVE-2024-29872.json) (`2025-01-24T18:18:31.603`) -- [CVE-2024-29873](CVE-2024/CVE-2024-298xx/CVE-2024-29873.json) (`2025-01-24T18:18:29.537`) -- [CVE-2024-29874](CVE-2024/CVE-2024-298xx/CVE-2024-29874.json) (`2025-01-24T18:18:27.523`) -- [CVE-2024-29875](CVE-2024/CVE-2024-298xx/CVE-2024-29875.json) (`2025-01-24T18:18:25.493`) -- [CVE-2024-29876](CVE-2024/CVE-2024-298xx/CVE-2024-29876.json) (`2025-01-24T18:18:23.223`) -- [CVE-2024-29877](CVE-2024/CVE-2024-298xx/CVE-2024-29877.json) (`2025-01-24T18:17:39.100`) -- [CVE-2024-29878](CVE-2024/CVE-2024-298xx/CVE-2024-29878.json) (`2025-01-24T18:17:36.817`) -- [CVE-2024-29879](CVE-2024/CVE-2024-298xx/CVE-2024-29879.json) (`2025-01-24T18:17:54.427`) -- [CVE-2024-3848](CVE-2024/CVE-2024-38xx/CVE-2024-3848.json) (`2025-01-24T17:28:21.717`) -- [CVE-2024-4223](CVE-2024/CVE-2024-42xx/CVE-2024-4223.json) (`2025-01-24T17:58:19.593`) -- [CVE-2024-4279](CVE-2024/CVE-2024-42xx/CVE-2024-4279.json) (`2025-01-24T17:03:18.140`) -- [CVE-2024-4318](CVE-2024/CVE-2024-43xx/CVE-2024-4318.json) (`2025-01-24T17:11:02.097`) +- [CVE-2024-11053](CVE-2024/CVE-2024-110xx/CVE-2024-11053.json) (`2025-01-24T20:15:31.920`) +- [CVE-2024-12117](CVE-2024/CVE-2024-121xx/CVE-2024-12117.json) (`2025-01-24T19:05:36.597`) +- [CVE-2024-12857](CVE-2024/CVE-2024-128xx/CVE-2024-12857.json) (`2025-01-24T19:18:01.417`) +- [CVE-2024-13176](CVE-2024/CVE-2024-131xx/CVE-2024-13176.json) (`2025-01-24T20:15:32.150`) +- [CVE-2024-13447](CVE-2024/CVE-2024-134xx/CVE-2024-13447.json) (`2025-01-24T20:53:40.380`) +- [CVE-2024-13495](CVE-2024/CVE-2024-134xx/CVE-2024-13495.json) (`2025-01-24T20:46:53.307`) +- [CVE-2024-13496](CVE-2024/CVE-2024-134xx/CVE-2024-13496.json) (`2025-01-24T20:45:57.463`) +- [CVE-2024-13499](CVE-2024/CVE-2024-134xx/CVE-2024-13499.json) (`2025-01-24T20:37:12.533`) +- [CVE-2024-24423](CVE-2024/CVE-2024-244xx/CVE-2024-24423.json) (`2025-01-24T19:07:57.183`) +- [CVE-2024-24442](CVE-2024/CVE-2024-244xx/CVE-2024-24442.json) (`2025-01-24T19:15:12.470`) +- [CVE-2024-24451](CVE-2024/CVE-2024-244xx/CVE-2024-24451.json) (`2025-01-24T20:15:32.263`) +- [CVE-2024-38821](CVE-2024/CVE-2024-388xx/CVE-2024-38821.json) (`2025-01-24T20:15:32.427`) +- [CVE-2024-38827](CVE-2024/CVE-2024-388xx/CVE-2024-38827.json) (`2025-01-24T20:15:32.553`) +- [CVE-2024-45296](CVE-2024/CVE-2024-452xx/CVE-2024-45296.json) (`2025-01-24T20:15:32.680`) +- [CVE-2024-52316](CVE-2024/CVE-2024-523xx/CVE-2024-52316.json) (`2025-01-24T20:15:32.803`) +- [CVE-2024-52317](CVE-2024/CVE-2024-523xx/CVE-2024-52317.json) (`2025-01-24T20:15:32.963`) +- [CVE-2024-52798](CVE-2024/CVE-2024-527xx/CVE-2024-52798.json) (`2025-01-24T20:15:33.107`) +- [CVE-2024-53923](CVE-2024/CVE-2024-539xx/CVE-2024-53923.json) (`2025-01-24T19:15:12.777`) +- [CVE-2024-55573](CVE-2024/CVE-2024-555xx/CVE-2024-55573.json) (`2025-01-24T19:15:12.923`) +- [CVE-2025-0428](CVE-2025/CVE-2025-04xx/CVE-2025-0428.json) (`2025-01-24T20:56:49.767`) +- [CVE-2025-0429](CVE-2025/CVE-2025-04xx/CVE-2025-0429.json) (`2025-01-24T20:51:18.657`) +- [CVE-2025-21102](CVE-2025/CVE-2025-211xx/CVE-2025-21102.json) (`2025-01-24T19:10:11.977`) +- [CVE-2025-21111](CVE-2025/CVE-2025-211xx/CVE-2025-21111.json) (`2025-01-24T19:11:42.417`) +- [CVE-2025-21492](CVE-2025/CVE-2025-214xx/CVE-2025-21492.json) (`2025-01-24T20:15:34.390`) +- [CVE-2025-21502](CVE-2025/CVE-2025-215xx/CVE-2025-21502.json) (`2025-01-24T20:15:34.500`) ## Download and Usage diff --git a/_state.csv b/_state.csv index bbed38b5db5..fab8a99ea00 100644 --- a/_state.csv +++ b/_state.csv @@ -133674,7 +133674,7 @@ CVE-2019-15687,0,0,631fa6883559929aa1f1ba6fd83d3891d2f2b7996c0b8937a59a8756b120d CVE-2019-15688,0,0,ea89229c33b4cee9066ab26488a8660db2c52706308eae88d3b6862c1d605c97,2024-11-21T04:29:15.837000 CVE-2019-15689,0,0,629e43a8bd569373cd6b7d4b5815383522904bfb3359850064a1c3098d372c44,2024-11-21T04:29:15.947000 CVE-2019-1569,0,0,51f78e17be9cc47788c1561bb50a778e1bced13c55e4d90967b9eb633e7f95a2,2024-11-21T04:36:49.903000 -CVE-2019-15690,1,1,c09b54b7ca9e39ef279f01b08012b242e21cb5377b9e6c8807a9dc0d6a49bc88,2025-01-24T18:15:27.657000 +CVE-2019-15690,0,0,c09b54b7ca9e39ef279f01b08012b242e21cb5377b9e6c8807a9dc0d6a49bc88,2025-01-24T18:15:27.657000 CVE-2019-15691,0,0,ffea0b91f1f36be4b31cb755b2df04ceda272166a735d2f0051e032565624c1f,2024-11-21T04:29:16.087000 CVE-2019-15692,0,0,b796642261001da0dd0123d4e48d3c486e03045c387ec48aafdadc4378094b7d,2024-11-21T04:29:16.240000 CVE-2019-15693,0,0,861049fe43cf437ab5d0f0cba06ef4440d8c3ec9045438ae693839101ba9ba9a,2024-11-21T04:29:16.367000 @@ -165550,7 +165550,7 @@ CVE-2021-0873,0,0,388d081e4033a27e7b95c124b75949e4303ca718f90b7feeee713a550220ae CVE-2021-0874,0,0,a81451014b610be497602acc6d602d5fb1523d46ea9d96941e35aaf6fbe17802,2024-11-21T05:43:12.113000 CVE-2021-0875,0,0,b84858392200f92efe18826bd48bf6bfc27acce03bb29a0503651024ae321f23,2024-11-21T05:43:12.210000 CVE-2021-0876,0,0,bc2623adf140a5052e69517b9017d55af39a4eb3884658abdf34dbe2f8eebca3,2024-11-21T05:43:12.303000 -CVE-2021-0877,0,1,c2e5cd30d0c477a2e68bc1e7d07537fb61bd5004c669d9456ede730fc557548b,2025-01-24T17:15:08.107000 +CVE-2021-0877,0,0,c2e5cd30d0c477a2e68bc1e7d07537fb61bd5004c669d9456ede730fc557548b,2025-01-24T17:15:08.107000 CVE-2021-0878,0,0,74054f38cbbca55331fda5f8dd7583715f509e18eeeced7decaee7dd72ee0770,2024-11-21T05:43:12.513000 CVE-2021-0879,0,0,b6d6a2c57e18595dc6074214481ede8a1a3a28cc41d86bfe2d6f3e905f1d0032,2024-11-21T05:43:12.610000 CVE-2021-0880,0,0,4612a9a40bedad3fd32283245ba201e18cb9e0bcf74c0ab05ea53f65dc15f628,2024-11-21T05:43:12.703000 @@ -176230,7 +176230,7 @@ CVE-2021-32025,0,0,be1366e60cdc64085a7ca3378dd8b2945646288a6056d66d9eaf86e564481 CVE-2021-32027,0,0,5ee2aa7a5aa3fa8bb911c577fd863dbdb076a0ad3ef0512d7dd32317414b22da,2024-11-21T06:06:44.467000 CVE-2021-32028,0,0,84c85cca513953c25777bc582de148d107114d46d9b13227dc0a8bf544f4d415,2024-11-21T06:06:44.593000 CVE-2021-32029,0,0,56c471bfaedf8eeeae330cda0d2954472dbd44261f536849dbc437841365a531,2024-11-21T06:06:44.717000 -CVE-2021-32030,0,1,793995724539fd7266f05023c81575e5fa8384d2c075c98f7758d1c73aca9099,2025-01-24T18:15:28.720000 +CVE-2021-32030,0,0,793995724539fd7266f05023c81575e5fa8384d2c075c98f7758d1c73aca9099,2025-01-24T18:15:28.720000 CVE-2021-32032,0,0,d4a228b8d3584c392915c1306de9b4891f451e0bcc887a1a2c922b4efeafaf40,2024-11-21T06:06:44.993000 CVE-2021-32033,0,0,9d53a703f8e89930e795f200116050cb1538597c59d5f4de2f68d4733f37ec27,2024-11-21T06:06:45.167000 CVE-2021-32036,0,0,5f2cf3c6d2205a2b02a642da73b2e1978439d07a378edd4a500d10314baf33fc,2024-11-21T06:06:45.330000 @@ -215510,7 +215510,7 @@ CVE-2023-20665,0,0,dfcb31026b7c30e90be6e3188d6c3b233b3c12e9403d3e657a19e03d0e7dd CVE-2023-20666,0,0,3ad2ba12d88061f23a7c0b09598969c2e9597c7160fc17bc5129321b5b838acf,2024-11-21T07:41:19.483000 CVE-2023-2067,0,0,0f14ce1d18441d6e968f52ac3b496b8b01e7386a752eeee24930cc49f9b3187d,2024-11-21T07:57:52.460000 CVE-2023-20670,0,0,e4e5ee151777987fef7de5981cab53d63b02c8c02f20668d5ebefff86242ed80,2024-11-21T07:41:19.597000 -CVE-2023-20673,0,1,29bae4906ec7c96c77c7c09aecc0e7fb7f495988834a892b933466c096361071,2025-01-24T17:15:09.203000 +CVE-2023-20673,0,0,29bae4906ec7c96c77c7c09aecc0e7fb7f495988834a892b933466c096361071,2025-01-24T17:15:09.203000 CVE-2023-20674,0,0,eb2146b7419e33779b6b00f43b6162659ce687b1b5ecf2b1d3b2ee2893270957,2024-11-21T07:41:19.830000 CVE-2023-20675,0,0,91492ea9a54e1bfc3d79a683f7dfb3a3f048f71ad7188ef164f152ebe8298300,2024-11-21T07:41:19.950000 CVE-2023-20676,0,0,57ebf27440c8ce41ba6129a4fb74ae61cf5eb4cd96f4cc80a46de05aee46574d,2024-11-21T07:41:20.067000 @@ -215538,28 +215538,28 @@ CVE-2023-20697,0,0,b15ff5814ad0ad32493c32593760653a362c78f43c2a573f054ad8ad9f354 CVE-2023-20698,0,0,8ddadf8df5c8784d5b1260722f41aafebe1a40e68b22dfcf40750ba3ecd27d48,2025-01-23T22:15:11.177000 CVE-2023-20699,0,0,4d6ac6ca5563d5f2a54f52ef2b9e7294293faa46f7f00297443cee93f8a621f5,2025-01-23T22:15:11.367000 CVE-2023-20700,0,0,b34b8edd94d410de075caf4b24435de4dae235dbba89d08781d6f13584fc0cdd,2025-01-23T22:15:11.560000 -CVE-2023-20701,0,1,fc32ec3458bae7abcef055d54e77fd3393a1f32bd2a222cee0ea0ffdbdf1327e,2025-01-24T17:15:09.410000 +CVE-2023-20701,0,0,fc32ec3458bae7abcef055d54e77fd3393a1f32bd2a222cee0ea0ffdbdf1327e,2025-01-24T17:15:09.410000 CVE-2023-20702,0,0,e2a87c7ea72a74e13d3b9da5cf9e91816dc47678a0d33d6ea334b793759111e7,2024-11-21T07:41:22.977000 -CVE-2023-20703,0,1,9c4746921326fa45c0841be614593261cd65c0d6284b5a69aa8fce32e55a939c,2025-01-24T17:15:09.593000 -CVE-2023-20704,0,0,ea9e15a3ce0dd2baadf88f8bb7c3ea13f534cd0b64f67403162733a7a307325a,2024-11-21T07:41:23.280000 -CVE-2023-20705,0,0,eeaa8ec22b70246791edd3adc54257964c89ed5f28290db91a37b301bd0563ad,2024-11-21T07:41:23.380000 -CVE-2023-20706,0,0,05268dc862916b80280026b2a77cea3d7aca47fc15090bf10e4c7334e9987ed1,2024-11-21T07:41:23.507000 -CVE-2023-20707,0,0,2834f0ef8cd8c8bc43d2f56c030752a59b1d952242d0c5d6831a3957ecfe3eb2,2024-11-21T07:41:23.620000 -CVE-2023-20708,0,0,067712cd07dea78f4ec72c5ed6725c5d148a9d2c6f5c92172ef532e1f27171f4,2024-11-21T07:41:23.737000 -CVE-2023-20709,0,0,f77eb6f47a9c01aeb7b37b0bb403dc2906cc5a60047939406ce5f60a7d638282,2024-11-21T07:41:23.847000 +CVE-2023-20703,0,0,9c4746921326fa45c0841be614593261cd65c0d6284b5a69aa8fce32e55a939c,2025-01-24T17:15:09.593000 +CVE-2023-20704,0,1,914a087c997067eff31eb1e3353a65984b7387b73450a71a637fb0c39a848c85,2025-01-24T20:15:27.600000 +CVE-2023-20705,0,1,21be813830cb0649cc97502b718e2067a993ea28a08edd2900288d0f20148db7,2025-01-24T20:15:27.760000 +CVE-2023-20706,0,1,6a308d87fa266ab887d9530509f3947bff6bfc988ea52eb0faed77991ca24479,2025-01-24T20:15:27.920000 +CVE-2023-20707,0,1,1eed28a9c944afe36202459b76a50681f2121650282dac42441f0ae8b4ad54c1,2025-01-24T20:15:28.073000 +CVE-2023-20708,0,1,d454d42e1a7f045916cdb3d238d6805068521e873239a852f3c807d4f5075afd,2025-01-24T20:15:28.243000 +CVE-2023-20709,0,1,0fb083ee9379c275430090b17362c3915d7143508b3be27139587087e8925398,2025-01-24T20:15:28.400000 CVE-2023-2071,0,0,6ca8691d1e9c7cafae6a5748684ff3584a63b6c0782aca4e9e39176c7a9a8482,2024-11-21T07:57:52.790000 -CVE-2023-20710,0,0,36b3bd652704b53ed81bf08e9d3b6a30770e9e5726f30280c46f0944c40c0139,2024-11-21T07:41:23.967000 -CVE-2023-20711,0,0,a3a059039f4079683556bc911267d66baaed48cea9038f1dfc5e720f76c3a013,2024-11-21T07:41:24.080000 +CVE-2023-20710,0,1,8f799c28120e26078f88ba129d6a225e966389abaffdf751ed437eddd3a64681,2025-01-24T19:15:11.013000 +CVE-2023-20711,0,1,cdb48d023a61a078025350538b02e70c0ba80637a907120bf7f6930d703e1ec5,2025-01-24T19:15:11.540000 CVE-2023-20712,0,0,448f7cc7b18b7736e4158919a106777207ebeaae578ec88d49e8147b47bd416f,2025-01-07T19:15:28.830000 CVE-2023-20715,0,0,8e093ad3da4ecddaecba75d344d8950a8e8f5da70b953ce26dbfe70f2bae96c6,2025-01-07T19:15:29.033000 CVE-2023-20716,0,0,bc3be8c9031ce5b0447b088e80cf2c0fbcfc772b8457c122fb9d1df8c33921cf,2025-01-07T19:15:29.203000 -CVE-2023-20717,0,1,7c12e621a43ebd3ca57da61794e10716c27df59530d0e649da8d41cd8b7396c6,2025-01-24T17:15:09.770000 -CVE-2023-20718,0,1,6871c173b9e6c856a99b83bb31a5986b4d32cc9f4223baf79d2b88a8c52a023e,2025-01-24T17:15:09.937000 +CVE-2023-20717,0,0,7c12e621a43ebd3ca57da61794e10716c27df59530d0e649da8d41cd8b7396c6,2025-01-24T17:15:09.770000 +CVE-2023-20718,0,0,6871c173b9e6c856a99b83bb31a5986b4d32cc9f4223baf79d2b88a8c52a023e,2025-01-24T17:15:09.937000 CVE-2023-20719,0,0,b9a51dcc17d7372cb485458318997bcd2c9a54e6b566b2d8edb56d8e4e7d82bd,2025-01-24T16:15:29.153000 CVE-2023-2072,0,0,4884565e98bb3f8af8c5fb57495cf09e2b7ab12c309a5284f57a5c3408c00f44,2024-11-21T07:57:52.907000 CVE-2023-20720,0,0,4a7a68b2c716e4ecb2a5aae90dc33885f65b61eb4754c7c958faef79b057fc00,2025-01-24T15:15:09.510000 CVE-2023-20721,0,0,a24821403aa253474369b638de67f291e42084a5cf1fffe2e3188c98affac224,2025-01-24T15:15:09.697000 -CVE-2023-20722,0,0,8920eb055d033db9af8b82d589874977302f3c6343fff535a2c237261054f9eb,2024-11-21T07:41:25.093000 +CVE-2023-20722,0,1,248bfb3899a809f6b48ea56a26868bc3b32a57c12b0e206f5f44e150ab80219b,2025-01-24T19:15:11.707000 CVE-2023-20723,0,0,9d0686f907129b6919ada24bf4f11d306c0e127a565ad2d2e14861ae5024a41c,2024-11-21T07:41:25.200000 CVE-2023-20724,0,0,987f1a6ebac7796ad97470c40868ad4c190da72715630d9002692d9f05c5b7e0,2024-11-21T07:41:25.307000 CVE-2023-20725,0,0,f09278808328dfcfcad9a9453e6e7f164215557bbd6c9f4188e9f9b639210912,2025-01-07T21:15:10.227000 @@ -215750,7 +215750,7 @@ CVE-2023-20910,0,0,42b469d1e40838cbc2cf37212366f0d94ff573dac305f6e83df5f05900c29 CVE-2023-20911,0,0,ab40c86b9ae088eddceb5d780d2ee5f689d589c215dc35e9c7431f72c74f1d17,2024-11-21T07:41:48.260000 CVE-2023-20912,0,0,a7200d2947d78855a0b3085a5e7f9701a09997703d0fc330c2ba1ae6a4ffe923,2024-11-21T07:41:48.367000 CVE-2023-20913,0,0,e692bef2cbc52b4d3dd8dfad8fd764fb551f25ecca92b1f45eeb4bd10d46d51c,2024-11-21T07:41:48.470000 -CVE-2023-20914,0,1,6b5145528d510b04a8c592c1d20cfdd7716ba9252d059fcb55c8803940a2aa2f,2025-01-24T18:15:29.743000 +CVE-2023-20914,0,0,6b5145528d510b04a8c592c1d20cfdd7716ba9252d059fcb55c8803940a2aa2f,2025-01-24T18:15:29.743000 CVE-2023-20915,0,0,adfdd4422da4332db3f77db12fbf67dbbdac2660d5fc061368cc6c8467f1f174,2024-11-21T07:41:48.693000 CVE-2023-20916,0,0,a374d87bd55acf954a93f49d5fa49410d32593591843627dc9c7ca4968742700,2024-11-21T07:41:48.807000 CVE-2023-20917,0,0,d13795ea9bd32cac50a7140ca6600173c907f6872d18aacf395d3929d868bb19,2024-11-21T07:41:48.920000 @@ -215768,7 +215768,7 @@ CVE-2023-20927,0,0,a607587c512daad2a75d81512d73a603fcfa3abb48d5289e3dbaff22ab356 CVE-2023-20928,0,0,892415b0bbb1a273c0c4d0684975a78c5df304016f119c1b4ce59426590449f0,2024-11-21T07:41:50.197000 CVE-2023-20929,0,0,041e26d9b4c1dfffd082ab9480ad7471983cf487f26cb25f435768568d115446,2024-11-21T07:41:50.307000 CVE-2023-2093,0,0,f5d0e4a8e9249b4db32d41150a1e407490a3e931edcb3c038b611890842c7c04,2024-11-21T07:57:55.413000 -CVE-2023-20930,0,1,94d8d79f463551c6402b4135cc14c5a7c75415d884da1592c8007b82b38ecf47,2025-01-24T18:15:29.927000 +CVE-2023-20930,0,0,94d8d79f463551c6402b4135cc14c5a7c75415d884da1592c8007b82b38ecf47,2025-01-24T18:15:29.927000 CVE-2023-20931,0,0,d3b038426854dbc70e7344bdda980fc79d5daaad38a9b0361f8ca72476b28538,2024-11-21T07:41:50.530000 CVE-2023-20932,0,0,ab28ac247acecb824db440c588e9ebb9bc495ac7f65d5e471b1650aa0ccba933,2024-11-21T07:41:50.637000 CVE-2023-20933,0,0,a4eec22d73f22a806feb4c396f2b9e1e14b80acf59734b7f9d7828d4fdc36a15,2024-11-21T07:41:50.753000 @@ -215952,22 +215952,22 @@ CVE-2023-21099,0,0,afabd6091b22f62466375ddd2d5cf2dba66c45f7574132fd909c72a36e7ab CVE-2023-2110,0,0,718a01a86ed296dfb2aaf7f83682a9531cd721d906f14a1b1f42db7be1070ee9,2024-11-21T07:57:57.580000 CVE-2023-21100,0,0,a6f5ad62f1a95ea60c7f4843f485008a1ed2c66f5cb727afe7540a39c9398c46,2024-11-21T07:42:09.783000 CVE-2023-21101,0,0,38e7df0c443e508038a3e4161c84cfcbe9fa8e603833cd6af1be1d6a93d524fa,2024-11-21T07:42:09.897000 -CVE-2023-21102,0,1,fe6581b7408e9ebb7ae2547494c92fe8527cef74da3f12efb6200baf57c43f9a,2025-01-24T18:15:30.103000 -CVE-2023-21103,0,1,20c7440a93699015ea517e3301547543c2847fe28ca104a70a3ef6a848b1a5b5,2025-01-24T18:15:30.293000 -CVE-2023-21104,0,1,1ec05ff75e8278ed536cc1101ff9d8c843c8ed6aa8b24ab8410b92c2d34e23d2,2025-01-24T18:15:30.460000 +CVE-2023-21102,0,0,fe6581b7408e9ebb7ae2547494c92fe8527cef74da3f12efb6200baf57c43f9a,2025-01-24T18:15:30.103000 +CVE-2023-21103,0,0,20c7440a93699015ea517e3301547543c2847fe28ca104a70a3ef6a848b1a5b5,2025-01-24T18:15:30.293000 +CVE-2023-21104,0,0,1ec05ff75e8278ed536cc1101ff9d8c843c8ed6aa8b24ab8410b92c2d34e23d2,2025-01-24T18:15:30.460000 CVE-2023-21105,0,0,305734c9a4e52f89407b03a75469986fb19800a551f4779ecc963d7b4bee369a,2024-12-18T19:15:09.073000 -CVE-2023-21106,0,1,cc7e89eb8cf88ad3e9d3752b4097248d4503d0099cb95620e0e59c23db1d5ad8,2025-01-24T18:15:30.620000 -CVE-2023-21107,0,1,84535a7ce9c93e7ebf8a2c283b51e406f5a990dd5441966e312e7872f5ebe156,2025-01-24T18:15:30.783000 +CVE-2023-21106,0,0,cc7e89eb8cf88ad3e9d3752b4097248d4503d0099cb95620e0e59c23db1d5ad8,2025-01-24T18:15:30.620000 +CVE-2023-21107,0,0,84535a7ce9c93e7ebf8a2c283b51e406f5a990dd5441966e312e7872f5ebe156,2025-01-24T18:15:30.783000 CVE-2023-21108,0,0,aa471174704ea3fdb9f8b2106a5be8827cbb290a00c1eb662144d17620a7ea1d,2024-11-21T07:42:10.687000 -CVE-2023-21109,0,1,604447f954e139f9191bf5e1289232fe508636391eea9bd91609d198c4db2690,2025-01-24T18:15:30.957000 +CVE-2023-21109,0,0,604447f954e139f9191bf5e1289232fe508636391eea9bd91609d198c4db2690,2025-01-24T18:15:30.957000 CVE-2023-2111,0,0,6a9640260aa91563af780e2010a0c6c0acb0d185fdafa584ccb0db7edce84d06,2025-01-10T17:15:11.043000 -CVE-2023-21110,0,1,0b4b736e103bdaa50e37209c44fa0a9e35d32b615b19ae7e57860a2003079c40,2025-01-24T18:15:31.133000 +CVE-2023-21110,0,0,0b4b736e103bdaa50e37209c44fa0a9e35d32b615b19ae7e57860a2003079c40,2025-01-24T18:15:31.133000 CVE-2023-21111,0,0,a9228ee60075f73227629f6cd77e27f676d0edb5135fe71db50c6e10f3d1393f,2024-11-21T07:42:11 -CVE-2023-21112,0,1,8f032a593c5483bc4f7b3834871ad08de86f2ddb01c05d63111f70ea9ef7db61,2025-01-24T17:15:10.117000 +CVE-2023-21112,0,0,8f032a593c5483bc4f7b3834871ad08de86f2ddb01c05d63111f70ea9ef7db61,2025-01-24T17:15:10.117000 CVE-2023-21113,0,0,31e1212d8efecb910800eecacc301137f8379e91cd70784a0252f8c3d5ee2583,2024-12-17T16:58:29.983000 CVE-2023-21114,0,0,fa32db5c147ae6a7a528a1bc56976da826ae48513e9e13398dd1022162fdf60f,2024-12-17T16:55:34.213000 CVE-2023-21115,0,0,d7e4c2025519fe78f076fc7aa3fd4a605d2590b8acba5d765081b08ac5bbd196,2024-11-21T07:42:11.600000 -CVE-2023-21116,0,1,f36d1d9895ca6fa6cf75804df5dd1e5e8731c79ef1371e6b2a54b5eb9ac49188,2025-01-24T17:15:10.293000 +CVE-2023-21116,0,0,f36d1d9895ca6fa6cf75804df5dd1e5e8731c79ef1371e6b2a54b5eb9ac49188,2025-01-24T17:15:10.293000 CVE-2023-21117,0,0,f0124ef076dc79a4e01262a8b1df4548fa0485e051c0d1617c6886216a48de33,2024-11-21T07:42:11.813000 CVE-2023-21118,0,0,71bb5efb77659c4025ee924a86e0b6dfd68c36cf41f64b4a9e78eb742b30f14c,2024-11-21T07:42:11.923000 CVE-2023-2112,0,0,ea9a0d098479ca4a7653e7953d9458eaeb6beaee2899a894eed45d07c80dc3a1,2024-11-21T07:57:57.813000 @@ -217943,7 +217943,7 @@ CVE-2023-23440,0,0,23331a24ed6fa042411fd43f8a792c8068294bfdb2977056e0bb7e7c8bcb7 CVE-2023-23441,0,0,4a953f0968337cc774649a952b3cf8d5696aa197f235e8802480db67d2b08c12,2024-11-21T07:46:12.167000 CVE-2023-23442,0,0,fe6970f3a3deffb09880c9386fa0a2141bd23cf70dadfdc2f5f416e05825daa5,2024-11-21T07:46:12.287000 CVE-2023-23443,0,0,ff97eb33c74f86a442e8a98c8e7d211e003fa05ac20f95b4909749668ca2c44d,2024-11-21T07:46:12.430000 -CVE-2023-23444,0,1,af6371fa483594b27f468bf271fa3878b052345131d1783f19d6978af19a2e4b,2025-01-24T17:15:10.457000 +CVE-2023-23444,0,0,af6371fa483594b27f468bf271fa3878b052345131d1783f19d6978af19a2e4b,2025-01-24T17:15:10.457000 CVE-2023-23445,0,0,8880e92d7bc034cb675d38c08f42febf5fa13c8e783bde27ccf599769f1f0259,2024-11-21T07:46:12.700000 CVE-2023-23446,0,0,c7a658494892aa196ecef5ec259814150fa42e230131ea0b1967b6aca86a951e,2024-11-21T07:46:12.857000 CVE-2023-23447,0,0,799570d84d44a1209e10ffb483abe255041344fd4d07112e85033741618026c6,2024-11-21T07:46:12.987000 @@ -218915,9 +218915,9 @@ CVE-2023-24535,0,0,9101527fd9107c5386236adaf2ee7bf3fcaeec19ee7ec12624ba60305ac5f CVE-2023-24536,0,0,bb2b8efcce4307c33912fd14b2db6df4da6e5afc1a5edcdd426d6232dcb522f3,2024-11-21T07:48:04.893000 CVE-2023-24537,0,0,98119d9acafd36005d2ffe696ca11675bc78d34c3c5852328010fe5111c9a191,2024-11-29T12:15:05.507000 CVE-2023-24538,0,0,c6ee96ea8510988e4fb3d5d751f84079e69488c511ff159e1502a7c218c3a75d,2024-11-21T07:48:05.130000 -CVE-2023-24539,0,1,ea2a302f962025f2382b8a15f62e5c70586e5fca58dbbba73e1ce7033f68300a,2025-01-24T17:15:10.670000 +CVE-2023-24539,0,0,ea2a302f962025f2382b8a15f62e5c70586e5fca58dbbba73e1ce7033f68300a,2025-01-24T17:15:10.670000 CVE-2023-2454,0,0,6361fc24a87ee7375e7b169be77c132fef3b9323deeb35b6d25dbcbf4850e79b,2025-01-06T18:15:13.670000 -CVE-2023-24540,0,1,b7f6c4fc2274b312f970ecce72090873352ec9fdcea64505b5abf9b78add4433,2025-01-24T17:15:10.893000 +CVE-2023-24540,0,0,b7f6c4fc2274b312f970ecce72090873352ec9fdcea64505b5abf9b78add4433,2025-01-24T17:15:10.893000 CVE-2023-24542,0,0,6612770957bfd2d7428b34a6ccdd2c7fcc6dc69049e1a2e76f202f5ae6e2afa2,2024-11-21T07:48:05.473000 CVE-2023-24544,0,0,7a92daab2fe2f7e58be38c40376f6014daf231528157940605d6e0de84c2256e,2024-11-21T07:48:05.587000 CVE-2023-24545,0,0,a0ab2d4842655375847722a0e937641ff0e0f8a7250b255418abf046a7f0cb00,2024-11-21T07:48:05.733000 @@ -219281,10 +219281,10 @@ CVE-2023-25002,0,0,05d98309d4ba01ab62a26e2e37b08847dff9179b49bd841d1fb29dca3b558 CVE-2023-25003,0,0,297b20457154613e442e6580d1b0483f9176e6b0e009157fbdd46071985f01a2,2024-11-21T07:48:54.767000 CVE-2023-25004,0,0,dbbc283b91f6ad6a332d9cd1d90463d0f805f7f8fcb481a2ec535a2c5f47b4d0,2024-11-21T07:48:54.893000 CVE-2023-25005,0,0,a4af3ee4f7aaa6243ca8568f13971e21ecd5ea682d692f71b836aa41bcef090c,2024-11-21T07:48:55.020000 -CVE-2023-25006,0,0,1f3de1f8953e85bd8a18c657b7335516c2448615f5b5cef4a41a0d7c6a1d18ac,2024-11-21T07:48:55.110000 -CVE-2023-25007,0,0,ab60a7f00cd6324cafcd5f5cddd9bee4720061fed408d88348628f2464f48429,2024-11-21T07:48:55.217000 -CVE-2023-25008,0,0,e212e66b79f836d2685450136199aae4d3407724be3880c9d24ab2b3f21be818,2024-11-21T07:48:55.320000 -CVE-2023-25009,0,0,a1ff504ba9081295efd5117e1dc19d171728759227339ca4ad38102e8e557467,2024-11-21T07:48:55.420000 +CVE-2023-25006,0,1,ae853a9109bdc39886707af4fba9fcba2895ea3fc5c03bcf7a7d0ae16349fec8,2025-01-24T20:15:28.567000 +CVE-2023-25007,0,1,22e5e0ddf5d72f0ac6a83616236efd19f5942400446e93ab195f7deea283c4ac,2025-01-24T20:15:28.733000 +CVE-2023-25008,0,1,350f0b19f640b9a36076dd4bd0035f87b878718f7e4ff571ff5c2fe7e18bb900,2025-01-24T20:15:28.890000 +CVE-2023-25009,0,1,aa83be1f25b4fe7ad392f362dbe2275f77d3b1fb2cab182a0e912f7f5704bc96,2025-01-24T20:15:29.030000 CVE-2023-2501,0,0,bcf94db4736413975ae16393e7bf5502060569e2c0b8dae4e7633363bec1c1b1,2023-11-07T04:12:46.920000 CVE-2023-25010,0,0,2c2f9fa1e30c2bc914254b7e01118518c31f0a0383a641e07d8a730c3c46f3d1,2024-11-21T07:48:55.513000 CVE-2023-25011,0,0,a01ad7712d2d74f9a1c8e248a3027079450a37b7d549ce047ec4d0f3f1cdfc0c,2024-11-21T07:48:55.610000 @@ -219588,7 +219588,7 @@ CVE-2023-25411,0,0,636dbecb556f26daf21eeee2d431f6e959c60ce85cccda03228fd8ee62b05 CVE-2023-25413,0,0,cbfb5dd5cfc9c6f68654da140c07215cc19ddb12fe14d6e2b371dac1edf57fb2,2024-11-21T07:49:29.447000 CVE-2023-25414,0,0,3cd7d483909e792b0a7b93f13aa9dd88ddb536f36551bc7983297dcc89a6ffff,2024-11-21T07:49:29.600000 CVE-2023-25415,0,0,ef59fe27bbab6a95d982795658a0dc7a3295e9ce3467cc8b53254a40c4638281,2024-11-21T07:49:29.730000 -CVE-2023-25428,0,0,e156cc2f7344449203b4767e2d20ae3dcdec550c54b2539722b09482b09d89f0,2024-11-21T07:49:29.863000 +CVE-2023-25428,0,1,394fbb9a4bbe9ce705d46ba5ba0225c0e642240f4e95fba1842a0fee358881b5,2025-01-24T20:15:29.190000 CVE-2023-25431,0,0,e316aa04217c95c99f1457a91f82135e51b8eff788a9ce2487c26f659f34afa3,2024-11-21T07:49:30 CVE-2023-25432,0,0,f20d1f459f74b986748a5528b7c2eb57d58187f6efbbf33869825f1d4e128f21,2024-11-21T07:49:30.130000 CVE-2023-25433,0,0,5df429e22dc751f41d7a433fdbe286812200698b107ca366808321b8c7ea1827,2024-11-21T07:49:30.260000 @@ -220539,7 +220539,7 @@ CVE-2023-26456,0,0,e082554b5abddc1181c4f573b227849cb909bfd759c086d3320483fc4595f CVE-2023-26457,0,0,1bf337e471bdfd12cf4e9a80906a6b456effcec0e91875477ab400f3fa9deff0,2024-11-21T07:51:30.473000 CVE-2023-26458,0,0,4f17b4a93349210a4477a4d519e7b00b822b8c47de774b72fec50d1f8dff2bd3,2024-11-21T07:51:31.217000 CVE-2023-26459,0,0,09338abaf25813d8a620bef182c6637fd3b37d13c5f707911e4d5bb3acc49305,2024-11-21T07:51:31.410000 -CVE-2023-2646,0,1,ccc99fbe80f4ded6d07f3b3f839f57c6106a718899d71ea764725254ed7b5c7c,2025-01-24T17:15:12.910000 +CVE-2023-2646,0,0,ccc99fbe80f4ded6d07f3b3f839f57c6106a718899d71ea764725254ed7b5c7c,2025-01-24T17:15:12.910000 CVE-2023-26460,0,0,48284d4a5937580bfb1d772bc775dfbd15cdb9e095e57f5addb17f37f82e0e8b,2024-11-21T07:51:31.720000 CVE-2023-26461,0,0,7e1223c51d4b82add8bddd794a14557f764fef91b24807bfd5db3c5f7ac8e287,2024-11-21T07:51:32.480000 CVE-2023-26462,0,0,b28f0e03e82910749ea20e439b44f9545fd9fabf4bd993763e891b6621188a84,2024-11-21T07:51:32.687000 @@ -220677,7 +220677,7 @@ CVE-2023-26595,0,0,04344e2401c7ce98c0143d2d0d5275c14deb36b2fb712d71e2c152ccc7fd1 CVE-2023-26596,0,0,473d756e5fc103c72c25cb52f36d58f77ec5ae61a2a53c9a3dc335fe84d6a907,2024-11-21T07:51:49.530000 CVE-2023-26597,0,0,aacf593fde559d15ce4638d00292bbc24591756418f0523c6654e6c81acd48a7,2024-11-21T07:51:49.657000 CVE-2023-26599,0,0,1dbb1f2d05db14b400489b090477c44b30116883ba51ce5b297c4ac394001c52,2024-11-21T07:51:49.787000 -CVE-2023-2660,0,1,c5e50d8f7c245a28f7e9c9d744a9c90d554ec4216b5e5c8e04bc31f8bfdce061,2025-01-24T17:15:13.147000 +CVE-2023-2660,0,0,c5e50d8f7c245a28f7e9c9d744a9c90d554ec4216b5e5c8e04bc31f8bfdce061,2025-01-24T17:15:13.147000 CVE-2023-26600,0,0,fc886529aff42ccdb72f3f96931777e9e70a1824ffc00cacb571e65058ac20b7,2024-11-21T07:51:49.920000 CVE-2023-26601,0,0,a5885f284434b5f08eb9e7edc10d2032bb0cda5c5996581471528822ba1aee62,2024-11-21T07:51:50.100000 CVE-2023-26602,0,0,6b0e3fbb7db010761dc530c451b95f462476cafda0ba70599528d74ebf165b88,2024-11-21T07:51:50.250000 @@ -221009,7 +221009,7 @@ CVE-2023-27232,0,0,6435041c02247b021ed0b287b7d978facd84a00f3d98235b6fe0014bae1d1 CVE-2023-27233,0,0,994f850112ed4f229ea119f753b0d0f877886e6fcdd0f4225e5f9ce183fae55e,2025-01-22T20:15:29.997000 CVE-2023-27234,0,0,8a7752bb1b30f5109f35237cc28f0ace1198d6b8423fb706790cd6275247ea06,2024-11-21T07:52:29.960000 CVE-2023-27235,0,0,c60453614f616d535021868dd641756962f30770bab77e2c62e439343b77ec43,2024-11-21T07:52:30.097000 -CVE-2023-27237,0,0,9e9f2e27b4ef41dc68969c03b24add02917d4a65eb1bd11f767ff119994d2172,2024-11-21T07:52:30.230000 +CVE-2023-27237,0,1,e09f60848d34f83c21a67da1938fe74ef21b790eaeaa3d9fbd20f0f0b76350dd,2025-01-24T20:15:29.370000 CVE-2023-27238,0,0,56534d066662ad2f46a3a8d5d8828a6ae1945f3cf9874425d0528759c2fa661c,2024-11-21T07:52:30.387000 CVE-2023-27239,0,0,8bece8ac4b3711e3110c648e7b065b3c9db482f541d115b3820b8138bcb95a0f,2024-11-21T07:52:30.530000 CVE-2023-2724,0,0,2a19d858691970cc8211d9fd57ad5cb987dab827efcf2e326b77a55f6df6f404,2024-11-21T07:59:10.277000 @@ -221312,7 +221312,7 @@ CVE-2023-27539,0,0,79c56876ceb58bbd6b856aaea0384a545d7c13f924cf40b93447a0213977b CVE-2023-2754,0,0,d5f6eb5ab236b3e3f181c76459d82ae29b6dfb8e4cabb74d93353265b6c24b94,2024-11-21T07:59:13.700000 CVE-2023-27540,0,0,e4f5a1b7cec8ef2d7fa729e4f9d99a9b9a12336eae9d656bd8d408965b9762f1,2024-11-21T07:53:07.683000 CVE-2023-27545,0,0,b2e7b47fc90259bf8fa905eaab6313d354638d5c3596602c89dbf7a17d90f60f,2024-11-21T07:53:07.830000 -CVE-2023-27554,0,1,fcf2ebab72cc0944dccd70a2526310290a286d09797603fbbdbe043d8d526833,2025-01-24T17:15:11.073000 +CVE-2023-27554,0,0,fcf2ebab72cc0944dccd70a2526310290a286d09797603fbbdbe043d8d526833,2025-01-24T17:15:11.073000 CVE-2023-27555,0,0,3777aa72fa625967b5cda53af2e0f8261052871f52d53a5942e3108050fe8948,2024-11-21T07:53:08.090000 CVE-2023-27556,0,0,969f7cfc1e16960d50a85b35a60f2c41e633c8f4bc7d8f329967f854df446f58,2024-11-21T07:53:08.230000 CVE-2023-27557,0,0,fee7f96091f4daac062b31ac020f2cead86e494cc367ca598dea840d505d7a93,2024-11-21T07:53:08.370000 @@ -221509,7 +221509,7 @@ CVE-2023-27810,0,0,4569b21ebe55bbd48c1fb19faa85e62fba04d801b3613e998284a55d92e59 CVE-2023-27812,0,0,f05ff8a230032379067162d0b03d2285448beb4e87b0935dc732b83e39a36c07,2024-11-21T07:53:32.147000 CVE-2023-2782,0,0,ce544c6d4ca6c7683f979a527ee94be242e480f3f8c3de285cfb741878216e7f,2024-11-21T07:59:16.830000 CVE-2023-27821,0,0,030653ba3fc23e6f1777838848a9d58e0658048b431e4f2b337261c0054cac8f,2024-11-21T07:53:32.300000 -CVE-2023-27823,0,0,de39d5d1b69e6ce911d3824858554c47261bf277ea1b73dfc02a4c614e32a6c0,2024-11-21T07:53:32.453000 +CVE-2023-27823,0,1,13e437ff0232d53e76f7ba344aab33dc944b5bf5242ffc7d0bf2fcd7c6276f47,2025-01-24T20:15:29.567000 CVE-2023-27826,0,0,6347975b3ad6cd0a6c56e8ad212042e6480582857697baae9c7d72978fd34950,2024-11-21T07:53:32.610000 CVE-2023-2783,0,0,096c3b26e537bed1ca5ddb3ac65f36398fc1d487c37d85c199430095b0e32907,2024-11-21T07:59:16.937000 CVE-2023-27830,0,0,31134275eb53f6f7a000d54b47d97c7e7c9a150ff8289e7f25052e8f6b4f75b8,2024-11-21T07:53:32.780000 @@ -221545,7 +221545,7 @@ CVE-2023-27867,0,0,b3180c2e860e0413e8d41b1901615f40b89c210542c1724dadd9bee526fc0 CVE-2023-27868,0,0,cb7a506841b50eb06d257d56dc78fa2c1ab5b1ca3d2e8ff81ab764c29e3e03df,2024-11-21T07:53:36.427000 CVE-2023-27869,0,0,4f4a00d98ec41c193738491046862ede6064b06bf9027e76d4489b0e99b3d1c9,2024-11-21T07:53:36.557000 CVE-2023-2787,0,0,9fb1047255b25715a91fef59ad5a4da5af4311b790827aec2538c223ce0f6fc2,2024-11-21T07:59:17.380000 -CVE-2023-27870,0,1,3ea38275458aa0c6b389ca9a602ed81c7d57c55d4cb9fda57c47e946adc9312a,2025-01-24T17:15:11.300000 +CVE-2023-27870,0,0,3ea38275458aa0c6b389ca9a602ed81c7d57c55d4cb9fda57c47e946adc9312a,2025-01-24T17:15:11.300000 CVE-2023-27871,0,0,ea357f4faa19761cd1c0c05f1d43a11950992e2db72fb10cc6d71d8f7b13028a,2024-11-21T07:53:36.797000 CVE-2023-27873,0,0,b31b1d8677b8e850135ecaa71dd7d112f59b0e81c5ddcce14b855c8ba08f5f95,2024-11-21T07:53:36.910000 CVE-2023-27874,0,0,0463bc709b1afe4b00211e6eff9a08d11e494f4b25c1a468020d0c4ff2d7a5a8,2024-11-21T07:53:37.033000 @@ -222654,14 +222654,14 @@ CVE-2023-29018,0,0,922e43052abec4031928226480f9538d26a6892cda65ef30e3335a545bcbe CVE-2023-29019,0,0,2bb9d1ecd0bc7cc72e87afc659e37efd7756a1d02e250ef6e354bcdb71155936,2024-11-21T07:56:24.387000 CVE-2023-2902,0,0,47a9dad13558343e16b2017833e6364aab2d675a8542431aac7c200506e3c368,2024-11-21T07:59:31.927000 CVE-2023-29020,0,0,2a49e9f30066e93fdba914d2bb8fa0f11e6a43ca326e40530c27eaa91167b6f0,2024-11-21T07:56:24.500000 -CVE-2023-29022,0,1,e66ea941b7e10386765faf64675274940ae480af5ddbfeb5226697a7889eae7d,2025-01-24T17:15:11.670000 +CVE-2023-29022,0,0,e66ea941b7e10386765faf64675274940ae480af5ddbfeb5226697a7889eae7d,2025-01-24T17:15:11.670000 CVE-2023-29023,0,0,c64c514f4e1f5a31c5c214b34efe883b6a34ac207496705f78d7ec08809e20cb,2024-11-21T07:56:24.763000 CVE-2023-29024,0,0,7c06025a9bab391c729156e49629d2916ef80c3f84c3e91b52d7a9e3f6d44c39,2024-11-21T07:56:24.893000 CVE-2023-29025,0,0,2be59035fd82225469e3059b819966fd8cb0982bccadc85ccf123f8d3df53bc6,2024-11-21T07:56:25.007000 -CVE-2023-29026,0,1,b114387596b85621f04495942fb8a776a8c1d5339a35a81d08fbc514e328d2fe,2025-01-24T17:15:11.873000 -CVE-2023-29027,0,1,843d6f2b13c2354adddcbeb4ce851225c71df74e4a3c02cf918ac1bcfda70fb6,2025-01-24T17:15:12.077000 -CVE-2023-29028,0,1,138eda2990db7e4030f460e032ced1422a6cfbb5ad0c23b863a09020f8c197f4,2025-01-24T17:15:12.280000 -CVE-2023-29029,0,1,643828183084d0be4afc3eedc7dbea129e57b1f7f796bb4e5c6d8386a60395bd,2025-01-24T17:15:12.477000 +CVE-2023-29026,0,0,b114387596b85621f04495942fb8a776a8c1d5339a35a81d08fbc514e328d2fe,2025-01-24T17:15:11.873000 +CVE-2023-29027,0,0,843d6f2b13c2354adddcbeb4ce851225c71df74e4a3c02cf918ac1bcfda70fb6,2025-01-24T17:15:12.077000 +CVE-2023-29028,0,0,138eda2990db7e4030f460e032ced1422a6cfbb5ad0c23b863a09020f8c197f4,2025-01-24T17:15:12.280000 +CVE-2023-29029,0,0,643828183084d0be4afc3eedc7dbea129e57b1f7f796bb4e5c6d8386a60395bd,2025-01-24T17:15:12.477000 CVE-2023-2903,0,0,9ba856a39b94381866d5413d1f09ca929280c6c11fb24ca23baeaf46b446d687,2024-11-21T07:59:32.067000 CVE-2023-29030,0,0,26b77e0fc62ed65c3e1141d3cf421cf74a3c2c419863014312219b7a9b96b8fb,2024-11-21T07:56:25.597000 CVE-2023-29031,0,0,7fe53f183d9ed3da1ecdfc1ed5672bbca9d1242a73ac8c88b5d9e3615331318d,2024-11-21T07:56:25.720000 @@ -222994,7 +222994,7 @@ CVE-2023-29388,0,0,b9d88f91ad2e793aacf5c8e6eccf028fea7b9c2660698f7be78bc69cb9046 CVE-2023-29389,0,0,c0a5bc2996fa100a5d1d4dbba184a794dfb7e1a165cf887f98ddec59042a381f,2024-11-21T07:56:59.087000 CVE-2023-2939,0,0,5097b0f3fd177e801415b54d7716f4683fb54c1157f3dcb9725b8d5f368e5323,2024-11-21T07:59:36.560000 CVE-2023-2940,0,0,7ad5423ee87e68f755e2cd74221edf5f886bdd506499833f9705f0fa2df479b6,2024-11-21T07:59:36.687000 -CVE-2023-29400,0,1,1e44a659f313ac7ea2eae366c8b5a4f17b500bbe5c336da0915df4967f9eda4a,2025-01-24T17:15:12.747000 +CVE-2023-29400,0,0,1e44a659f313ac7ea2eae366c8b5a4f17b500bbe5c336da0915df4967f9eda4a,2025-01-24T17:15:12.747000 CVE-2023-29401,0,0,189d3900ddbcd7a2489925c125aba69107e9bb9c485eb99b6325e285251a68c9,2025-01-06T20:15:25.613000 CVE-2023-29402,0,0,a1ce29ca36e2d1afa1603edc7261a9f4ccc8426222c2732d9abfeb73f679ba58,2025-01-06T22:15:08.150000 CVE-2023-29403,0,0,5dd4e6e903a0bb525f274407e12a14583c7672c8b5f7195ea14caf14f928175e,2025-01-06T20:15:25.820000 @@ -223196,7 +223196,7 @@ CVE-2023-2964,0,0,1d3278bf302564765627761894f402290b8c52e46be3d5e4f4bb1deddc4a2b CVE-2023-29641,0,0,43f0c1f656129d61c82018c826ea53c869fa84131b27213eacd5a21a64ed15b0,2024-11-21T07:57:22.227000 CVE-2023-29643,0,0,48b7dffeba5a5a32df8a31531ac344dba5adc6f0b323f87a4913ab91667a0727,2024-11-21T07:57:22.363000 CVE-2023-29656,0,0,a190f968c9b1e7640b2ec05941bfad4eda34e6985b30539e83a1f8e9649a3b3b,2024-11-21T07:57:22.500000 -CVE-2023-29657,0,0,0c8be9f584b27ecc977fc88dbce6882818887d6714c80bb6d1c1c1b1cdd51f5c,2024-11-21T07:57:22.643000 +CVE-2023-29657,0,1,aa8f581305ab53803794f1539ce0a704fb05194c2ac57e21afcf877a051f25e0,2025-01-24T20:15:29.760000 CVE-2023-29659,0,0,2a1fbd4d093cf958c4550a6528a3516a6d6c32bec9b3616c299d65551cafbaee,2024-11-21T07:57:22.783000 CVE-2023-29665,0,0,dc5bcda9680e3e806a58c210d638989728a9beeb191b9384e06e9fdf34c58cb4,2024-11-21T07:57:22.933000 CVE-2023-2967,0,0,68b3934288b12b39ac75de572ea12e8a00d7bce5b33663c2007fc9474a10f59f,2024-11-21T07:59:39.733000 @@ -223267,7 +223267,7 @@ CVE-2023-29779,0,0,681d8f683b2b71d50829dae856e43cd958db8f6cac9eaf6cbd2d467d723a5 CVE-2023-2978,0,0,ee44bdff3bc9077dbbc663fe0140364d678849011078f4d2033355d188a2eed8,2024-11-21T07:59:41.117000 CVE-2023-29780,0,0,cd39c42a57d66a3e72171622ffcf04e4013249b5645e59ef63ca186cb0348f85,2024-11-21T07:57:30.837000 CVE-2023-2979,0,0,940b8b5de0a61f019fd0bb4626df1bcc3e538e4fdbed90682482103718fa5e10,2024-11-21T07:59:41.287000 -CVE-2023-29790,0,0,2d92efaa85a761d0f83ea25f4bf069330abb6324de8da52f8d53c9144ec89017,2024-11-21T07:57:30.977000 +CVE-2023-29790,0,1,3b7e7bb2fc189dfb0da936cef9967e2b65134075246924fac3fad8720d30f13e,2025-01-24T20:15:29.987000 CVE-2023-29791,0,0,4b6f9ea2ad71afd296025135f53cd681f25dbb8240e6363e4604bd06dc15ea1b,2024-11-21T07:57:31.123000 CVE-2023-29798,0,0,929fc11dd08aafb782ae337033d6502ede598af40c51265505538d2cc854416a,2024-11-21T07:57:31.270000 CVE-2023-29799,0,0,0ead7209bfbe112296ed08d38629564c44635e7c5af1a6e255bfe2d6058b47d3,2024-11-21T07:57:31.410000 @@ -223484,7 +223484,7 @@ CVE-2023-30242,0,0,8baf24c44e63d1d69a6b0e1808b413624bf1c2f7ebe52100423b7d370d1b2 CVE-2023-30243,0,0,cdd46154297eae24fd51e167aa0472371f4219ce774c3c7239994abd7252160a,2024-11-21T07:59:55.980000 CVE-2023-30245,0,0,a964180dc5b6ec566c747fe0ba5220ac10fc7a3fffcac9a0879e4ba7b66689a8,2025-01-23T19:15:09.430000 CVE-2023-30246,0,0,6dbb071f5e59c28eb4fadaf8cc46d1b6e0a4cacf509deac2c8135d3934a98362,2025-01-24T16:15:32.490000 -CVE-2023-30247,0,0,903b7ad5843b2662c72b6532d3f837f2c30e6290bedd17cd01ed26c5389753f9,2024-11-21T07:59:56.410000 +CVE-2023-30247,0,1,8c34575f00011ad3b8708c886000e65d3a750580164f5b9d5bee394c447af3c6,2025-01-24T20:15:30.177000 CVE-2023-3025,0,0,c446eec5a9db9b12bf1ed2b6e31a26a68cf8f29bc31a0a6681096b8631efaa39,2024-11-21T08:16:16.200000 CVE-2023-30253,0,0,75d2b84f9e9ecd963fdf5317e18b495d544993e124b5902f9ae167bc369b8b60,2025-01-14T17:15:11.487000 CVE-2023-30256,0,0,0f007ec55ed468355a21fd6223d5b056f22a827eb3cdf0e2c5c0c4a50bee8cea,2024-11-21T07:59:56.697000 @@ -223531,7 +223531,7 @@ CVE-2023-30325,0,0,70807d2e4ca4fd8775172f6f8c11f55824cb776a5263239554b2fc808a3d8 CVE-2023-30326,0,0,c76e1b6103c9108270158042c753db77df7e3a997868ccfc2c52e3fb3cbc9e35,2024-11-21T08:00:02.550000 CVE-2023-30328,0,0,f1cfeb65535c22c6dea5cb800a464259181bb50580fbeea1b5dd0746e897731d,2024-11-21T08:00:02.727000 CVE-2023-3033,0,0,b30954e6e4a2fe108c8f54ffaf32a0eac08d5a10fc5d81af3d4d264074cae498,2024-11-21T08:16:17.173000 -CVE-2023-30330,0,0,df8dd805c8b161afe1ad423cd6c9545318269fad3d34e02125adeb97a503b0a0,2024-11-21T08:00:02.900000 +CVE-2023-30330,0,1,c046fb9ab922964500fee6f7e97dd4b2b6019859f4dfaabb2c896602c3c5b6f3,2025-01-24T20:15:30.353000 CVE-2023-30331,0,0,36b96b882140193a8befe83190e229390cc72a5b8b8b6271ed5f4522479867c4,2024-11-21T08:00:03.073000 CVE-2023-30333,0,0,e07d80cd11d0f66a322bda627fa83bab998b43c871bb2011c5667290d3b88bdd,2025-01-23T20:15:28.040000 CVE-2023-30334,0,0,c9fb7cd60cb8c9d33f0459930e2ea3d60618172c24f68dd48411639f1c0f4c19,2024-11-21T08:00:03.393000 @@ -224545,9 +224545,9 @@ CVE-2023-31613,0,0,dc3bc24966fcb2f8b19ed3778b36b32d0e22aaaacc0ef0b444c0a986eb49f CVE-2023-31614,0,0,cac7870b524a6213f4456b450f01d98b860768ae9c8129fe5dc1d12e5b99ad73,2024-11-21T08:02:05.280000 CVE-2023-31615,0,0,febe50b4026c3ea138f24df1a3698d981043d9580285e2632bfa571eb671d727,2024-11-21T08:02:05.430000 CVE-2023-31616,0,0,ca90d2794d3bc5f0fa73e79c853d40712773f874d9a3d547424a158b18c588a3,2025-01-23T20:15:28.237000 -CVE-2023-31617,0,1,5bf96898d5156077c55068ebeba29f15ccd9f29832abf7f06adbac536987a4f9,2025-01-24T17:15:13.593000 -CVE-2023-31618,0,1,161cd99f3e19d37b29ee4734c9a141582307f130ef057994e00b167062cc61f5,2025-01-24T17:15:13.817000 -CVE-2023-31619,0,1,1a460e436291c41f6edcda0474673dd598dcbf4e7d6560a964f39c8869010ca9,2025-01-24T17:15:14.007000 +CVE-2023-31617,0,0,5bf96898d5156077c55068ebeba29f15ccd9f29832abf7f06adbac536987a4f9,2025-01-24T17:15:13.593000 +CVE-2023-31618,0,0,161cd99f3e19d37b29ee4734c9a141582307f130ef057994e00b167062cc61f5,2025-01-24T17:15:13.817000 +CVE-2023-31619,0,0,1a460e436291c41f6edcda0474673dd598dcbf4e7d6560a964f39c8869010ca9,2025-01-24T17:15:14.007000 CVE-2023-3162,0,0,93f3ff20815ae3e12b6e1e87ebab4b734c329261c3fc1a22caf2ae8bad17d55b,2024-11-21T08:16:35.813000 CVE-2023-31620,0,0,2c889dbd711ab948387f355f21dcf0e288fb9b8b250f5b6e8fa6c945ff1f20d3,2025-01-24T15:15:10.067000 CVE-2023-31621,0,0,6d538cd26d4e963121721fdf4267e59ce563fb20354bcd190cf29f37f327e6c9,2025-01-24T15:15:10.273000 @@ -224692,11 +224692,11 @@ CVE-2023-31907,0,0,499f3cd90a76791b68a8afaa55122b520e5f406899634d10e3dcc99b6dc01 CVE-2023-31908,0,0,139c39aa0c7ae32cb32a7959314a2ee90226dedf13a661887cbe2b480137f543,2024-11-21T08:02:22.823000 CVE-2023-3191,0,0,6d5b8163594269d541d9b945b744164903108dc6d9fb58a1266c95089a1b3503,2024-11-21T08:16:39.710000 CVE-2023-31910,0,0,2972f57939109c9c1176101cd18f38750de45e0e257675e8f82afa08e2633400,2024-11-21T08:02:22.953000 -CVE-2023-31913,0,0,4af7eef241b808ebe2dc23e1dc5068efdfeb48aa3da79d419517e79271e44131,2024-11-21T08:02:23.093000 -CVE-2023-31914,0,0,86ae2a3a565226dd65e7f976141eb00bfb2dcc3616da6175e87a4ad43b968dce,2024-11-21T08:02:23.230000 -CVE-2023-31916,0,1,b2ba581a50a8b818d1f24ebba35e6212bc03e423016659d3acf4da3cd3b0f54d,2025-01-24T17:15:14.200000 -CVE-2023-31918,0,0,26d31462eec110bc0ea4d7b38a27204e297550e7e2ee2c74879290079d6ab345,2024-11-21T08:02:23.490000 -CVE-2023-31919,0,0,5c290c97b9b9ec7ec4920d5807b11e284892926ed7c3d8e701e7620a8bb4f1cd,2024-11-21T08:02:23.620000 +CVE-2023-31913,0,1,6b18f7f06cc36e42afc3182bbc9134d703327b78c9c0a6b1735d70a7dfcf3c0d,2025-01-24T20:15:30.967000 +CVE-2023-31914,0,1,a76467eeb22d8403ef01085642d9d400a725a2085ae6416fdd6af063ecc8f93d,2025-01-24T20:15:31.147000 +CVE-2023-31916,0,0,b2ba581a50a8b818d1f24ebba35e6212bc03e423016659d3acf4da3cd3b0f54d,2025-01-24T17:15:14.200000 +CVE-2023-31918,0,1,7a69641b5e0f2012b6743095ca2510725e58e704ba5c3a24adeaa20c858ef329,2025-01-24T20:15:31.320000 +CVE-2023-31919,0,1,cc70af628b7b3c92c1439be155b44fae09247059907867ecc9f03b5a317f3501,2025-01-24T20:15:31.490000 CVE-2023-3192,0,0,67f6792a55f68a187470b1e218d44e4e8e7549ccaf6c276bb4bb2dd84a9f0b2f,2024-11-21T08:16:39.850000 CVE-2023-31920,0,0,d49a53c9c78aa04ab2e0f30e554cd510e77c1ff4b3883954eb91c13fa642891f,2025-01-24T16:15:33.003000 CVE-2023-31921,0,0,cd627c5ee00b8d4c5e43df4d7636a4f1a58f57db000cbc18f8d30097b1567801,2025-01-24T16:15:33.267000 @@ -228658,7 +228658,7 @@ CVE-2023-37025,0,0,33bc7b812664e9275c3bfb23b6d53cbfefd4368ab864d63e6acddf0e1a53b CVE-2023-37026,0,0,61e46660d78cf955ae84e8e6591d596e7e87156504936378555fdb48a5003b9e,2025-01-23T18:15:28.537000 CVE-2023-37027,0,0,91beb5dd340a2ca54c55e25ee0aabe436b43c2179e0c9e4ab7d35730b3f91707,2025-01-23T16:15:32.543000 CVE-2023-37028,0,0,b17f27dec429070f83800c68afdc54fd88a66eb2c6dd49083c00e6201303a0bc,2025-01-23T16:15:32.740000 -CVE-2023-37029,0,0,b106e86842b4ab241775a15c1634c6a13d62cbf1d5f3eaee1cf4a3751ecd0529,2025-01-23T20:15:31.297000 +CVE-2023-37029,0,1,01dc11100f945bc28bf294eba0513a2204feaede513c0a6239261c6563e600c3,2025-01-24T19:10:35.177000 CVE-2023-3703,0,0,e793c1538a953443cfd9717dd4892eed9653e7e0e15a19f28233b00c03531ba9,2024-11-21T08:17:52.740000 CVE-2023-37030,0,0,2769613fc3db294b5909b55d6a376f481a0d6e0f7442ce4546c6af67d7872eea,2025-01-23T16:15:32.940000 CVE-2023-37031,0,0,f0d7880be47a0bdc007926f700ea044205aa9928cd41294ef7001b483319f7ee,2025-01-23T16:15:33.127000 @@ -235722,7 +235722,7 @@ CVE-2023-46393,0,0,9a88622a02f878401e0594af75a0c5f322db9f6a774503837069dc1919a38 CVE-2023-46394,0,0,15a2be266882ce5c7996f06599828c0429faf292e647b8839449e98272146285,2024-11-21T08:28:26.387000 CVE-2023-46396,0,0,bb4fd6eafc5e30939b253d28c3e2b3924dc41a01338566a01d248def0231db21,2024-11-21T08:28:26.537000 CVE-2023-4640,0,0,ed87e5f4e497c402b3df3f1a5218899f4400a69977f8db760ed9d0e7a2c9a13b,2024-11-21T08:35:35.697000 -CVE-2023-46400,0,0,8bb0b1dd77be771ece795e14db91d9a71db77eaa821c41e6f8839070faa358a8,2025-01-23T22:15:12.200000 +CVE-2023-46400,0,1,16632e3aaa7622a4553afaf2c4a313997dabfa16c487987445350e26eecc26ff,2025-01-24T20:15:31.663000 CVE-2023-46401,0,0,5986305e338b5b9accdc9359b0cf901126f4bcad7f721d1a3678ea3f0c7415ff,2025-01-23T22:15:12.307000 CVE-2023-46402,0,0,aaa3ff7a897d6cf9e33dcc787240acf7209bc0069ec2781169e797f5937f8833,2024-11-21T08:28:26.690000 CVE-2023-46404,0,0,244272f7668dd1e0a9457a738847246c64d5c278ad9643e94570e35173b604fc,2024-11-21T08:28:26.833000 @@ -244212,7 +244212,7 @@ CVE-2024-11049,0,0,f15d3cde98533895db175c6daeef740cd643f4fe5ea44a8fb9695d76fbd71 CVE-2024-11050,0,0,97b09a9297d22ccf4873559fbbb697493b98dfb210b831947a035d7cd550348b,2024-11-23T01:38:15.047000 CVE-2024-11051,0,0,0c5db2f4a5372b3789ea13ae4e153849a79584f39670640750e498cda1bc9950,2024-12-02T15:14:56.087000 CVE-2024-11052,0,0,7c7b2b511b21d0c05d1e2d0d46b4e7de1a92945f93e58cfee2fa96fcc37dd09f,2024-12-12T06:15:20.953000 -CVE-2024-11053,0,0,ace2879f672fc259fa319c3ae0100e28557a0568ca7da01d55485560a934674e,2024-12-15T17:15:05.273000 +CVE-2024-11053,0,1,36852a8075b22d1ba0cd31cdc22ff54fde5dd2040e48752d635968bfb4e7865c,2025-01-24T20:15:31.920000 CVE-2024-11054,0,0,62fc21be220f83b3b99662a715e1e46c9921295e254139d37846c3d822e7f7f0,2024-11-14T02:43:36.197000 CVE-2024-11055,0,0,361b4525d8d554dca9b7af21fbdc2732ba2b4cb91ff03c9d581c539d68f515b7,2024-11-14T15:18:45.933000 CVE-2024-11056,0,0,3a10fc20d50d7af8e373f4e0a2d0b184a059255ae88f42572318a0a10383d763,2024-11-14T15:21:09.907000 @@ -245159,7 +245159,7 @@ CVE-2024-12111,0,0,94cbde89c1eb7b342ad5b2e1b90e676e3d9dc7b09262fa3ba8de5cb41e47a CVE-2024-12112,0,0,675887d484c30a489c839813de06f4a2c0e83ee331233fc3bb15be475c6237ea,2025-01-08T04:15:06.683000 CVE-2024-12115,0,0,e6944683813361fa4999b92dbfb5849d2d0c20bc3f6186b671317bdf2839435d,2024-12-07T02:15:18.653000 CVE-2024-12116,0,0,4a2ceff80336184e35d0f53deaa453232f189dd136149b8e8e0cd03d307eb4c7,2025-01-11T08:15:24.867000 -CVE-2024-12117,0,0,c238501812a79d7a4391a03942bad0e9831f923aee816f3f08dc91ca0401a6c6,2025-01-22T07:15:14.987000 +CVE-2024-12117,0,1,5c2bbc39fb5b6d6401c07a64822b77288aeec30fc2cbad0cd60835722d462264,2025-01-24T19:05:36.597000 CVE-2024-12118,0,0,5b864c8aba94946082c0182c7625d7aeb008b9e7cdfe838bdb7fde83b8bd59ea,2025-01-23T12:15:26.890000 CVE-2024-1212,0,0,c6c0d98b39fe69ac963e13ef16e93aec1a62abd1466de44e7788f638a4921cfa,2024-11-21T08:50:03.010000 CVE-2024-12121,0,0,03702b315699ac0a86731f33a73d0aefd1ecc16bf8d72dc7730c1bb362033b62,2024-12-19T02:15:22.610000 @@ -245705,13 +245705,13 @@ CVE-2024-12853,0,0,41257905fe1b8024a4b0abaa09fe8324bc7a9ba4b9ffaf1cfe293b8b9bbd7 CVE-2024-12854,0,0,69236f9eafc0f2c7414eefa82874add13ee2f0264bbd1b7a7471ee6aa8d8128f,2025-01-08T10:15:07.120000 CVE-2024-12855,0,0,a46d762f03387b8afb1e9185d9de027ca31f0ae538ce006a6a77ed552320cc05,2025-01-08T09:15:06.927000 CVE-2024-12856,0,0,9babd12091bd3794c40f556b84241a138bc1e45b107552b0272431ce40e98129,2024-12-27T18:15:23.677000 -CVE-2024-12857,0,0,7eb8167cf473c2db513e3e588b18f4cd2b5edab127d9da6d7fef294dd12ac2e2,2025-01-22T07:15:16.237000 +CVE-2024-12857,0,1,ef7076837ea8a02d79d9d26c8f73cc7fa350cecedb358a5c02f6632362e827cc,2025-01-24T19:18:01.417000 CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee914a,2024-11-21T08:50:14.037000 CVE-2024-12867,0,0,732c7583e9efa2618fe2f4098930414e7eb5e8b8eea2432950087191a298a004,2024-12-20T20:15:22.740000 CVE-2024-1287,0,0,86cfcf8ed68830eef8991c1cc47e2012e7e4c97ca8a27598ab8fa2741ba6d8b0,2024-11-21T08:50:14.227000 CVE-2024-12875,0,0,65f6ca3bff49bc2fd9ea644c89d99467e02d0f3d3859a576808fcf00ae63e813,2024-12-21T12:15:20.910000 CVE-2024-12877,0,0,a9e389a679e420f1b0a9a06268a68a8b0a86295a1a7eef4bfea3f46105e61e67,2025-01-11T08:15:26.127000 -CVE-2024-12879,0,1,a421a5e4db3a04db3d207087595051348d7d155e9057f63ac7b875e4bac6c451,2025-01-24T18:07:31.260000 +CVE-2024-12879,0,0,a421a5e4db3a04db3d207087595051348d7d155e9057f63ac7b875e4bac6c451,2025-01-24T18:07:31.260000 CVE-2024-1288,0,0,395f2de724425f73212a7bc39e91c09ee4289c7b4882341dd1ed370b6c884fd8,2024-11-21T08:50:14.440000 CVE-2024-12881,0,0,ca1a79d9bb91f6e4db066c4e6e2534703ac042b68f8ca082fdad0b99821d0028,2024-12-24T10:15:06.240000 CVE-2024-12883,0,0,0dccbc52a4dfe90cc951e45cce63bd7a8971973694371765a4b4ec10fba99d5e,2025-01-10T21:24:53.957000 @@ -245890,7 +245890,7 @@ CVE-2024-13083,0,0,a00551ba6e0cadbeb1b3f766f7f6ef5748853bc6fcbf1ce2f64d620d72471 CVE-2024-13084,0,0,d00934445b6245a2d7a1c922e54582011935a722283aea79975605354cc8b9da,2025-01-06T14:44:57.910000 CVE-2024-13085,0,0,d0eb71970e4340c9d521cd6295f0e2badb4028ac6e8c3353ab1951da5ac33a1b,2025-01-06T14:43:13.437000 CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000 -CVE-2024-13091,0,1,e9978d25b15eb759e2bc9cfbde0802cf5e89ad556f7a4c0b02504deb75ff452d,2025-01-24T18:42:25.563000 +CVE-2024-13091,0,0,e9978d25b15eb759e2bc9cfbde0802cf5e89ad556f7a4c0b02504deb75ff452d,2025-01-24T18:42:25.563000 CVE-2024-13092,0,0,8a150593dbe1f180e29b1c2e3ea75cd720a3d6f50bb74cd3f244a3b1730f66a4,2025-01-06T21:15:14.273000 CVE-2024-13093,0,0,efaf6e963b0d924999f6d8167a81917175f763e9f833fbf291aa1961a6ad2e71,2025-01-06T21:15:14.427000 CVE-2024-1310,0,0,8eacc1832dc63ed57a42c33584abbb481a62a43a07e6f25f2b4df813accea989,2024-11-21T08:50:17.717000 @@ -245946,7 +245946,7 @@ CVE-2024-13170,0,0,64bb0fa3762d809dad101b4ba885fcca0dd1d305c82c02d70bc824e02b59a CVE-2024-13171,0,0,699657c265d040f82de898618a447265bb42e4c5f15629b32474eb0a58331d80,2025-01-14T18:15:28.913000 CVE-2024-13172,0,0,4be3076bfc8edd49ff4de334b04e8f62cacb071216b0af58069e07996765e5eb,2025-01-14T18:15:29.110000 CVE-2024-13173,0,0,052d5e11a0e6d41f18ffe50cc98d7e8fa992f332fedcf8acc482d2ed982cfbb4,2025-01-08T15:15:16.577000 -CVE-2024-13176,0,0,8a4d9284c211e2970017d5835563099844fe8229e7bf1f92a53e73993fa36f99,2025-01-20T17:15:07.667000 +CVE-2024-13176,0,1,688a5544ed6d5367fbc75e2da5ad54b6de313aa96b38efe207c8c73df66ca729,2025-01-24T20:15:32.150000 CVE-2024-13179,0,0,9d2a982b824c67bbacd2e3f4856194d80faa53a9ffb503fdbd054d373079f25f,2025-01-16T21:01:38.177000 CVE-2024-1318,0,0,8468ceebf6c6c9f41014d2f5941b790bd61167061813191d7b8edcc4ba43bbca,2024-12-31T16:56:50.763000 CVE-2024-13180,0,0,d8eed302f18bf4ce52a1f3c3aecacb18daed8ee47876692255a4c4adf22e5203,2025-01-16T21:01:52.650000 @@ -246089,8 +246089,8 @@ CVE-2024-13351,0,0,7985eca9113b0e4ff9b5606ce71f06a97acfce6eac97b8c91847c6875b508 CVE-2024-13354,0,0,5de8a07beb3503362800c3c9a7e68d19454bfcd982cb7525cd68c521c68ce55c,2025-01-24T11:15:08.887000 CVE-2024-13355,0,0,b14926ff025e929de229a84af4734d711f0473d16ba82bc6498a7b20173af029,2025-01-16T10:15:08.750000 CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000 -CVE-2024-13360,0,1,42c7ef7264873842b1b321dcb1d9eb02287e4b9dd082710569d0b72683473221,2025-01-24T18:58:46.177000 -CVE-2024-13361,0,1,796ae81aa903e35e91be1aa59cd637cc5eee53bc205bb2f1ae10309102da0980,2025-01-24T18:55:22.577000 +CVE-2024-13360,0,0,42c7ef7264873842b1b321dcb1d9eb02287e4b9dd082710569d0b72683473221,2025-01-24T18:58:46.177000 +CVE-2024-13361,0,0,796ae81aa903e35e91be1aa59cd637cc5eee53bc205bb2f1ae10309102da0980,2025-01-24T18:55:22.577000 CVE-2024-13366,0,0,4b12bd5212b118d30ff048db445e6d1c00e6cad223533401dbdc6a341b0a882c,2025-01-17T07:15:26.947000 CVE-2024-13367,0,0,28bc518effbeac20d5854322c01ceb858440caae6a5bae49591369a0a18ef4cb,2025-01-17T07:15:27.123000 CVE-2024-1337,0,0,ecd9569d803b0ad7e93765437336dbe54b6bca900bd0d8d6a4265ae95a2bd0fa,2024-11-21T08:50:21.857000 @@ -246117,23 +246117,23 @@ CVE-2024-13409,0,0,9a9934c96e1b3b594722c2aa6970db5452530e9596d366c39c81c530d063b CVE-2024-1341,0,0,090bf84c5ce2b0dfeca3a04f998237d36add49409b51be286587af2f8364beb8,2024-11-21T08:50:22.300000 CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000 CVE-2024-13422,0,0,e3ad66da42c2798d7caf436789cf96956e806fa00807b0554cd9b7f915a2326a,2025-01-23T12:15:28.163000 -CVE-2024-13426,0,1,86fab2a47173ecbfa78b3dbc75ac72da294fc64d34b2b04366fafee0f3e9a13d,2025-01-24T18:37:38.503000 +CVE-2024-13426,0,0,86fab2a47173ecbfa78b3dbc75ac72da294fc64d34b2b04366fafee0f3e9a13d,2025-01-24T18:37:38.503000 CVE-2024-1343,0,0,7c2447499342d3573955d9e9545316db90429adf3b266826e2ed2754189f075e,2024-11-21T08:50:22.433000 CVE-2024-13432,0,0,7d75f67ac18cf32d5dc44570eb7cf156c877d943529d3637d5b0bb399b86a599,2025-01-18T07:15:08.983000 CVE-2024-13433,0,0,b744d44080e2e33c41984f231e71d8cc1252181c511f568444c5c86671c3eb05,2025-01-18T07:15:09.160000 CVE-2024-13434,0,0,292fbae0324c9bc0e0a4304860c64d8e4dabea0f0444b12419bd12eebd083320,2025-01-17T05:15:09.290000 CVE-2024-1344,0,0,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000 CVE-2024-13444,0,0,2a82e7dc36beac803abf8c10509e1ae610559c76a3585d9c1850f27a1808797c,2025-01-21T11:15:09.450000 -CVE-2024-13447,0,0,a103ae61959293a726fdc47498052185ef8168ea4410b87b04821193eaac3ef9,2025-01-22T11:15:07.777000 +CVE-2024-13447,0,1,4e4ee51c076699c7672245e5729c9870c182faecf6e2bd018441c71df98cbb9d,2025-01-24T20:53:40.380000 CVE-2024-1345,0,0,7c212e7b361746cfecf33f6e4ed924489ff6a3a938083dd73fe4da2b7b4649da,2024-11-21T08:50:22.667000 CVE-2024-13454,0,0,64bcb798150e96f58a909578ab30d46cff0e023968dc2b1dcc5267d8fae6c946,2025-01-21T20:15:30.793000 CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc24d,2024-11-21T08:50:22.793000 CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000 CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000 CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000 -CVE-2024-13495,0,0,7ba82927e3930c2cb6a7d1f568fd7c246464ed5b3f7c9c4431055a5bec2ad448,2025-01-22T11:15:08.193000 -CVE-2024-13496,0,0,936618627f845ba9cc9798cf205c2bbd4e19d9aa7fe11bf69036c2a8cbae283c,2025-01-22T11:15:08.373000 -CVE-2024-13499,0,0,fdec2fa425d6a94422e0b6dd68749531fdda49fd494a43529909b244ec9a2cf7,2025-01-22T11:15:08.533000 +CVE-2024-13495,0,1,7a8bc062291cac2ab3dfb8a0fb7feeecd31abf131df44b7d6a18b1140227b207,2025-01-24T20:46:53.307000 +CVE-2024-13496,0,1,192a8533534e044b339576d96e9cea7e19a2bbd248a7b183889cec35656a4f79,2025-01-24T20:45:57.463000 +CVE-2024-13499,0,1,6d635dc5b8c51f2804fa43df8b3beb018f4524a3b4ba54f25865b62cf92ed7dc,2025-01-24T20:37:12.533000 CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a81697f,2024-11-21T08:50:23.313000 CVE-2024-13502,0,0,ac2a41b6cd26a4157041ef83a41fb1ca5fe4741530d1e5a7cb1a80b922fa6ce0,2025-01-17T14:15:31.147000 CVE-2024-13503,0,0,9a18f887782bddd42cf8f60b9b9da1ba6181ce424bb49fdf69f585a65e64cdd7,2025-01-17T14:15:31.317000 @@ -246156,9 +246156,9 @@ CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996 CVE-2024-13572,0,0,810ff57abb3e74e570a0f4342646c85283702b45afe741301e2f9c7354adbef4,2025-01-24T11:15:09.520000 CVE-2024-1358,0,0,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000 CVE-2024-13583,0,0,0b9f6e50f40d8666926a0b56850821d9e08e6198a49b3d6cb41e84991c2caf40,2025-01-24T10:15:07.770000 -CVE-2024-13584,0,1,ee87f1c36c9c93255b87e8f2b16900d4e175847a31f3c291ef2046e604a7f364,2025-01-24T18:20:40.760000 +CVE-2024-13584,0,0,ee87f1c36c9c93255b87e8f2b16900d4e175847a31f3c291ef2046e604a7f364,2025-01-24T18:20:40.760000 CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d3c,2024-11-21T08:50:24.543000 -CVE-2024-13590,0,1,aa6f52a963149ee514cd80b7b2a6b7948bff891700d00f428940ffd85b0107d7,2025-01-24T18:09:26.147000 +CVE-2024-13590,0,0,aa6f52a963149ee514cd80b7b2a6b7948bff891700d00f428940ffd85b0107d7,2025-01-24T18:09:26.147000 CVE-2024-13593,0,0,9e6eeaf6317d0d53a5777da60336a0df45a0567c61ee5316375bb6592e2f9ab4,2025-01-23T10:15:07.737000 CVE-2024-13594,0,0,b89d92c59d6589291d5b3e44e449a8d8620a2bd20dcfac4fc41ec59549c64cba,2025-01-24T11:15:09.667000 CVE-2024-1360,0,0,a87675d91847a9b72ed5368695c7c67c099276d1667e5e94dc544f268946892c,2024-11-21T08:50:24.707000 @@ -246395,7 +246395,7 @@ CVE-2024-1599,0,0,105f658bdb5d4f55673b9a4a91d4766e7759683398ba430d2b081d80ef821d CVE-2024-1600,0,0,10ef0d97da1af05e4452c1d5b85c6b86d92a91f8e5aeffb132a19cd0ecdd104f,2024-11-21T08:50:55.133000 CVE-2024-1601,0,0,144a783d83759d1f22b634484b2bbef03f531a52b9217df0a5759fb08e47b78c,2024-11-21T08:50:55.263000 CVE-2024-1602,0,0,56ecc218dd37ad215a177db8079488241e64c43dc3bae7eec42fdf1bdb84777a,2024-11-21T08:50:55.387000 -CVE-2024-1603,0,1,40e9d93a18e24bfe0aaa466babdd862b8c37692838e40cbdcde8e0e815d795d8,2025-01-24T18:22:44.423000 +CVE-2024-1603,0,0,40e9d93a18e24bfe0aaa466babdd862b8c37692838e40cbdcde8e0e815d795d8,2025-01-24T18:22:44.423000 CVE-2024-1604,0,0,7ac9103a08c9e9dd04004b4e7466052243f63c72b367568e72784f5a0bc1202e,2024-11-21T08:50:55.637000 CVE-2024-1605,0,0,9d25139cf22609654ef8a455d8d21cdf06e67cf1e19359d09ce5b9576dd7793f,2024-11-21T08:50:55.790000 CVE-2024-1606,0,0,98f100f836fcdef4d873587f10566a7e89908cb420114440541bb054f23516db,2024-11-21T08:50:55.920000 @@ -250260,19 +250260,19 @@ CVE-2024-2442,0,0,253b87e62399d3a6af245d178e21fd710ca2545ac6e1dfd17779d2dcf3253a CVE-2024-24420,0,0,5a5bc176c375a6ae3c1f1f1aaa7fa8c118b011f44384ef34091460eeed674d90,2025-01-23T16:15:34.687000 CVE-2024-24421,0,0,fa164804ff284d241187d08b344fa9d54b6fd94cc28a5540cb8e981223f48d19,2025-01-23T16:15:34.883000 CVE-2024-24422,0,0,1247c4510d55f3623ac23416024d95438e2a92cf5a1d9eb7b0493895127e21c8,2025-01-23T16:15:35.053000 -CVE-2024-24423,0,0,ddea1df30dfa7ce209949db87ba3322324bc4b2ab5b0764768258bd83bb953a9,2025-01-23T16:15:35.253000 +CVE-2024-24423,0,1,3602e7e8dd0e190d1cab0bce472c12bf7aab77349cdd1f464f686e921273c5fa,2025-01-24T19:07:57.183000 CVE-2024-24424,0,0,512c38d36e5aa9c9f79f68e96ae95b4f93b2be8c28966f0070415d2ad484813e,2025-01-23T16:15:35.453000 CVE-2024-24425,0,0,f020647313a266e9b26d920d7b3ff0c5a70298ceb4b38f72086ac27d496b3748,2024-11-19T17:35:09.450000 CVE-2024-24426,0,0,1ba202c66d22ec01d9165c4229044ba2d8de45fa575e097063ba053bd7d0b3a7,2024-12-03T17:15:09.400000 -CVE-2024-24427,0,1,9f4db1e25b8a6f9f095e87c0819d91e392c3303a0ffc4e643040fa19913b74d5,2025-01-24T18:47:28.570000 -CVE-2024-24428,0,1,ef5d1f3e1c76dfbbcd121548afdf85c644e4be29902773b535f47eb5dabf7d2f,2025-01-24T18:44:26.897000 +CVE-2024-24427,0,0,9f4db1e25b8a6f9f095e87c0819d91e392c3303a0ffc4e643040fa19913b74d5,2025-01-24T18:47:28.570000 +CVE-2024-24428,0,0,ef5d1f3e1c76dfbbcd121548afdf85c644e4be29902773b535f47eb5dabf7d2f,2025-01-24T18:44:26.897000 CVE-2024-24429,0,0,4ab29af21421fe9731a30a80f100729ff3757ff97b28d5817033562018b538d4,2025-01-22T16:15:28.907000 CVE-2024-2443,0,0,1bdda57280ff24c7755bfc385c8c5e030e460e899c6d0c2078c3b0acbbc8fb06,2024-11-21T09:09:45.827000 CVE-2024-24430,0,0,bbeb452d0a78e4023881f525a04de9114ebaa1d6a1e4c74130e66ee8c8539e7c,2025-01-23T18:15:29.850000 CVE-2024-24431,0,0,df56f81b7c3a1e35add47673987ba3302b83c2d47d8419bd59e79e036d2e2abd,2024-12-03T16:15:21.187000 CVE-2024-24432,0,0,8f5779f5919d73329002c1b84a29f1fc16c658faaf52302aadd0e87a855a1c40,2025-01-22T15:15:12.793000 CVE-2024-2444,0,0,d9ff5dc2f1cec3e82221567fd131c75cf5704e6ca903fd99eda244483e9cdd6e,2024-11-21T09:09:45.953000 -CVE-2024-24442,0,0,dab1d192224455c9dbc2bb672a2b1d0803f5127b7d95d237ff5a5b7907e7708e,2025-01-21T22:15:11.610000 +CVE-2024-24442,0,1,ee978616649e5f964d58831d9a89396afadb2cfa402f3f4d3cd199735f6dbfb6,2025-01-24T19:15:12.470000 CVE-2024-24443,0,0,61ee9c48ca4b7520a2cef22b1d83f9f14d157d857aab2d1ed38a31b2dd4c3b0e,2025-01-23T19:15:10.540000 CVE-2024-24444,0,0,ac03478eee756bd3acfd373638c49cadedc682520b5d9852b736440ee5f0ff5e,2025-01-21T22:15:11.737000 CVE-2024-24445,0,0,8951525a630ef7002c4c50c2bc834a25267be75618ad4d3813836a8ae7898249,2025-01-23T16:15:35.617000 @@ -250281,7 +250281,7 @@ CVE-2024-24447,0,0,16b4c82adca912903405ea4de695a47b9422228cb2a3f727c34125b114515 CVE-2024-24449,0,0,cb429ffc1f73fa46512b04b6b6b7262785b1e5e3d056a09b6c1ac751016dc45d,2024-11-26T19:15:23.090000 CVE-2024-2445,0,0,caebbca57e6dc905fece28cfd8e27fbd318000c7101a9c9ad5d052cb37da5e31,2024-12-13T17:15:49.207000 CVE-2024-24450,0,0,bfdf5a51b70b0375ac650a265388caa7ba6f2b773803891c0563ccf75c951b15,2024-11-18T17:11:56.587000 -CVE-2024-24451,0,0,05fd2058e14b28682a9eeb86247ae7c27fb5eb86cb63a940169f32a54cc648c9,2025-01-21T22:15:12.013000 +CVE-2024-24451,0,1,2047230038706a6ea449594aac339b5a79a1ce23f8545e56ac9ddd4465baf12d,2025-01-24T20:15:32.263000 CVE-2024-24452,0,0,9b35057c4f8238c71060c4a3362de0c41210e1bb46a2fdae5c8c842b460d1809,2024-11-18T17:11:56.587000 CVE-2024-24453,0,0,7dbe40dab6b44347c4e5eb5b29ed5a220fbd48ca061b2817d1f080948c6c4725,2024-11-18T17:11:56.587000 CVE-2024-24454,0,0,16fe1707e5b6500467b31b614258ea3c9d6830f97969cc4c9d7fb698042d7182,2024-11-18T17:11:56.587000 @@ -251312,7 +251312,7 @@ CVE-2024-25933,0,0,10c4dcd1d4877c2c5d9d0ce4b63a969433dc4656fa5c7f916b0ffa00f975f CVE-2024-25934,0,0,62ea49431b2bed66fcc156f5ea3cdf41723ad0795ba3206bf55318a5498e2cb0,2024-11-21T09:01:36.283000 CVE-2024-25935,0,0,66be2dcb22fbb70c35c4ddb4f21e1f6946a1ef5585b5ff1ae05a77950d584a36,2024-11-21T09:01:36.420000 CVE-2024-25936,0,0,883e76a8e3b646c5fa72740a548a845a65d2a06142b661c1322ccee0cc64fa50,2024-11-21T09:01:36.543000 -CVE-2024-25937,0,1,ff95c9e0762c8748df9a9a290ad15a2baaab9ad61fd50aa6f8e199feb077d8a3,2025-01-24T18:42:26.510000 +CVE-2024-25937,0,0,ff95c9e0762c8748df9a9a290ad15a2baaab9ad61fd50aa6f8e199feb077d8a3,2025-01-24T18:42:26.510000 CVE-2024-25938,0,0,1d865435e59bdefe0610d67720b1f7a1a1a64e9177daafdb2de5f4c0e3a2169a,2024-11-21T09:01:36.797000 CVE-2024-25939,0,0,fb4f39370672b53a09e47b6058fdff83594ffb1956fa31c3b1a3b0c65c6d3f89,2024-08-14T17:49:14.177000 CVE-2024-2594,0,0,21f2f45d3be94b17d49078e4bde55faa65299c07cf2be6edec5fcc2f64e73c73,2024-11-21T09:10:05.157000 @@ -253127,7 +253127,7 @@ CVE-2024-28045,0,0,3250b5241cb3eb30591229d8a728ec2919682fc73063bc0b93558e23a7537 CVE-2024-28046,0,0,08ac6a41262a30c05ef763f8296b9175ae9831f9fdea62d8c95f9945b9c74715,2024-09-06T18:40:14.330000 CVE-2024-28048,0,0,166375921280a7285874abcdec0584c225aafe530cd2ca9bad02a6525a8cff07,2024-11-21T09:05:41.997000 CVE-2024-28049,0,0,4191140b72d68518c43bb961f8171d2b3da1a3878f82c679e5f952ecd7437a12,2024-11-15T14:00:09.720000 -CVE-2024-2805,0,1,fe8f764c46018c0437f3ff224d0879dfaff251abe0ca32544a20cce1c4a57b33,2025-01-24T18:45:05.873000 +CVE-2024-2805,0,0,fe8f764c46018c0437f3ff224d0879dfaff251abe0ca32544a20cce1c4a57b33,2025-01-24T18:45:05.873000 CVE-2024-28050,0,0,f3643cbdb49a4c7574b6516a7598c57183183b47fe304523dd186648f5cfdc84,2024-09-06T18:38:11.353000 CVE-2024-28051,0,0,7601c11101569664a5b4d443a5b495681a8340b0f1a4c210fa382ed043fbb231,2024-11-15T14:00:09.720000 CVE-2024-28052,0,0,c091e5a10488583b0029fed7f1a8e4d1e6cdb2795bd026298532c166c3b5f4bd,2024-11-21T09:05:42.417000 @@ -254291,16 +254291,16 @@ CVE-2024-29865,0,0,9ff88181cc09011dacc69644a77d36e95923b0be430e91548467a246755f0 CVE-2024-29866,0,0,8fc166448f3fbecaecd8b7ed9d6aa230d3bb984af892d0077240e75b9b6f7a9a,2024-11-21T09:08:30.190000 CVE-2024-29868,0,0,654a536670a62fb45b5203eb432335632fdfc103e225c6be2f801ded9b3b1341,2024-11-21T09:08:30.413000 CVE-2024-2987,0,0,e4d4968f2ab326fc6f93467dbe0c42753ad32258cee7fd3257881b95a825941e,2025-01-14T15:10:15.733000 -CVE-2024-29870,0,1,b73bbe674034b941cb1de42af16181f829d1cbe733c707402192e9d9f2c3eec7,2025-01-24T18:18:36.670000 -CVE-2024-29871,0,1,61f4b4d6f5a977f77b612c4fe0dcdf35eb10ba2cd3db813456ced514fcadbcf3,2025-01-24T18:18:34.350000 -CVE-2024-29872,0,1,d4e4aff44522db648daf879beddf04b8eec6f8628a65f3da5471f851ccb907f2,2025-01-24T18:18:31.603000 -CVE-2024-29873,0,1,bf0f80e52c044b0af95eaf9546edffe28d428f032f83759d6cf4605c55b106c0,2025-01-24T18:18:29.537000 -CVE-2024-29874,0,1,deb4673e1cd798c1cbaa54a5aa0e3d21cc21e45db970c79bbc8edeab04a40389,2025-01-24T18:18:27.523000 -CVE-2024-29875,0,1,bbf120dab2bab4c06c3bc81a694740691f6ab47c4b437a16caf1820ebf9b3df0,2025-01-24T18:18:25.493000 -CVE-2024-29876,0,1,7f6f19b24f771554c14edae445fc4f018b98ec2bedb6f2a808f719f93fc2e44f,2025-01-24T18:18:23.223000 -CVE-2024-29877,0,1,88a069f8ee7c95e6c1d2db12276ee28ef36ce6e54fca833122b22a39a3dda5e8,2025-01-24T18:17:39.100000 -CVE-2024-29878,0,1,a568e7af6c22d4b342eb4140b83b64cff76bc59e0f04aa4842c0668e0d651796,2025-01-24T18:17:36.817000 -CVE-2024-29879,0,1,e2c2757fa86f08980c5086f1a721230bdf2268c46bff1d92e73e717d38f3624f,2025-01-24T18:17:54.427000 +CVE-2024-29870,0,0,b73bbe674034b941cb1de42af16181f829d1cbe733c707402192e9d9f2c3eec7,2025-01-24T18:18:36.670000 +CVE-2024-29871,0,0,61f4b4d6f5a977f77b612c4fe0dcdf35eb10ba2cd3db813456ced514fcadbcf3,2025-01-24T18:18:34.350000 +CVE-2024-29872,0,0,d4e4aff44522db648daf879beddf04b8eec6f8628a65f3da5471f851ccb907f2,2025-01-24T18:18:31.603000 +CVE-2024-29873,0,0,bf0f80e52c044b0af95eaf9546edffe28d428f032f83759d6cf4605c55b106c0,2025-01-24T18:18:29.537000 +CVE-2024-29874,0,0,deb4673e1cd798c1cbaa54a5aa0e3d21cc21e45db970c79bbc8edeab04a40389,2025-01-24T18:18:27.523000 +CVE-2024-29875,0,0,bbf120dab2bab4c06c3bc81a694740691f6ab47c4b437a16caf1820ebf9b3df0,2025-01-24T18:18:25.493000 +CVE-2024-29876,0,0,7f6f19b24f771554c14edae445fc4f018b98ec2bedb6f2a808f719f93fc2e44f,2025-01-24T18:18:23.223000 +CVE-2024-29877,0,0,88a069f8ee7c95e6c1d2db12276ee28ef36ce6e54fca833122b22a39a3dda5e8,2025-01-24T18:17:39.100000 +CVE-2024-29878,0,0,a568e7af6c22d4b342eb4140b83b64cff76bc59e0f04aa4842c0668e0d651796,2025-01-24T18:17:36.817000 +CVE-2024-29879,0,0,e2c2757fa86f08980c5086f1a721230bdf2268c46bff1d92e73e717d38f3624f,2025-01-24T18:17:54.427000 CVE-2024-2988,0,0,82667b43a39fa361897af5e745219c302675a25631d3c63cfb07aea1cd122ce4,2025-01-15T18:20:41.567000 CVE-2024-29880,0,0,9ac6e81333477f282048eba209d47dc5f78b687ca71971db5702c5608a33ba05,2024-12-16T15:37:50.093000 CVE-2024-29881,0,0,26411cffafa6bc6e69a94607cec3788fdb2462e04af812e3926cbb73aee7ce39,2024-11-21T09:08:32.393000 @@ -258315,7 +258315,7 @@ CVE-2024-35117,0,0,775edc85fc6292ca975b97313cb5e23af42f4ca9689462af06c7300c98306 CVE-2024-35118,0,0,4324926efe207392a4ed876fb67f7b1d20226a5f3a177cb56ee4d7f8d8101687,2024-09-19T15:53:25.123000 CVE-2024-35119,0,0,d30b5118f01127b72a967e41cbcd9127e0dc9e2965ef5097a86f08236d88d108,2024-11-21T09:19:48.800000 CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000 -CVE-2024-35122,1,1,de59a9b5e0157ef4689680697859cb84bcd3a44a0711e096a42fc3b28dff992d,2025-01-24T18:15:31.680000 +CVE-2024-35122,0,0,de59a9b5e0157ef4689680697859cb84bcd3a44a0711e096a42fc3b28dff992d,2025-01-24T18:15:31.680000 CVE-2024-35124,0,0,a922d1c3a3958629dbb0cd51b2de664bb7e7c9433c590d1267fd4128399d23a0,2024-08-22T13:31:16.353000 CVE-2024-3513,0,0,f3b60a2341228082c6b2c058a60950acb3fa7e0ac56c3c9b7f478ff2d11ae041,2024-11-21T09:29:45.410000 CVE-2024-35133,0,0,c27bb2f028f480c71f80a658c5187f1d60bf9d11ef3f138f496564d01c9e391f,2024-09-21T10:15:05.527000 @@ -261040,7 +261040,7 @@ CVE-2024-38475,0,0,cffda6a953163d4e08000545cbd4d92ba2e5d3654b5efce5be8544cd35b12 CVE-2024-38476,0,0,96df90db5dbf5efcc1d36711d52981a73ed110b8dfbeaa5665e3f3feb3c366d0,2024-12-02T17:36:33.403000 CVE-2024-38477,0,0,61c016535771a81220fcf93e40f52301771e6724b3cd648d2be13687108c8516,2024-11-21T09:26:03.687000 CVE-2024-38479,0,0,c70847aedbd201cfc354e550e0b90cec56f97441e95e9c598b1abef167a9ff30,2024-11-15T13:58:08.913000 -CVE-2024-3848,0,1,1bb91ee395c277a929aef5b89902a90b679e2d6a3388b7e9b3f685b088b1075c,2025-01-24T17:28:21.717000 +CVE-2024-3848,0,0,1bb91ee395c277a929aef5b89902a90b679e2d6a3388b7e9b3f685b088b1075c,2025-01-24T17:28:21.717000 CVE-2024-38480,0,0,8fa161912c0761a853152d1feac8fbf447a9a2c195060b213f1ea7b76eade0d8,2024-11-21T09:26:04.080000 CVE-2024-38481,0,0,e569c1b2683e1d59dfe394dee132f7375b3825578031c3d522810bc8473f889e,2024-08-02T13:54:44.360000 CVE-2024-38482,0,0,23aec5fa68b4dca4b432634d8e07eea61a04bf96b789d1627bdb6ec4b3c1f391,2024-09-05T16:04:53.577000 @@ -261396,9 +261396,9 @@ CVE-2024-38818,0,0,f3b0a463e446554a0bbb57d124414991153a9fb40d9dc2ce6360b72156684 CVE-2024-38819,0,0,c298508c17117e1259d3bfe55735b04be8f822cea51854f73ce47b1bd6cf019b,2025-01-10T13:15:09.287000 CVE-2024-3882,0,0,d37dc3616c740393b4e1b16d38d2bd3ccee2a1af91c97d5fbd3f6f75e095d7d6,2024-11-21T09:30:37.540000 CVE-2024-38820,0,0,517fdb1091af57612900b39a11b0b83e3890144a7a4d4cb71cfb71c69b405fa9,2024-11-29T12:15:07.007000 -CVE-2024-38821,0,0,0618f1513f6bbf25c713d315a6dad9b1bf80204f6b7dc5d1e77e053b31592951,2024-10-28T13:58:09.230000 +CVE-2024-38821,0,1,74b8175803172fc63d22dc332a41fdd98b88e2c1ead7e686074b3e1c775d2446,2025-01-24T20:15:32.427000 CVE-2024-38826,0,0,aa0be29968eb435ec090127c9d271f3db29778a1347f10ec378a7a1554409ee7,2024-11-12T13:55:21.227000 -CVE-2024-38827,0,0,f7285de9e12a479fca65242632f63f093d55c18ad767dacbf1d6e13c67480020,2024-12-02T15:15:11.270000 +CVE-2024-38827,0,1,2e81585c986691122bd5b137a7a8366ca83e5bd591adaec79ae968dfb0819731,2025-01-24T20:15:32.553000 CVE-2024-38828,0,0,2b01623940f343417ee92cfdb4f261afb5dfca65f597a90b4769cc03110fea56,2024-11-18T17:11:17.393000 CVE-2024-38829,0,0,6e70b82cf4a08eca299f1ef01398ce598581c72dcb52145f07efeeba754e9484,2024-12-10T15:15:07.593000 CVE-2024-3883,0,0,c916445e546de0871526642978215546e67de3bd61061903009ac41fc512f75b,2024-11-21T09:30:37.683000 @@ -263710,7 +263710,7 @@ CVE-2024-42226,0,0,2d5e76969c1f0b438bed45c61874cec36b686b80128dcef7f9f95043b4a13 CVE-2024-42227,0,0,8f8280088a8c0ede77f59a0730412c09092742973c6824d19b85621f8ae00ec6,2024-11-21T09:33:45.603000 CVE-2024-42228,0,0,92788e39cba87c835c9cabe6851309d5340678792b1ac27b66afecf40c40bcaa,2024-11-21T09:33:45.750000 CVE-2024-42229,0,0,c1c650d90eaf3fa2ef9945c918f4dda3a135157b3aee095f9634b361e69f9fd9,2024-11-21T09:33:45.887000 -CVE-2024-4223,0,1,7df3d4d8fecbcaa41ae361583a055efd573240af607d639184c8dcc4400884d6,2025-01-24T17:58:19.593000 +CVE-2024-4223,0,0,7df3d4d8fecbcaa41ae361583a055efd573240af607d639184c8dcc4400884d6,2025-01-24T17:58:19.593000 CVE-2024-42230,0,0,af18a5f3770b456af2935d52b15bbcd492e35d3cfa9de0f42d41a4d6820163d6,2024-11-21T09:33:46.033000 CVE-2024-42231,0,0,46d7e508d0762971c3dcb5dad30392c8ef5fbe6250f39349c1d5f7c8bf43d923,2024-11-21T09:33:46.177000 CVE-2024-42232,0,0,4b8ab3cb19ac6cb852312db2d77d9d89e0d1af7971d031fc08f420eb02008759,2024-08-08T15:02:09.750000 @@ -264159,7 +264159,7 @@ CVE-2024-42786,0,0,85b09a5221a9594253db9b9c3fd2feaef5f83a51f4ec409ed7a5ba9e257e8 CVE-2024-42787,0,0,45f3ed868cc942437c0852e8b40e0543958b0fc69835a95cf364d4a1d605228a,2024-08-26T16:35:12.107000 CVE-2024-42788,0,0,eba477bbf8d922176673502f714569bef804f50992bdb2fc80a6d0ebf1d9500e,2024-08-26T19:35:29.970000 CVE-2024-42789,0,0,c3abb16e8c30602e0f327e18fd3c7a168c3a85d869c1621845f272b05306d65e,2024-08-27T20:35:34.673000 -CVE-2024-4279,0,1,390066ee801519493819202272b1f7a405622ecc07038505d51a6828e138138a,2025-01-24T17:03:18.140000 +CVE-2024-4279,0,0,390066ee801519493819202272b1f7a405622ecc07038505d51a6828e138138a,2025-01-24T17:03:18.140000 CVE-2024-42790,0,0,539360a9beda973ab08fb912d592087f677c6fb9a6fff6589cd7f5b776b9bd5a,2024-09-05T18:36:04.237000 CVE-2024-42791,0,0,9ffda97a3c4e9d2b1bb65c6c60f82add6cc6a53f4f8ba5cf10604ce57358e9f9,2024-08-26T19:35:30.910000 CVE-2024-42792,0,0,d46d80558cda01ef420339b2588d51cdd59e10dffb1a2c4145461835bf0c2904,2024-09-05T18:35:24.220000 @@ -264384,7 +264384,7 @@ CVE-2024-4317,0,0,5b5e9e74799ba1a2d6d19fd0e10c6f6a1617c77f3e3ad0fc8833212ed75eb5 CVE-2024-43173,0,0,d8d2ac885c1902e546063772016f5d0005860b114ffe9d7489140ac6cd8bfc67,2024-10-25T15:40:19.977000 CVE-2024-43176,0,0,67ef639d68302e5458cf789165bf8b534cafee061131b6437c0c7535ddbce0f4,2025-01-09T15:15:15.737000 CVE-2024-43177,0,0,0d4884cc3bb5ef316ac2268cbd50954452c99cbd34944a23e957f2b36af6ec01,2024-10-25T16:05:15.777000 -CVE-2024-4318,0,1,fc62d21c2c8b26ac8e0d1cd9f3141fb17772267ec7a232271f2e38a2b9942358,2025-01-24T17:11:02.097000 +CVE-2024-4318,0,0,fc62d21c2c8b26ac8e0d1cd9f3141fb17772267ec7a232271f2e38a2b9942358,2025-01-24T17:11:02.097000 CVE-2024-43180,0,0,6670a14096e07d80379b771c9a47c08fb6325e7824dc7bd81cd7b9a209c280c1,2024-09-20T17:28:06.617000 CVE-2024-43188,0,0,35ee6e8501322911378089524ec540a5a184dc89828aed8181b5a2e26a216c66,2024-09-29T00:24:49.103000 CVE-2024-43189,0,0,167da65acb79f1d31d6282e0f7371fa322d7e1ea30726b85e9e01b0a45ea77c4,2024-11-18T17:11:56.587000 @@ -266026,7 +266026,7 @@ CVE-2024-45292,0,0,4bbbea9efaef28cba408c6ba944bc233f9f2c92b0520b2d3dae5e889f91e0 CVE-2024-45293,0,0,d3d493d8f8cb34c8eb46baece93bb38ae502ffd95bfac3aab404a1304b9ee887,2024-10-10T12:57:21.987000 CVE-2024-45294,0,0,c892336db6e97945729784698a30c4434775db08a35a5ad837741c623dcd4529,2024-09-06T17:15:16.977000 CVE-2024-45295,0,0,9cbcd7c9c4357757a60245b46b7ad7987cdeaebea00bcdcc3890fa90524c0282,2024-09-06T17:15:17.053000 -CVE-2024-45296,0,0,ec14a652c89f605f90825b582664eef20966a0a8282f3d0348335004d9331d94,2024-09-10T12:09:50.377000 +CVE-2024-45296,0,1,486e7f952c7eaae5bc2a0d9b313f98272bcfc325a472d908193b2678eaa8854c,2025-01-24T20:15:32.680000 CVE-2024-45297,0,0,14069df7bb6b18a47bdfabbf481aec675b4bbcd71e305fd3cf3bf9a334a8bc22,2024-10-19T01:06:04.160000 CVE-2024-45298,0,0,fb7ff4012f2a9917eba89cdca12125e0df3e61608007b5bb0258a5ca72437753,2024-09-20T12:30:17.483000 CVE-2024-45299,0,0,678e6725aeb381a6e95b9326e3c170cec61c894b2e068f5150ad26f154dfe223,2024-09-30T12:48:22.930000 @@ -270797,8 +270797,8 @@ CVE-2024-52311,0,0,d790bc3cdbdfdddbda36ed2ababd8a2c32e1bc2a1113e6b7b556a0abac6c1 CVE-2024-52312,0,0,b3269e4f709b3d11a427463bb94420f63a4be758cd1fc2f211540d3800e96afe,2024-11-12T13:56:54.483000 CVE-2024-52313,0,0,064c5b69482d2f69d12089deef461a350be44b4b70fa1d35129f36a5da474442,2024-11-12T13:56:54.483000 CVE-2024-52314,0,0,2bc5f0f4e54107738b2581026358de8cab0a15c42911fbb686ea5cbcd385d7b9,2024-11-12T13:56:54.483000 -CVE-2024-52316,0,0,ebf0d6b51f9b3de5678fe00136918cce85b2bdc4db5d96ec21388d145ce9f4b8,2024-11-21T09:46:16.433000 -CVE-2024-52317,0,0,ce73efcf7b1c232dccd668d6afadee9ebc191724bbb215d2a3cde41432512716,2024-11-21T09:46:16.630000 +CVE-2024-52316,0,1,61b42467eb736e5bfcbc70944349ca53c7f33e48c5c58ae3df8e3b8e81f8a835,2025-01-24T20:15:32.803000 +CVE-2024-52317,0,1,6ea18c6e88afa2054c29dacb3a8974e558398f762fd06c0f7736839e6b6113d2,2025-01-24T20:15:32.963000 CVE-2024-52318,0,0,9990c8ea56e7da2a0fb5af64141a1eeb644a507e2c6f41d3a96bd75739255ee9,2024-11-21T09:46:16.813000 CVE-2024-52319,0,0,559a60ef1f4b0e5c15ebbccd65dd87f2daaedff91c3db37c5f132858a727fd5f,2025-01-11T13:15:24.843000 CVE-2024-5232,0,0,9c659ab55a0398d626d6da1c09e82340b1fec2662d16e1eca07d5817bed41493,2024-11-21T09:47:14.200000 @@ -271145,7 +271145,7 @@ CVE-2024-52793,0,0,c259519361bf0f2bada907a2abf587f20a0b7b99896b145765bec60711987 CVE-2024-52794,0,0,74da6ef4e158fa373b5567025e41b90b053ffdf18f4589a42837eeb80082f0be,2024-12-19T20:15:07.513000 CVE-2024-52796,0,0,c094d9da5a38d3963fdd7303411dd95ea5300d09a2791bab4ea3e7aba7101d12,2024-11-21T13:57:24.187000 CVE-2024-52797,0,0,2142f2c1af185ced7e31099175b8654d2eb171ab8034a1cbc53332894508d5eb,2024-11-21T13:57:24.187000 -CVE-2024-52798,0,0,5157e4ea6190ab69ee7c37a0b38947343b24d18a0669da753dddd45aa2fe815c,2024-12-05T23:15:06.310000 +CVE-2024-52798,0,1,097d02cca6abb4f00d0fb7e000b3f72d39ad998aee6d0c100d3fe5db038463f2,2025-01-24T20:15:33.107000 CVE-2024-52799,0,0,5164047af67efd81a587a0f11902bd9b646ea6409c75d3050136656870c9f811,2024-11-21T17:15:24.220000 CVE-2024-5280,0,0,3e8ea863efd8b526e720e64cbe4758353525e21d47ce068767029a0280c0073e,2024-11-21T09:47:20.597000 CVE-2024-52800,0,0,4505e37f985e56fe3cf39789115b736e7889c518dc26181ca244911c8cb4f63c,2024-11-29T19:15:08.713000 @@ -271155,6 +271155,7 @@ CVE-2024-52803,0,0,ad17a168cc5bcbff505d915a6c18845694247932f59af51fe8a468bb194bd CVE-2024-52804,0,0,91bcbe7be8769a13fa9d0d5d981687804b03259d489112a9fce48c172b51f425,2024-11-22T16:15:34.417000 CVE-2024-52805,0,0,6400cd1fc7976e7bbb59377c9e96826d176b488716471db18011beb20c0676ed,2024-12-03T17:15:12.120000 CVE-2024-52806,0,0,aaeca36df443b621f90f72d9c311aad70a2303bdaad6f85ae8bdc7fcc83738d7,2024-12-02T17:15:12.580000 +CVE-2024-52807,1,1,6b0652c6fdab6864a2d6b99051c1a623bb41660272ac72c8990913fe2a7c333e,2025-01-24T19:15:12.640000 CVE-2024-52809,0,0,652f885846d676120f14dabdd6ac521fed85152402f72016697d2b26d1715ae5,2024-11-29T19:15:09.030000 CVE-2024-5281,0,0,fc0976db5d10ac7222d6d7be38c22f60caf8b70ddc146c5f21bffad51467d30a,2024-11-21T09:47:20.760000 CVE-2024-52810,0,0,bc519c3395fca90f2847180bace5d2bd61f10ead143c379d0438b1982cdf8ded,2024-11-29T19:15:09.163000 @@ -271881,7 +271882,7 @@ CVE-2024-53919,0,0,276cab16a69dd8abd191858092e087c05871f9a8d5d2b89d95f580d07d640 CVE-2024-5392,0,0,6be8d0f4dc47d176328e011891583492739b095279f214844a12528377250390,2024-11-21T09:47:33.860000 CVE-2024-53920,0,0,a291ce56b664f688b2d6f36f512bf0b737cf558f95f0af0d70bd1b3310ba1ecf,2024-12-02T17:15:13.913000 CVE-2024-53921,0,0,80ba8805361036f43b4514262b685ccd25900644ea805da6dca5ed5b14f2db17,2024-12-03T20:15:16.153000 -CVE-2024-53923,0,0,ddbf7a04cf7f0e474b2e144691ab45850fa993c42e2020f58b8fbba42a322ac0,2025-01-23T22:15:14.017000 +CVE-2024-53923,0,1,555f40f110f5cc9cc3044cd555d315fd962ceb2a9297b9a92037b2bcd868c9b6,2025-01-24T19:15:12.777000 CVE-2024-5393,0,0,03f52ea3100aa691cac10394b6f99ef6880a74fc6f5839ec2548a00bbba3cf64,2024-11-21T09:47:34.007000 CVE-2024-53930,0,0,4c5164466e0edc2dc94be8460bd35fddb8be39646d6d12f4d1b2cb254100683a,2024-11-26T16:15:21.150000 CVE-2024-53931,0,0,66ab4af5c7bf6064acdc11817ab23c4178c3505b9395737ed6c6df4ecd45f67a,2025-01-23T18:15:30.897000 @@ -272634,7 +272635,7 @@ CVE-2024-55564,0,0,0ed737f325f7d691c0861d9b182294d3bfcbaeec43b5fc3c9c74a4f890349 CVE-2024-55565,0,0,41a9edd709fcc5c920649312806312f16fb139e829113bdded78cdd6366005ad,2024-12-12T19:15:13.670000 CVE-2024-55566,0,0,498f1e4e837f8ad9758e1df3de86aaaf6f7c709a5bad66d4383c3066d4682f26,2024-12-17T21:15:08.777000 CVE-2024-5557,0,0,44dff462a78b58967ede2ecdaa2532229f4e94d50ecd88f40009666b113c3dd3,2024-11-21T09:47:55.560000 -CVE-2024-55573,0,0,dd64a47b92811084c42210b9c92c2b642d1378b14c7e845aa8aeabd5e76fe2c5,2025-01-23T23:15:08.113000 +CVE-2024-55573,0,1,87c1d76df18d7da2938a148b25d87e75b4595eedc061d29382f7b68f19851cf6,2025-01-24T19:15:12.923000 CVE-2024-55577,0,0,eb6e58a9376d2712c57299b02d380d0ccd71fcb052d16b54f861ce85709558e3,2025-01-15T06:15:16.740000 CVE-2024-55578,0,0,5c3fcc77d09324042ddbdfd728ad5e7386e7d5896fd6497db19ee19fc8c81ce3,2024-12-12T18:15:27.533000 CVE-2024-55579,0,0,eb7b97c3360bce570eb740843f88f428eb8ed07ac934bdc24aaa75a35aac660f,2024-12-10T15:15:08.163000 @@ -273077,7 +273078,7 @@ CVE-2024-56378,0,0,fab67c7f7143f85c88660814de01440f680c12a24f807e1e2e38a3d85020b CVE-2024-5638,0,0,4a64496852c4ee147220588b5d1940917ce749a1b3dd56d16a77a8cf3ed54b84,2024-11-21T09:48:04.153000 CVE-2024-5639,0,0,78123d59d6ff1062d5cdcc1456c84b89eb240e57bd822aee818d4edc5bb804e5,2024-11-21T09:48:04.290000 CVE-2024-5640,0,0,01c62801966d56f9308a985efd017779bd36dfe950ad675d920936fb65a56c1f,2024-11-21T09:48:04.440000 -CVE-2024-56404,1,1,9f4deeafebabc745cc3dff480f380c557b4dfe89dbcbcbad779f703d0f976d17,2025-01-24T18:15:31.883000 +CVE-2024-56404,0,0,9f4deeafebabc745cc3dff480f380c557b4dfe89dbcbcbad779f703d0f976d17,2025-01-24T18:15:31.883000 CVE-2024-56408,0,0,231c67f9fc1f41f9606578a75272e2c2a9d506190f72a4802346eacd6c714911,2025-01-03T19:15:12.533000 CVE-2024-56409,0,0,a0be310b5d957146d6a04dd3071b8b9ffcc804a6eb6f1cb89943675a6d183542,2025-01-03T19:15:12.627000 CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000 @@ -273483,8 +273484,10 @@ CVE-2024-57034,0,0,de036f3ae14f1b62005a975b4bfce6fdd6790752b5eed7979f69e97b8eb0c CVE-2024-57035,0,0,1e6427aacaea51c871421f79fcbc3481eaa36132b14f2391d58f6d6e395b671f,2025-01-21T17:15:15.703000 CVE-2024-57036,0,0,3a425a52d7d12c5a0f18067d93edc2459610041510f5c755af20fa9200d1b9b6,2025-01-21T16:15:14.143000 CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000 +CVE-2024-57041,1,1,ddfb29be19bbf27e0e79d11117c70804483f6627ba362e993db3cc41d054c8a6,2025-01-24T20:15:33.353000 CVE-2024-5708,0,0,f68252af81d3d9fd48c33f6db887b706921f7e4e9ec883679703f59930376646,2024-08-06T16:30:24.547000 CVE-2024-5709,0,0,9e7f02d16313ead7a68864ca2ed2dc29106d9085227941350b2847c3e4c2a85b,2024-08-06T16:30:24.547000 +CVE-2024-57095,1,1,875cae30bc2fea90461df4c9f6d426bd980c17969b9a5f071ece2b68c57f9206,2025-01-24T20:15:33.473000 CVE-2024-5710,0,0,9b8da5c1d380b97df0420ebc8886a7e69a937a7c44dad142b0c060e78b36a5bf,2024-11-21T09:48:12.877000 CVE-2024-5711,0,0,ee26b23352bc3eb492910cce0ac4d4e0fcc138593b5b885cf10639f27fe76384,2024-11-21T09:48:13.010000 CVE-2024-5712,0,0,d9053a973766129971458824397812ec1e4acf4c6e0c33b032abc440bd305a91,2024-11-21T09:48:13.160000 @@ -273520,6 +273523,7 @@ CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d CVE-2024-57252,0,0,628dc6b1296f8743687d596afba3a931ec7c07f8b9dd88efd06e94d742bfce54,2025-01-17T22:15:28.817000 CVE-2024-5726,0,0,4ceeef37c455f852012651a7e920e126aeb659ebe7ba7b011f93539db03748f1,2024-11-21T09:48:14.060000 CVE-2024-5727,0,0,fcb5435c7826764738326be67041da3dad875d35da2f0e0301dde5c6609d328a,2024-11-21T09:48:14.180000 +CVE-2024-57277,1,1,cf3bfbd32910c82a101c705fc837da91aff2f392e35fb884cbc5ee32ed42427b,2025-01-24T20:15:33.587000 CVE-2024-5728,0,0,5c443df1ac8c53ac147f54c0053d74d00fcb14e9c202dddb628d942cdb86d4d7,2024-11-21T09:48:14.357000 CVE-2024-5729,0,0,aadee3b7646ed860effd8dd252b041b4d71b9abc4abf921ad91790c2248d1201,2024-11-21T09:48:14.543000 CVE-2024-5730,0,0,7c8f1898d38c08e8565f96fa000ade8830daf4e5695b898fe37d498e1b84f28b,2024-11-21T09:48:14.723000 @@ -277555,8 +277559,8 @@ CVE-2025-0408,0,0,2729cf9415a38755adad695073dad161acc79ef38638b787879efcd1f5040e CVE-2025-0409,0,0,9622ef176974a666883ccef87aa9961f8329f556e68cbb6ca3f25010c47796f0,2025-01-13T18:15:21.430000 CVE-2025-0410,0,0,77fcc9d20cbc72a10bd98fd8a0d76eb1f68bad51f3fb695c8bb4e738dc713659,2025-01-13T18:15:21.730000 CVE-2025-0412,0,0,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb69a,2025-01-13T04:15:06.477000 -CVE-2025-0428,0,0,c2b934230f006344ae566631d78ec0e5f7aabd2dedcf0cdbb5812ecb5d3df834,2025-01-22T08:15:09.013000 -CVE-2025-0429,0,0,e418a9f9d060e82f68162301a0c7c9fbe3fe7e8f1604875ba80247062e471888,2025-01-22T08:15:09.173000 +CVE-2025-0428,0,1,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6db,2025-01-24T20:56:49.767000 +CVE-2025-0429,0,1,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000 CVE-2025-0430,0,0,3df411857494f23f4104c7f6ca6fdc22130d91a76d6c4544b3161220203412c9,2025-01-17T18:15:30.920000 CVE-2025-0434,0,0,9423e4a9647036afb879cbc64af4784af28d91fab549e68c542c16a9ee7ea8f9,2025-01-15T15:15:14.273000 CVE-2025-0435,0,0,6d6e40a41cd469c8312087bc239581bfd90670921823d0c0e139702d7eee198e,2025-01-15T15:15:14.430000 @@ -277663,9 +277667,15 @@ CVE-2025-0693,0,0,2dbd0ee2fa3f9bda7df2c547c0b425cdbbb9ef75c33ee753ae3804f02fa747 CVE-2025-0697,0,0,2b300d6fe20cc05389e1f1da76da10c584853d80e73da80ea6280f5fc93d0276,2025-01-24T15:15:12.130000 CVE-2025-0698,0,0,41b2c00dd6b2e11497e6ad0d5935ff7e418c7e8ce23cb7590bf86289758b8bd6,2025-01-24T16:15:37.717000 CVE-2025-0699,0,0,a52cce5fc729b9f7c244ab5c5dc069fe63ab6c6e0e5e97843aece40a8ddee923,2025-01-24T16:15:37.977000 -CVE-2025-0700,1,1,aab49e7b57968ae9bb6bdc55a4a334c3e455c1fe53b7d97f3c04ebd86124676b,2025-01-24T17:15:14.517000 -CVE-2025-0701,1,1,ed54a30cd5bec9a382b4386379ee73a17b4fb606ffc8ee86cda1de75e134fd3c,2025-01-24T17:15:14.730000 -CVE-2025-0702,1,1,13a501903b381eeb26ae5972c4ea5e951078e29cd62f66fcd05996ed0a782b66,2025-01-24T18:15:32.087000 +CVE-2025-0700,0,0,aab49e7b57968ae9bb6bdc55a4a334c3e455c1fe53b7d97f3c04ebd86124676b,2025-01-24T17:15:14.517000 +CVE-2025-0701,0,0,ed54a30cd5bec9a382b4386379ee73a17b4fb606ffc8ee86cda1de75e134fd3c,2025-01-24T17:15:14.730000 +CVE-2025-0702,0,0,13a501903b381eeb26ae5972c4ea5e951078e29cd62f66fcd05996ed0a782b66,2025-01-24T18:15:32.087000 +CVE-2025-0703,1,1,f443154cebcff8a079a2d370276e2f90abbaf98c492722b2bb83ece1f03fdb81,2025-01-24T19:15:13.137000 +CVE-2025-0704,1,1,bf263efdb1da880eedbf0f27b25fb0a13d6a575fbe53eb91eb3cad76137a5e44,2025-01-24T19:15:13.303000 +CVE-2025-0705,1,1,f3420909330e5fa0675403b6d448ed8937590dce5c2555ea75118ba9d0377bea,2025-01-24T19:15:13.467000 +CVE-2025-0706,1,1,0cb83cbb5aaa96f70d9ecd809e8b663d6c86b0a33387630ec42ce044013d9464,2025-01-24T20:15:33.830000 +CVE-2025-0707,1,1,811af14c14c0a3b5a80f66025364f309edc4fe1d62ed897fbf3dfde8e4e9cd5f,2025-01-24T20:15:34.020000 +CVE-2025-0708,1,1,4a67dffd73a44f6c1bc3efea10acc8736f5bcaa22b0e0a5da65bd9a2075ec6b9,2025-01-24T20:15:34.200000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000 @@ -277688,8 +277698,8 @@ CVE-2025-20630,0,0,b69f04020608923d2a464ad06edf2aa9ee933f1eafbc166f5b91bfd601e0d CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000 CVE-2025-21088,0,0,2fc6ecd1dae8270574ff01139ed8a42b63c05aa457c258a8d76906ce3a93ca54,2025-01-15T16:15:32.413000 CVE-2025-21101,0,0,1ef0167ef283dbabcdd7bd0e2debfd81378d1bf596b30170903b5a150ed83abb,2025-01-15T05:15:09.097000 -CVE-2025-21102,0,0,8153781fb244bf502850065fab180d787cadc10df5675c4bfb3f0250244d97ce,2025-01-08T12:15:22.850000 -CVE-2025-21111,0,0,ac99f23afec6fb5ea7aef333a4f2d14bc0359a06e3db388b0b698b212d2c1078,2025-01-08T18:15:20.157000 +CVE-2025-21102,0,1,933ca72a52260837d55d5545fa75f1f12ce9dc7f55e3f7d4f145fee0707ab4ba,2025-01-24T19:10:11.977000 +CVE-2025-21111,0,1,36449c466fabe660f3fc2f10d8992e6a7d9c5e3d2cf72d3dce2cc840c6da552b,2025-01-24T19:11:42.417000 CVE-2025-21122,0,0,ea413e582ae453fe56a0d16448a41ab087511f8fc84dce169b1dd1e0cebc7d9c,2025-01-14T19:15:33.070000 CVE-2025-21127,0,0,f4bc482a58e381a20321cbbdeaa050ed9cde9073a4c43797f44f5c980d42dfdf,2025-01-14T19:15:33.230000 CVE-2025-21128,0,0,40945503866b9130c6c67e813bc72623208ffdfcd3f68f3f78dadfd34ec95930,2025-01-17T20:37:35.437000 @@ -277869,7 +277879,7 @@ CVE-2025-21417,0,0,fd095985c935f49210d9fa1ed1207877c8c15b5405f59c1ff106288b43f18 CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000 CVE-2025-21490,0,0,98aae49df09722e484f2181974271fc107b3101ab3dbd9cc9dd1ca3416b2ddf5,2025-01-23T20:15:31.750000 CVE-2025-21491,0,0,6076cb457888ed12bac407cf717ae74e21970b3745c710f624ec3aea8e6322c5,2025-01-23T20:15:32.030000 -CVE-2025-21492,0,0,53a8d0e6fdb1b300a2a1e16c1647542ee014fe1f84af1256f70d9945f699037a,2025-01-23T20:15:32.163000 +CVE-2025-21492,0,1,175b05e4b6021ea2e9dabd82cb14ca0549d088227dfc44490c43cf779c0afb04,2025-01-24T20:15:34.390000 CVE-2025-21493,0,0,764caa554437fbca5b7d52e7918de33e7b17e17cee871cca7b0bad377e1783b2,2025-01-23T17:15:22.473000 CVE-2025-21494,0,0,8a293e6ebd165cb16947e535d4a872bf7b2395365539ce264f87dff49d038515,2025-01-23T17:15:22.713000 CVE-2025-21495,0,0,fe11be338e1c05fec9619cc491b1fbe01f7127eb46f2c1cd0e8e0b8eeb09528c,2025-01-23T17:15:22.903000 @@ -277878,7 +277888,7 @@ CVE-2025-21498,0,0,1121a212146d5056853b73dcdb9fae89353866d7239590b2949de592cfc79 CVE-2025-21499,0,0,2c32e354ed5a6e4eea492ba23bb7728e07a08fad97151da4f29131ca6df8e113,2025-01-23T17:15:23.230000 CVE-2025-21500,0,0,bbe9f114cc8d8e49962ad9854df4e89c5a30ee8cfa74d29f4db3b527d20b85d8,2025-01-23T17:15:23.520000 CVE-2025-21501,0,0,b499d527899d3c99b0af0dd327ab08d36e2a133ebd4d99fcf7220ac8dcf2048e,2025-01-23T17:15:23.680000 -CVE-2025-21502,0,0,9e7240c42429dd97a5210935ed8d7dd74bd6e17d82a1c185c997ee5ed21e1ef9,2025-01-23T17:15:23.830000 +CVE-2025-21502,0,1,bcaf1d92c66b5b1a9efc00ebff1fdc4e2a0848184817e1eff8671e84f48a5148,2025-01-24T20:15:34.500000 CVE-2025-21503,0,0,080f9da947c7317b04f4eddb1ade32f90cb3468e2aae9c32affbab4901d70265,2025-01-23T17:15:23.987000 CVE-2025-21504,0,0,5e6343e63c0c757690808cbfd0f3aecf26233691269ccced5982828c9467730c,2025-01-23T17:15:24.147000 CVE-2025-21505,0,0,d38d80007487ff694532508e892a45688687c6b699ba24e27e4e84ef185a18d2,2025-01-22T19:15:10.520000 @@ -278218,11 +278228,11 @@ CVE-2025-22600,0,0,d4d2827dc6878ccbad7b7bb4cb346a62426d6f55b5376cb57fe133465e20f CVE-2025-22605,0,0,8133d836964af94521533e50666e61283a9b57a268e19bb256ac814dc1dfcd5e,2025-01-24T15:15:12.330000 CVE-2025-22606,0,0,3d923e303b156c53bd4343472a4e5b113d35cd4273c3f9114587d96dd8d17f7e,2025-01-24T16:15:38.307000 CVE-2025-22607,0,0,168bb9e66a3ed8b4ee8d63dbea88df36b4ba59b92d437413a77aabe7acfe1fcf,2025-01-24T16:15:38.470000 -CVE-2025-22608,1,1,0c7ef24982b3f5eceaa10491abc354cc7f9eb2cf42b3660392d310512b6c0ec8,2025-01-24T17:15:14.960000 -CVE-2025-22609,1,1,02fe93f2e652a6bff4b8791eb8a4f4685c6bd9820625fffe434bf0e411d383f5,2025-01-24T17:15:15.100000 -CVE-2025-22610,1,1,5ae4b17a409ea68afd6223ae506d5dd4fa1ee84ef818aa22d33763454c9ebdd6,2025-01-24T17:15:15.237000 -CVE-2025-22611,1,1,e166844a80d71db30b3de346ec9a551ff3258f0fef744eb0ff7f0d563752126d,2025-01-24T17:15:15.410000 -CVE-2025-22612,1,1,61993c9ea9d32d9a679dfa0319d3a1ed694b0c900dac40afe946dd2becfee666,2025-01-24T17:15:15.570000 +CVE-2025-22608,0,0,0c7ef24982b3f5eceaa10491abc354cc7f9eb2cf42b3660392d310512b6c0ec8,2025-01-24T17:15:14.960000 +CVE-2025-22609,0,0,02fe93f2e652a6bff4b8791eb8a4f4685c6bd9820625fffe434bf0e411d383f5,2025-01-24T17:15:15.100000 +CVE-2025-22610,0,0,5ae4b17a409ea68afd6223ae506d5dd4fa1ee84ef818aa22d33763454c9ebdd6,2025-01-24T17:15:15.237000 +CVE-2025-22611,0,0,e166844a80d71db30b3de346ec9a551ff3258f0fef744eb0ff7f0d563752126d,2025-01-24T17:15:15.410000 +CVE-2025-22612,0,0,61993c9ea9d32d9a679dfa0319d3a1ed694b0c900dac40afe946dd2becfee666,2025-01-24T17:15:15.570000 CVE-2025-22613,0,0,aad2f12635038b5a8cde416e18c507c3fb94ff08ed3ac7216fed29e0755971c1,2025-01-14T01:15:17.580000 CVE-2025-22614,0,0,d656f7b32b5f198b4bb45970b1a94ba1a87474675109e3354122f9cf920f1c84,2025-01-13T21:15:14.967000 CVE-2025-22615,0,0,2a8f7e50fe035fc366011623a2b600d00f80d19938ec5c5a0af1c9fd13d1c4e2,2025-01-13T21:15:15.110000 @@ -278419,7 +278429,7 @@ CVE-2025-23218,0,0,0d9a220919abe3a17ac7afcfc75e9654aeb452859503c7554f342466bfb43 CVE-2025-23219,0,0,7bfc816a66d36eeb8427d1e438890d0ae6033f069415e0175c799b53ab2c0b1e,2025-01-21T15:15:15.247000 CVE-2025-23220,0,0,7594bd1f2d5770c36a55b5b9fd690b04bf7606bfe4b3acd2181f9cbade146b08,2025-01-21T15:15:15.430000 CVE-2025-23221,0,0,b9e220051865326d7bce5e6fa27b18637659ac0f27be03003737cde64e90648d,2025-01-20T17:15:07.987000 -CVE-2025-23222,1,1,6e6cf8752e018e416c67330a2d8c338b5d549b55c5c98add2ee5e3a6cab2ac5a,2025-01-24T17:15:15.730000 +CVE-2025-23222,0,0,6e6cf8752e018e416c67330a2d8c338b5d549b55c5c98add2ee5e3a6cab2ac5a,2025-01-24T17:15:15.730000 CVE-2025-23227,0,0,75fe948a80947a9372caedcd96d18d272ac6c356759cc5bc5433fe8af18f71c1,2025-01-23T18:15:33.440000 CVE-2025-23237,0,0,d204c5fb01db488a0f6e27659293f1738cb1ba3c0404ed666043b41f571f334e,2025-01-22T06:15:14.480000 CVE-2025-23366,0,0,3312897ce94f2285a7d2a9ec8c23b065acb503e3b2f9a747e3e7ca809adbfbea,2025-01-14T18:16:06.290000 @@ -278778,16 +278788,17 @@ CVE-2025-24018,0,0,253cb165de2151aa99c00e094e395864d5f28218ab550c9418de5b539f47c CVE-2025-24019,0,0,d677e8b4264557b8de91d13cc1839d782f81c7838cdf1014e4423ff0e2378420,2025-01-21T18:15:17.933000 CVE-2025-24020,0,0,d1d82909cc1d36cd28a38444ff637a664659fd65670255997925f7aeb54551d2,2025-01-21T18:15:18.157000 CVE-2025-24024,0,0,cc1a55cdc4aa0884265065c04ec8fcbe647c671a5eda489d6e2b90242b0234c1,2025-01-21T20:15:46.617000 -CVE-2025-24025,1,1,ba0a50ab42754ad7310c91bd7b375b61cce55c348a10f0db06fba7898b24397c,2025-01-24T17:15:15.900000 +CVE-2025-24025,0,0,ba0a50ab42754ad7310c91bd7b375b61cce55c348a10f0db06fba7898b24397c,2025-01-24T17:15:15.900000 CVE-2025-24027,0,0,b4b9d72fc8e3425a087a0a1486908f265d010b0a775752f732c367a7acbbe48d,2025-01-22T15:15:27.090000 CVE-2025-24030,0,0,e2fd122b8248f003d111dc0b5ddf9576f531248dec679d6a485c837f76e061a9,2025-01-23T04:15:07.100000 CVE-2025-24033,0,0,5298ddf90a31dd5bed434b92ade2e1e1f159bb928c748f338aa55ed871c1edd6,2025-01-23T18:15:33.610000 CVE-2025-24034,0,0,01368f671e1ddc2c3ae3eb7ad36c77d52e8bbadd88990239d386e351378f82b1,2025-01-23T18:15:33.793000 CVE-2025-24337,0,0,07d30bbea6dfa209bcd4c6bc43756d477d6586721f50f7d7909041753d5deb68,2025-01-20T14:15:27.130000 CVE-2025-24353,0,0,10800d697e68cd55cff6432e6a23d04d139654b7a35f7e8dc56fa2c5247f6ece,2025-01-23T18:15:33.990000 -CVE-2025-24355,1,1,df091ddf8aeeb5f247d7b78b7e73863226f57cadf3f514eb1d8aa9b7831cf7ba,2025-01-24T17:15:16.047000 -CVE-2025-24359,1,1,fe898aa41d1a6ecee2652ccd06e899fa4186d85ca361d42c0af02e968484e3d0,2025-01-24T17:15:16.197000 -CVE-2025-24362,1,1,bd0008c19e13cbed43d9a180a0c8a1357e3b6112b693da2df160b4b2a8f315e9,2025-01-24T18:15:32.383000 +CVE-2025-24355,0,0,df091ddf8aeeb5f247d7b78b7e73863226f57cadf3f514eb1d8aa9b7831cf7ba,2025-01-24T17:15:16.047000 +CVE-2025-24359,0,0,fe898aa41d1a6ecee2652ccd06e899fa4186d85ca361d42c0af02e968484e3d0,2025-01-24T17:15:16.197000 +CVE-2025-24362,0,0,bd0008c19e13cbed43d9a180a0c8a1357e3b6112b693da2df160b4b2a8f315e9,2025-01-24T18:15:32.383000 +CVE-2025-24363,1,1,39d368ed8bf973713f2f52722001ed32dc19782f4926a08e8694d7826f6928da,2025-01-24T19:15:13.633000 CVE-2025-24397,0,0,1350cea3fe5814d5435bcd6f3428089c30106b375e343d91ae9b66932985a500,2025-01-23T17:15:27.643000 CVE-2025-24398,0,0,17fdec77669ad9ad2442f8bfcba68e0f31676d9e19986be37cb27c2c0527b869,2025-01-23T16:15:40.920000 CVE-2025-24399,0,0,5022626df407f9335397c8d8aa775d254829312030eabbf3f85ce199b116608f,2025-01-23T15:15:13.440000 @@ -278803,107 +278814,107 @@ CVE-2025-24460,0,0,97eab806c8a3d30547891d4eaab3684701aff9d96e2ee7ed4dd851798df98 CVE-2025-24461,0,0,4661385da2b0856294db236374b642678d50c8f98ffe4c271a944c44e0c44892,2025-01-21T18:15:19.260000 CVE-2025-24529,0,0,7459c8f6ea6572438be054043522f6ad7d47bb47712c68b14b3279374ca9499e,2025-01-23T06:15:27.710000 CVE-2025-24530,0,0,26bcbc2a7fc8ce39ab2344c25221d31ecec6ecd190428b8d21eb1bedd98340f6,2025-01-23T06:15:27.893000 -CVE-2025-24542,1,1,06390c27c63870cfb207e6b1afc38cc2bd70c54f2ceb6de8405d7ce03a0795ae,2025-01-24T18:15:32.550000 -CVE-2025-24543,1,1,a8808a4cea2b4649f0717c8217dced1494e1792562a41700280f034c2d3ba9ea,2025-01-24T18:15:32.703000 -CVE-2025-24546,1,1,685ea9d400c8b68f55f713daec1971d56383230bb2c0cc8dfdd7487103aa25d1,2025-01-24T18:15:32.893000 -CVE-2025-24547,1,1,c177583f7b4a7259791b6ebcff6a352143f7ed52e1ea2f3eabe18b6e76e995e9,2025-01-24T18:15:33.063000 -CVE-2025-24552,1,1,5836fd4cff67061da1a022b37868b2f3c365d2f5d165ede2a999174e0f3c027d,2025-01-24T18:15:33.257000 -CVE-2025-24555,1,1,d47f17b8e2e295cf6139e94a64e84d237163885ad2ad17216990f34a21e900fe,2025-01-24T18:15:33.440000 -CVE-2025-24561,1,1,c698bd2c648564da7cb8a5ead03f00bdcfe0f5e2d45f91fef21ce218041ca538,2025-01-24T18:15:33.623000 -CVE-2025-24562,1,1,f5a2b27ad0b893f9e361ae02017813ce34418cc837106061d965034991fc502e,2025-01-24T18:15:33.810000 -CVE-2025-24568,1,1,76160f57a35703cc1bc60dd8f4bddda882f344202b02d103baf733d8125cff67,2025-01-24T18:15:33.987000 -CVE-2025-24570,1,1,c28f0a95c222bf88ff7e9dd87509b02b35c9c870ecf7971f96c34cc8feb983a7,2025-01-24T18:15:34.147000 -CVE-2025-24571,1,1,12bfb570d5dbb7308e59de1fd0e176919ad5f022d4e611da786987fff50f0ad8,2025-01-24T18:15:34.320000 -CVE-2025-24572,1,1,e3ac7a79beb24ee51d610adb2cb92f6370de0683b7c71a16d0715c9b9818df2d,2025-01-24T18:15:34.477000 -CVE-2025-24573,1,1,a36ec8cef6808cd3d1fb49d9f183a488e91ea170f05b12416bdf37b36e6a11dd,2025-01-24T18:15:34.640000 -CVE-2025-24575,1,1,b03818ba1e4c3aeeb27298e818e610b716ce9803fac1b0ad6bda5ddd15380e71,2025-01-24T18:15:34.793000 -CVE-2025-24578,1,1,9ebad620682ffd1f3787c587a27256d6a506f18cbd8a1ce1d1120fd892563b95,2025-01-24T18:15:34.947000 -CVE-2025-24579,1,1,39320e1ca3cff811d077bb02f394492c461e2541554c51a875dd94da458bac42,2025-01-24T18:15:35.090000 -CVE-2025-24580,1,1,ab85777d568cb058beb30f27c69bfb0e37c8ac9491945266f51ef971bad94724,2025-01-24T18:15:35.247000 -CVE-2025-24582,1,1,209ec204e7084e59b84c8b89cb45a02f8bb82fd1340ff31459e78d9843eb29cf,2025-01-24T18:15:35.397000 -CVE-2025-24585,1,1,47779c8be502d2f8974ad64490e1a1e82fed824b118a7bd216044006040b6fc0,2025-01-24T18:15:35.550000 -CVE-2025-24587,1,1,83dadf6f5943ab35b4261110272e8c994fb8e55edbeb6272ceca4207329750cd,2025-01-24T18:15:35.697000 -CVE-2025-24588,1,1,d9036330eda1737d297809da894b62625833067225784b7fe8acb6888f6403f3,2025-01-24T18:15:35.867000 -CVE-2025-24589,1,1,1f4b8875ec04a580b47ea3d833e6473e46bfd047bc1844b72331a542c8eb134e,2025-01-24T18:15:36.013000 -CVE-2025-24591,1,1,c06501d874c7779d16221de3e54b0ff73ada530cf2b09da8b6bd7cda4da17cfd,2025-01-24T18:15:36.160000 -CVE-2025-24594,1,1,1f51a1d2e76cef969f6771fdca9d4628f716965e3d22ebbbb8948ae8c6232723,2025-01-24T18:15:36.330000 -CVE-2025-24595,1,1,fbc09565a4f924c0a009b4638cc6ed5e9d14e449e9654f8ef695d4106c965b5a,2025-01-24T18:15:36.497000 -CVE-2025-24596,1,1,4a462b85d7c20eb1e51f14e1da141104983de82ee010f1f7b247f3fd81c9e8c1,2025-01-24T18:15:36.657000 -CVE-2025-24604,1,1,62a39d9b09aae3795a1a5623a917bfa7211aaa213197284781446d74cdc483ea,2025-01-24T18:15:36.823000 -CVE-2025-24610,1,1,13a39d2f135170db910afda2a99191d77f2a29be1fdfb9d97efc58222978983e,2025-01-24T18:15:36.980000 -CVE-2025-24611,1,1,5715cfb8338e1d2a6890eac94e9d49d3d44cfa21d68c17c839c3a2944696055d,2025-01-24T18:15:37.133000 -CVE-2025-24613,1,1,a70c00764d3411f7b1338b628fc12a47b1328b33b9da5afc488f76f92c8b96df,2025-01-24T18:15:37.277000 -CVE-2025-24618,1,1,da3544734c42b41de5d6a3c3e9e18a2c81f4e457d3ca0a84f080e276d1914cb5,2025-01-24T18:15:37.430000 -CVE-2025-24622,1,1,4b49230d23e5067c05caf1084f2ec10486574296a79fe30ed3f1144d7ae78365,2025-01-24T18:15:37.577000 -CVE-2025-24623,1,1,b4d38c40443e89d7d83b964704d024031307ae190e58bbadc657ccbcaf15f87f,2025-01-24T18:15:37.727000 -CVE-2025-24625,1,1,c78d300f1f0ba711e3f863a83d368167a911692a6dfd48749e68c965f6f009fa,2025-01-24T18:15:37.897000 -CVE-2025-24627,1,1,02ed717fe8cb73f0e136d781f500cc8f29934ec76495d5547688a475083bddd4,2025-01-24T18:15:38.050000 -CVE-2025-24633,1,1,b407bcbade3843581c653e2df1781329c3dc7476fcc6243a7b85dc7360c755e6,2025-01-24T18:15:38.200000 -CVE-2025-24634,1,1,2bd24fdaae28a006ea4038da848c5e593d0eecbe902bfc5110e8d66be395288f,2025-01-24T18:15:38.350000 -CVE-2025-24636,1,1,66aa9f526ce1fd7f3d18159e839d4ebddd24821053620416273bd4a4e01bf4a1,2025-01-24T18:15:38.507000 -CVE-2025-24638,1,1,771d55a14f39075844370a6399a01b34d18de7f194d5cd5f84255753a3dd779b,2025-01-24T18:15:38.670000 -CVE-2025-24644,1,1,5a47ee9c1d078a6ab6544254498806ccdab795bbe804f919ad0351c4bf3bd942,2025-01-24T18:15:38.833000 -CVE-2025-24647,1,1,f6ab095caebb935495a3077e569d4af7bedb49dd976f7af33513a1117411a07d,2025-01-24T18:15:39.007000 -CVE-2025-24649,1,1,3b3a4824fb68967b1f582d342beee2b3ff647491ee0f270bf1d2a2b1f72a5b08,2025-01-24T18:15:39.167000 -CVE-2025-24650,1,1,6ea9b4337dbcbf323aedc2ca0b5a46ef1d4a239be7cbebf3b610ead1dd97c2fd,2025-01-24T18:15:39.347000 -CVE-2025-24652,1,1,c353cde4161115497d4426748cbd42af741bfe8e05dd4c6a54196751723082a6,2025-01-24T18:15:39.517000 -CVE-2025-24657,1,1,34382b4ec4b370cd77a5479eb06b63be1dbf14efa49a41334a11289472d53685,2025-01-24T18:15:39.680000 -CVE-2025-24658,1,1,33f621aca80f81bae17c30018c844fddd51a5d84b90b6ebafe9a2b8fd90c132a,2025-01-24T18:15:39.853000 -CVE-2025-24659,1,1,654ad6b5ec0df1e9ebaf722f52ff857a359566f5b00efc1f6e3cb28f0db38c25,2025-01-24T18:15:40.020000 -CVE-2025-24663,1,1,f3711c9accc4b12ad7834685e3e4aaacbb7fccfd4d32f811bf4f2577f1939900,2025-01-24T18:15:40.203000 -CVE-2025-24666,1,1,be6ec7879094dc001b0696cb821c2095ad2a8f7c7c793b6dd00a635361dbdb0c,2025-01-24T18:15:40.400000 -CVE-2025-24668,1,1,c89d00e75f790c015d667678d46e8274cdadbf70f8ab8fd19b8cecf64c2996ec,2025-01-24T18:15:40.563000 -CVE-2025-24669,1,1,2bd984196325f9359369d146852c6e5bd5675e7d8664e79d08418b733167f3ba,2025-01-24T18:15:40.730000 -CVE-2025-24672,1,1,32dbfa19e8e8f7f5545c2ecc56f14444dce0b5c958c67364d096b5716255a83e,2025-01-24T18:15:40.890000 -CVE-2025-24673,1,1,e540a505904aceef2cc98c7bfe2f11010b78fb974d615918190efab538273b60,2025-01-24T18:15:41.033000 -CVE-2025-24674,1,1,99c3f4c4fe9a4e224716f4005c8714cf9f289295dfd9326bf4cc77892f03492a,2025-01-24T18:15:41.190000 -CVE-2025-24675,1,1,51e821f54bd8ecbcb5cfb06e587c8dca98b57e93613b7ac8b1b6133b06a2fd06,2025-01-24T18:15:41.340000 -CVE-2025-24678,1,1,2bbd55332471912e791fac5e14be971b126ef8718f19e1b02bcd492cfbd40804,2025-01-24T18:15:41.477000 -CVE-2025-24679,1,1,879343bd10e103078696d5c045c74727d598b6e1533bbbb4ccca5b8c7a6890c5,2025-01-24T18:15:41.630000 -CVE-2025-24681,1,1,605fdc2e36dc827462c36791192232d92dd296cecf5b41187efd4a46c704eab8,2025-01-24T18:15:41.767000 -CVE-2025-24682,1,1,ca5f8a1b03b0ffb82cb43100159f5b8a9d5c286a9ed1e11204650e11edcdf612,2025-01-24T18:15:41.947000 -CVE-2025-24683,1,1,bd281ec7d77c6dd8b1732719895ece773bf0791905499e1cf46a62b4feaf0c85,2025-01-24T18:15:42.133000 -CVE-2025-24687,1,1,a97e3c851507d885e2534c8d23f0ef9f7027aca0eec7a3965703f56e53f67d20,2025-01-24T18:15:42.283000 -CVE-2025-24691,1,1,8f9407c7a90579300dd1854e170d65459a01a3bff3d853f2b1c7f87668044003,2025-01-24T18:15:42.433000 -CVE-2025-24693,1,1,f35145384e64db76c047b09c9b47c63eeb337ad6b5d0dccb1624efec40465bf8,2025-01-24T18:15:42.597000 -CVE-2025-24695,1,1,c04e4c7660d18da5bf4fbb386df60dba6cc296536b0f421a0b91361548036f9a,2025-01-24T18:15:42.740000 -CVE-2025-24696,1,1,1bb0ad0f28b2f0aa4961a30841714ea0e1b020038a68374887cd31646c83c0a0,2025-01-24T18:15:42.900000 -CVE-2025-24698,1,1,5c6684bbe39da2344d05dc8369ce68303ac286e14087e1cfdab558d06ff959cb,2025-01-24T18:15:43.050000 -CVE-2025-24701,1,1,dea6057bf9aed9ebbded4621add56011ab64912e4c0c93cfb43244bc165ca256,2025-01-24T18:15:43.207000 -CVE-2025-24702,1,1,fa01a1892360f33df64499b6533d30d0eda438a0d10cb84aa1d78d8bdca1c3af,2025-01-24T18:15:43.360000 -CVE-2025-24703,1,1,53afab872f7388167263b805962dd844307667888eb889ce9f196026e4f4111a,2025-01-24T18:15:43.520000 -CVE-2025-24704,1,1,43aa1057b326b12aa4a75847e7646bdd016b51bb0e7184f81c5a88630a642b2b,2025-01-24T18:15:43.680000 -CVE-2025-24705,1,1,0d29a10c3c131298ef8bd5a8cb9217ebb025888c7cb5d2d97a7633b27b032767,2025-01-24T18:15:43.840000 -CVE-2025-24706,1,1,310d3f61486b57a678867c52af7a3873d74ff33456f7825d148f48af59ebe640,2025-01-24T18:15:44.003000 -CVE-2025-24709,1,1,6d23c7aa23f5f0132f167fb051a07c37a43447273edf0a534d427fd5c040c301,2025-01-24T18:15:44.170000 -CVE-2025-24711,1,1,2b6393d74f40d976d8e5d885b625242518c74534f12353db2bfa977c486e6f90,2025-01-24T18:15:44.330000 -CVE-2025-24712,1,1,ad5ee3989300fa678ccc1aeeb2c1408d12155cb4b9c591212188ab9aa01bb7df,2025-01-24T18:15:44.480000 -CVE-2025-24713,1,1,8966c71c53790b1b9ead199719a98f45f6076ff08526301a47eed7a249ba7a5b,2025-01-24T18:15:44.630000 -CVE-2025-24714,1,1,01c79f3d6975fa00ca9de87ee51395e5de6793c68e48bd2909badc648a193078,2025-01-24T18:15:44.773000 -CVE-2025-24715,1,1,918d31ff258da35c7d5a3cb0c4c244eba5a3169754271f2070db9f98a76d2e96,2025-01-24T18:15:44.913000 -CVE-2025-24716,1,1,b60cda0ae81f3b0923fa7b26df1f0e620ddd729d40eb70ccadd9577c7ee769ce,2025-01-24T18:15:45.057000 -CVE-2025-24717,1,1,192c45824352b7ecf8a017aadf0ae5aeb9949e337e41e88029f7cee314070cf4,2025-01-24T18:15:45.210000 -CVE-2025-24719,1,1,b6a5eaae7b6b9dac2df9124e88387d1f1ef87c3d0c79dd412c3d005280b66ed8,2025-01-24T18:15:45.360000 -CVE-2025-24720,1,1,9c714f59d0192e69fce2a5027c9e7738070e04ddd86e75e44b28cff60eb7786a,2025-01-24T18:15:45.523000 -CVE-2025-24721,1,1,87c237eedc92baee03d4c2c20cc1d540e9d333bd80081e1b8926ab4576af7541,2025-01-24T18:15:45.667000 -CVE-2025-24722,1,1,106540240b595e1aec5b8fa9e09f91f9ee3b9bb7a5c4be42b1402891197f70b9,2025-01-24T18:15:45.840000 -CVE-2025-24723,1,1,e34ffe38900ed8b7d4bc696f0229b29b7d1ca4b5fb0c61b9dd36098e52476bca,2025-01-24T18:15:46 -CVE-2025-24724,1,1,0c3c230f2335636de94b352c856fdddbd7ec4c077414cf5b34eb16c72c531ba3,2025-01-24T18:15:46.170000 -CVE-2025-24725,1,1,39badf212b726e7acaa4e97dbd766cb1126545014d5a091f440369ce9c726ba9,2025-01-24T18:15:46.357000 -CVE-2025-24726,1,1,0c0816fefa045232d048f04bb8178baf633ca23ec380c328b637ada0a73cedca,2025-01-24T18:15:46.530000 -CVE-2025-24727,1,1,f6ea1216d7a0db8d183fdda471a5a76fe0233610c79b1707065671886662a268,2025-01-24T18:15:46.707000 -CVE-2025-24728,1,1,84aa2685db206700b76b940bbded488e49e9d7953e58eaddab9851c7759e111a,2025-01-24T18:15:46.877000 -CVE-2025-24729,1,1,d4888141917a917f0b67ea47914b3667525b7d5bb6bec0dc6db20c9739de0d40,2025-01-24T18:15:47.037000 -CVE-2025-24730,1,1,de57057c50132029cabb407237df8b5f924deea8b827b83bc9ff22cd2540b007,2025-01-24T18:15:47.193000 -CVE-2025-24731,1,1,deda6cfa64b0cb7c0758fd613b83afe4503aa9279575d0f21abd67c134bf98d1,2025-01-24T18:15:47.370000 -CVE-2025-24732,1,1,3fd26d751d57e24224f295e32d4ca4a749ee196e54ebbf1f721f129b551a0c08,2025-01-24T18:15:47.530000 -CVE-2025-24733,1,1,c2d5a3c564f85643df1d4ddd0c0ca25091224d21af48a3e0572cad63c6815829,2025-01-24T18:15:47.697000 -CVE-2025-24736,1,1,21d5e200a5148e73bd5dafff50040c7b3e1154ecc968b11ea3570877dfd8772a,2025-01-24T18:15:47.850000 -CVE-2025-24738,1,1,5d5988528bb650b6634abd793a96cb9def937ba17e73005bacf017bf3351b910,2025-01-24T18:15:48.017000 -CVE-2025-24739,1,1,a33756c91d7136f68d0e64bb0fd64169a674dd2c3fbd5af74ade3b1148c42aee,2025-01-24T18:15:48.177000 -CVE-2025-24746,1,1,76b6359f26bba7626bbf7027b062daab552b87a782fc60d7a7da64d1ce3753c9,2025-01-24T18:15:48.437000 -CVE-2025-24750,1,1,e2f4a9b31b86d06509f886277e82ff83239dd5a8a7c14cdf3ecc2568e5cf5c3e,2025-01-24T18:15:48.663000 -CVE-2025-24751,1,1,4aa19aa90aab45ec9714df6e468e19599d2a1949dc2de4e4c8d985f84e38f858,2025-01-24T18:15:48.810000 -CVE-2025-24753,1,1,87b78dd3e11c90af6930cbca7a5346ee214e24237caa8b3601406532dfdbc4de,2025-01-24T18:15:48.950000 -CVE-2025-24755,1,1,0e39e774c30955a9f13b754dc33d0bc563de45fb71998c25f43b8191a534aac2,2025-01-24T18:15:49.160000 -CVE-2025-24756,1,1,ff4539720b20166980f34d623a65288c03d097bfc09671d9931f9e736be019cf,2025-01-24T18:15:49.307000 +CVE-2025-24542,0,0,06390c27c63870cfb207e6b1afc38cc2bd70c54f2ceb6de8405d7ce03a0795ae,2025-01-24T18:15:32.550000 +CVE-2025-24543,0,0,a8808a4cea2b4649f0717c8217dced1494e1792562a41700280f034c2d3ba9ea,2025-01-24T18:15:32.703000 +CVE-2025-24546,0,0,685ea9d400c8b68f55f713daec1971d56383230bb2c0cc8dfdd7487103aa25d1,2025-01-24T18:15:32.893000 +CVE-2025-24547,0,0,c177583f7b4a7259791b6ebcff6a352143f7ed52e1ea2f3eabe18b6e76e995e9,2025-01-24T18:15:33.063000 +CVE-2025-24552,0,0,5836fd4cff67061da1a022b37868b2f3c365d2f5d165ede2a999174e0f3c027d,2025-01-24T18:15:33.257000 +CVE-2025-24555,0,0,d47f17b8e2e295cf6139e94a64e84d237163885ad2ad17216990f34a21e900fe,2025-01-24T18:15:33.440000 +CVE-2025-24561,0,0,c698bd2c648564da7cb8a5ead03f00bdcfe0f5e2d45f91fef21ce218041ca538,2025-01-24T18:15:33.623000 +CVE-2025-24562,0,0,f5a2b27ad0b893f9e361ae02017813ce34418cc837106061d965034991fc502e,2025-01-24T18:15:33.810000 +CVE-2025-24568,0,0,76160f57a35703cc1bc60dd8f4bddda882f344202b02d103baf733d8125cff67,2025-01-24T18:15:33.987000 +CVE-2025-24570,0,0,c28f0a95c222bf88ff7e9dd87509b02b35c9c870ecf7971f96c34cc8feb983a7,2025-01-24T18:15:34.147000 +CVE-2025-24571,0,0,12bfb570d5dbb7308e59de1fd0e176919ad5f022d4e611da786987fff50f0ad8,2025-01-24T18:15:34.320000 +CVE-2025-24572,0,0,e3ac7a79beb24ee51d610adb2cb92f6370de0683b7c71a16d0715c9b9818df2d,2025-01-24T18:15:34.477000 +CVE-2025-24573,0,0,a36ec8cef6808cd3d1fb49d9f183a488e91ea170f05b12416bdf37b36e6a11dd,2025-01-24T18:15:34.640000 +CVE-2025-24575,0,0,b03818ba1e4c3aeeb27298e818e610b716ce9803fac1b0ad6bda5ddd15380e71,2025-01-24T18:15:34.793000 +CVE-2025-24578,0,0,9ebad620682ffd1f3787c587a27256d6a506f18cbd8a1ce1d1120fd892563b95,2025-01-24T18:15:34.947000 +CVE-2025-24579,0,0,39320e1ca3cff811d077bb02f394492c461e2541554c51a875dd94da458bac42,2025-01-24T18:15:35.090000 +CVE-2025-24580,0,0,ab85777d568cb058beb30f27c69bfb0e37c8ac9491945266f51ef971bad94724,2025-01-24T18:15:35.247000 +CVE-2025-24582,0,0,209ec204e7084e59b84c8b89cb45a02f8bb82fd1340ff31459e78d9843eb29cf,2025-01-24T18:15:35.397000 +CVE-2025-24585,0,0,47779c8be502d2f8974ad64490e1a1e82fed824b118a7bd216044006040b6fc0,2025-01-24T18:15:35.550000 +CVE-2025-24587,0,0,83dadf6f5943ab35b4261110272e8c994fb8e55edbeb6272ceca4207329750cd,2025-01-24T18:15:35.697000 +CVE-2025-24588,0,0,d9036330eda1737d297809da894b62625833067225784b7fe8acb6888f6403f3,2025-01-24T18:15:35.867000 +CVE-2025-24589,0,0,1f4b8875ec04a580b47ea3d833e6473e46bfd047bc1844b72331a542c8eb134e,2025-01-24T18:15:36.013000 +CVE-2025-24591,0,0,c06501d874c7779d16221de3e54b0ff73ada530cf2b09da8b6bd7cda4da17cfd,2025-01-24T18:15:36.160000 +CVE-2025-24594,0,0,1f51a1d2e76cef969f6771fdca9d4628f716965e3d22ebbbb8948ae8c6232723,2025-01-24T18:15:36.330000 +CVE-2025-24595,0,0,fbc09565a4f924c0a009b4638cc6ed5e9d14e449e9654f8ef695d4106c965b5a,2025-01-24T18:15:36.497000 +CVE-2025-24596,0,0,4a462b85d7c20eb1e51f14e1da141104983de82ee010f1f7b247f3fd81c9e8c1,2025-01-24T18:15:36.657000 +CVE-2025-24604,0,0,62a39d9b09aae3795a1a5623a917bfa7211aaa213197284781446d74cdc483ea,2025-01-24T18:15:36.823000 +CVE-2025-24610,0,0,13a39d2f135170db910afda2a99191d77f2a29be1fdfb9d97efc58222978983e,2025-01-24T18:15:36.980000 +CVE-2025-24611,0,0,5715cfb8338e1d2a6890eac94e9d49d3d44cfa21d68c17c839c3a2944696055d,2025-01-24T18:15:37.133000 +CVE-2025-24613,0,0,a70c00764d3411f7b1338b628fc12a47b1328b33b9da5afc488f76f92c8b96df,2025-01-24T18:15:37.277000 +CVE-2025-24618,0,0,da3544734c42b41de5d6a3c3e9e18a2c81f4e457d3ca0a84f080e276d1914cb5,2025-01-24T18:15:37.430000 +CVE-2025-24622,0,0,4b49230d23e5067c05caf1084f2ec10486574296a79fe30ed3f1144d7ae78365,2025-01-24T18:15:37.577000 +CVE-2025-24623,0,0,b4d38c40443e89d7d83b964704d024031307ae190e58bbadc657ccbcaf15f87f,2025-01-24T18:15:37.727000 +CVE-2025-24625,0,0,c78d300f1f0ba711e3f863a83d368167a911692a6dfd48749e68c965f6f009fa,2025-01-24T18:15:37.897000 +CVE-2025-24627,0,0,02ed717fe8cb73f0e136d781f500cc8f29934ec76495d5547688a475083bddd4,2025-01-24T18:15:38.050000 +CVE-2025-24633,0,0,b407bcbade3843581c653e2df1781329c3dc7476fcc6243a7b85dc7360c755e6,2025-01-24T18:15:38.200000 +CVE-2025-24634,0,0,2bd24fdaae28a006ea4038da848c5e593d0eecbe902bfc5110e8d66be395288f,2025-01-24T18:15:38.350000 +CVE-2025-24636,0,0,66aa9f526ce1fd7f3d18159e839d4ebddd24821053620416273bd4a4e01bf4a1,2025-01-24T18:15:38.507000 +CVE-2025-24638,0,0,771d55a14f39075844370a6399a01b34d18de7f194d5cd5f84255753a3dd779b,2025-01-24T18:15:38.670000 +CVE-2025-24644,0,0,5a47ee9c1d078a6ab6544254498806ccdab795bbe804f919ad0351c4bf3bd942,2025-01-24T18:15:38.833000 +CVE-2025-24647,0,0,f6ab095caebb935495a3077e569d4af7bedb49dd976f7af33513a1117411a07d,2025-01-24T18:15:39.007000 +CVE-2025-24649,0,0,3b3a4824fb68967b1f582d342beee2b3ff647491ee0f270bf1d2a2b1f72a5b08,2025-01-24T18:15:39.167000 +CVE-2025-24650,0,0,6ea9b4337dbcbf323aedc2ca0b5a46ef1d4a239be7cbebf3b610ead1dd97c2fd,2025-01-24T18:15:39.347000 +CVE-2025-24652,0,0,c353cde4161115497d4426748cbd42af741bfe8e05dd4c6a54196751723082a6,2025-01-24T18:15:39.517000 +CVE-2025-24657,0,0,34382b4ec4b370cd77a5479eb06b63be1dbf14efa49a41334a11289472d53685,2025-01-24T18:15:39.680000 +CVE-2025-24658,0,0,33f621aca80f81bae17c30018c844fddd51a5d84b90b6ebafe9a2b8fd90c132a,2025-01-24T18:15:39.853000 +CVE-2025-24659,0,0,654ad6b5ec0df1e9ebaf722f52ff857a359566f5b00efc1f6e3cb28f0db38c25,2025-01-24T18:15:40.020000 +CVE-2025-24663,0,0,f3711c9accc4b12ad7834685e3e4aaacbb7fccfd4d32f811bf4f2577f1939900,2025-01-24T18:15:40.203000 +CVE-2025-24666,0,0,be6ec7879094dc001b0696cb821c2095ad2a8f7c7c793b6dd00a635361dbdb0c,2025-01-24T18:15:40.400000 +CVE-2025-24668,0,0,c89d00e75f790c015d667678d46e8274cdadbf70f8ab8fd19b8cecf64c2996ec,2025-01-24T18:15:40.563000 +CVE-2025-24669,0,0,2bd984196325f9359369d146852c6e5bd5675e7d8664e79d08418b733167f3ba,2025-01-24T18:15:40.730000 +CVE-2025-24672,0,0,32dbfa19e8e8f7f5545c2ecc56f14444dce0b5c958c67364d096b5716255a83e,2025-01-24T18:15:40.890000 +CVE-2025-24673,0,0,e540a505904aceef2cc98c7bfe2f11010b78fb974d615918190efab538273b60,2025-01-24T18:15:41.033000 +CVE-2025-24674,0,0,99c3f4c4fe9a4e224716f4005c8714cf9f289295dfd9326bf4cc77892f03492a,2025-01-24T18:15:41.190000 +CVE-2025-24675,0,0,51e821f54bd8ecbcb5cfb06e587c8dca98b57e93613b7ac8b1b6133b06a2fd06,2025-01-24T18:15:41.340000 +CVE-2025-24678,0,0,2bbd55332471912e791fac5e14be971b126ef8718f19e1b02bcd492cfbd40804,2025-01-24T18:15:41.477000 +CVE-2025-24679,0,0,879343bd10e103078696d5c045c74727d598b6e1533bbbb4ccca5b8c7a6890c5,2025-01-24T18:15:41.630000 +CVE-2025-24681,0,0,605fdc2e36dc827462c36791192232d92dd296cecf5b41187efd4a46c704eab8,2025-01-24T18:15:41.767000 +CVE-2025-24682,0,0,ca5f8a1b03b0ffb82cb43100159f5b8a9d5c286a9ed1e11204650e11edcdf612,2025-01-24T18:15:41.947000 +CVE-2025-24683,0,0,bd281ec7d77c6dd8b1732719895ece773bf0791905499e1cf46a62b4feaf0c85,2025-01-24T18:15:42.133000 +CVE-2025-24687,0,0,a97e3c851507d885e2534c8d23f0ef9f7027aca0eec7a3965703f56e53f67d20,2025-01-24T18:15:42.283000 +CVE-2025-24691,0,0,8f9407c7a90579300dd1854e170d65459a01a3bff3d853f2b1c7f87668044003,2025-01-24T18:15:42.433000 +CVE-2025-24693,0,0,f35145384e64db76c047b09c9b47c63eeb337ad6b5d0dccb1624efec40465bf8,2025-01-24T18:15:42.597000 +CVE-2025-24695,0,0,c04e4c7660d18da5bf4fbb386df60dba6cc296536b0f421a0b91361548036f9a,2025-01-24T18:15:42.740000 +CVE-2025-24696,0,0,1bb0ad0f28b2f0aa4961a30841714ea0e1b020038a68374887cd31646c83c0a0,2025-01-24T18:15:42.900000 +CVE-2025-24698,0,0,5c6684bbe39da2344d05dc8369ce68303ac286e14087e1cfdab558d06ff959cb,2025-01-24T18:15:43.050000 +CVE-2025-24701,0,0,dea6057bf9aed9ebbded4621add56011ab64912e4c0c93cfb43244bc165ca256,2025-01-24T18:15:43.207000 +CVE-2025-24702,0,0,fa01a1892360f33df64499b6533d30d0eda438a0d10cb84aa1d78d8bdca1c3af,2025-01-24T18:15:43.360000 +CVE-2025-24703,0,0,53afab872f7388167263b805962dd844307667888eb889ce9f196026e4f4111a,2025-01-24T18:15:43.520000 +CVE-2025-24704,0,0,43aa1057b326b12aa4a75847e7646bdd016b51bb0e7184f81c5a88630a642b2b,2025-01-24T18:15:43.680000 +CVE-2025-24705,0,0,0d29a10c3c131298ef8bd5a8cb9217ebb025888c7cb5d2d97a7633b27b032767,2025-01-24T18:15:43.840000 +CVE-2025-24706,0,0,310d3f61486b57a678867c52af7a3873d74ff33456f7825d148f48af59ebe640,2025-01-24T18:15:44.003000 +CVE-2025-24709,0,0,6d23c7aa23f5f0132f167fb051a07c37a43447273edf0a534d427fd5c040c301,2025-01-24T18:15:44.170000 +CVE-2025-24711,0,0,2b6393d74f40d976d8e5d885b625242518c74534f12353db2bfa977c486e6f90,2025-01-24T18:15:44.330000 +CVE-2025-24712,0,0,ad5ee3989300fa678ccc1aeeb2c1408d12155cb4b9c591212188ab9aa01bb7df,2025-01-24T18:15:44.480000 +CVE-2025-24713,0,0,8966c71c53790b1b9ead199719a98f45f6076ff08526301a47eed7a249ba7a5b,2025-01-24T18:15:44.630000 +CVE-2025-24714,0,0,01c79f3d6975fa00ca9de87ee51395e5de6793c68e48bd2909badc648a193078,2025-01-24T18:15:44.773000 +CVE-2025-24715,0,0,918d31ff258da35c7d5a3cb0c4c244eba5a3169754271f2070db9f98a76d2e96,2025-01-24T18:15:44.913000 +CVE-2025-24716,0,0,b60cda0ae81f3b0923fa7b26df1f0e620ddd729d40eb70ccadd9577c7ee769ce,2025-01-24T18:15:45.057000 +CVE-2025-24717,0,0,192c45824352b7ecf8a017aadf0ae5aeb9949e337e41e88029f7cee314070cf4,2025-01-24T18:15:45.210000 +CVE-2025-24719,0,0,b6a5eaae7b6b9dac2df9124e88387d1f1ef87c3d0c79dd412c3d005280b66ed8,2025-01-24T18:15:45.360000 +CVE-2025-24720,0,0,9c714f59d0192e69fce2a5027c9e7738070e04ddd86e75e44b28cff60eb7786a,2025-01-24T18:15:45.523000 +CVE-2025-24721,0,0,87c237eedc92baee03d4c2c20cc1d540e9d333bd80081e1b8926ab4576af7541,2025-01-24T18:15:45.667000 +CVE-2025-24722,0,0,106540240b595e1aec5b8fa9e09f91f9ee3b9bb7a5c4be42b1402891197f70b9,2025-01-24T18:15:45.840000 +CVE-2025-24723,0,0,e34ffe38900ed8b7d4bc696f0229b29b7d1ca4b5fb0c61b9dd36098e52476bca,2025-01-24T18:15:46 +CVE-2025-24724,0,0,0c3c230f2335636de94b352c856fdddbd7ec4c077414cf5b34eb16c72c531ba3,2025-01-24T18:15:46.170000 +CVE-2025-24725,0,0,39badf212b726e7acaa4e97dbd766cb1126545014d5a091f440369ce9c726ba9,2025-01-24T18:15:46.357000 +CVE-2025-24726,0,0,0c0816fefa045232d048f04bb8178baf633ca23ec380c328b637ada0a73cedca,2025-01-24T18:15:46.530000 +CVE-2025-24727,0,0,f6ea1216d7a0db8d183fdda471a5a76fe0233610c79b1707065671886662a268,2025-01-24T18:15:46.707000 +CVE-2025-24728,0,0,84aa2685db206700b76b940bbded488e49e9d7953e58eaddab9851c7759e111a,2025-01-24T18:15:46.877000 +CVE-2025-24729,0,0,d4888141917a917f0b67ea47914b3667525b7d5bb6bec0dc6db20c9739de0d40,2025-01-24T18:15:47.037000 +CVE-2025-24730,0,0,de57057c50132029cabb407237df8b5f924deea8b827b83bc9ff22cd2540b007,2025-01-24T18:15:47.193000 +CVE-2025-24731,0,0,deda6cfa64b0cb7c0758fd613b83afe4503aa9279575d0f21abd67c134bf98d1,2025-01-24T18:15:47.370000 +CVE-2025-24732,0,0,3fd26d751d57e24224f295e32d4ca4a749ee196e54ebbf1f721f129b551a0c08,2025-01-24T18:15:47.530000 +CVE-2025-24733,0,0,c2d5a3c564f85643df1d4ddd0c0ca25091224d21af48a3e0572cad63c6815829,2025-01-24T18:15:47.697000 +CVE-2025-24736,0,0,21d5e200a5148e73bd5dafff50040c7b3e1154ecc968b11ea3570877dfd8772a,2025-01-24T18:15:47.850000 +CVE-2025-24738,0,0,5d5988528bb650b6634abd793a96cb9def937ba17e73005bacf017bf3351b910,2025-01-24T18:15:48.017000 +CVE-2025-24739,0,0,a33756c91d7136f68d0e64bb0fd64169a674dd2c3fbd5af74ade3b1148c42aee,2025-01-24T18:15:48.177000 +CVE-2025-24746,0,0,76b6359f26bba7626bbf7027b062daab552b87a782fc60d7a7da64d1ce3753c9,2025-01-24T18:15:48.437000 +CVE-2025-24750,0,0,e2f4a9b31b86d06509f886277e82ff83239dd5a8a7c14cdf3ecc2568e5cf5c3e,2025-01-24T18:15:48.663000 +CVE-2025-24751,0,0,4aa19aa90aab45ec9714df6e468e19599d2a1949dc2de4e4c8d985f84e38f858,2025-01-24T18:15:48.810000 +CVE-2025-24753,0,0,87b78dd3e11c90af6930cbca7a5346ee214e24237caa8b3601406532dfdbc4de,2025-01-24T18:15:48.950000 +CVE-2025-24755,0,0,0e39e774c30955a9f13b754dc33d0bc563de45fb71998c25f43b8191a534aac2,2025-01-24T18:15:49.160000 +CVE-2025-24756,0,0,ff4539720b20166980f34d623a65288c03d097bfc09671d9931f9e736be019cf,2025-01-24T18:15:49.307000