From 6a445b5535b2b3e8b39e0972763f7fc397c217cf Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 12 Feb 2025 19:04:09 +0000 Subject: [PATCH] Auto-Update: 2025-02-12T19:00:40.892063+00:00 --- CVE-2020/CVE-2020-126xx/CVE-2020-12607.json | 6 +- CVE-2021/CVE-2021-202xx/CVE-2021-20240.json | 44 +- CVE-2022/CVE-2022-234xx/CVE-2022-23491.json | 48 +- CVE-2022/CVE-2022-328xx/CVE-2022-32871.json | 22 +- CVE-2022/CVE-2022-374xx/CVE-2022-37462.json | 32 +- CVE-2022/CVE-2022-453xx/CVE-2022-45320.json | 325 +++++++++++++- CVE-2023/CVE-2023-245xx/CVE-2023-24534.json | 32 +- CVE-2023/CVE-2023-245xx/CVE-2023-24536.json | 32 +- CVE-2023/CVE-2023-245xx/CVE-2023-24537.json | 32 +- CVE-2023/CVE-2023-245xx/CVE-2023-24538.json | 32 +- CVE-2023/CVE-2023-246xx/CVE-2023-24626.json | 40 +- CVE-2023/CVE-2023-270xx/CVE-2023-27018.json | 32 +- CVE-2023/CVE-2023-270xx/CVE-2023-27019.json | 32 +- CVE-2023/CVE-2023-270xx/CVE-2023-27020.json | 32 +- CVE-2023/CVE-2023-270xx/CVE-2023-27021.json | 32 +- CVE-2023/CVE-2023-270xx/CVE-2023-27033.json | 32 +- CVE-2023/CVE-2023-271xx/CVE-2023-27180.json | 32 +- CVE-2023/CVE-2023-277xx/CVE-2023-27719.json | 32 +- CVE-2023/CVE-2023-277xx/CVE-2023-27720.json | 32 +- CVE-2023/CVE-2023-278xx/CVE-2023-27801.json | 32 +- CVE-2023/CVE-2023-278xx/CVE-2023-27802.json | 32 +- CVE-2023/CVE-2023-278xx/CVE-2023-27803.json | 32 +- CVE-2023/CVE-2023-278xx/CVE-2023-27805.json | 32 +- CVE-2023/CVE-2023-278xx/CVE-2023-27806.json | 32 +- CVE-2023/CVE-2023-278xx/CVE-2023-27807.json | 32 +- CVE-2023/CVE-2023-278xx/CVE-2023-27808.json | 32 +- CVE-2023/CVE-2023-278xx/CVE-2023-27810.json | 32 +- CVE-2023/CVE-2023-28xx/CVE-2023-2826.json | 12 +- CVE-2023/CVE-2023-293xx/CVE-2023-29374.json | 32 +- CVE-2023/CVE-2023-294xx/CVE-2023-29421.json | 32 +- CVE-2023/CVE-2023-294xx/CVE-2023-29465.json | 22 +- CVE-2023/CVE-2023-294xx/CVE-2023-29473.json | 12 +- CVE-2023/CVE-2023-294xx/CVE-2023-29474.json | 12 +- CVE-2023/CVE-2023-294xx/CVE-2023-29475.json | 12 +- CVE-2023/CVE-2023-304xx/CVE-2023-30450.json | 32 +- CVE-2023/CVE-2023-385xx/CVE-2023-38562.json | 53 ++- CVE-2023/CVE-2023-395xx/CVE-2023-39540.json | 63 ++- CVE-2023/CVE-2023-395xx/CVE-2023-39541.json | 43 +- CVE-2023/CVE-2023-453xx/CVE-2023-45318.json | 68 ++- CVE-2023/CVE-2023-503xx/CVE-2023-50306.json | 71 ++- CVE-2023/CVE-2023-513xx/CVE-2023-51392.json | 63 ++- CVE-2023/CVE-2023-513xx/CVE-2023-51393.json | 62 ++- CVE-2023/CVE-2023-513xx/CVE-2023-51394.json | 62 ++- CVE-2023/CVE-2023-69xx/CVE-2023-6936.json | 76 +++- CVE-2024/CVE-2024-01xx/CVE-2024-0144.json | 6 +- CVE-2024/CVE-2024-01xx/CVE-2024-0145.json | 6 +- CVE-2024/CVE-2024-07xx/CVE-2024-0715.json | 74 +++- CVE-2024/CVE-2024-116xx/CVE-2024-11628.json | 56 +++ CVE-2024/CVE-2024-116xx/CVE-2024-11629.json | 56 +++ CVE-2024/CVE-2024-11xx/CVE-2024-1155.json | 115 ++++- CVE-2024/CVE-2024-11xx/CVE-2024-1156.json | 115 ++++- CVE-2024/CVE-2024-120xx/CVE-2024-12085.json | 10 +- CVE-2024/CVE-2024-134xx/CVE-2024-13484.json | 6 +- CVE-2024/CVE-2024-16xx/CVE-2024-1647.json | 53 ++- CVE-2024/CVE-2024-16xx/CVE-2024-1648.json | 53 ++- CVE-2024/CVE-2024-16xx/CVE-2024-1651.json | 63 ++- CVE-2024/CVE-2024-215xx/CVE-2024-21502.json | 96 +++- CVE-2024/CVE-2024-217xx/CVE-2024-21785.json | 242 ++++++++++- CVE-2024/CVE-2024-218xx/CVE-2024-21802.json | 64 ++- CVE-2024/CVE-2024-218xx/CVE-2024-21825.json | 64 ++- CVE-2024/CVE-2024-218xx/CVE-2024-21836.json | 64 ++- CVE-2024/CVE-2024-221xx/CVE-2024-22187.json | 242 ++++++++++- CVE-2024/CVE-2024-233xx/CVE-2024-23315.json | 242 ++++++++++- CVE-2024/CVE-2024-234xx/CVE-2024-23496.json | 64 ++- CVE-2024/CVE-2024-236xx/CVE-2024-23601.json | 238 +++++++++- CVE-2024/CVE-2024-236xx/CVE-2024-23605.json | 64 ++- CVE-2024/CVE-2024-239xx/CVE-2024-23947.json | 45 +- CVE-2024/CVE-2024-239xx/CVE-2024-23948.json | 45 +- CVE-2024/CVE-2024-244xx/CVE-2024-24402.json | 68 ++- CVE-2024/CVE-2024-247xx/CVE-2024-24793.json | 53 ++- CVE-2024/CVE-2024-247xx/CVE-2024-24794.json | 53 ++- CVE-2024/CVE-2024-248xx/CVE-2024-24851.json | 242 ++++++++++- CVE-2024/CVE-2024-249xx/CVE-2024-24946.json | 222 +++++++++- CVE-2024/CVE-2024-249xx/CVE-2024-24947.json | 222 +++++++++- CVE-2024/CVE-2024-249xx/CVE-2024-24954.json | 57 ++- CVE-2024/CVE-2024-249xx/CVE-2024-24955.json | 57 ++- CVE-2024/CVE-2024-249xx/CVE-2024-24956.json | 57 ++- CVE-2024/CVE-2024-249xx/CVE-2024-24957.json | 57 ++- CVE-2024/CVE-2024-249xx/CVE-2024-24958.json | 57 ++- CVE-2024/CVE-2024-249xx/CVE-2024-24959.json | 57 ++- CVE-2024/CVE-2024-249xx/CVE-2024-24962.json | 232 +++++++++- CVE-2024/CVE-2024-249xx/CVE-2024-24963.json | 232 +++++++++- CVE-2024/CVE-2024-259xx/CVE-2024-25973.json | 81 +++- CVE-2024/CVE-2024-302xx/CVE-2024-30269.json | 72 ++- CVE-2024/CVE-2024-314xx/CVE-2024-31441.json | 64 ++- CVE-2024/CVE-2024-328xx/CVE-2024-32838.json | 8 +- CVE-2024/CVE-2024-352xx/CVE-2024-35218.json | 124 +++++- CVE-2024/CVE-2024-408xx/CVE-2024-40890.json | 389 ++++++++++++++++- CVE-2024/CVE-2024-408xx/CVE-2024-40891.json | 389 ++++++++++++++++- CVE-2024/CVE-2024-497xx/CVE-2024-49791.json | 48 +- CVE-2024/CVE-2024-498xx/CVE-2024-49800.json | 60 ++- CVE-2024/CVE-2024-55xx/CVE-2024-5550.json | 8 +- CVE-2024/CVE-2024-60xx/CVE-2024-6097.json | 56 +++ CVE-2025/CVE-2025-04xx/CVE-2025-0411.json | 80 +++- CVE-2025/CVE-2025-09xx/CVE-2025-0905.json | 53 ++- CVE-2025/CVE-2025-09xx/CVE-2025-0906.json | 53 ++- CVE-2025/CVE-2025-09xx/CVE-2025-0907.json | 53 ++- CVE-2025/CVE-2025-09xx/CVE-2025-0908.json | 53 ++- CVE-2025/CVE-2025-09xx/CVE-2025-0909.json | 53 ++- CVE-2025/CVE-2025-09xx/CVE-2025-0910.json | 53 ++- CVE-2025/CVE-2025-09xx/CVE-2025-0919.json | 16 + CVE-2025/CVE-2025-09xx/CVE-2025-0925.json | 16 + CVE-2025/CVE-2025-12xx/CVE-2025-1209.json | 145 +++++++ CVE-2025/CVE-2025-12xx/CVE-2025-1210.json | 145 +++++++ CVE-2025/CVE-2025-12xx/CVE-2025-1213.json | 141 ++++++ CVE-2025/CVE-2025-12xx/CVE-2025-1214.json | 141 ++++++ CVE-2025/CVE-2025-213xx/CVE-2025-21391.json | 134 +++++- CVE-2025/CVE-2025-214xx/CVE-2025-21418.json | 141 +++++- CVE-2025/CVE-2025-251xx/CVE-2025-25182.json | 60 +++ CVE-2025/CVE-2025-251xx/CVE-2025-25184.json | 86 ++++ CVE-2025/CVE-2025-251xx/CVE-2025-25198.json | 56 +++ CVE-2025/CVE-2025-251xx/CVE-2025-25199.json | 60 +++ CVE-2025/CVE-2025-252xx/CVE-2025-25200.json | 102 +++++ CVE-2025/CVE-2025-257xx/CVE-2025-25741.json | 21 + CVE-2025/CVE-2025-257xx/CVE-2025-25742.json | 21 + CVE-2025/CVE-2025-257xx/CVE-2025-25743.json | 21 + CVE-2025/CVE-2025-257xx/CVE-2025-25744.json | 21 + CVE-2025/CVE-2025-257xx/CVE-2025-25746.json | 21 + README.md | 96 ++-- _state.csv | 457 ++++++++++---------- 120 files changed, 8595 insertions(+), 636 deletions(-) create mode 100644 CVE-2024/CVE-2024-116xx/CVE-2024-11628.json create mode 100644 CVE-2024/CVE-2024-116xx/CVE-2024-11629.json create mode 100644 CVE-2024/CVE-2024-60xx/CVE-2024-6097.json create mode 100644 CVE-2025/CVE-2025-09xx/CVE-2025-0919.json create mode 100644 CVE-2025/CVE-2025-09xx/CVE-2025-0925.json create mode 100644 CVE-2025/CVE-2025-12xx/CVE-2025-1209.json create mode 100644 CVE-2025/CVE-2025-12xx/CVE-2025-1210.json create mode 100644 CVE-2025/CVE-2025-12xx/CVE-2025-1213.json create mode 100644 CVE-2025/CVE-2025-12xx/CVE-2025-1214.json create mode 100644 CVE-2025/CVE-2025-251xx/CVE-2025-25182.json create mode 100644 CVE-2025/CVE-2025-251xx/CVE-2025-25184.json create mode 100644 CVE-2025/CVE-2025-251xx/CVE-2025-25198.json create mode 100644 CVE-2025/CVE-2025-251xx/CVE-2025-25199.json create mode 100644 CVE-2025/CVE-2025-252xx/CVE-2025-25200.json create mode 100644 CVE-2025/CVE-2025-257xx/CVE-2025-25741.json create mode 100644 CVE-2025/CVE-2025-257xx/CVE-2025-25742.json create mode 100644 CVE-2025/CVE-2025-257xx/CVE-2025-25743.json create mode 100644 CVE-2025/CVE-2025-257xx/CVE-2025-25744.json create mode 100644 CVE-2025/CVE-2025-257xx/CVE-2025-25746.json diff --git a/CVE-2020/CVE-2020-126xx/CVE-2020-12607.json b/CVE-2020/CVE-2020-126xx/CVE-2020-12607.json index 9fc7cc70474..ceb9086f16e 100644 --- a/CVE-2020/CVE-2020-126xx/CVE-2020-12607.json +++ b/CVE-2020/CVE-2020-126xx/CVE-2020-12607.json @@ -2,7 +2,7 @@ "id": "CVE-2020-12607", "sourceIdentifier": "cve@mitre.org", "published": "2020-06-02T21:15:10.607", - "lastModified": "2024-11-21T04:59:54.750", + "lastModified": "2025-02-12T18:29:08.047", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:fastecdsa_project:fastecdsa:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:antonkueltz:fastecdsa:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.1.2", - "matchCriteriaId": "F373E4E2-A51A-401A-B1B8-1AC0766EC1FB" + "matchCriteriaId": "757F0CBF-E904-4C5C-9247-A116DABA2DA3" } ] } diff --git a/CVE-2021/CVE-2021-202xx/CVE-2021-20240.json b/CVE-2021/CVE-2021-202xx/CVE-2021-20240.json index b22d80c6bf2..8582a9d43a4 100644 --- a/CVE-2021/CVE-2021-202xx/CVE-2021-20240.json +++ b/CVE-2021/CVE-2021-202xx/CVE-2021-20240.json @@ -2,8 +2,8 @@ "id": "CVE-2021-20240", "sourceIdentifier": "secalert@redhat.com", "published": "2021-05-28T11:15:08.037", - "lastModified": "2024-11-21T05:46:11.837", - "vulnStatus": "Modified", + "lastModified": "2025-02-12T17:16:44.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -86,8 +86,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*", - "versionEndExcluding": "2.42.0", - "matchCriteriaId": "CB1C4898-ED59-4BF4-A2A0-1A56419E05FE" + "versionEndExcluding": "2.39.2", + "matchCriteriaId": "A0A2CE4E-0CE5-43DF-922B-1135746AC1F0" } ] } @@ -126,15 +126,27 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B5H3GNVWMZTYZR3JBYCK57PF7PFMQBNP/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BGZVCTH5O7WBJLYXZ2UOKLYNIFPVR55D/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EANWYODLOJDFLMBH6WEKJJMQ5PKLEWML/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926787", @@ -147,15 +159,27 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B5H3GNVWMZTYZR3JBYCK57PF7PFMQBNP/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BGZVCTH5O7WBJLYXZ2UOKLYNIFPVR55D/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EANWYODLOJDFLMBH6WEKJJMQ5PKLEWML/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-234xx/CVE-2022-23491.json b/CVE-2022/CVE-2022-234xx/CVE-2022-23491.json index ea0d741b8d8..35e30a8d11a 100644 --- a/CVE-2022/CVE-2022-234xx/CVE-2022-23491.json +++ b/CVE-2022/CVE-2022-234xx/CVE-2022-23491.json @@ -2,8 +2,8 @@ "id": "CVE-2022-23491", "sourceIdentifier": "security-advisories@github.com", "published": "2022-12-07T22:15:09.870", - "lastModified": "2024-11-21T06:48:40.290", - "vulnStatus": "Modified", + "lastModified": "2025-02-12T17:36:19.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -62,6 +62,16 @@ "weaknesses": [ { "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + }, + { + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -80,10 +90,35 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:certifi_project:certifi:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:certifi:certifi:*:*:*:*:*:python:*:*", "versionStartIncluding": "2017.11.5", "versionEndExcluding": "2022.12.7", - "matchCriteriaId": "1606EC69-E0F1-42D0-8D95-81E7FE44F65D" + "matchCriteriaId": "A9A9E60B-C4BA-4FA7-9EDF-26C0F2433F5D" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*", + "matchCriteriaId": "24B8DB06-590A-4008-B0AB-FCD1401C77C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86B51137-28D9-41F2-AFA2-3CC22B4954D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4455CF3A-CC91-4BE4-A7AB-929AC82E34F5" } ] } @@ -123,7 +158,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20230223-0010/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-328xx/CVE-2022-32871.json b/CVE-2022/CVE-2022-328xx/CVE-2022-32871.json index 832dfde7618..21f92a8b961 100644 --- a/CVE-2022/CVE-2022-328xx/CVE-2022-32871.json +++ b/CVE-2022/CVE-2022-328xx/CVE-2022-32871.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32871", "sourceIdentifier": "product-security@apple.com", "published": "2023-04-10T19:15:06.967", - "lastModified": "2024-11-21T07:07:08.120", + "lastModified": "2025-02-12T17:15:10.880", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2022/CVE-2022-374xx/CVE-2022-37462.json b/CVE-2022/CVE-2022-374xx/CVE-2022-37462.json index dfb2f6b3214..13d2e3d5220 100644 --- a/CVE-2022/CVE-2022-374xx/CVE-2022-37462.json +++ b/CVE-2022/CVE-2022-374xx/CVE-2022-37462.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37462", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-10T13:15:06.913", - "lastModified": "2024-11-21T07:15:01.633", + "lastModified": "2025-02-12T18:15:19.050", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45320.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45320.json index 5e283a4f580..bf67ab00fe0 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45320.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45320.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45320", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-20T05:15:07.613", - "lastModified": "2024-11-21T07:29:02.940", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:51:52.663", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,330 @@ "value": "Liferay Portal anterior a 7.4.3.16 y Liferay DXP anterior a 7.2 fixpack 19, 7.3 anterior a la actualizaci\u00f3n 6 y 7.4 anterior a la actualizaci\u00f3n 16 permiten a los usuarios autenticados remotamente convertirse en propietarios de una p\u00e1gina wiki editando la p\u00e1gina wiki." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2", + "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*", + "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*", + "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*", + "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*", + "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*", + "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*", + "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*", + "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*", + "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*", + "matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*", + "matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*", + "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*", + "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "B6AAAAF1-994E-409D-8FC7-DE2A2CF60AD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_8:*:*:*:*:*:*", + "matchCriteriaId": "D70C8521-473E-4AA4-BBE8-02BED236383B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*", + "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*", + "matchCriteriaId": "AD408C73-7D78-4EB1-AA2C-F4A6D4DC980B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update5:*:*:*:*:*:*", + "matchCriteriaId": "513F3229-7C31-44EB-88F6-E564BE725853" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*", + "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*", + "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*", + "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*", + "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*", + "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*", + "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*", + "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*", + "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*", + "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*", + "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*", + "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*", + "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*", + "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*", + "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*", + "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*", + "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.4.3.16", + "matchCriteriaId": "513C4959-418A-4E06-B0BC-5E812FEECC31" + } + ] + } + ] + } + ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2022-45320", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2022-45320", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24534.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24534.json index f390ec5fcc3..7e319910e28 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24534.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24534.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24534", "sourceIdentifier": "security@golang.org", "published": "2023-04-06T16:15:07.657", - "lastModified": "2024-11-21T07:48:04.643", + "lastModified": "2025-02-12T18:15:19.837", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24536.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24536.json index 7195de348e3..0a5b672df92 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24536.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24536.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24536", "sourceIdentifier": "security@golang.org", "published": "2023-04-06T16:15:07.710", - "lastModified": "2024-11-21T07:48:04.893", + "lastModified": "2025-02-12T18:15:20.083", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-770" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24537.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24537.json index 960f7c3f7a8..b68add49ea8 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24537.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24537.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24537", "sourceIdentifier": "security@golang.org", "published": "2023-04-06T16:15:07.753", - "lastModified": "2024-11-29T12:15:05.507", + "lastModified": "2025-02-12T17:15:13.973", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24538.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24538.json index 12aa2b68ff4..15bd13766e7 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24538.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24538.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24538", "sourceIdentifier": "security@golang.org", "published": "2023-04-06T16:15:07.800", - "lastModified": "2024-11-21T07:48:05.130", + "lastModified": "2025-02-12T17:15:14.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-246xx/CVE-2023-24626.json b/CVE-2023/CVE-2023-246xx/CVE-2023-24626.json index 9605d38942f..9d2f0836a7c 100644 --- a/CVE-2023/CVE-2023-246xx/CVE-2023-24626.json +++ b/CVE-2023/CVE-2023-246xx/CVE-2023-24626.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24626", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-08T05:15:07.063", - "lastModified": "2024-11-21T07:48:15.523", + "lastModified": "2025-02-12T17:15:14.380", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 4.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "configurations": [ @@ -111,6 +141,14 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "https://www.exploit-db.com/exploits/51252", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27018.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27018.json index d6add531095..df7c06fd9eb 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27018.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27018.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27018", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:08.433", - "lastModified": "2024-11-21T07:52:11.723", + "lastModified": "2025-02-12T17:15:14.883", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27019.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27019.json index d62c2021342..7695a4a868a 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27019.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27019.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27019", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:08.470", - "lastModified": "2024-11-21T07:52:11.857", + "lastModified": "2025-02-12T18:15:20.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27020.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27020.json index 23f9e6f8cae..6c0c7b71099 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27020.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27020.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27020", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:08.507", - "lastModified": "2024-11-21T07:52:12.010", + "lastModified": "2025-02-12T17:15:15.087", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27021.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27021.json index 5a20839bda4..8d7730df92b 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27021.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27021.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27021", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:08.540", - "lastModified": "2024-11-21T07:52:12.150", + "lastModified": "2025-02-12T17:15:15.277", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27033.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27033.json index 3fa7ab66e0b..56e5198316d 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27033.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27033.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27033", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T21:15:06.920", - "lastModified": "2024-11-21T07:52:12.633", + "lastModified": "2025-02-12T17:15:15.500", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27180.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27180.json index cafe78ead6f..bd3d0ea3e6e 100644 --- a/CVE-2023/CVE-2023-271xx/CVE-2023-27180.json +++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27180.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27180", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T21:15:06.957", - "lastModified": "2024-11-21T07:52:25.857", + "lastModified": "2025-02-12T17:15:15.697", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-277xx/CVE-2023-27719.json b/CVE-2023/CVE-2023-277xx/CVE-2023-27719.json index 2f3101db58a..3d52f296861 100644 --- a/CVE-2023/CVE-2023-277xx/CVE-2023-27719.json +++ b/CVE-2023/CVE-2023-277xx/CVE-2023-27719.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27719", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-09T21:15:07.220", - "lastModified": "2024-11-21T07:53:23.200", + "lastModified": "2025-02-12T17:15:15.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-277xx/CVE-2023-27720.json b/CVE-2023/CVE-2023-277xx/CVE-2023-27720.json index 2d1518471ef..1cc00eb441c 100644 --- a/CVE-2023/CVE-2023-277xx/CVE-2023-27720.json +++ b/CVE-2023/CVE-2023-277xx/CVE-2023-27720.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27720", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-09T21:15:07.263", - "lastModified": "2024-11-21T07:53:23.360", + "lastModified": "2025-02-12T17:15:16.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27801.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27801.json index 6c3b6d7a864..9cd575a368d 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27801.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27801.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27801", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T14:15:07.577", - "lastModified": "2024-11-21T07:53:30.740", + "lastModified": "2025-02-12T17:15:16.390", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27802.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27802.json index 71c3fc1dd4e..00b13ef9854 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27802.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27802.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27802", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T14:15:07.613", - "lastModified": "2024-11-21T07:53:30.900", + "lastModified": "2025-02-12T17:15:16.597", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27803.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27803.json index 7195e620946..9d6fa0496eb 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27803.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27803.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27803", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T14:15:07.650", - "lastModified": "2024-11-21T07:53:31.047", + "lastModified": "2025-02-12T17:15:16.797", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27805.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27805.json index 82978a28e3d..82b0c0863ae 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27805.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27805.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27805", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T14:15:07.720", - "lastModified": "2024-11-21T07:53:31.343", + "lastModified": "2025-02-12T17:15:17.010", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27806.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27806.json index b63cfaacc24..d357b006abe 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27806.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27806.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27806", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T14:15:07.757", - "lastModified": "2024-11-21T07:53:31.497", + "lastModified": "2025-02-12T17:15:17.203", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27807.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27807.json index 5df8d7ca300..110e533717d 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27807.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27807.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27807", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T14:15:07.790", - "lastModified": "2024-11-21T07:53:31.660", + "lastModified": "2025-02-12T17:15:17.400", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27808.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27808.json index 9a9ac30f933..f1c0c6a6631 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27808.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27808.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27808", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T14:15:07.827", - "lastModified": "2024-11-21T07:53:31.840", + "lastModified": "2025-02-12T17:15:17.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27810.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27810.json index 18e572c9cea..2b3c0bb2cfa 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27810.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27810.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27810", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T14:15:07.860", - "lastModified": "2024-11-21T07:53:32.000", + "lastModified": "2025-02-12T17:15:17.790", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2826.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2826.json index 5d743a317f8..20fd90be446 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2826.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2826.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2826", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-21T08:15:08.643", - "lastModified": "2024-11-21T07:59:21.890", + "lastModified": "2025-02-12T17:15:20.110", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -83,7 +83,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -153,6 +153,14 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://github.com/joicygiore/ApplyForCVE/blob/main/XSS.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29374.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29374.json index 77bcf087c10..6b5f7b7ebf0 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29374.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29374.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29374", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-05T02:15:37.340", - "lastModified": "2024-11-21T07:56:57.473", + "lastModified": "2025-02-12T17:15:18.260", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29421.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29421.json index bd4e054b5cc..b3eed706b73 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29421.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29421.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29421", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-06T05:15:07.653", - "lastModified": "2024-11-21T07:57:01.903", + "lastModified": "2025-02-12T17:15:18.467", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29465.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29465.json index 7bf57df564c..59a0f3b1e4d 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29465.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29465.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29465", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-06T20:15:08.830", - "lastModified": "2024-11-21T07:57:07.537", + "lastModified": "2025-02-12T17:15:18.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29473.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29473.json index 76bfc1690fc..035cd360cc6 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29473.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29473.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29473", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-06T23:15:07.297", - "lastModified": "2024-11-21T07:57:08.040", + "lastModified": "2025-02-12T17:15:18.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29474.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29474.json index edc97e922ee..cab96f28c53 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29474.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29474.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29474", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-06T23:15:07.357", - "lastModified": "2024-11-21T07:57:08.170", + "lastModified": "2025-02-12T17:15:19.070", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29475.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29475.json index 6d5ff11e409..d36e66ff864 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29475.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29475.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29475", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-06T23:15:07.403", - "lastModified": "2024-11-21T07:57:08.320", + "lastModified": "2025-02-12T17:15:19.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30450.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30450.json index 0e8c9da7bcd..81928878e9f 100644 --- a/CVE-2023/CVE-2023-304xx/CVE-2023-30450.json +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30450.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30450", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-08T23:15:06.930", - "lastModified": "2024-11-21T08:00:12.513", + "lastModified": "2025-02-12T17:15:20.380", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38562.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38562.json index f5c06b66b97..8526b92daf6 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38562.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38562.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38562", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-20T15:15:08.020", - "lastModified": "2024-11-21T08:13:50.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:51:08.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -51,14 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:weston-embedded:uc-tcp-ip:3.06.01:*:*:*:*:*:*:*", + "matchCriteriaId": "27A185C2-4CE9-475C-B0F8-F48EFF1CAEFF" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1829", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39540.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39540.json index 5a69284111d..a808b7c3c6b 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39540.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39540.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39540", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-20T15:15:08.323", - "lastModified": "2024-11-21T08:15:38.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:50:58.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-126" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:weston-embedded:uc-tcp-ip:3.06.01:*:*:*:*:*:*:*", + "matchCriteriaId": "27A185C2-4CE9-475C-B0F8-F48EFF1CAEFF" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1828", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1828", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39541.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39541.json index df51cc33280..d407ab0c21c 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39541.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39541.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39541", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-20T15:15:08.533", - "lastModified": "2024-11-21T08:15:38.337", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:50:36.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,51 @@ "value": "CWE-126" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:weston-embedded:uc-tcp-ip:3.06.01:*:*:*:*:*:*:*", + "matchCriteriaId": "27A185C2-4CE9-475C-B0F8-F48EFF1CAEFF" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1828", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1828", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45318.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45318.json index 029a1a8e247..e83bc24c7f7 100644 --- a/CVE-2023/CVE-2023-453xx/CVE-2023-45318.json +++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45318.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45318", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-20T15:15:08.727", - "lastModified": "2024-11-21T08:26:44.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:50:45.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,56 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:silabs:gecko_software_development_kit:4.3.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "630B4655-F4AA-4DAA-8127-BBC89EE6046C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:weston-embedded:uc-http:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE7CD12C-6F8F-4347-B9BD-51C46EF0F84E" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1843", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1843", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50306.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50306.json index 5444a1207a7..5cda823cc25 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50306.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50306.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50306", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-20T14:15:08.237", - "lastModified": "2024-11-21T08:36:49.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T17:01:45.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, @@ -49,24 +69,63 @@ "value": "CWE-204" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:common_licensing:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "60A24280-F68D-4C5A-B12A-BCC1BDC53FBC" + } + ] + } + ] } ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/273337", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7120660", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/273337", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7120660", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51392.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51392.json index 8d4e3225f5d..0ef1750c934 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51392.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51392.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51392", "sourceIdentifier": "product-security@silabs.com", "published": "2024-02-23T17:15:07.840", - "lastModified": "2024-11-21T08:38:00.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:49:30.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-1240" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:silabs:emberznet:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0", + "versionEndIncluding": "7.2.4", + "matchCriteriaId": "E456A82A-F19A-4C1C-B775-8D3D61447EE6" + } + ] + } + ] } ], "references": [ { "url": "https://community.silabs.com/068Vm000001BKm6", - "source": "product-security@silabs.com" + "source": "product-security@silabs.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://community.silabs.com/068Vm000001BKm6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51393.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51393.json index fba2edc2091..815e06e0f8d 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51393.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51393.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51393", "sourceIdentifier": "product-security@silabs.com", "published": "2024-02-23T20:15:51.687", - "lastModified": "2024-11-21T08:38:01.120", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:49:22.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-770" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:silabs:emberznet:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.4.0", + "matchCriteriaId": "4302C76B-4600-4188-9A73-77BEAE036F47" + } + ] + } + ] } ], "references": [ { "url": "https://community.silabs.com/068Vm000001NaAM", - "source": "product-security@silabs.com" + "source": "product-security@silabs.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://community.silabs.com/068Vm000001NaAM", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51394.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51394.json index 794896b41ab..6dfc05e499d 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51394.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51394.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51394", "sourceIdentifier": "product-security@silabs.com", "published": "2024-02-23T20:15:51.880", - "lastModified": "2024-11-21T08:38:01.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:49:15.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-476" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:silabs:emberznet:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.4.0", + "matchCriteriaId": "4302C76B-4600-4188-9A73-77BEAE036F47" + } + ] + } + ] } ], "references": [ { "url": "https://community.silabs.com/068Vm000001NL4u", - "source": "product-security@silabs.com" + "source": "product-security@silabs.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://community.silabs.com/068Vm000001NL4u", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6936.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6936.json index 9b0b6e67782..4e2ae7cba94 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6936.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6936.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6936", "sourceIdentifier": "facts@wolfssl.com", "published": "2024-02-20T22:15:08.197", - "lastModified": "2024-11-21T08:44:52.383", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T17:01:14.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,89 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.6.6", + "matchCriteriaId": "57DCDF61-F982-41D7-83BE-DDAEC85A797A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wolfSSL/wolfssl/pull/6949/", - "source": "facts@wolfssl.com" + "source": "facts@wolfssl.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://www.wolfssl.com/docs/security-vulnerabilities/", - "source": "facts@wolfssl.com" + "source": "facts@wolfssl.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/wolfSSL/wolfssl/pull/6949/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://www.wolfssl.com/docs/security-vulnerabilities/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0144.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0144.json index 91407da6b9c..0d5ee3c2908 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0144.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0144.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0144", "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-12T01:15:08.483", - "lastModified": "2025-02-12T02:15:10.163", + "lastModified": "2025-02-12T18:15:20.557", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5596", "source": "psirt@nvidia.com" }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2113", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0145.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0145.json index b3f822600fe..e3ecfcf32e4 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0145.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0145.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0145", "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-12T01:15:08.630", - "lastModified": "2025-02-12T02:15:10.263", + "lastModified": "2025-02-12T18:15:20.700", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2108", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2113", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0715.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0715.json index 76f7208f37b..b6d65a7706e 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0715.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0715.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0715", "sourceIdentifier": "hirt@hitachi.co.jp", "published": "2024-02-20T02:15:49.720", - "lastModified": "2024-11-21T08:47:12.060", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T17:02:20.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,62 @@ "value": "CWE-917" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-917" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hitachi:global_link_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.8.7-03", + "matchCriteriaId": "670CDEBA-8379-4A02-9C10-38EC4C75FB1C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-112/index.html", - "source": "hirt@hitachi.co.jp" + "source": "hirt@hitachi.co.jp", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-112/index.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11628.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11628.json new file mode 100644 index 00000000000..4d91e870363 --- /dev/null +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11628.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-11628", + "sourceIdentifier": "security@progress.com", + "published": "2025-02-12T17:15:22.067", + "lastModified": "2025-02-12T17:15:22.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Progress\u00ae Telerik\u00ae Kendo UI for Vue versions v2.4.0 through v6.0.1, an attacker can introduce or modify properties within the global prototype chain which can result in denial of service or command injection." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], + "references": [ + { + "url": "https://www.telerik.com/kendo-vue-ui/components/knowledge-base/kb-security-protoype-pollution-2024-11628", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11629.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11629.json new file mode 100644 index 00000000000..dfb5506f329 --- /dev/null +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11629.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-11629", + "sourceIdentifier": "security@progress.com", + "published": "2025-02-12T17:15:22.200", + "lastModified": "2025-02-12T17:15:22.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Progress\u00ae Telerik\u00ae Document Processing Libraries, versions prior to 2025 Q1 (2025.1.205), using .NET Standard 2.0, the contents of a file at an arbitrary path can be exported to RTF." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], + "references": [ + { + "url": "https://docs.telerik.com/devtools/document-processing/knowledge-base/kb-security-rtf-filecontent-export-cve-2024-11629", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1155.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1155.json index cb78b1caea1..1bd886a4c0b 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1155.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1155.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1155", "sourceIdentifier": "security@ni.com", "published": "2024-02-20T15:15:09.703", - "lastModified": "2024-11-21T08:49:55.300", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:50:24.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,103 @@ "value": "CWE-276" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:data_record_ad:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.0.1", + "matchCriteriaId": "2267E001-7C8A-4E3C-BAA3-C4108CDC2C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:flexlogger:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2022_q3", + "matchCriteriaId": "A05CEECE-4F09-4875-97F5-D419044299B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:g_web_development_software:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2022_q3", + "matchCriteriaId": "1C4008CF-D7BB-4400-AF25-69A468E0274F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:labview_nxg:5.1:*:*:*:community:*:*:*", + "matchCriteriaId": "E84E23D5-04EB-4B73-B335-AD1F9ECA6166" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:labview_nxg:5.1:*:*:*:real-time_module:*:*:*", + "matchCriteriaId": "25474D7C-8523-49BF-8D83-5D82A0D95FD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:labview_nxg:5.1:*:*:*:web_module:*:*:*", + "matchCriteriaId": "06AE0E0E-8E3C-416F-97EC-308FB2953B56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:specification_compliance_manager:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2023_q4", + "matchCriteriaId": "18B58D78-41AA-484A-A184-DFA999ED504B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:static_test_software_suite:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.2", + "matchCriteriaId": "338BAA7F-884C-41D8-B131-9E2C2FD46DC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:sts_software_bundle:*:*:*:*:*:*:*:*", + "versionEndIncluding": "21.0", + "matchCriteriaId": "B018440C-809C-4E30-9A08-AAF79D7D280E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:systemlink_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024_q1", + "matchCriteriaId": "95CF6EFB-FED4-428A-8CE5-AAE9D12A64FB" + } + ] + } + ] } ], "references": [ { "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/incorrect-permissions-for-shared-systemlink-elixir-based-service.html", - "source": "security@ni.com" + "source": "security@ni.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/incorrect-permissions-for-shared-systemlink-elixir-based-service.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1156.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1156.json index f13b061714d..f6c935b5aa1 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1156.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1156.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1156", "sourceIdentifier": "security@ni.com", "published": "2024-02-20T15:15:09.910", - "lastModified": "2024-11-21T08:49:55.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:50:02.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,103 @@ "value": "CWE-276" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:data_record_ad:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.0.1", + "matchCriteriaId": "2267E001-7C8A-4E3C-BAA3-C4108CDC2C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:flexlogger:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2022_q3", + "matchCriteriaId": "A05CEECE-4F09-4875-97F5-D419044299B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:g_web_development_software:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2022_q3", + "matchCriteriaId": "1C4008CF-D7BB-4400-AF25-69A468E0274F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:labview_nxg:5.1:*:*:*:community:*:*:*", + "matchCriteriaId": "E84E23D5-04EB-4B73-B335-AD1F9ECA6166" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:labview_nxg:5.1:*:*:*:real-time_module:*:*:*", + "matchCriteriaId": "25474D7C-8523-49BF-8D83-5D82A0D95FD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:labview_nxg:5.1:*:*:*:web_module:*:*:*", + "matchCriteriaId": "06AE0E0E-8E3C-416F-97EC-308FB2953B56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:specification_compliance_manager:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2023_q4", + "matchCriteriaId": "18B58D78-41AA-484A-A184-DFA999ED504B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:static_test_software_suite:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.2", + "matchCriteriaId": "338BAA7F-884C-41D8-B131-9E2C2FD46DC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:sts_software_bundle:*:*:*:*:*:*:*:*", + "versionEndIncluding": "21.0", + "matchCriteriaId": "B018440C-809C-4E30-9A08-AAF79D7D280E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emerson:systemlink_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024_q1", + "matchCriteriaId": "95CF6EFB-FED4-428A-8CE5-AAE9D12A64FB" + } + ] + } + ] } ], "references": [ { "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/incorrect-permissions-for-shared-systemlink-elixir-based-service.html", - "source": "security@ni.com" + "source": "security@ni.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/incorrect-permissions-for-shared-systemlink-elixir-based-service.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json index 0ea9a97bec3..4c698ae83c9 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12085", "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-14T18:15:25.123", - "lastModified": "2025-02-12T04:15:08.523", + "lastModified": "2025-02-12T18:15:20.823", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -108,6 +108,14 @@ "url": "https://access.redhat.com/errata/RHSA-2025:1128", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:1225", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:1227", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-12085", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13484.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13484.json index 6de4336b1f2..0b65293c326 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13484.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13484.json @@ -2,13 +2,13 @@ "id": "CVE-2024-13484", "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-28T18:15:32.537", - "lastModified": "2025-01-28T19:15:13.753", + "lastModified": "2025-02-12T17:15:23.177", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A flaw was found in ArgoCD. The openshift.io/cluster-monitoring label is applied to all namespaces that deploy an ArgoCD CR instance, allowing the namespace to create a rogue PrometheusRule. This issue can have adverse effects on the platform monitoring stack, as the rule is rolled out cluster-wide when the label is applied." + "value": "A flaw was found in openshift-gitops-operator-container. The openshift.io/cluster-monitoring label is applied to all namespaces that deploy an ArgoCD CR instance, allowing the namespace to create a rogue PrometheusRule. This issue can have adverse effects on the platform monitoring stack, as the rule is rolled out cluster-wide when the label is applied." }, { "lang": "es", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1647.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1647.json index 7f404d5318f..dac3c40d30b 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1647.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1647.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1647", "sourceIdentifier": "help@fluidattacks.com", "published": "2024-02-20T01:15:07.717", - "lastModified": "2024-11-21T08:50:59.913", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T17:03:00.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,24 +49,65 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kumaf:pyhtml2pdf:0.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "7BBAEC91-C1D1-4197-983C-88EDE980FD3B" + } + ] + } + ] } ], "references": [ { "url": "https://fluidattacks.com/advisories/oliver/", - "source": "help@fluidattacks.com" + "source": "help@fluidattacks.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://pypi.org/project/pyhtml2pdf/", - "source": "help@fluidattacks.com" + "source": "help@fluidattacks.com", + "tags": [ + "Product" + ] }, { "url": "https://fluidattacks.com/advisories/oliver/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://pypi.org/project/pyhtml2pdf/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1648.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1648.json index 8932c00a99f..e95ac72d5c6 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1648.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1648.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1648", "sourceIdentifier": "help@fluidattacks.com", "published": "2024-02-20T01:15:07.943", - "lastModified": "2024-11-21T08:51:00.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T17:02:43.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,24 +49,65 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fraserxu:electron-pdf:20.0.0:*:*:*:*:node.js:*:*", + "matchCriteriaId": "F174B14E-92BA-4307-8052-1519F4EC45AA" + } + ] + } + ] } ], "references": [ { "url": "https://fluidattacks.com/advisories/drake", - "source": "help@fluidattacks.com" + "source": "help@fluidattacks.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.npmjs.com/package/electron-pdf/", - "source": "help@fluidattacks.com" + "source": "help@fluidattacks.com", + "tags": [ + "Product" + ] }, { "url": "https://fluidattacks.com/advisories/drake", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.npmjs.com/package/electron-pdf/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1651.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1651.json index 5faba3946e0..0c12b6f812c 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1651.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1651.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1651", "sourceIdentifier": "help@fluidattacks.com", "published": "2024-02-20T00:15:14.847", - "lastModified": "2024-11-21T08:51:00.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T17:26:55.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,22 +71,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:torrentpier:torrentpier:2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1D7F5085-554D-4D13-8E2B-40AC71B7630C" + } + ] + } + ] + } + ], "references": [ { "url": "https://fluidattacks.com/advisories/xavi/", - "source": "help@fluidattacks.com" + "source": "help@fluidattacks.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/torrentpier/torrentpier", - "source": "help@fluidattacks.com" + "source": "help@fluidattacks.com", + "tags": [ + "Product" + ] }, { "url": "https://fluidattacks.com/advisories/xavi/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/torrentpier/torrentpier", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21502.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21502.json index ca13cff6f67..18e438a2205 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21502.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21502.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21502", "sourceIdentifier": "report@snyk.io", "published": "2024-02-24T05:15:44.643", - "lastModified": "2024-11-21T08:54:34.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:49:07.160", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,40 +69,96 @@ "value": "CWE-457" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:antonkueltz:fastecdsa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.2", + "matchCriteriaId": "AC53779B-A4F3-4862-A23A-A75226BBA659" + } + ] + } + ] } ], "references": [ { "url": "https://gist.github.com/keltecc/49da037072276f21b005a8337c15db26", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/AntonKueltz/fastecdsa/blob/v2.3.1/src/curveMath.c%23L210", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/AntonKueltz/fastecdsa/commit/57fc5689c95d649dab7ef60cc99ac64589f01e36", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Patch" + ] }, { "url": "https://security.snyk.io/vuln/SNYK-PYTHON-FASTECDSA-6262045", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/keltecc/49da037072276f21b005a8337c15db26", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/AntonKueltz/fastecdsa/blob/v2.3.1/src/curveMath.c%23L210", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/AntonKueltz/fastecdsa/commit/57fc5689c95d649dab7ef60cc99ac64589f01e36", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://security.snyk.io/vuln/SNYK-PYTHON-FASTECDSA-6262045", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21785.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21785.json index 85dc687ac31..44bda996558 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21785.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21785.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21785", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T16:15:12.073", - "lastModified": "2024-11-21T08:55:00.023", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T17:30:02.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,32 +49,258 @@ "value": "CWE-489" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4A393F14-3BD3-44DE-B06F-9235AB62C68F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5A4772E7-8788-4DB5-98CE-25F0255E0386" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5086EF1F-C3CE-4B5F-A352-67CE332A6C4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "CC227F17-D280-4C74-A73E-8F92158686BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5CC4A2E2-DF6D-427A-88E6-54FD6D11BDFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB4DDF3B-AB0E-4DDD-9865-D4EEDCCA78DE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0462A9CE-4EAA-4C12-9147-F530C42328D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "C8277A48-94C7-40F3-A822-F6311B2CDA94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D58D4140-C719-4EDA-8963-667F9FF21970" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "AAF96AFD-40E3-4FB6-BAD7-067D9E257A08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "D476CC45-B4A1-4210-9347-9854BB0A86AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p2-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "386D70E8-70D6-4D25-818C-2218E1B1AC6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "9B7F3A1F-BD96-49A7-A340-0E5E1893326C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "27710A58-507C-43BB-849F-7238F5D6D9ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FAF2C99-BC5F-4E99-A3A8-FBBDDC24C933" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "01C6DFFC-374B-4314-9230-53BD01BD6574" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "51095762-A87C-4A1D-A4E2-679462DC8FA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-540:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB6B9FC-390E-43FD-9DF9-AAB1A9CDAA48" + } + ] + } + ] } ], "references": [ { "url": "https://community.automationdirect.com/s/internal-database-security-advisory/a4GPE0000003yaj2AA/sa00038", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1942", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1942", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://community.automationdirect.com/s/internal-database-security-advisory/a4GPE0000003yaj2AA/sa00038", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1942", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1942", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21802.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21802.json index c70b6148086..9b2e012ed05 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21802.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21802.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21802", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-26T16:27:55.550", - "lastModified": "2024-11-21T08:55:01.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:48:44.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ggerganov:llama.cpp:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-01-09", + "matchCriteriaId": "07A47D2B-F723-47ED-B617-B1D29C4157DC" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1914", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1914", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21825.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21825.json index f91c2206484..955a1fc04f0 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21825.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21825.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21825", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-26T16:27:55.770", - "lastModified": "2024-11-21T08:55:04.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:47:51.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ggerganov:llama.cpp:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-01-09", + "matchCriteriaId": "07A47D2B-F723-47ED-B617-B1D29C4157DC" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1912", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1912", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21836.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21836.json index 5eb475cc3a6..c1e2d08b06a 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21836.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21836.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21836", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-26T16:27:55.990", - "lastModified": "2024-11-21T08:55:05.760", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:53:55.033", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ggerganov:llama.cpp:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-01-09", + "matchCriteriaId": "07A47D2B-F723-47ED-B617-B1D29C4157DC" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1915", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1915", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22187.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22187.json index baae503e920..bbf876440ad 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22187.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22187.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22187", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T16:15:12.330", - "lastModified": "2024-11-21T08:55:45.137", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T17:30:21.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,32 +49,258 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4A393F14-3BD3-44DE-B06F-9235AB62C68F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5A4772E7-8788-4DB5-98CE-25F0255E0386" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5086EF1F-C3CE-4B5F-A352-67CE332A6C4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "CC227F17-D280-4C74-A73E-8F92158686BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5CC4A2E2-DF6D-427A-88E6-54FD6D11BDFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB4DDF3B-AB0E-4DDD-9865-D4EEDCCA78DE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0462A9CE-4EAA-4C12-9147-F530C42328D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "C8277A48-94C7-40F3-A822-F6311B2CDA94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D58D4140-C719-4EDA-8963-667F9FF21970" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "AAF96AFD-40E3-4FB6-BAD7-067D9E257A08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "D476CC45-B4A1-4210-9347-9854BB0A86AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p2-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "386D70E8-70D6-4D25-818C-2218E1B1AC6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "9B7F3A1F-BD96-49A7-A340-0E5E1893326C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "27710A58-507C-43BB-849F-7238F5D6D9ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FAF2C99-BC5F-4E99-A3A8-FBBDDC24C933" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "01C6DFFC-374B-4314-9230-53BD01BD6574" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "51095762-A87C-4A1D-A4E2-679462DC8FA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-540:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB6B9FC-390E-43FD-9DF9-AAB1A9CDAA48" + } + ] + } + ] } ], "references": [ { "url": "https://community.automationdirect.com/s/internal-database-security-advisory/a4GPE0000003yXV2AY/sa00036", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1940", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1940", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://community.automationdirect.com/s/internal-database-security-advisory/a4GPE0000003yXV2AY/sa00036", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1940", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1940", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23315.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23315.json index 534b4c69431..9dba484d0a4 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23315.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23315.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23315", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T16:15:12.663", - "lastModified": "2024-11-21T08:57:29.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T17:30:29.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,32 +49,258 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4A393F14-3BD3-44DE-B06F-9235AB62C68F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5A4772E7-8788-4DB5-98CE-25F0255E0386" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5086EF1F-C3CE-4B5F-A352-67CE332A6C4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "CC227F17-D280-4C74-A73E-8F92158686BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5CC4A2E2-DF6D-427A-88E6-54FD6D11BDFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB4DDF3B-AB0E-4DDD-9865-D4EEDCCA78DE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0462A9CE-4EAA-4C12-9147-F530C42328D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "C8277A48-94C7-40F3-A822-F6311B2CDA94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D58D4140-C719-4EDA-8963-667F9FF21970" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "AAF96AFD-40E3-4FB6-BAD7-067D9E257A08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "D476CC45-B4A1-4210-9347-9854BB0A86AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p2-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "386D70E8-70D6-4D25-818C-2218E1B1AC6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "9B7F3A1F-BD96-49A7-A340-0E5E1893326C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "27710A58-507C-43BB-849F-7238F5D6D9ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FAF2C99-BC5F-4E99-A3A8-FBBDDC24C933" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "01C6DFFC-374B-4314-9230-53BD01BD6574" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "51095762-A87C-4A1D-A4E2-679462DC8FA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-540:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB6B9FC-390E-43FD-9DF9-AAB1A9CDAA48" + } + ] + } + ] } ], "references": [ { "url": "https://community.automationdirect.com/s/internal-database-security-advisory/a4GPE0000003yZ72AI/sa00037", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1941", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1941", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://community.automationdirect.com/s/internal-database-security-advisory/a4GPE0000003yZ72AI/sa00037", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1941", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1941", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23496.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23496.json index 304714de81d..61928df3ed8 100644 --- a/CVE-2024/CVE-2024-234xx/CVE-2024-23496.json +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23496.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23496", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-26T16:27:56.800", - "lastModified": "2024-11-21T08:57:49.887", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:53:44.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ggerganov:llama.cpp:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-01-09", + "matchCriteriaId": "07A47D2B-F723-47ED-B617-B1D29C4157DC" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1913", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1913", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23601.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23601.json index 933692c7c2c..91fbf93dc5a 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23601.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23601.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23601", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T16:15:12.917", - "lastModified": "2024-11-21T08:57:59.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T17:30:39.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,32 +49,254 @@ "value": "CWE-345" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4A393F14-3BD3-44DE-B06F-9235AB62C68F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5A4772E7-8788-4DB5-98CE-25F0255E0386" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5086EF1F-C3CE-4B5F-A352-67CE332A6C4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "CC227F17-D280-4C74-A73E-8F92158686BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5CC4A2E2-DF6D-427A-88E6-54FD6D11BDFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB4DDF3B-AB0E-4DDD-9865-D4EEDCCA78DE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0462A9CE-4EAA-4C12-9147-F530C42328D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "C8277A48-94C7-40F3-A822-F6311B2CDA94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D58D4140-C719-4EDA-8963-667F9FF21970" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "AAF96AFD-40E3-4FB6-BAD7-067D9E257A08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "D476CC45-B4A1-4210-9347-9854BB0A86AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p2-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "386D70E8-70D6-4D25-818C-2218E1B1AC6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "9B7F3A1F-BD96-49A7-A340-0E5E1893326C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "27710A58-507C-43BB-849F-7238F5D6D9ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FAF2C99-BC5F-4E99-A3A8-FBBDDC24C933" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "01C6DFFC-374B-4314-9230-53BD01BD6574" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "51095762-A87C-4A1D-A4E2-679462DC8FA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-540:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB6B9FC-390E-43FD-9DF9-AAB1A9CDAA48" + } + ] + } + ] } ], "references": [ { "url": "https://community.automationdirect.com/s/internal-database-security-advisory/a4GPE0000003ycL2AQ/sa00039", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1943", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1943", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://community.automationdirect.com/s/internal-database-security-advisory/a4GPE0000003ycL2AQ/sa00039", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1943", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1943", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23605.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23605.json index 5f67f702bff..ca28fc11ce5 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23605.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23605.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23605", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-26T16:27:57.000", - "lastModified": "2024-11-21T08:57:59.433", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:53:36.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ggerganov:llama.cpp:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-01-09", + "matchCriteriaId": "07A47D2B-F723-47ED-B617-B1D29C4157DC" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1916", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1916", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23947.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23947.json index 2eb16ae4041..1f5542802a7 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23947.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23947.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23947", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T14:15:10.233", - "lastModified": "2024-11-21T08:58:44.480", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:43:20.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23948.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23948.json index ef137ff05aa..306df254866 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23948.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23948.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23948", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T14:15:10.460", - "lastModified": "2024-11-21T08:58:44.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:43:24.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24402.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24402.json index 7e30a41840e..372ad46e13e 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24402.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24402.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24402", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T17:15:10.443", - "lastModified": "2024-11-21T08:59:15.080", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:53:28.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,73 @@ "value": "Un problema en Nagios XI 2024R1.01 permite a un atacante remoto escalar privilegios mediante un script manipulado al componente /usr/local/nagios/bin/npcd." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nagios:nagios_xi:2024:r1.0.1:*:*:*:*:*:*", + "matchCriteriaId": "C1FE1A0B-78D1-4626-A4CD-21B843DA596E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.nagios.com/changelog/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.nagios.com/changelog/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24793.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24793.json index 079ff9ff9d1..d7756ea0469 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24793.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24793.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24793", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-20T11:15:08.090", - "lastModified": "2024-11-21T08:59:43.383", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:52:00.803", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nih:libdicom:1.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "3CB47B53-5857-4971-ABF8-A3DA8CB79BC2" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24794.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24794.json index 32314c74357..ae931445840 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24794.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24794.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24794", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-02-20T11:15:08.343", - "lastModified": "2024-11-21T08:59:43.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:51:15.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nih:libdicom:1.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "3CB47B53-5857-4971-ABF8-A3DA8CB79BC2" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1931", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24851.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24851.json index 7a04846c0e2..002bea18dcf 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24851.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24851.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24851", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T16:15:13.150", - "lastModified": "2024-11-21T08:59:51.157", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T17:30:47.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,32 +49,258 @@ "value": "CWE-805" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4A393F14-3BD3-44DE-B06F-9235AB62C68F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5A4772E7-8788-4DB5-98CE-25F0255E0386" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5086EF1F-C3CE-4B5F-A352-67CE332A6C4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "CC227F17-D280-4C74-A73E-8F92158686BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5CC4A2E2-DF6D-427A-88E6-54FD6D11BDFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB4DDF3B-AB0E-4DDD-9865-D4EEDCCA78DE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0462A9CE-4EAA-4C12-9147-F530C42328D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "C8277A48-94C7-40F3-A822-F6311B2CDA94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D58D4140-C719-4EDA-8963-667F9FF21970" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "AAF96AFD-40E3-4FB6-BAD7-067D9E257A08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "D476CC45-B4A1-4210-9347-9854BB0A86AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p2-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "386D70E8-70D6-4D25-818C-2218E1B1AC6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "9B7F3A1F-BD96-49A7-A340-0E5E1893326C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "27710A58-507C-43BB-849F-7238F5D6D9ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FAF2C99-BC5F-4E99-A3A8-FBBDDC24C933" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "01C6DFFC-374B-4314-9230-53BD01BD6574" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "51095762-A87C-4A1D-A4E2-679462DC8FA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-540:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB6B9FC-390E-43FD-9DF9-AAB1A9CDAA48" + } + ] + } + ] } ], "references": [ { "url": "https://community.automationdirect.com/s/internal-database-security-advisory/a4GPE0000003y1F2AQ/sa00025", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1936", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1936", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://community.automationdirect.com/s/internal-database-security-advisory/a4GPE0000003y1F2AQ/sa00025", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1936", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1936", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24946.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24946.json index 533ab13dd8e..8858710dd77 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24946.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24946.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24946", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T16:15:13.383", - "lastModified": "2024-11-21T09:00:02.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:34:36.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,232 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4A393F14-3BD3-44DE-B06F-9235AB62C68F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5A4772E7-8788-4DB5-98CE-25F0255E0386" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5086EF1F-C3CE-4B5F-A352-67CE332A6C4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "CC227F17-D280-4C74-A73E-8F92158686BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5CC4A2E2-DF6D-427A-88E6-54FD6D11BDFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB4DDF3B-AB0E-4DDD-9865-D4EEDCCA78DE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0462A9CE-4EAA-4C12-9147-F530C42328D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "C8277A48-94C7-40F3-A822-F6311B2CDA94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D58D4140-C719-4EDA-8963-667F9FF21970" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "AAF96AFD-40E3-4FB6-BAD7-067D9E257A08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "D476CC45-B4A1-4210-9347-9854BB0A86AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p2-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "386D70E8-70D6-4D25-818C-2218E1B1AC6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "9B7F3A1F-BD96-49A7-A340-0E5E1893326C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "27710A58-507C-43BB-849F-7238F5D6D9ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FAF2C99-BC5F-4E99-A3A8-FBBDDC24C933" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "01C6DFFC-374B-4314-9230-53BD01BD6574" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "51095762-A87C-4A1D-A4E2-679462DC8FA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-540:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB6B9FC-390E-43FD-9DF9-AAB1A9CDAA48" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1937", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1937", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1937", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1937", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24947.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24947.json index 6500cdff88f..ea1b9235bfb 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24947.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24947.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24947", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T16:15:13.650", - "lastModified": "2024-11-21T09:00:02.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:30:42.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,232 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4A393F14-3BD3-44DE-B06F-9235AB62C68F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5A4772E7-8788-4DB5-98CE-25F0255E0386" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5086EF1F-C3CE-4B5F-A352-67CE332A6C4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "CC227F17-D280-4C74-A73E-8F92158686BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5CC4A2E2-DF6D-427A-88E6-54FD6D11BDFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB4DDF3B-AB0E-4DDD-9865-D4EEDCCA78DE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0462A9CE-4EAA-4C12-9147-F530C42328D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "C8277A48-94C7-40F3-A822-F6311B2CDA94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D58D4140-C719-4EDA-8963-667F9FF21970" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "AAF96AFD-40E3-4FB6-BAD7-067D9E257A08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "D476CC45-B4A1-4210-9347-9854BB0A86AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p2-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "386D70E8-70D6-4D25-818C-2218E1B1AC6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "9B7F3A1F-BD96-49A7-A340-0E5E1893326C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "27710A58-507C-43BB-849F-7238F5D6D9ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FAF2C99-BC5F-4E99-A3A8-FBBDDC24C933" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "01C6DFFC-374B-4314-9230-53BD01BD6574" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "51095762-A87C-4A1D-A4E2-679462DC8FA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-540:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB6B9FC-390E-43FD-9DF9-AAB1A9CDAA48" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1937", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1937", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1937", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1937", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24954.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24954.json index 03f0c6e9bc1..52388642962 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24954.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24954.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24954", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T16:15:13.880", - "lastModified": "2024-11-21T09:00:02.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:30:49.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,67 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4A393F14-3BD3-44DE-B06F-9235AB62C68F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5086EF1F-C3CE-4B5F-A352-67CE332A6C4F" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24955.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24955.json index 8b3b3138fda..a8ed3c74b99 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24955.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24955.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24955", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T16:15:14.107", - "lastModified": "2024-11-21T09:00:02.620", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:31:05.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,67 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4A393F14-3BD3-44DE-B06F-9235AB62C68F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5086EF1F-C3CE-4B5F-A352-67CE332A6C4F" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24956.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24956.json index 6c83ac0f9d0..c56b3a20f07 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24956.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24956.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24956", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T16:15:14.320", - "lastModified": "2024-11-21T09:00:02.743", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:31:17.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,67 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4A393F14-3BD3-44DE-B06F-9235AB62C68F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5086EF1F-C3CE-4B5F-A352-67CE332A6C4F" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24957.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24957.json index e967126ebd4..2abc67d5483 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24957.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24957.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24957", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T16:15:14.543", - "lastModified": "2024-11-21T09:00:02.867", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T17:03:40.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,67 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4A393F14-3BD3-44DE-B06F-9235AB62C68F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5086EF1F-C3CE-4B5F-A352-67CE332A6C4F" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24958.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24958.json index 7a28aed0786..32bf6179803 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24958.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24958.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24958", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T16:15:14.770", - "lastModified": "2024-11-21T09:00:02.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:31:11.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,67 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4A393F14-3BD3-44DE-B06F-9235AB62C68F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5086EF1F-C3CE-4B5F-A352-67CE332A6C4F" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24959.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24959.json index f79719a4e11..e3f9f1600da 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24959.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24959.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24959", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T16:15:14.997", - "lastModified": "2024-11-21T09:00:03.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:31:34.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,67 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4A393F14-3BD3-44DE-B06F-9235AB62C68F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5086EF1F-C3CE-4B5F-A352-67CE332A6C4F" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1938", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24962.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24962.json index 4afa9a5558a..1aee2bd62a7 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24962.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24962.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24962", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T16:15:15.213", - "lastModified": "2024-11-21T09:00:03.243", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:31:24.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,24 +49,244 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4A393F14-3BD3-44DE-B06F-9235AB62C68F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5A4772E7-8788-4DB5-98CE-25F0255E0386" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5086EF1F-C3CE-4B5F-A352-67CE332A6C4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "CC227F17-D280-4C74-A73E-8F92158686BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5CC4A2E2-DF6D-427A-88E6-54FD6D11BDFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB4DDF3B-AB0E-4DDD-9865-D4EEDCCA78DE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0462A9CE-4EAA-4C12-9147-F530C42328D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "C8277A48-94C7-40F3-A822-F6311B2CDA94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D58D4140-C719-4EDA-8963-667F9FF21970" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "AAF96AFD-40E3-4FB6-BAD7-067D9E257A08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "D476CC45-B4A1-4210-9347-9854BB0A86AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p2-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "386D70E8-70D6-4D25-818C-2218E1B1AC6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "9B7F3A1F-BD96-49A7-A340-0E5E1893326C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "27710A58-507C-43BB-849F-7238F5D6D9ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FAF2C99-BC5F-4E99-A3A8-FBBDDC24C933" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "01C6DFFC-374B-4314-9230-53BD01BD6574" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "51095762-A87C-4A1D-A4E2-679462DC8FA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-540:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB6B9FC-390E-43FD-9DF9-AAB1A9CDAA48" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1939", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1939", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1939", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1939", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24963.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24963.json index 50ed6b432b1..84282ff7dbe 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24963.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24963.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24963", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T16:15:15.450", - "lastModified": "2024-11-21T09:00:03.350", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:31:43.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,24 +49,244 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "4A393F14-3BD3-44DE-B06F-9235AB62C68F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550e_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5A4772E7-8788-4DB5-98CE-25F0255E0386" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5086EF1F-C3CE-4B5F-A352-67CE332A6C4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "CC227F17-D280-4C74-A73E-8F92158686BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "5CC4A2E2-DF6D-427A-88E6-54FD6D11BDFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB4DDF3B-AB0E-4DDD-9865-D4EEDCCA78DE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:1.2.10.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0462A9CE-4EAA-4C12-9147-F530C42328D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p3-530_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "C8277A48-94C7-40F3-A822-F6311B2CDA94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p3-530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D58D4140-C719-4EDA-8963-667F9FF21970" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "AAF96AFD-40E3-4FB6-BAD7-067D9E257A08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p2-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "D476CC45-B4A1-4210-9347-9854BB0A86AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p2-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "386D70E8-70D6-4D25-818C-2218E1B1AC6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "9B7F3A1F-BD96-49A7-A340-0E5E1893326C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-550_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "27710A58-507C-43BB-849F-7238F5D6D9ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FAF2C99-BC5F-4E99-A3A8-FBBDDC24C933" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:1.2.10.10:*:*:*:*:*:*:*", + "matchCriteriaId": "01C6DFFC-374B-4314-9230-53BD01BD6574" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:automationdirect:p1-540_firmware:4.1.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "51095762-A87C-4A1D-A4E2-679462DC8FA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:automationdirect:p1-540:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DB6B9FC-390E-43FD-9DF9-AAB1A9CDAA48" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1939", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1939", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1939", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1939", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25973.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25973.json index ad2753bc6b2..2bcf5bce6b8 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25973.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25973.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25973", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2024-02-20T08:15:07.717", - "lastModified": "2024-11-21T09:01:40.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:51:24.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "El LMS OpenOlat de Frentix GmbH se ve afectado por m\u00faltiples vulnerabilidades de Cross-Site Scripting (XSS) Almacenado. Un atacante con derechos para crear o editar grupos puede crear un curso con un nombre que contenga un payload XSS. Adem\u00e1s, los atacantes con permisos para crear o cambiar el nombre de un cat\u00e1logo (subcategor\u00eda) pueden ingresar entradas sin filtrar en el campo de nombre. Adem\u00e1s, los atacantes a quienes se les permite crear curr\u00edculos tambi\u00e9n pueden ingresar datos sin filtrar en el campo de nombre. Esto permite a un atacante ejecutar c\u00f3digo JavaScript almacenado con los permisos de la v\u00edctima en el contexto del navegador del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", @@ -26,24 +49,68 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:frentix:openolat:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1.6", + "matchCriteriaId": "C7A58DE8-BC68-48E5-B2B6-4B2196FE1FA7" + } + ] + } + ] } ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Feb/23", - "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "https://r.sec-consult.com/openolat", - "source": "551230f0-3615-47bd-b7cc-93e92e730bbf" + "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Feb/23", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "https://r.sec-consult.com/openolat", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30269.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30269.json index 0a52e5d0939..7819884f5a8 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30269.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30269.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30269", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-08T15:15:07.820", - "lastModified": "2024-11-21T09:11:35.500", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T17:50:06.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.5.0", + "matchCriteriaId": "6CC5892A-DDBB-451C-AA7F-69B47CA1128A" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/dataease/dataease/releases/tag/v2.5.0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/dataease/dataease/security/advisories/GHSA-8gvx-4qvj-6vv5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/dataease/dataease/releases/tag/v2.5.0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/dataease/dataease/security/advisories/GHSA-8gvx-4qvj-6vv5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31441.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31441.json index 4588d65e8c9..cdfce70fce2 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31441.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31441.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31441", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-14T15:25:18.967", - "lastModified": "2024-11-21T09:13:31.627", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T17:49:35.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.18.19", + "matchCriteriaId": "06697CDB-18F5-48BB-A3B2-9CE2FBCC1094" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/dataease/dataease/security/advisories/GHSA-h7hj-7wg6-p5wh", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/dataease/dataease/security/advisories/GHSA-h7hj-7wg6-p5wh", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32838.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32838.json index 84da517288f..a2f845c4861 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32838.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32838.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32838", "sourceIdentifier": "security@apache.org", "published": "2025-02-12T10:15:13.043", - "lastModified": "2025-02-12T10:15:13.043", + "lastModified": "2025-02-12T18:15:21.633", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -60,7 +60,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,6 +73,10 @@ { "url": "https://lists.apache.org/thread/7l88h17pn9nf8zpx5bbojk7ko5oxo1dy", "source": "security@apache.org" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/02/12/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35218.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35218.json index 0817410a61b..433f4be2064 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35218.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35218.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35218", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-21T14:15:12.003", - "lastModified": "2024-11-21T09:19:57.623", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T17:46:28.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,48 +69,128 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.18.13", + "matchCriteriaId": "129BB794-C562-487F-B088-1565243F3EBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.8.4", + "matchCriteriaId": "F560DE40-FC77-4CCF-9936-3A4359822D06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.0", + "versionEndExcluding": "12.3.7", + "matchCriteriaId": "432E6FEF-E2FC-4490-8376-0D056ADDB57A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.0", + "versionEndExcluding": "13.1.1", + "matchCriteriaId": "070BDE45-92F3-4C27-BDDF-BD98E344B2B8" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/umbraco/Umbraco-CMS/commit/1b712fe6ec52aa4e71b3acf63e393c8e6ab85385", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/commit/a2684069b1e9976444f60b4b37a80be05b87f6b6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/commit/cbf9f9bcd199d7ca0412be3071d275556f10b7ba", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/commit/d090176272d07500dac0daee7c598aa8bb321050", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-gvpc-3pj6-4m9w", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/commit/1b712fe6ec52aa4e71b3acf63e393c8e6ab85385", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/commit/a2684069b1e9976444f60b4b37a80be05b87f6b6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/commit/cbf9f9bcd199d7ca0412be3071d275556f10b7ba", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/commit/d090176272d07500dac0daee7c598aa8bb321050", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-gvpc-3pj6-4m9w", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40890.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40890.json index 60bdf785385..7cf368947b9 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40890.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40890.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40890", "sourceIdentifier": "security@zyxel.com.tw", "published": "2025-02-04T10:15:08.717", - "lastModified": "2025-02-12T02:00:01.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:12:16.130", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "security@zyxel.com.tw", @@ -62,10 +62,393 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg1312-b10a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8CC0C61-EB6A-4736-80E3-B69693D4A2B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg1312-b10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B6C4A31-3B83-444F-B5F8-1397B43B2211" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg1312-b10b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8EF1C4A6-0305-4759-8DEC-92EB3D2915B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg1312-b10b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B193DF7-5EE9-4A78-A01E-753463665627" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg1312-b10e_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2DF4827D-405E-4D21-A17E-A201EC6F79F3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg1312-b10e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "155187EA-4A46-4850-B983-BCE245D57777" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg3312-b10a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7AC711D-503A-48F9-A523-193F29B9DB22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg3312-b10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFD9DF7D-E6E8-4261-8BD7-12A1AE8839BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg3313-b10a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDEC1767-C8D9-495F-B809-FCDB39DCF98B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg3313-b10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "46446AE5-EBC1-4E4C-A30F-C610C3EB0975" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg3926-b10b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7120E86-98DC-4824-BF59-02234501EA29" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg3926-b10b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1DAF061-1975-4A5B-8206-1E9836DBA1B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg4325-b10a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B88B7A0D-D194-47D1-9D78-682EDFC52B52" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg4325-b10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "135700AF-7EC0-4E94-8552-B6F1038DE4A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg4380-b10a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4808FDF8-4815-4C4F-AFE7-31EADE517B31" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg4380-b10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88BA2BDF-9ACA-4F89-B7B7-FD232A6399CD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg8324-b10a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF0AFA0F-D126-4D1C-89EC-878AB0F5E74C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg8324-b10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53C32749-82A6-42AA-9EBE-11014F161D2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg8924-b10a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11BEC42C-7815-4EA3-B1E5-66E2443B5032" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg8924-b10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96DC6BBF-15B8-496F-85FE-5373B6CEDC3C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:sbg3300-n000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "852E8F04-4C28-4904-AA4A-ACE4EAD6DC31" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:sbg3300-n000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "902A735D-2D84-4183-B4B3-FA36AD9F13A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:sbg3300-nb00_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B338AE18-ECE4-4B90-A1D5-16F2983464E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:sbg3300-nb00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4658399-1699-4426-ACFF-BDEE20BF1A54" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:sbg3500-n000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC4B86C-ED2F-406D-BCAA-B970BAD248D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:zyxel:sbg3500-n000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC4B86C-ED2F-406D-BCAA-B970BAD248D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:sbg3500-nb00_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD0DECE6-7AFC-4E86-9FFE-1215ECF8324D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:sbg3500-nb00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5185679F-9FBC-4B2E-AE79-1471EB56E46A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025", - "source": "security@zyxel.com.tw" + "source": "security@zyxel.com.tw", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40891.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40891.json index 213d207c8aa..fd5addd9da0 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40891.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40891.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40891", "sourceIdentifier": "security@zyxel.com.tw", "published": "2025-02-04T10:15:08.920", - "lastModified": "2025-02-12T02:00:01.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:11:58.790", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "security@zyxel.com.tw", @@ -62,10 +62,393 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg1312-b10a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8CC0C61-EB6A-4736-80E3-B69693D4A2B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg1312-b10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B6C4A31-3B83-444F-B5F8-1397B43B2211" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg1312-b10b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8EF1C4A6-0305-4759-8DEC-92EB3D2915B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg1312-b10b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B193DF7-5EE9-4A78-A01E-753463665627" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg1312-b10e_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2DF4827D-405E-4D21-A17E-A201EC6F79F3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg1312-b10e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "155187EA-4A46-4850-B983-BCE245D57777" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg3312-b10a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7AC711D-503A-48F9-A523-193F29B9DB22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg3312-b10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFD9DF7D-E6E8-4261-8BD7-12A1AE8839BD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg3313-b10a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDEC1767-C8D9-495F-B809-FCDB39DCF98B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg3313-b10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "46446AE5-EBC1-4E4C-A30F-C610C3EB0975" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg3926-b10b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7120E86-98DC-4824-BF59-02234501EA29" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg3926-b10b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1DAF061-1975-4A5B-8206-1E9836DBA1B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg4325-b10a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B88B7A0D-D194-47D1-9D78-682EDFC52B52" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg4325-b10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "135700AF-7EC0-4E94-8552-B6F1038DE4A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg4380-b10a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4808FDF8-4815-4C4F-AFE7-31EADE517B31" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg4380-b10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88BA2BDF-9ACA-4F89-B7B7-FD232A6399CD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg8324-b10a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF0AFA0F-D126-4D1C-89EC-878AB0F5E74C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg8324-b10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53C32749-82A6-42AA-9EBE-11014F161D2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:vmg8924-b10a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11BEC42C-7815-4EA3-B1E5-66E2443B5032" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:vmg8924-b10a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96DC6BBF-15B8-496F-85FE-5373B6CEDC3C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:sbg3300-n000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "852E8F04-4C28-4904-AA4A-ACE4EAD6DC31" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:sbg3300-n000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "902A735D-2D84-4183-B4B3-FA36AD9F13A5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:sbg3300-nb00_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B338AE18-ECE4-4B90-A1D5-16F2983464E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:sbg3300-nb00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4658399-1699-4426-ACFF-BDEE20BF1A54" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:sbg3500-n000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC4B86C-ED2F-406D-BCAA-B970BAD248D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:zyxel:sbg3500-n000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC4B86C-ED2F-406D-BCAA-B970BAD248D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zyxel:sbg3500-nb00_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD0DECE6-7AFC-4E86-9FFE-1215ECF8324D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zyxel:sbg3500-nb00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5185679F-9FBC-4B2E-AE79-1471EB56E46A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025", - "source": "security@zyxel.com.tw" + "source": "security@zyxel.com.tw", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49791.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49791.json index 149cf4d05b4..06cf33a06f7 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49791.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49791.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49791", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-06T00:15:26.420", - "lastModified": "2025-02-06T00:15:26.420", - "vulnStatus": "Received", + "lastModified": "2025-02-12T18:59:58.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:applinx:11.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7116F100-D485-4B66-A910-9A4663360A0F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7182522", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-498xx/CVE-2024-49800.json b/CVE-2024/CVE-2024-498xx/CVE-2024-49800.json index 4fa1d78036b..0f178fad1a0 100644 --- a/CVE-2024/CVE-2024-498xx/CVE-2024-49800.json +++ b/CVE-2024/CVE-2024-498xx/CVE-2024-49800.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49800", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-02-06T00:15:27.620", - "lastModified": "2025-02-06T00:15:27.620", - "vulnStatus": "Received", + "lastModified": "2025-02-12T17:58:29.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -36,25 +36,75 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-316" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:applinx:11.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7116F100-D485-4B66-A910-9A4663360A0F" + } + ] + } + ] } ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7182522", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5550.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5550.json index 70714a61d43..d8095212e20 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5550.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5550.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5550", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:09.473", - "lastModified": "2024-11-21T09:47:54.640", - "vulnStatus": "Modified", + "lastModified": "2025-02-12T17:31:38.343", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -92,8 +92,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:h2o:h2o:3.40.0.4:*:*:*:*:python:*:*", - "matchCriteriaId": "071849AC-FE17-43A6-A67F-35760CABCAB2" + "criteria": "cpe:2.3:a:h2o:h2o:3.40.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E57282AC-B36C-452D-968F-DD4B940072BD" } ] } diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6097.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6097.json new file mode 100644 index 00000000000..b4bac644b2d --- /dev/null +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6097.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6097", + "sourceIdentifier": "security@progress.com", + "published": "2025-02-12T18:15:21.977", + "lastModified": "2025-02-12T18:15:21.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Progress\u00ae Telerik\u00ae Reporting versions prior to 2025 Q1 (19.0.25.211), information disclosure is possible by a local threat actor through an absolute path vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-36" + } + ] + } + ], + "references": [ + { + "url": "https://docs.telerik.com/reporting/knowledge-base/kb-security-absolute-path-traversal-CVE-2024-6097", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0411.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0411.json index a4ac690a9cf..893132ec25d 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0411.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0411.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0411", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-01-25T05:15:09.533", - "lastModified": "2025-02-07T17:15:31.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:14:13.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -53,28 +75,72 @@ "value": "CWE-693" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:7-zip:7-zip:*:*:*:*:*:*:*:*", + "versionEndExcluding": "24.09", + "matchCriteriaId": "AAFF445C-96F1-4328-A34E-A8C392B34BF3" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-045/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/01/24/6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20250207-0005/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.vicarius.io/vsociety/posts/cve-2025-0411-7-zip-mitigation-vulnerability", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation" + ] }, { "url": "https://www.vicarius.io/vsociety/posts/cve-2025-0411-detection-7-zip-vulnerability", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0905.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0905.json index 14d2bc3fba4..3e7283ab10c 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0905.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0905.json @@ -2,16 +2,42 @@ "id": "CVE-2025-0905", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:34.997", - "lastModified": "2025-02-11T20:15:34.997", - "vulnStatus": "Received", + "lastModified": "2025-02-12T19:00:08.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JB2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25433." + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de lectura fuera de los l\u00edmites en el an\u00e1lisis de archivos JB2 de editor PDF-XChange. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre instalaciones afectadas de editor PDF-XChange. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos JB2. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una lectura m\u00e1s all\u00e1 del final de un objeto asignado. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-25433." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4.2.390", + "matchCriteriaId": "64861956-D5A9-440A-AB6B-BB519B8E8839" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-067/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0906.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0906.json index d70cf9af381..3691ed8c536 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0906.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0906.json @@ -2,16 +2,42 @@ "id": "CVE-2025-0906", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:35.113", - "lastModified": "2025-02-11T20:15:35.113", - "vulnStatus": "Received", + "lastModified": "2025-02-12T18:59:53.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JB2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25434." + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de lectura fuera de los l\u00edmites en el an\u00e1lisis de archivos JB2 de editor PDF-XChange. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre instalaciones afectadas de editor PDF-XChange. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos JB2. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una lectura m\u00e1s all\u00e1 del final de un b\u00fafer asignado. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-25434." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4.2.390", + "matchCriteriaId": "64861956-D5A9-440A-AB6B-BB519B8E8839" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-068/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0907.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0907.json index aaa0f50e0d0..e69c8b1dbd7 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0907.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0907.json @@ -2,16 +2,42 @@ "id": "CVE-2025-0907", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:35.240", - "lastModified": "2025-02-11T20:15:35.240", - "vulnStatus": "Received", + "lastModified": "2025-02-12T18:59:44.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JB2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25435." + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de lectura fuera de los l\u00edmites en el an\u00e1lisis de archivos JB2 de editor PDF-XChange. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre instalaciones afectadas de editor PDF-XChange. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos JB2. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una lectura m\u00e1s all\u00e1 del final de un objeto asignado. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-25435." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4.2.390", + "matchCriteriaId": "64861956-D5A9-440A-AB6B-BB519B8E8839" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-069/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0908.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0908.json index b180ecf20c0..e103aeb2703 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0908.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0908.json @@ -2,16 +2,42 @@ "id": "CVE-2025-0908", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:35.370", - "lastModified": "2025-02-11T20:15:35.370", - "vulnStatus": "Received", + "lastModified": "2025-02-12T18:59:38.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25557." + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de lectura fuera de los l\u00edmites en el an\u00e1lisis de archivos U3D del editor PDF-XChange. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre las instalaciones afectadas del editor PDF-XChange. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos U3D. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una lectura m\u00e1s all\u00e1 del final de un b\u00fafer asignado. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-25557." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.4.2.390", + "matchCriteriaId": "64861956-D5A9-440A-AB6B-BB519B8E8839" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-063/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0909.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0909.json index e97b035aa41..559f2072b56 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0909.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0909.json @@ -2,16 +2,42 @@ "id": "CVE-2025-0909", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:35.500", - "lastModified": "2025-02-11T20:15:35.500", - "vulnStatus": "Received", + "lastModified": "2025-02-12T18:59:31.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XPS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25678." + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de lectura fuera de los l\u00edmites en el an\u00e1lisis de archivos XPS del editor PDF-XChange. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre instalaciones afectadas del editor PDF-XChange. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos XPS. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una lectura m\u00e1s all\u00e1 del final de un objeto asignado. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-25678." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.5.0.393", + "matchCriteriaId": "118C49BE-6894-4AC8-8792-80DC370C343E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-064/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0910.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0910.json index 1214d20479a..92b19952b27 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0910.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0910.json @@ -2,16 +2,42 @@ "id": "CVE-2025-0910", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:35.633", - "lastModified": "2025-02-11T20:15:35.633", - "vulnStatus": "Received", + "lastModified": "2025-02-12T18:59:18.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25748." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remoto fuera de los l\u00edmites en el an\u00e1lisis de archivos U3D del editor PDF-XChange. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas del editor PDF-XChange. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos U3D. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una escritura m\u00e1s all\u00e1 del final de un objeto asignado. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-25748." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -47,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.5.0.393", + "matchCriteriaId": "118C49BE-6894-4AC8-8792-80DC370C343E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-065/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0919.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0919.json new file mode 100644 index 00000000000..f9453be5f5f --- /dev/null +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0919.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-0919", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-12T17:15:23.357", + "lastModified": "2025-02-12T17:15:23.357", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-0818. Reason: This candidate is a reservation duplicate of CVE-2025-0818. Notes: All CVE users should reference CVE-2025-0818 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0925.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0925.json new file mode 100644 index 00000000000..c7f7f3d178f --- /dev/null +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0925.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2025-0925", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-12T17:15:23.437", + "lastModified": "2025-02-12T17:15:23.437", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-0818. Reason: This candidate is a reservation duplicate of CVE-2025-0818. Notes: All CVE users should reference CVE-2025-0818 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1209.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1209.json new file mode 100644 index 00000000000..f159621d9c7 --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1209.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-1209", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-12T17:15:23.497", + "lastModified": "2025-02-12T17:15:23.497", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in code-projects Wazifa System 1.0. Affected is the function searchuser of the file /search_resualts.php. The manipulation of the argument firstname/lastname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. There is a typo in the affected file name." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/nanguawuming/CVE2/blob/main/cve2.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295146", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295146", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.497356", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1210.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1210.json new file mode 100644 index 00000000000..0f332bf1a7e --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1210.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-1210", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-12T17:15:23.673", + "lastModified": "2025-02-12T17:15:23.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in code-projects Wazifa System 1.0. Affected by this vulnerability is an unknown functionality of the file /controllers/control.php. The manipulation of the argument to leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/nanguawuming/CVE2/blob/main/cve3.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295147", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295147", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.497357", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1213.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1213.json new file mode 100644 index 00000000000..fb00cefcdaa --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1213.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-1213", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-12T18:15:22.180", + "lastModified": "2025-02-12T18:15:22.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in pihome-shc PiHome 1.77. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/janssensjelle/published-pocs/blob/main/pihome_xss_index.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295172", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295172", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.497521", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1214.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1214.json new file mode 100644 index 00000000000..5d8eba9e6d8 --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1214.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-1214", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-12T18:15:22.417", + "lastModified": "2025-02-12T18:15:22.417", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in pihome-shc PiHome 2.0. This affects an unknown part of the file /user_accounts.php?uid of the component Role-Based Access Control. The manipulation leads to missing authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + }, + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/janssensjelle/published-pocs/blob/main/pihomehvac-improper-access-control.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295173", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295173", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.497533", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21391.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21391.json index 55d35c4f19e..506423e9d1e 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21391.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21391.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21391", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:37.723", - "lastModified": "2025-02-12T02:00:01.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:14:53.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Storage Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el almacenamiento de Windows" } ], "metrics": { @@ -42,19 +46,141 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-59" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4890", + "matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7785", + "matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "D3106289-A3E3-4508-B118-17BD2488D681" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "70BC66D1-8679-4FA5-A4E0-2E9FDB56E273" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21391", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21418.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21418.json index 96a8cdd35f2..e7fea0486f1 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21418.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21418.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21418", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:40.023", - "lastModified": "2025-02-12T02:00:01.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T18:14:34.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability" + }, + { + "lang": "es", + "value": "Controlador de funci\u00f3n auxiliar de Windows para vulnerabilidad de elevaci\u00f3n de privilegios de WinSock" } ], "metrics": { @@ -42,19 +46,148 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "CFBEF986-E905-4BB5-B385-235915023D89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20915", + "matchCriteriaId": "1BFC22FD-A703-4D65-9126-955BB9540340" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5487", + "matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5487", + "matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4890", + "matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4890", + "matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6893", + "matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3207", + "matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1425", + "matchCriteriaId": "D3106289-A3E3-4508-B118-17BD2488D681" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.3194", + "matchCriteriaId": "C5C38103-E0F4-4302-98CE-BD8B20460004" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21418", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25182.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25182.json new file mode 100644 index 00000000000..1436e0c334a --- /dev/null +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25182.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-25182", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-12T17:15:23.857", + "lastModified": "2025-02-12T17:15:23.857", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Stroom is a data processing, storage and analysis platform. A vulnerability exists starting in version 7.2-beta.53 and prior to versions 7.2.24, 7.3-beta.22, 7.4.4, and 7.5-beta.2 that allows authentication bypass to a Stroom system when configured with ALB and installed in a way that the application is accessible not through the ALB itself. This vulnerability may also allow for server-side request forgery which may lead to code execution or further privileges escalations when using the AWS metadata URL. This scenario assumes that Stroom must be configured to use ALB Authentication integration and the application is network accessible. The vulnerability has been fixed in versions 7.2.24, 7.3-beta.22, 7.4.4, and 7.5-beta.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gchq/stroom/pull/4320", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/gchq/stroom/security/advisories/GHSA-x489-xx2m-vc43", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25184.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25184.json new file mode 100644 index 00000000000..0daa9249794 --- /dev/null +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25184.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-25184", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-12T17:15:24.000", + "lastModified": "2025-02-12T17:15:24.000", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.11, 3.0.12, and 3.1.11, Rack::CommonLogger can be exploited by crafting input that includes newline characters to manipulate log entries. The supplied proof-of-concept demonstrates injecting malicious content into logs. When a user provides the authorization credentials via Rack::Auth::Basic, if success, the username will be put in env['REMOTE_USER'] and later be used by Rack::CommonLogger for logging purposes. The issue occurs when a server intentionally or unintentionally allows a user creation with the username contain CRLF and white space characters, or the server just want to log every login attempts. If an attacker enters a username with CRLF character, the logger will log the malicious username with CRLF characters into the logfile. Attackers can break log formats or insert fraudulent entries, potentially obscuring real activity or injecting malicious data into log files. Versions 2.2.11, 3.0.12, and 3.1.11 contain a fix." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-93" + }, + { + "lang": "en", + "value": "CWE-117" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/rack/rack/commit/074ae244430cda05c27ca91cda699709cfb3ad8e", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rack/rack/security/advisories/GHSA-7g2v-jj9q-g3rg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25198.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25198.json new file mode 100644 index 00000000000..43561604f37 --- /dev/null +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25198.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-25198", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-12T18:15:27.757", + "lastModified": "2025-02-12T18:15:27.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "mailcow: dockerized is an open source groupware/email suite based on docker. Prior to version 2025-01a, a vulnerability in mailcow's password reset functionality allows an attacker to manipulate the `Host HTTP` header to generate a password reset link pointing to an attacker-controlled domain. This can lead to account takeover if a user clicks the poisoned link. Version 2025-01a contains a patch. As a workaround, deactivate the password reset functionality by clearing `Notification email sender` and `Notification email subject` under System -> Configuration -> Options -> Password Settings." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-3mvx-qw4r-fcqf", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25199.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25199.json new file mode 100644 index 00000000000..44813dd9019 --- /dev/null +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25199.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-25199", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-12T18:15:27.933", + "lastModified": "2025-02-12T18:15:27.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "go-crypto-winnative Go crypto backend for Windows using Cryptography API: Next Generation (CNG). Prior to commit f49c8e1379ea4b147d5bff1b3be5b0ff45792e41, calls to `cng.TLS1PRF` don't release the key handle, producing a small memory leak every time. Commit f49c8e1379ea4b147d5bff1b3be5b0ff45792e41 contains a fix for the issue. The fix is included in versions 1.23.6-2 and 1.22.12-2 of the Microsoft build of go, as well as in the pseudoversion 0.0.0-20250211154640-f49c8e1379ea of the `github.com/microsoft/go-crypto-winnative` Go package." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/microsoft/go-crypto-winnative/commit/f49c8e1379ea4b147d5bff1b3be5b0ff45792e41", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/microsoft/go-crypto-winnative/security/advisories/GHSA-29c6-3hcj-89cf", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25200.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25200.json new file mode 100644 index 00000000000..ad0f12120ca --- /dev/null +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25200.json @@ -0,0 +1,102 @@ +{ + "id": "CVE-2025-25200", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-12T18:15:28.110", + "lastModified": "2025-02-12T18:15:28.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Koa is expressive middleware for Node.js using ES2017 async functions. Prior to versions 0.21.2, 1.7.1, 2.15.4, and 3.0.0-alpha.3, Koa uses an evil regex to parse the `X-Forwarded-Proto` and `X-Forwarded-Host` HTTP headers. This can be exploited to carry out a Denial-of-Service attack. Versions 0.21.2, 1.7.1, 2.15.4, and 3.0.0-alpha.3 fix the issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.2, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/koajs/koa/blob/master/lib/request.js#L259", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/koajs/koa/blob/master/lib/request.js#L404", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/koajs/koa/commit/5054af6e31ffd451a4151a1fe144cef6e5d0d83c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/koajs/koa/commit/5f294bb1c7c8d9c61904378d250439a321bffd32", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/koajs/koa/commit/93fe903fc966635a991bcf890cfc3427d33a1a08", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/koajs/koa/releases/tag/2.15.4", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/koajs/koa/security/advisories/GHSA-593f-38f6-jp5m", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25741.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25741.json new file mode 100644 index 00000000000..04059a4c9be --- /dev/null +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25741.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25741", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T18:15:28.293", + "lastModified": "2025-02-12T18:15:28.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the IPv6_PppoePassword parameter in the SetIPv6PppoeSettings module." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://dear-sunshine-ba5.notion.site/D-Link-DIR-853-7-1812386a664480b7ac54d281afa629f5", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25742.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25742.json new file mode 100644 index 00000000000..56dc2cbeda7 --- /dev/null +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25742.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25742", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T17:15:24.150", + "lastModified": "2025-02-12T17:15:24.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the AccountPassword parameter in the SetSysEmailSettings module." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://dear-sunshine-ba5.notion.site/D-Link-DIR-853-3-1812386a664480feaf1ceab444b132b3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25743.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25743.json new file mode 100644 index 00000000000..ffbae051bff --- /dev/null +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25743.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25743", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T17:15:24.270", + "lastModified": "2025-02-12T17:15:24.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-853 A1 FW1.20B07 was discovered to contain a command injection vulnerability in the SetVirtualServerSettings module." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://dear-sunshine-ba5.notion.site/D-Link-DIR-853-1812386a664480229910c137ded2d3f1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25744.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25744.json new file mode 100644 index 00000000000..e33d609a49f --- /dev/null +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25744.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25744", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T17:15:24.390", + "lastModified": "2025-02-12T17:15:24.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the Password parameter in the SetDynamicDNSSettings module." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://dear-sunshine-ba5.notion.site/D-Link-DIR-853-4-1812386a664480378626cc13b98e18f5", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25746.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25746.json new file mode 100644 index 00000000000..ae8c091c581 --- /dev/null +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25746.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25746", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T17:15:24.500", + "lastModified": "2025-02-12T17:15:24.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulnerability via the Password parameter in the SetWanSettings module." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://dear-sunshine-ba5.notion.site/D-Link-DIR-853-5-1812386a66448044b489f223b8c2e78a", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 9077f45a28b..6bd9fafe076 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-12T17:00:21.136541+00:00 +2025-02-12T19:00:40.892063+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-12T16:59:46.897000+00:00 +2025-02-12T19:00:08.500000+00:00 ``` ### Last Data Feed Release @@ -33,63 +33,63 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -281062 +281081 ``` ### CVEs added in the last Commit Recently added CVEs: `19` -- [CVE-2024-11343](CVE-2024/CVE-2024-113xx/CVE-2024-11343.json) (`2025-02-12T16:15:39.100`) -- [CVE-2024-12251](CVE-2024/CVE-2024-122xx/CVE-2024-12251.json) (`2025-02-12T15:15:12.370`) -- [CVE-2024-12379](CVE-2024/CVE-2024-123xx/CVE-2024-12379.json) (`2025-02-12T15:15:12.707`) -- [CVE-2024-12629](CVE-2024/CVE-2024-126xx/CVE-2024-12629.json) (`2025-02-12T16:15:39.810`) -- [CVE-2024-54160](CVE-2024/CVE-2024-541xx/CVE-2024-54160.json) (`2025-02-12T15:15:15.050`) -- [CVE-2024-9870](CVE-2024/CVE-2024-98xx/CVE-2024-9870.json) (`2025-02-12T16:15:42.563`) -- [CVE-2025-0332](CVE-2025/CVE-2025-03xx/CVE-2025-0332.json) (`2025-02-12T16:15:42.703`) -- [CVE-2025-0376](CVE-2025/CVE-2025-03xx/CVE-2025-0376.json) (`2025-02-12T15:15:15.477`) -- [CVE-2025-0516](CVE-2025/CVE-2025-05xx/CVE-2025-0516.json) (`2025-02-12T16:15:42.883`) -- [CVE-2025-0556](CVE-2025/CVE-2025-05xx/CVE-2025-0556.json) (`2025-02-12T16:15:43.030`) -- [CVE-2025-1042](CVE-2025/CVE-2025-10xx/CVE-2025-1042.json) (`2025-02-12T15:15:16.230`) -- [CVE-2025-1202](CVE-2025/CVE-2025-12xx/CVE-2025-1202.json) (`2025-02-12T15:15:17.920`) -- [CVE-2025-1206](CVE-2025/CVE-2025-12xx/CVE-2025-1206.json) (`2025-02-12T15:15:18.093`) -- [CVE-2025-1207](CVE-2025/CVE-2025-12xx/CVE-2025-1207.json) (`2025-02-12T16:15:44.393`) -- [CVE-2025-1208](CVE-2025/CVE-2025-12xx/CVE-2025-1208.json) (`2025-02-12T16:15:44.613`) -- [CVE-2025-1212](CVE-2025/CVE-2025-12xx/CVE-2025-1212.json) (`2025-02-12T15:15:18.290`) -- [CVE-2025-1244](CVE-2025/CVE-2025-12xx/CVE-2025-1244.json) (`2025-02-12T15:15:18.430`) -- [CVE-2025-25349](CVE-2025/CVE-2025-253xx/CVE-2025-25349.json) (`2025-02-12T16:15:46.323`) -- [CVE-2025-25351](CVE-2025/CVE-2025-253xx/CVE-2025-25351.json) (`2025-02-12T16:15:46.453`) +- [CVE-2024-11628](CVE-2024/CVE-2024-116xx/CVE-2024-11628.json) (`2025-02-12T17:15:22.067`) +- [CVE-2024-11629](CVE-2024/CVE-2024-116xx/CVE-2024-11629.json) (`2025-02-12T17:15:22.200`) +- [CVE-2024-6097](CVE-2024/CVE-2024-60xx/CVE-2024-6097.json) (`2025-02-12T18:15:21.977`) +- [CVE-2025-0919](CVE-2025/CVE-2025-09xx/CVE-2025-0919.json) (`2025-02-12T17:15:23.357`) +- [CVE-2025-0925](CVE-2025/CVE-2025-09xx/CVE-2025-0925.json) (`2025-02-12T17:15:23.437`) +- [CVE-2025-1209](CVE-2025/CVE-2025-12xx/CVE-2025-1209.json) (`2025-02-12T17:15:23.497`) +- [CVE-2025-1210](CVE-2025/CVE-2025-12xx/CVE-2025-1210.json) (`2025-02-12T17:15:23.673`) +- [CVE-2025-1213](CVE-2025/CVE-2025-12xx/CVE-2025-1213.json) (`2025-02-12T18:15:22.180`) +- [CVE-2025-1214](CVE-2025/CVE-2025-12xx/CVE-2025-1214.json) (`2025-02-12T18:15:22.417`) +- [CVE-2025-25182](CVE-2025/CVE-2025-251xx/CVE-2025-25182.json) (`2025-02-12T17:15:23.857`) +- [CVE-2025-25184](CVE-2025/CVE-2025-251xx/CVE-2025-25184.json) (`2025-02-12T17:15:24.000`) +- [CVE-2025-25198](CVE-2025/CVE-2025-251xx/CVE-2025-25198.json) (`2025-02-12T18:15:27.757`) +- [CVE-2025-25199](CVE-2025/CVE-2025-251xx/CVE-2025-25199.json) (`2025-02-12T18:15:27.933`) +- [CVE-2025-25200](CVE-2025/CVE-2025-252xx/CVE-2025-25200.json) (`2025-02-12T18:15:28.110`) +- [CVE-2025-25741](CVE-2025/CVE-2025-257xx/CVE-2025-25741.json) (`2025-02-12T18:15:28.293`) +- [CVE-2025-25742](CVE-2025/CVE-2025-257xx/CVE-2025-25742.json) (`2025-02-12T17:15:24.150`) +- [CVE-2025-25743](CVE-2025/CVE-2025-257xx/CVE-2025-25743.json) (`2025-02-12T17:15:24.270`) +- [CVE-2025-25744](CVE-2025/CVE-2025-257xx/CVE-2025-25744.json) (`2025-02-12T17:15:24.390`) +- [CVE-2025-25746](CVE-2025/CVE-2025-257xx/CVE-2025-25746.json) (`2025-02-12T17:15:24.500`) ### CVEs modified in the last Commit -Recently modified CVEs: `101` +Recently modified CVEs: `99` -- [CVE-2024-34370](CVE-2024/CVE-2024-343xx/CVE-2024-34370.json) (`2025-02-12T15:42:09.867`) -- [CVE-2024-3460](CVE-2024/CVE-2024-34xx/CVE-2024-3460.json) (`2025-02-12T15:36:15.813`) -- [CVE-2024-3461](CVE-2024/CVE-2024-34xx/CVE-2024-3461.json) (`2025-02-12T15:37:59.677`) -- [CVE-2024-3943](CVE-2024/CVE-2024-39xx/CVE-2024-3943.json) (`2025-02-12T16:26:27.347`) -- [CVE-2024-3945](CVE-2024/CVE-2024-39xx/CVE-2024-3945.json) (`2025-02-12T16:26:04.993`) -- [CVE-2024-3946](CVE-2024/CVE-2024-39xx/CVE-2024-3946.json) (`2025-02-12T16:25:25.547`) -- [CVE-2024-3947](CVE-2024/CVE-2024-39xx/CVE-2024-3947.json) (`2025-02-12T16:23:45.067`) -- [CVE-2024-4317](CVE-2024/CVE-2024-43xx/CVE-2024-4317.json) (`2025-02-12T16:17:31.043`) -- [CVE-2024-4422](CVE-2024/CVE-2024-44xx/CVE-2024-4422.json) (`2025-02-12T16:29:48.533`) -- [CVE-2024-4426](CVE-2024/CVE-2024-44xx/CVE-2024-4426.json) (`2025-02-12T16:29:15.587`) -- [CVE-2024-4427](CVE-2024/CVE-2024-44xx/CVE-2024-4427.json) (`2025-02-12T16:28:31.400`) -- [CVE-2024-54909](CVE-2024/CVE-2024-549xx/CVE-2024-54909.json) (`2025-02-12T15:15:15.220`) -- [CVE-2024-54916](CVE-2024/CVE-2024-549xx/CVE-2024-54916.json) (`2025-02-12T16:15:42.160`) -- [CVE-2024-57000](CVE-2024/CVE-2024-570xx/CVE-2024-57000.json) (`2025-02-12T16:15:42.317`) -- [CVE-2025-0506](CVE-2025/CVE-2025-05xx/CVE-2025-0506.json) (`2025-02-12T15:15:15.613`) -- [CVE-2025-1183](CVE-2025/CVE-2025-11xx/CVE-2025-1183.json) (`2025-02-12T15:15:16.520`) -- [CVE-2025-1184](CVE-2025/CVE-2025-11xx/CVE-2025-1184.json) (`2025-02-12T15:15:16.723`) -- [CVE-2025-1185](CVE-2025/CVE-2025-11xx/CVE-2025-1185.json) (`2025-02-12T15:15:16.917`) -- [CVE-2025-1186](CVE-2025/CVE-2025-11xx/CVE-2025-1186.json) (`2025-02-12T15:15:17.140`) -- [CVE-2025-1188](CVE-2025/CVE-2025-11xx/CVE-2025-1188.json) (`2025-02-12T15:15:17.407`) -- [CVE-2025-1197](CVE-2025/CVE-2025-11xx/CVE-2025-1197.json) (`2025-02-12T15:15:17.670`) -- [CVE-2025-23093](CVE-2025/CVE-2025-230xx/CVE-2025-23093.json) (`2025-02-12T15:15:18.597`) -- [CVE-2025-23798](CVE-2025/CVE-2025-237xx/CVE-2025-23798.json) (`2025-02-12T16:15:45.630`) -- [CVE-2025-26344](CVE-2025/CVE-2025-263xx/CVE-2025-26344.json) (`2025-02-12T15:15:18.757`) -- [CVE-2025-26345](CVE-2025/CVE-2025-263xx/CVE-2025-26345.json) (`2025-02-12T15:15:18.930`) +- [CVE-2024-24956](CVE-2024/CVE-2024-249xx/CVE-2024-24956.json) (`2025-02-12T18:31:17.050`) +- [CVE-2024-24957](CVE-2024/CVE-2024-249xx/CVE-2024-24957.json) (`2025-02-12T17:03:40.950`) +- [CVE-2024-24958](CVE-2024/CVE-2024-249xx/CVE-2024-24958.json) (`2025-02-12T18:31:11.083`) +- [CVE-2024-24959](CVE-2024/CVE-2024-249xx/CVE-2024-24959.json) (`2025-02-12T18:31:34.233`) +- [CVE-2024-24962](CVE-2024/CVE-2024-249xx/CVE-2024-24962.json) (`2025-02-12T18:31:24.260`) +- [CVE-2024-24963](CVE-2024/CVE-2024-249xx/CVE-2024-24963.json) (`2025-02-12T18:31:43.123`) +- [CVE-2024-25973](CVE-2024/CVE-2024-259xx/CVE-2024-25973.json) (`2025-02-12T18:51:24.363`) +- [CVE-2024-30269](CVE-2024/CVE-2024-302xx/CVE-2024-30269.json) (`2025-02-12T17:50:06.097`) +- [CVE-2024-31441](CVE-2024/CVE-2024-314xx/CVE-2024-31441.json) (`2025-02-12T17:49:35.443`) +- [CVE-2024-32838](CVE-2024/CVE-2024-328xx/CVE-2024-32838.json) (`2025-02-12T18:15:21.633`) +- [CVE-2024-35218](CVE-2024/CVE-2024-352xx/CVE-2024-35218.json) (`2025-02-12T17:46:28.833`) +- [CVE-2024-40890](CVE-2024/CVE-2024-408xx/CVE-2024-40890.json) (`2025-02-12T18:12:16.130`) +- [CVE-2024-40891](CVE-2024/CVE-2024-408xx/CVE-2024-40891.json) (`2025-02-12T18:11:58.790`) +- [CVE-2024-49791](CVE-2024/CVE-2024-497xx/CVE-2024-49791.json) (`2025-02-12T18:59:58.627`) +- [CVE-2024-49800](CVE-2024/CVE-2024-498xx/CVE-2024-49800.json) (`2025-02-12T17:58:29.817`) +- [CVE-2024-5550](CVE-2024/CVE-2024-55xx/CVE-2024-5550.json) (`2025-02-12T17:31:38.343`) +- [CVE-2025-0411](CVE-2025/CVE-2025-04xx/CVE-2025-0411.json) (`2025-02-12T18:14:13.143`) +- [CVE-2025-0905](CVE-2025/CVE-2025-09xx/CVE-2025-0905.json) (`2025-02-12T19:00:08.500`) +- [CVE-2025-0906](CVE-2025/CVE-2025-09xx/CVE-2025-0906.json) (`2025-02-12T18:59:53.950`) +- [CVE-2025-0907](CVE-2025/CVE-2025-09xx/CVE-2025-0907.json) (`2025-02-12T18:59:44.813`) +- [CVE-2025-0908](CVE-2025/CVE-2025-09xx/CVE-2025-0908.json) (`2025-02-12T18:59:38.310`) +- [CVE-2025-0909](CVE-2025/CVE-2025-09xx/CVE-2025-0909.json) (`2025-02-12T18:59:31.043`) +- [CVE-2025-0910](CVE-2025/CVE-2025-09xx/CVE-2025-0910.json) (`2025-02-12T18:59:18.447`) +- [CVE-2025-21391](CVE-2025/CVE-2025-213xx/CVE-2025-21391.json) (`2025-02-12T18:14:53.363`) +- [CVE-2025-21418](CVE-2025/CVE-2025-214xx/CVE-2025-21418.json) (`2025-02-12T18:14:34.870`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f28f1c203b7..ace3b70a675 100644 --- a/_state.csv +++ b/_state.csv @@ -147681,7 +147681,7 @@ CVE-2020-12603,0,0,844d517dfdbd09c1605a51d0590a8c4b88c320e5da0a149dfe95b58dadc36 CVE-2020-12604,0,0,c6da2b4d097f64b8f5aa86509d221211f19e1ed4d956c267d7e9fd23894ab816,2024-11-21T04:59:54.307000 CVE-2020-12605,0,0,8b924308f61952cd88dc670c8e7f2b8183d49faad60553fc91350f8677d07ceb,2024-11-21T04:59:54.460000 CVE-2020-12606,0,0,44f719b468f9ba6827249f7dcd568ea67de2badbff7a85936a373c2910c56b83,2024-11-21T04:59:54.603000 -CVE-2020-12607,0,0,80dec1017de264a91c8b02ba714f236c1f41a73b6e044aa45b30e0e33bd1c776,2024-11-21T04:59:54.750000 +CVE-2020-12607,0,1,fa36897f780e19f4e4f2b1ec9926ff64edd231c3735f2f43f667060037c688ff,2025-02-12T18:29:08.047000 CVE-2020-12608,0,0,de01f549f9984eeab22d35af42d8ba7e39e409e493a17141caae796784c4d3fc,2024-11-21T04:59:54.910000 CVE-2020-1261,0,0,e1d7c4c5b313342fd200cc4c21fb3662005b26d463407c21cf69f575c6973c4e,2024-11-21T05:10:06.657000 CVE-2020-12612,0,0,c0d1a10b1c4b1f6d8bf6a7aa16927783131cfbc7c3a26b4dec834c5153736dba,2024-11-21T04:59:55.060000 @@ -152550,7 +152550,7 @@ CVE-2020-1967,0,0,9ec23729b1dc39221d1091ee477697472a019d1ed969dfd8fdfdcaa5e626c3 CVE-2020-19670,0,0,2161e4a21f3ac2b81dbdae55ce7ee3c65f8a54f8a55de9ac9adaa2f3e2cecd29,2024-11-21T05:09:18.787000 CVE-2020-19672,0,0,478a2fab4de1bf97e06779751f54c11c30f6f4287ef0113647c8dba7b14ef9ea,2024-11-21T05:09:18.930000 CVE-2020-19676,0,0,4c4184f77cbb374cf3fac913100af7a99db8235fb57378a0fbf04d7db88c5259,2024-11-21T05:09:19.070000 -CVE-2020-19678,0,1,edf7f0ec3186d7a70404f6ca5b37d9814c1cada800c7098b8af18090766ac193,2025-02-12T16:15:31.977000 +CVE-2020-19678,0,0,edf7f0ec3186d7a70404f6ca5b37d9814c1cada800c7098b8af18090766ac193,2025-02-12T16:15:31.977000 CVE-2020-1968,0,0,8dd45388ec44ac321a681ada3d189da03e0f02708f423eea3f20161ccd817fa6,2024-11-21T05:11:45.367000 CVE-2020-19682,0,0,de66eb60c1808d6e5a0bb64c9eacab68989f40295ec6db0a880e367b55f61674,2024-11-21T05:09:19.373000 CVE-2020-19683,0,0,cc3ef760683550ca9495211e2f4f0c869863e6903472df986067de653efaf561,2024-11-21T05:09:19.530000 @@ -158131,7 +158131,7 @@ CVE-2020-3428,0,0,1d203dfb64afc88635ecdea956d4e399018ec66b0845e3a3c519582ad91af9 CVE-2020-3429,0,0,101e53f438fdaab4d8036c36641c0ed4e00559faf42044f1ad2ece55c0b4650a,2024-11-21T05:31:03.167000 CVE-2020-3430,0,0,98eeb5229dfeae10e40545efe1765338b1e8931dcbdcc810929adf0530704da8,2024-11-21T05:31:03.293000 CVE-2020-3431,0,0,cd6d3bac32cfd8857a644f1078f419fb235151f316f0943be1e4e9e1b0583c53,2024-11-18T17:11:17.393000 -CVE-2020-3432,0,1,d412eb5285fce19b5be4c24fe9afbd23141c78b30a40e65a3645d0c49b8256ad,2025-02-12T15:15:10.460000 +CVE-2020-3432,0,0,d412eb5285fce19b5be4c24fe9afbd23141c78b30a40e65a3645d0c49b8256ad,2025-02-12T15:15:10.460000 CVE-2020-3433,0,0,0e0fb5bb51a05c6c75a030d839f72e158a7c69e2a7cb7718d94fd50b680f41ff,2024-11-21T05:31:03.480000 CVE-2020-3434,0,0,c8995b33bcde31c655667c0230d7d58e1c0dd14cc20aaace02cd27edf751de36,2024-11-21T05:31:03.617000 CVE-2020-3435,0,0,42896a56717af6cb678dbb4889e2a239138d23b959eef5d7c82a355eef30417a,2024-11-21T05:31:03.753000 @@ -158946,11 +158946,11 @@ CVE-2020-36065,0,0,36cafc2b7b41c95eca0119f13bcc706947d3ae310a9bded6797e87ab10dbb CVE-2020-36066,0,0,974012e7f4cd6c05a726bca33784345eb95e8c7ffd9bbeaa1a2138f1037c6009,2024-11-21T05:28:43.150000 CVE-2020-36067,0,0,89b7cf9d7124b10737712c705b84fd3e805dce1779bd6505930513f2364b9f9e,2024-11-21T05:28:43.320000 CVE-2020-36070,0,0,5161892d1ed961f9619de603debf1cb6d65d645fe3ba70d1237fe172dedd8b9e,2025-02-03T17:15:11.693000 -CVE-2020-36071,0,1,dc346b43cc07612947c608efccccfe6d65b06608a93037c598f42bc3540e4c0e,2025-02-12T16:15:32.337000 -CVE-2020-36072,0,1,47de15fba14a4fad3914acbdf2b2470a99ad505464318df6e6f8f6ec42f6e942,2025-02-12T16:15:32.520000 +CVE-2020-36071,0,0,dc346b43cc07612947c608efccccfe6d65b06608a93037c598f42bc3540e4c0e,2025-02-12T16:15:32.337000 +CVE-2020-36072,0,0,47de15fba14a4fad3914acbdf2b2470a99ad505464318df6e6f8f6ec42f6e942,2025-02-12T16:15:32.520000 CVE-2020-36073,0,0,8d73ea235b937c80f022f14872cb81c1863d61c4ee218db0bb4a6e59bfb0063d,2025-02-11T20:15:30.403000 -CVE-2020-36074,0,1,d205b675a3efe7e7fb1b1e1c476ca7d6a3001fa79a7fc0b5a6b197c571eea3d6,2025-02-12T16:15:32.700000 -CVE-2020-36077,0,1,c240000e69b4f06b68caa6416f5238ea39ea02d91ef33b4b6d596448ad0aa246,2025-02-12T15:15:09.483000 +CVE-2020-36074,0,0,d205b675a3efe7e7fb1b1e1c476ca7d6a3001fa79a7fc0b5a6b197c571eea3d6,2025-02-12T16:15:32.700000 +CVE-2020-36077,0,0,c240000e69b4f06b68caa6416f5238ea39ea02d91ef33b4b6d596448ad0aa246,2025-02-12T15:15:09.483000 CVE-2020-36079,0,0,230b6994faf4d070027f0fa1f6a4a9c852d30612849d7686d59f6cb4641b67dc,2024-11-21T05:28:44.537000 CVE-2020-36082,0,0,6ec0c94eb23b0553d02910ab3688c529fc1c8e8fabff9d4e2868532cbe311ae3,2024-11-21T05:28:44.733000 CVE-2020-36084,0,0,bbb5fb1b641a03bae0a01b445a9c084ae4812633cffc67513679ede67a5bf67e,2025-02-06T16:15:28.517000 @@ -166861,7 +166861,7 @@ CVE-2021-20237,0,0,e4c299580ed2bd77a7879d2fde8b88ddeb6910d5cd5fa345f06758de69ca9 CVE-2021-20238,0,0,284bc0a5df9a9aa972185f9f90fda282f354929d59f0fa927c2400a4397f909a,2024-11-21T05:46:11.590000 CVE-2021-20239,0,0,85c3f31c775ec87f8f92a4e72a4d612e300ad025b1c72df091cf5fc252e2700d,2024-11-21T05:46:11.713000 CVE-2021-2024,0,0,cc56e422bf9d8fe3d037f36c460a894b73f5bcec936dc1a1477620cb9158182c,2024-11-21T06:02:12.237000 -CVE-2021-20240,0,0,3ad5822e10d9d27e74dca328ba7fce68a5d34a571330f6ed7bd9e157ab4fe29e,2024-11-21T05:46:11.837000 +CVE-2021-20240,0,1,b51ecffbd42f3fb94288b051d81c170ec813248b385337d736aead909a1931da,2025-02-12T17:16:44.330000 CVE-2021-20241,0,0,40ab4eab353492029b997a2facb5616c40c3a89d207e225339358fd3658b6670,2024-11-21T05:46:11.953000 CVE-2021-20242,0,0,431d8ba50c3e6729452d71e3937f00d3e027908d50000475e1da1fe0f7045549,2023-11-07T03:29:02.123000 CVE-2021-20243,0,0,74d98d8c6bd42321cf73ab702566dc6446c75675c84853f66722b69f6d29a16c,2024-11-21T05:46:12.100000 @@ -186534,7 +186534,7 @@ CVE-2021-45980,0,0,f8f2f37f4a6203ec70045d070925b72d05a11e390af6d97d4dd6909f02232 CVE-2021-45981,0,0,3fb61d192fcdf03c4e482a6f480291b6b4cf6a1c6b5f0d96897a2b2f98863b60,2024-11-21T06:33:25.317000 CVE-2021-45982,0,0,722f12ed419e6b40ff534e919992de734fcef2d85f76ef61756675a8abe7c7d3,2024-11-21T06:33:25.463000 CVE-2021-45983,0,0,27e69690d9d191816bcb545e6e4d4a356487e88778575d5d79ed848c0882fc5f,2024-11-21T06:33:25.603000 -CVE-2021-45985,0,1,a6f49e1af84b57e32c9f150a01af30fb8164f87fad5eff331b1e0b676337f5e1,2025-02-12T16:15:33 +CVE-2021-45985,0,0,a6f49e1af84b57e32c9f150a01af30fb8164f87fad5eff331b1e0b676337f5e1,2025-02-12T16:15:33 CVE-2021-45986,0,0,07cb2076c889a9f5cc47d30541cc529afb9f9df95b088a267f0c6d85b5b0700a,2024-11-21T06:33:25.893000 CVE-2021-45987,0,0,6146314797d834f557e34fc5c76cfc65c1d92bfd05de0b9af25f579274408f1c,2024-11-21T06:33:26.037000 CVE-2021-45988,0,0,d33f41dcca6a050503a5a3cda9ca5b8a9efe656b8feea1e4d2c29dee75e79cfd,2024-11-21T06:33:26.180000 @@ -193051,7 +193051,7 @@ CVE-2022-23487,0,0,28ab89bae773cfe3eb988f7436f19428c18297cf7c3a8234f6e0079e763a0 CVE-2022-23488,0,0,36c205b6f30a8c5caf476c262536d7f82f128ad58c27a2a751697ed558ca9298,2024-11-21T06:48:39.983000 CVE-2022-2349,0,0,b367e2cf839fed665d8e171ad4db11f1875af39becf8f1f87eeaff4b46dfd052,2023-11-07T03:46:32.710000 CVE-2022-23490,0,0,95778d552e9af0a0b0f5a7d2fc9ad280802afc198d7db605f6c5cfb8af2197fd,2024-11-21T06:48:40.130000 -CVE-2022-23491,0,0,66b2bd805ca9a395f9d420e832c4794b50a801f06cf4d1ea2df7c83c242b481a,2024-11-21T06:48:40.290000 +CVE-2022-23491,0,1,7eb492d7fc028df0a04ce5e9ef4b8579cc379257c1756af94117c168ee0bcfeb,2025-02-12T17:36:19.373000 CVE-2022-23492,0,0,f5248911eeba9f5da6f9eb427b85d5082d448d5e0ad89b2bee9998b4c88cd2f8,2024-11-21T06:48:40.450000 CVE-2022-23493,0,0,4b7818ed68b97f04628ff8fe9a93f1a08715cd6c990a9fe1ae42f31b014f761b,2024-11-21T06:48:40.597000 CVE-2022-23494,0,0,75c78dc76aee47168111d0ac15011f97e5653bce14b5c7fd4a122b64d891cf7b,2024-11-21T06:48:40.730000 @@ -200040,7 +200040,7 @@ CVE-2022-31795,0,0,e87150b97c1595f70c15af39b375b9e3a356b56a2e94be20560be511f6e8d CVE-2022-31796,0,0,14e0f1b4cee5370b95f4e2647aeeffe69e5474ef0322e9f54b5182239dbd3879,2024-11-21T07:05:20.900000 CVE-2022-31798,0,0,e549cf30b2c66e83ee0fcd8c913e23d35c726aceb746d6eb9a6de0bb4572e411,2024-11-21T07:05:21.057000 CVE-2022-31799,0,0,b267b7ae01f62f80ffb0216b260fd93dca79abaa52716c5b918a57dad17ae0e3,2024-11-21T07:05:21.203000 -CVE-2022-3180,0,1,7d81fc2d23e606d5a8f406e42f7f0265ed720114cb86bd78ec1b913d812bbc3f,2025-02-12T15:15:10.730000 +CVE-2022-3180,0,0,7d81fc2d23e606d5a8f406e42f7f0265ed720114cb86bd78ec1b913d812bbc3f,2025-02-12T15:15:10.730000 CVE-2022-31800,0,0,6db4ef6ef8456fee479b75712875c618f6bf7e29ea191a42b8cb2155d6ab01f6,2024-11-21T07:05:21.370000 CVE-2022-31801,0,0,15a9fabf68274e7f2ba1fa15bae069bfe9e501270dca5df64319063297383989,2024-11-21T07:05:21.537000 CVE-2022-31802,0,0,930da7f9507ef8219beb1bd2fd7f97d299cec36695d5708783a3954bd5782360,2024-11-21T07:05:21.673000 @@ -200655,7 +200655,7 @@ CVE-2022-32595,0,0,acf1a9a19bfa61f57216d13ee96ed6e569cdc6e3b45206b8d78af1fca01a6 CVE-2022-32596,0,0,8d52ca4c1356aa2f18081d05df6c1a93ae21746b637421f4fa972d1ad3ab8073,2024-11-21T07:06:42.370000 CVE-2022-32597,0,0,c646ebd37548c9e9d77727cd02599ecb1a470c2cda2b98f6b13eac49ef555017,2024-11-21T07:06:42.500000 CVE-2022-32598,0,0,2841e560a3eff3784e68801643c17ac58aeb4121f4360c1cc0d68131c7e6f7ee,2024-11-21T07:06:42.643000 -CVE-2022-32599,0,1,1f9ca761050cbfae01bd6b6ede1956b8629014f8c21d8160af6f67be08dfa23c,2025-02-12T16:15:33.257000 +CVE-2022-32599,0,0,1f9ca761050cbfae01bd6b6ede1956b8629014f8c21d8160af6f67be08dfa23c,2025-02-12T16:15:33.257000 CVE-2022-3260,0,0,5f8e39b4c19d0605e8384f7a5f71b1e8f7050c3ec091c9f93169a46e92517323,2024-11-21T07:19:09.900000 CVE-2022-32601,0,0,a4d37317c0c125cd86271f6dc54b76b52ab410d0f09116b183eab8e03c79de8c,2024-11-21T07:06:42.913000 CVE-2022-32602,0,0,3d05011bf9f097860d6399278b4268095363d044909efd60f2c47e4265dbfbd5,2024-11-21T07:06:43.043000 @@ -200940,7 +200940,7 @@ CVE-2022-32867,0,0,8dc54934f6a287bfe59f8aa1078608ce123c9941961815928a5813322af4c CVE-2022-32868,0,0,db0834a72b5d07dc2350ac00eb19270d8e8da92429cddd42fc1da268c61aa0d2,2024-11-21T07:07:07.847000 CVE-2022-3287,0,0,d993f07b4ef5ddbc1c5aa77c97fead6b65513d585bc61e4da265c581f05a00ff,2024-11-21T07:19:13.427000 CVE-2022-32870,0,0,567c1b51bda4e8aeac381fbe3d438dd49d16266f8c6193336b6be3eb013008a2,2024-11-21T07:07:07.990000 -CVE-2022-32871,0,0,a60c59868e040ec70b4c5f769d163f9b2906a8e11b725339d7c59cbc64f73e8e,2024-11-21T07:07:08.120000 +CVE-2022-32871,0,1,ac08b6527fdf90a3eb505995f72aabc9519a018622ac94cd1b6050c6feefa2f4,2025-02-12T17:15:10.880000 CVE-2022-32872,0,0,ba33c0df8b28b48702879dd3edba39479f3c0710301f4738c303c93b2cabffbd,2024-11-21T07:07:08.263000 CVE-2022-32873,0,0,59af72cebc81f6635499e7a49c026214e93d20b502c37d0364465d39dbb56a8d,2023-11-07T03:48:14.087000 CVE-2022-32874,0,0,e6d5f6c04fd4c8e081e414970479f8900c9fce241b58cbc86c391901fb6396bc,2023-11-07T03:48:14.297000 @@ -204617,7 +204617,7 @@ CVE-2022-37459,0,0,e05501708fdb421d525fd0c7eeeefb421792e4567f8efa6cb649c07aeee08 CVE-2022-3746,0,0,794777e40fb09b415278b75cbf0fcb51010a496262c2db50bc65d5b029999eb6,2024-11-21T07:20:09.980000 CVE-2022-37460,0,0,6c75f1d437a874b15f8f8595cef14dd06eab9f931241b899eafcedbb5e1edac6,2024-05-06T21:15:48.130000 CVE-2022-37461,0,0,dd5272b5b69bb698444d1e6b9e7da9c9cff3554cbf4c3beb714d912ad12bcf79,2024-11-21T07:15:01.470000 -CVE-2022-37462,0,0,9c0a2267bb024044c931a6a7fe2301a9e8b05faf5d196892325b8c1f3a454e5a,2024-11-21T07:15:01.633000 +CVE-2022-37462,0,1,f7e6351a908b88ab930dfb1c7c8a57aca70bc1cb2cde8b81941b2fb3342ee58a,2025-02-12T18:15:19.050000 CVE-2022-3747,0,0,d33f321a72534df6c0f7d538ee493355ff4335736b80981cb6ab4e9e464bee7d,2024-11-21T07:20:10.190000 CVE-2022-3748,0,0,4c6a3ebc0d4e325cde97e2f8775aa85a033e1c82aa843579db77939eede30f50,2024-11-21T07:20:10.317000 CVE-2022-3750,0,0,a609e7c347b21edbf6d2fbc09521b9cdf9fb2b630cd9faec5d3705e6ee360cd1,2024-11-21T07:20:10.460000 @@ -208393,7 +208393,7 @@ CVE-2022-42446,0,0,42971664056387c462ee497f548a6df2aa4c23ac4c265a4511e389c929317 CVE-2022-42447,0,0,f7ef42af5c8cacb5fc0ea44780f55cb655e5af2c0cb4eb0afa493b27973c84d4,2024-11-21T07:24:59.133000 CVE-2022-4245,0,0,7305d9be07f9487c1c925b80efa0a1de65c9ce2ebf2d82dff49a350744824522,2024-11-21T07:34:51.700000 CVE-2022-42451,0,0,fac5780b2589fa4e5302e0f3e43b95825686711085e3865819f7625dc438191a,2024-11-21T07:24:59.253000 -CVE-2022-42452,0,1,4ae9a6da3248cc6cafa82d3fd707633ac3bc6886f08fe893b6abcd86f029c3f8,2025-02-12T15:15:10.903000 +CVE-2022-42452,0,0,4ae9a6da3248cc6cafa82d3fd707633ac3bc6886f08fe893b6abcd86f029c3f8,2025-02-12T15:15:10.903000 CVE-2022-42453,0,0,6efb2f3324a4ebb1a36d6eb4c118e6f5231faa0d0a3a0599ef663f4876b97dba,2024-11-21T07:24:59.570000 CVE-2022-42454,0,0,dc1c2309d8e52319695997954620c1223cab3041e006ca32b24e1b7568ef7ef5,2024-11-21T07:24:59.690000 CVE-2022-42455,0,0,badf4c23d6df82d324228f5c766d47f3602caca1944541d277c3e4fcc1e01ca4,2024-11-21T07:24:59.813000 @@ -210383,7 +210383,7 @@ CVE-2022-4531,0,0,83c9dea44857e2b3d5707eadb09615962b28f3408f88a3269d03262a57cdbf CVE-2022-45313,0,0,89bf2f7a6b1b0ada0771f9b6feb3a4cbcb101b2bf751749f2b6f6b298ffdceab,2024-11-21T07:29:02.640000 CVE-2022-45315,0,0,ec32db564b0c398c79e788eb323ca338950a534fe9a216874f44be61f9abcc16,2024-11-21T07:29:02.783000 CVE-2022-4532,0,0,51cbf5a1e6ae006dcc5d3711843ce95455a4843a125d988c30c12abe1a13416a,2024-08-19T13:00:23.117000 -CVE-2022-45320,0,0,e0ccf71f2f6897d63c8f6e63a0bedf23135e8e2fbccdb10a7428e0d4ceaf7728,2024-11-21T07:29:02.940000 +CVE-2022-45320,0,1,788fa213d7fdb37dc8ab1cfdaf4835a74d05df11d9ae7de0a652ff3e0a77947f,2025-02-12T18:51:52.663000 CVE-2022-45326,0,0,ae842a12efd7b1591b047319e0182671d4b6e879a4e2687589211337526f99e1,2024-11-21T07:29:03.110000 CVE-2022-45328,0,0,514aad500fb97f68bf7863a14696e1d04367133cbff4a4747d9b130dca960649,2024-11-21T07:29:03.277000 CVE-2022-45329,0,0,814f74a9d1e4c37fa3cc68b9ba74cf1436fd85cf4240584206a99df2f9f9fb61,2024-11-21T07:29:03.417000 @@ -211447,7 +211447,7 @@ CVE-2022-46771,0,0,e308702c33951cef86466c282c34e1181461d2bb96e55f9f561ffc5dafacd CVE-2022-46773,0,0,112a51786cdf13d9158cad82a332d5cff3510f2f906bfdaa552f009dbfab7f58,2024-11-21T07:31:01.957000 CVE-2022-46774,0,0,8de7e017c75431fee9f31bfc354280fda37c6993d65615e096ecbd0972beaaad,2024-11-21T07:31:02.107000 CVE-2022-4678,0,0,52001ae804b8f428d2f8b70574cf576158f516cd4006f670865a63bcae025ac5,2024-11-21T07:35:43.170000 -CVE-2022-46781,0,1,62228cc8f38fe96453bb8fc7fad3a26b2677473f2ef3633b94e481524b089acb,2025-02-12T16:15:33.610000 +CVE-2022-46781,0,0,62228cc8f38fe96453bb8fc7fad3a26b2677473f2ef3633b94e481524b089acb,2025-02-12T16:15:33.610000 CVE-2022-46782,0,0,83804d18333bf015864e344f6cdfe721ea90868e3b3d898827bbb4088c44ef47,2024-11-21T07:31:02.410000 CVE-2022-46783,0,0,45a54218286789c0e69cd7cbd020d6b41c963fe072d4c5980013d4c3323fd3d2,2024-11-21T07:31:02.563000 CVE-2022-46784,0,0,595755ae66baf8374b8ed12c9f84940baa92a649586445fbfa67e743c33ceed2,2024-11-21T07:31:02.727000 @@ -213957,7 +213957,7 @@ CVE-2023-0801,0,0,063d442888cfcb6c32c17c951b32ca646c408f2b7707b6358340ea4341b398 CVE-2023-0802,0,0,a0c0edc4970f5885409257e4b4c09fdc33b13dfdf517ca5c3e3ad9766499521f,2024-11-21T07:37:51.953000 CVE-2023-0803,0,0,6f4843b90310d3e74b2af185dd3f795e521dacf1b741c4dcc9216b5b77e8fe4e,2024-11-21T07:37:52.080000 CVE-2023-0804,0,0,4940bd10c9fb71770cfa170825223e709f4587d6fa98d8e2a2f5b0f4e312eedb,2024-11-21T07:37:52.203000 -CVE-2023-0805,0,1,75614ad83ec01ebbf0b764d89e209da063dd1a80aebb21e97c589c9e711702ab,2025-02-12T16:15:34.123000 +CVE-2023-0805,0,0,75614ad83ec01ebbf0b764d89e209da063dd1a80aebb21e97c589c9e711702ab,2025-02-12T16:15:34.123000 CVE-2023-0808,0,0,e85707e51b510e300366f58c6e01e5711ef161400e45bcc32bfc9bea6e14600b,2024-11-21T07:37:52.447000 CVE-2023-0809,0,0,ae5a66aa2d6f72e22dc793e86d3ac5a2a55c6b042b5824ab8dfd6f2d382dbe8f,2024-11-21T07:37:52.583000 CVE-2023-0810,0,0,54b05e186b1588a087cfe5dfe73312fe8ee9efc7a5bfd67a62f15cb94fef6fe9,2024-11-21T07:37:52.730000 @@ -214637,7 +214637,7 @@ CVE-2023-1516,0,0,54b45e15af970c41acd50b1a625c6f02df63d0d269668fdc1904c4c8e67698 CVE-2023-1517,0,0,02fd45c004ce1dc186b6d78aba8065b11fafc69073345d494eee2f8c98d96331,2024-11-21T07:39:21.180000 CVE-2023-1518,0,0,ff3bd1f1ef00c796b224d4b61b33ff6fd65f18a15330b54fd64399e65722958d,2024-11-21T07:39:21.297000 CVE-2023-1521,0,0,34ba7a16607d114cc465c9eda0277be53b7130d5847ae48ed5169503b7db47b0,2024-11-26T21:15:04.650000 -CVE-2023-1522,0,1,81c42717bcdd0263fae8da95cd7975f6bc9fb3e662f1a3fe30a2965d81880e3b,2025-02-12T16:15:34.290000 +CVE-2023-1522,0,0,81c42717bcdd0263fae8da95cd7975f6bc9fb3e662f1a3fe30a2965d81880e3b,2025-02-12T16:15:34.290000 CVE-2023-1523,0,0,e33d8037be249eb9c37a3baeaa357b5ce6cf643d512a05007dcdf784033b647c,2024-11-21T07:39:21.537000 CVE-2023-1524,0,0,f8b678f6be7ad1e8e7316c0ff029f2f0b1c061101505f9c1a3fb4ce2fdbd092d,2025-01-10T21:15:10.800000 CVE-2023-1525,0,0,87c70f3d61d61d75374dcd01bd6c995692b55b602d7e76a135e18fad1943c07f,2025-01-30T15:15:12.910000 @@ -214954,7 +214954,7 @@ CVE-2023-1851,0,0,f44f3f6504309385b4f8263763fcf7917371182c1b2db3b4c2e573863bb2de CVE-2023-1852,0,0,e765cf67395341f70bdd2c4eb9da5bf2e504c47d0b4788feae1083a580f83929,2024-11-21T07:40:01.360000 CVE-2023-1853,0,0,d7b0c11db155bafedd6ba2bf77404a33ab2b9b348bef98cdd50d598060c449a2,2024-11-21T07:40:01.480000 CVE-2023-1854,0,0,fb020e9221103020085ff3c7b993d52f2feb73032275d0b52a285404e7a10412,2024-11-21T07:40:01.610000 -CVE-2023-1855,0,1,a64a2ebfa7264eafd94e32382791f28346056726a93ae7e51f3bec555345fe20,2025-02-12T16:15:34.520000 +CVE-2023-1855,0,0,a64a2ebfa7264eafd94e32382791f28346056726a93ae7e51f3bec555345fe20,2025-02-12T16:15:34.520000 CVE-2023-1856,0,0,f9af566e702d56338edf59b53bb8cfdccbf57fc3c827d54a91dde61961df4300,2024-11-21T07:40:01.847000 CVE-2023-1857,0,0,55cb03a7a1032c1834395536b9eba3913167eecde95bdd4c2ae2f2b93e3dcf21,2024-11-21T07:40:01.977000 CVE-2023-1858,0,0,df7325c01a486bc312639bb1f615f6ac0a26c25e7b26e6a183a5620e96094aac,2024-11-21T07:40:02.093000 @@ -215551,18 +215551,18 @@ CVE-2023-20670,0,0,e4e5ee151777987fef7de5981cab53d63b02c8c02f20668d5ebefff86242e CVE-2023-20673,0,0,29bae4906ec7c96c77c7c09aecc0e7fb7f495988834a892b933466c096361071,2025-01-24T17:15:09.203000 CVE-2023-20674,0,0,eb2146b7419e33779b6b00f43b6162659ce687b1b5ecf2b1d3b2ee2893270957,2024-11-21T07:41:19.830000 CVE-2023-20675,0,0,91492ea9a54e1bfc3d79a683f7dfb3a3f048f71ad7188ef164f152ebe8298300,2024-11-21T07:41:19.950000 -CVE-2023-20676,0,1,cac9e70e0811c0897af0048c023485fdde33f6815ec767fbb24f9b47cc3533c3,2025-02-12T16:15:35 +CVE-2023-20676,0,0,cac9e70e0811c0897af0048c023485fdde33f6815ec767fbb24f9b47cc3533c3,2025-02-12T16:15:35 CVE-2023-20677,0,0,16defb5b1d67b70811af504802d85fb22e6e7dc792efd018cc72d13dbf886b31,2024-11-21T07:41:20.183000 -CVE-2023-20679,0,1,bc056dc1c31fbcb599ca8278730b2a5ae7f450cce065487c52635fab0636d2ba,2025-02-12T16:15:35.183000 +CVE-2023-20679,0,0,bc056dc1c31fbcb599ca8278730b2a5ae7f450cce065487c52635fab0636d2ba,2025-02-12T16:15:35.183000 CVE-2023-2068,0,0,e7b98f8c9f6042c5b50a34967c2d0a821e72430aa747c353ebe3326a8c3bf3bc,2024-11-21T07:57:52.570000 -CVE-2023-20680,0,1,d4f4a5597f43acc74f02e21723ded35721b319bb49302a4ff1ba86dca8936c7f,2025-02-12T16:15:35.410000 -CVE-2023-20681,0,1,50ef0ec0c5dea933040bd1004bcab113016efd29b9ce4dbbda0b2ae46cb37611,2025-02-12T16:15:35.610000 -CVE-2023-20682,0,1,01a27450357cf525dc5be89369f8b34439f32fcffb503cac5de40f69cd87e9bf,2025-02-12T16:15:35.787000 -CVE-2023-20684,0,1,1dac3f81ba83c8fbb47163fbb84cc7d94d40f50ad2c55406d194ec2a4751a66b,2025-02-12T16:15:35.960000 -CVE-2023-20685,0,1,f26ee39d8dfb986170a6ba9f80d8987b45c63570316dcd1706bdba49dacad3e0,2025-02-12T16:15:36.130000 -CVE-2023-20686,0,1,d26ea0d24a4041415f7d5bf58e5a211d7b3d2a86f373d888057b61092ca984e2,2025-02-12T16:15:36.297000 -CVE-2023-20687,0,1,08d50695a173c975bdae9253b6a0ef708e8b408d6a946c0b0090fc7a48ebae36,2025-02-12T16:15:36.453000 -CVE-2023-20688,0,1,6a3a1ceb78c5ad77e4c78be95c20296e80f5ec1f0be5b70885164109db058aca,2025-02-12T16:15:36.617000 +CVE-2023-20680,0,0,d4f4a5597f43acc74f02e21723ded35721b319bb49302a4ff1ba86dca8936c7f,2025-02-12T16:15:35.410000 +CVE-2023-20681,0,0,50ef0ec0c5dea933040bd1004bcab113016efd29b9ce4dbbda0b2ae46cb37611,2025-02-12T16:15:35.610000 +CVE-2023-20682,0,0,01a27450357cf525dc5be89369f8b34439f32fcffb503cac5de40f69cd87e9bf,2025-02-12T16:15:35.787000 +CVE-2023-20684,0,0,1dac3f81ba83c8fbb47163fbb84cc7d94d40f50ad2c55406d194ec2a4751a66b,2025-02-12T16:15:35.960000 +CVE-2023-20685,0,0,f26ee39d8dfb986170a6ba9f80d8987b45c63570316dcd1706bdba49dacad3e0,2025-02-12T16:15:36.130000 +CVE-2023-20686,0,0,d26ea0d24a4041415f7d5bf58e5a211d7b3d2a86f373d888057b61092ca984e2,2025-02-12T16:15:36.297000 +CVE-2023-20687,0,0,08d50695a173c975bdae9253b6a0ef708e8b408d6a946c0b0090fc7a48ebae36,2025-02-12T16:15:36.453000 +CVE-2023-20688,0,0,6a3a1ceb78c5ad77e4c78be95c20296e80f5ec1f0be5b70885164109db058aca,2025-02-12T16:15:36.617000 CVE-2023-20689,0,0,9c580cbe89febf776e40db5d60e6c51f9520660ccc5ce54a231ee85ab0b4a4b5,2024-11-21T07:41:21.487000 CVE-2023-2069,0,0,22ec0ee46ca6b75b55a8ab1a23a2bf3fef5b82a40c0d9ee7213ce468f2d17d73,2024-11-21T07:57:52.677000 CVE-2023-20690,0,0,3d03d920a4794261460a19bd833d33829f8c890aae919b89f1565f1727ddec3d,2024-11-21T07:41:21.613000 @@ -218949,11 +218949,11 @@ CVE-2023-24530,0,0,7ef676a634c8aba369f9683a0389e1bdb2255cfb96b6e799493b54b2b4a94 CVE-2023-24531,0,0,b51c2dd327b8e15296fde49ea9eaeabb04a4dbd8bd91fd75e870ab4f55e86066,2024-11-21T07:48:04.190000 CVE-2023-24532,0,0,88581f6b3392e74b951288a160bd414980d6e6f0465084eb25057ace37266e39,2024-11-21T07:48:04.383000 CVE-2023-24533,0,0,9c25eae470ab995f4601fccaddde73c53913b219aa31ffd47e784ec337cdbe9f,2024-11-21T07:48:04.520000 -CVE-2023-24534,0,0,43e085002704ca85937ac0f5798c793a9382d7ac52905f08521d295826edc555,2024-11-21T07:48:04.643000 +CVE-2023-24534,0,1,3f190c9bf555ba8a80f7c40ca4f179383ac59048cc10bea8746879b358c59684,2025-02-12T18:15:19.837000 CVE-2023-24535,0,0,9101527fd9107c5386236adaf2ee7bf3fcaeec19ee7ec12624ba60305ac5f307,2025-01-06T20:15:25.153000 -CVE-2023-24536,0,0,bb2b8efcce4307c33912fd14b2db6df4da6e5afc1a5edcdd426d6232dcb522f3,2024-11-21T07:48:04.893000 -CVE-2023-24537,0,0,98119d9acafd36005d2ffe696ca11675bc78d34c3c5852328010fe5111c9a191,2024-11-29T12:15:05.507000 -CVE-2023-24538,0,0,c6ee96ea8510988e4fb3d5d751f84079e69488c511ff159e1502a7c218c3a75d,2024-11-21T07:48:05.130000 +CVE-2023-24536,0,1,b0ff09854d2912b9bfc6717ac421bb1d2734a1f17276fb3732fd29efba47acc3,2025-02-12T18:15:20.083000 +CVE-2023-24537,0,1,dabba2240af61484ee0e456db566e780d80adedb2b5fdb54378e1df7a33a0c0d,2025-02-12T17:15:13.973000 +CVE-2023-24538,0,1,aa00a6369f4ca1684ff256358445fdec963019e946aa202e3a246a61c004ef85,2025-02-12T17:15:14.190000 CVE-2023-24539,0,0,ea2a302f962025f2382b8a15f62e5c70586e5fca58dbbba73e1ce7033f68300a,2025-01-24T17:15:10.670000 CVE-2023-2454,0,0,6361fc24a87ee7375e7b169be77c132fef3b9323deeb35b6d25dbcbf4850e79b,2025-01-06T18:15:13.670000 CVE-2023-24540,0,0,b7f6c4fc2274b312f970ecce72090873352ec9fdcea64505b5abf9b78add4433,2025-01-24T17:15:10.893000 @@ -219036,7 +219036,7 @@ CVE-2023-24621,0,0,05389959742ec3278497f8c9309bd0abe76641449fdb280196a465b94d7bc CVE-2023-24622,0,0,c066aa46ee63fbd74f051268e86dde35fde0e6bb5c6c60b992fae7fc835b9267,2024-11-21T07:48:15.090000 CVE-2023-24623,0,0,33390f24adfdc7a5e62bed25c8eee7ece2e7dd3803d0d8ccb6bcdb0ca591df18,2024-11-21T07:48:15.237000 CVE-2023-24625,0,0,59197d12ab32c33e45b7af281b34f6b8257dabd32ac48ad4271fd545249b19d6,2024-11-21T07:48:15.387000 -CVE-2023-24626,0,0,4439466f362cc0e38e5ac9c4fe7263957fb660e7dbb2352fcd7a349566217ab2,2024-11-21T07:48:15.523000 +CVE-2023-24626,0,1,f8c05a82508ace6da42ff99c3373707d59b1b90f2c4e5f8dccbbb2c862bb909b,2025-02-12T17:15:14.380000 CVE-2023-2463,0,0,f46badffb051b802c8d4c418e9ad13db7cd5c54b60cd8c2536b7f64dd0d44ee8,2024-11-21T07:58:40.123000 CVE-2023-2464,0,0,b8ae76a72e47db531a3bbe43222f04869a83359178fae5aa13a60312ce5c538a,2024-11-21T07:58:40.250000 CVE-2023-24641,0,0,7076d9df7f61967daef18368ab239a82191782b3edcfa4f944c828be11b4f242,2024-11-21T07:48:15.673000 @@ -220893,7 +220893,7 @@ CVE-2023-26984,0,0,3b99ec789769ff958d010fdceb1bb0d916624b799ff3b877ca7adbc158bf4 CVE-2023-26986,0,0,94a9ca1cf50bdd19fafa94e5e971b449f42a846e0edee43ac0ab234f9a96a360,2025-02-11T18:15:25.667000 CVE-2023-26987,0,0,7e0a4eaa4d803abc17024cde6c193682bcccb5a7d9831d5d98e1851f634d4d3c,2025-01-30T17:15:13.323000 CVE-2023-2699,0,0,1c04a3cc51ebb405d698cee0fe2e32f286ab499340c1d6cc19532b802b686fe7,2024-11-21T07:59:06.680000 -CVE-2023-26991,0,1,0ad8a895e031d4c9a4158a29415ca5b8b3237fd1895d18e017bf0b3958cb796c,2025-02-12T16:15:37.270000 +CVE-2023-26991,0,0,0ad8a895e031d4c9a4158a29415ca5b8b3237fd1895d18e017bf0b3958cb796c,2025-02-12T16:15:37.270000 CVE-2023-26998,0,0,70b29c0ae973491d7cc5b4fabac39d4344cee5de103e705010b9f8f4a253d792,2024-11-21T07:52:09.940000 CVE-2023-26999,0,0,0a6e26719d32d20a55674544c2b16e84e883bad504358330da63d67239bce96a,2024-11-21T07:52:10.107000 CVE-2023-2700,0,0,39eae528fab2c9005417e2728ba40351fd5c31be39110f823a95f3ceafdaaa56,2025-01-28T17:15:14.093000 @@ -220908,15 +220908,15 @@ CVE-2023-27014,0,0,73dc7a1507396b9838bb7e6e6f01dbc7a3aaeac9fd082adc6d67b575715f6 CVE-2023-27015,0,0,297678cbcb38f3c677cd08ac698ed4973678a64688198c23de60ec649ceaf8b9,2024-11-21T07:52:11.293000 CVE-2023-27016,0,0,7828ad7aa26649d91dc058a618c4c5055c6f841798b34bf10ad5587d120887a0,2024-11-21T07:52:11.433000 CVE-2023-27017,0,0,4ca20ec91958f2e051cb6e32a5be98b3406e3cca564b0eac86394b49ce567f75,2024-11-21T07:52:11.573000 -CVE-2023-27018,0,0,59ccf0169a3f44748fe4c71149de471f738caf4fd66c2c2c91fc2ef61a7f8003,2024-11-21T07:52:11.723000 -CVE-2023-27019,0,0,e460d4e9f3aaf532183878d3463e944e48410e0116757e6a8ac801e73778355b,2024-11-21T07:52:11.857000 +CVE-2023-27018,0,1,23a6e7dbbe8f85d69c5a7a9590756a3d992be4710e503f0be402a27b40b4642b,2025-02-12T17:15:14.883000 +CVE-2023-27019,0,1,6ae87986cd7cb7c06ebb70007c3caccf5a8f318951fb08179c2547d9bef2afba,2025-02-12T18:15:20.300000 CVE-2023-2702,0,0,89db1f202b02a106932fedf9649fa2fe945911614dd941a764165f7605194bcf,2024-11-21T07:59:07.040000 -CVE-2023-27020,0,0,32e78a8b24858c8f05ff9a9b03d7cbd43e96946333b8156c1d25c1f780d2138c,2024-11-21T07:52:12.010000 -CVE-2023-27021,0,0,f21a68b7fc058ef7ae27b1765dc78fcf625c7bb217d8fa1ccf130da7eb87c534,2024-11-21T07:52:12.150000 +CVE-2023-27020,0,1,2fd3363eea0280fba0331e4ff9991d28a4ed9e5bab08dd6ea65a0c6a12f1c3fa,2025-02-12T17:15:15.087000 +CVE-2023-27021,0,1,31dc1993cf2235b941a85a3fd10f67604bc4fc88f219aaabbc3c3a1713a02d6e,2025-02-12T17:15:15.277000 CVE-2023-27025,0,0,df08cdd42c2b6826389279ebc90283d3ef76ee78cbcc3012cc6fc8e1b5db5686,2024-11-21T07:52:12.293000 CVE-2023-2703,0,0,3609292fde1d1aacb0aa8f87f677168f34fca1193c36d1529bad688fb28841da,2024-11-21T07:59:07.153000 CVE-2023-27032,0,0,e875dabdae70d3bc01bc804badd0a6e9f298cc4e0ef121b744f83395d9fc6ad0,2025-02-10T16:15:33.903000 -CVE-2023-27033,0,0,8e43d0546dc1749d31b650461eb6da9590fcd4b8365d325bc4a5bbde1af4b73f,2024-11-21T07:52:12.633000 +CVE-2023-27033,0,1,82ff0d2f3b3fd7d30086afeef97b0224e31b5ec3774969e1ff155559652d5901,2025-02-12T17:15:15.500000 CVE-2023-27034,0,0,8464109bca5c284ab1c81c105ef27fefc639a1945af5ecc1a0c6de04b3e8bb1b,2024-11-21T07:52:12.807000 CVE-2023-27035,0,0,44ef166e8ace3fdcc7e292a7632d06c2d3e13c29e7c45f0521367721de449c86,2025-01-30T17:15:13.507000 CVE-2023-27037,0,0,3e02208b736711e0efb83bf4998fb6bac400b97126ddd20a1da0b5fa551abc27,2024-11-21T07:52:13.120000 @@ -221014,7 +221014,7 @@ CVE-2023-27172,0,0,fdc6b4909985623c5d04c35e7ff98db7d42f3fb84288e6c58db122fe0eb86 CVE-2023-27178,0,0,cf2226052e5545ae88fe34b9544caa90005893d2f19a7a7244f2e6909db17389,2025-02-11T16:15:37.157000 CVE-2023-27179,0,0,5c1d6ccf0482096ad65425268ee34782574c582151b15f493b60128bcae41a4b,2025-02-11T16:15:37.367000 CVE-2023-2718,0,0,79cc6eca1a64867cb98049c8d2740ab7357bd9d60318605314da897a0dc4528a,2024-11-21T07:59:09.650000 -CVE-2023-27180,0,0,4f4fcc0cf145360d367d23c18f4f0b9c373f73e5b17100a093cde063fae75161,2024-11-21T07:52:25.857000 +CVE-2023-27180,0,1,5aee80f2733c254604930927849c8ae0b0c27f0f1ad1baa16d7f4bba7d7ad3d1,2025-02-12T17:15:15.697000 CVE-2023-2719,0,0,b41f5dc200cc5430e63e93b47285eb4d9d8ad50be3a8af950a8b9b7ac424c6d5,2024-12-12T21:15:07.120000 CVE-2023-27191,0,0,7e880757d0e90eb04ab6e7236c6b9179f651f1d97471afbe8805837f01babb1a,2025-02-11T16:15:37.557000 CVE-2023-27192,0,0,bcdf364f757aa8781167c6be0e386c6f515c8b3ccba1d91d0d28fde271a55e10,2025-02-11T21:15:11.790000 @@ -221476,12 +221476,12 @@ CVE-2023-2771,0,0,ca5efb03113ccf8bdf2a139cc669a77fad68d96263863f76947581de42452c CVE-2023-27711,0,0,c9a2e5afb55daf06a1cf6cea1f425e79d38b0b6a59f909f53b876f341de40189,2024-11-21T07:53:22.753000 CVE-2023-27716,0,0,04cdeae9792ace27212dd0e890152b308a6873b8e0d55f3df12187e1391bdb41,2025-01-06T18:15:12.193000 CVE-2023-27718,0,0,f9f4a837797e1d81adf8b6bcbef4474a17838aac87d76451895c87444b2ee4fc,2025-02-11T19:15:12.007000 -CVE-2023-27719,0,0,ad9a081259e586a44857be5d7d388546cc821d3e7f94553d9b77ce9db0e15866,2024-11-21T07:53:23.200000 +CVE-2023-27719,0,1,dfe25380fff57a70fda0f241098562eff4093c25f2cd9d00385b811c3737f15b,2025-02-12T17:15:15.913000 CVE-2023-2772,0,0,371d0f43be59cbbbe5bc16860b9cc5b542f17f9f3db2e3bda7f801dd2dd6feef,2024-11-21T07:59:15.760000 -CVE-2023-27720,0,0,7f295d1ca2cdc3ba7306dfe9cf9355b6d301941a4f45d7bebd788b84514c1672,2024-11-21T07:53:23.360000 -CVE-2023-27727,0,1,ba79f2d98be22c1d8fa3fdfb8a2dfd0f96b4fa63a8700b953207c8c58a20d253,2025-02-12T16:15:37.670000 +CVE-2023-27720,0,1,972d5319b7f1821251953727e6b3068606f14511b0c2750ecef1afe4f2ff6d21,2025-02-12T17:15:16.150000 +CVE-2023-27727,0,0,ba79f2d98be22c1d8fa3fdfb8a2dfd0f96b4fa63a8700b953207c8c58a20d253,2025-02-12T16:15:37.670000 CVE-2023-27728,0,0,17edf59ab9dd7a355efb990d3ae4ea48939f1ba1f8b42b89a235535d7b086577,2025-02-11T20:15:32.317000 -CVE-2023-27729,0,1,7c31b222e84fc45a91ce56ab304b7ee08f217b5898423a6f251ed647b0b72509,2025-02-12T16:15:37.867000 +CVE-2023-27729,0,0,7c31b222e84fc45a91ce56ab304b7ee08f217b5898423a6f251ed647b0b72509,2025-02-12T16:15:37.867000 CVE-2023-2773,0,0,7873dd9f74ed847c32c6f25a2b1ebc492d8ca86ced180ebe78f8b36faa6bda9b,2024-11-21T07:59:15.893000 CVE-2023-27730,0,0,c2d514200981ef741f314869d376e098eba05128ef93a150340ce4fe1b36472f,2025-02-11T22:15:26.463000 CVE-2023-27733,0,0,384025e35fc12373e2b3d4230ff964fe5ec331e83aaaff69635a84e8c28228a4,2025-02-06T16:15:34.587000 @@ -221535,16 +221535,16 @@ CVE-2023-27793,0,0,caa5473ad4bd11616e9d9264dbcce9c71fc421aefbde0d30fab6a5dd5e4d2 CVE-2023-27795,0,0,7875a704318748a2891da4cc00c233f4972dd3ce3b3e1fec6c38c44a43dca8cb,2024-11-21T07:53:30.427000 CVE-2023-27796,0,0,0769b2a5e276771638bc1eabd05aa787bc7eef76b674ae5916de622b01efb796,2024-11-21T07:53:30.590000 CVE-2023-2780,0,0,5c35ef2fc85c31bb622a09dd29c3ec4bbc9499076b54d07a8a3e61939aa2a6b2,2024-11-21T07:59:16.617000 -CVE-2023-27801,0,0,bdfcf681aa59d7b5236f3a1753c9c43732918252440f8d1aae8e4f9755ad20ce,2024-11-21T07:53:30.740000 -CVE-2023-27802,0,0,583e20e77ac444bf854f2ae3d25c053bd9cbdc28ee131cd76a4be952bfb51953,2024-11-21T07:53:30.900000 -CVE-2023-27803,0,0,36880e0d4fb6a3fb3b42ee12b3d6706b2078041973148c506031d62c4b7ee275,2024-11-21T07:53:31.047000 +CVE-2023-27801,0,1,1d4f6a2ab4dc273555d178016f34637c2b2ce38c18a043c30ef3008a6ae9f2ed,2025-02-12T17:15:16.390000 +CVE-2023-27802,0,1,d958df0a570c5c40f6dcc19263d34fac20fa68ac7f44482294f6c5bed149ca2b,2025-02-12T17:15:16.597000 +CVE-2023-27803,0,1,55f5fbbfb92c5edcb6b28010be770f5d89ae24ae1305199ebe5134ca79d0335e,2025-02-12T17:15:16.797000 CVE-2023-27804,0,0,71251f4ac053060bb0430d00d62aef0ad43139777a0030429e48792a1d3fdf3f,2025-02-11T20:15:32.503000 -CVE-2023-27805,0,0,b9555e6a751f39bd768d67cf2b77eaa3d9975408f660a46064738f5c3c15f093,2024-11-21T07:53:31.343000 -CVE-2023-27806,0,0,fb623ce39113bff4a8c7603fd6084a2490ff91388a9f58ffae6ddf6c5a51b2fe,2024-11-21T07:53:31.497000 -CVE-2023-27807,0,0,509d230efe8851aa3f92651a0326d57fdd10fd4efc3db6b124bc111f7432abcd,2024-11-21T07:53:31.660000 -CVE-2023-27808,0,0,9a191422465151ce24f3d7bd450f36ffa7fe744ed1c7cfddf5cacd3b1f9d6e43,2024-11-21T07:53:31.840000 +CVE-2023-27805,0,1,3056bbc7784abad121d4acf2e8059bb1c2d50962cd6e3f81b3eb738fdfbab4ef,2025-02-12T17:15:17.010000 +CVE-2023-27806,0,1,073cde6c03e0024f29cc8373d653c6051c3f8abf176ee1c21f57051a9bd82845,2025-02-12T17:15:17.203000 +CVE-2023-27807,0,1,5e2e939f3d6469ce20d6bbddf2a298c50d6e3f45a413b3e8d14d749e19b0a0d0,2025-02-12T17:15:17.400000 +CVE-2023-27808,0,1,4d9bb0dc348bf84f2336604f2f5d3f134e76ceb9968bc590eaafa60b948a4fd2,2025-02-12T17:15:17.590000 CVE-2023-2781,0,0,2d45ee9903103c861fddb94d96b637139dd91421d20c97c4568becfae7af7f89,2024-11-21T07:59:16.723000 -CVE-2023-27810,0,0,4569b21ebe55bbd48c1fb19faa85e62fba04d801b3613e998284a55d92e5923d,2024-11-21T07:53:32 +CVE-2023-27810,0,1,4f0ebe7c96d3f7f3e072f27048b0f4c08eda7d0b824a574abbd3bd93549cbc07,2025-02-12T17:15:17.790000 CVE-2023-27812,0,0,f05ff8a230032379067162d0b03d2285448beb4e87b0935dc732b83e39a36c07,2024-11-21T07:53:32.147000 CVE-2023-2782,0,0,ce544c6d4ca6c7683f979a527ee94be242e480f3f8c3de285cfb741878216e7f,2024-11-21T07:59:16.830000 CVE-2023-27821,0,0,030653ba3fc23e6f1777838848a9d58e0658048b431e4f2b337261c0054cac8f,2024-11-21T07:53:32.300000 @@ -221968,7 +221968,7 @@ CVE-2023-28253,0,0,da7e3df64664cb20ec2e3fc06d7be22698fbd7e6b6a9abc7dfdbb84df83f2 CVE-2023-28254,0,0,8b55c3baab01e9a81aa806c3b78547158c80aacf8d4e0fed1a2dde2d27a33aab,2024-11-21T07:54:42.433000 CVE-2023-28255,0,0,6282d05de0f55c623ef60cff2392c95be1270053be6c69e955f1bd171f1790d6,2024-11-21T07:54:42.577000 CVE-2023-28256,0,0,53d012c4f4b9abca5c1a189025597db086560275d3d5102dba44da8993793d55,2024-11-21T07:54:42.730000 -CVE-2023-2826,0,0,9debfc446c07cdfa45f1ff780bc199b2de300c169067d8045820a765822f516d,2024-11-21T07:59:21.890000 +CVE-2023-2826,0,1,5f07de1819d0003ff8e578a142827c865b94157521575a450c8869e18dd04831,2025-02-12T17:15:20.110000 CVE-2023-28260,0,0,9d42909900dc5b743b635c40edb3388a3a1b977b27abb173433e9bf06d8a3542,2024-11-21T07:54:42.873000 CVE-2023-28261,0,0,f824058de5eff95abc36d6f6a46bba4e2c5eb13948639fd11bcfe28268e84d37,2025-01-01T01:15:44.280000 CVE-2023-28262,0,0,5688fdb5c21f038bb05742d43ee3ebb92be8fddb0b80ee5d81721383b6735563,2024-11-21T07:54:43.140000 @@ -222436,8 +222436,8 @@ CVE-2023-28722,0,0,0197cba368cfa8b5f792e3f581bf72641d1d1d543c23749ec06924490cb0c CVE-2023-28723,0,0,7b254bb302fbb257f66674f78765f98e600565c72f7d162513acd5e3c9ee4af5,2024-11-21T07:55:52.463000 CVE-2023-28724,0,0,ec029f8f0ff9d0f37b7397f4ba5dcd1662964a1b709eb075c5b9f55ff6a3cb18,2024-11-21T07:55:52.593000 CVE-2023-28725,0,0,0fa27e0548bbbb90f2e5f5eb34d47caf7e8ade76cd43b6a37bba438346c0424d,2024-11-21T07:55:52.713000 -CVE-2023-28726,0,1,4560c129a70424e59a9e0ec9144c7f21498c12307fd7f20d442d10065e14a6c7,2025-02-12T15:15:11.567000 -CVE-2023-28727,0,1,78378bb9aa3aaf6db5bf3c0ec59fefff29006f7f3848c76556bc4caf615c2e86,2025-02-12T15:15:11.747000 +CVE-2023-28726,0,0,4560c129a70424e59a9e0ec9144c7f21498c12307fd7f20d442d10065e14a6c7,2025-02-12T15:15:11.567000 +CVE-2023-28727,0,0,78378bb9aa3aaf6db5bf3c0ec59fefff29006f7f3848c76556bc4caf615c2e86,2025-02-12T15:15:11.747000 CVE-2023-28728,0,0,877a20ac4146bd2c6f7a990ad91e5f70e2fa07084297c678d945a8a8c485ba15,2024-11-21T07:55:53.123000 CVE-2023-28729,0,0,019d2dfe312886a4fa8f2fbaf9e1a5d008b33878488a7e6fef273287b7359011,2024-11-21T07:55:53.257000 CVE-2023-2873,0,0,5612e265e2326f26f39e95aa8afb6976ffa61e700ebc2177b393fb48d5a84173,2024-11-21T07:59:28.100000 @@ -223018,8 +223018,8 @@ CVE-2023-29370,0,0,3b5427bcb35bbac847bac96cb577c102996a23e0a01985a30a9a44e9cff3a CVE-2023-29371,0,0,191e519a42a5df41f1023bf9ae4cf5523dea74950c0461050b0eb7e4427adce8,2024-11-21T07:56:57.097000 CVE-2023-29372,0,0,8115b339cca23a604fd3b3fa184a2dcefdc174f8cc9dcd53bc8c9ebc153d7263,2024-11-21T07:56:57.223000 CVE-2023-29373,0,0,270d476731a85cd63c291e58603c75d0ed7fc1e9b98fefc1fc724cd6a3e371fc,2024-11-21T07:56:57.347000 -CVE-2023-29374,0,0,930a115a381ce3b53d56fc0e8d7eeb8e796c5679738528df6470c841a2b982e1,2024-11-21T07:56:57.473000 -CVE-2023-29375,0,1,c36a87ce03fed844189ada2f3d0d0b6776ce936ef348695cd06b1bb92f6222f0,2025-02-12T15:15:11.883000 +CVE-2023-29374,0,1,05d9e7e4f9a15a1d0bedeea80fd7b3b538c7a3c199bea8839e3893e83404870f,2025-02-12T17:15:18.260000 +CVE-2023-29375,0,0,c36a87ce03fed844189ada2f3d0d0b6776ce936ef348695cd06b1bb92f6222f0,2025-02-12T15:15:11.883000 CVE-2023-29376,0,0,ad99879985d5998c49f5d61784393df470a8be95a8f9d2de7f2e1321481e5789,2025-02-11T16:15:38.160000 CVE-2023-2938,0,0,ae1b1490f8e930d6c1e06430e6b60a57af33e3a4cef078f1253795138e4d4a5b,2024-11-21T07:59:36.437000 CVE-2023-29380,0,0,0711eb7be4f03fd1502a0ae9c381550f4ab3a7750f4aa9a76c30fe001c8d1f3c,2025-01-13T22:15:10.087000 @@ -223031,7 +223031,7 @@ CVE-2023-29385,0,0,0a76fe10e912204db8fb1def09cf5892bbfd1c15cb925ec61b58331f8f1f4 CVE-2023-29386,0,0,9dbcee483a89d7640924a14ce24cf0453936e8e4d2dd6a554e9a3f7aebd24455,2024-11-21T07:56:58.750000 CVE-2023-29387,0,0,b2b42cc1f6d822df4705f836910d448935eaf4a8ceb20ab6177ad26d4cc36bd5,2024-11-21T07:56:58.857000 CVE-2023-29388,0,0,b9d88f91ad2e793aacf5c8e6eccf028fea7b9c2660698f7be78bc69cb90463b2,2024-11-21T07:56:58.977000 -CVE-2023-29389,0,1,7a20f34d4d19d41c0aa5342ec58350f4f3268bb0d86016daffe03f54c70bddcd,2025-02-12T16:15:38.110000 +CVE-2023-29389,0,0,7a20f34d4d19d41c0aa5342ec58350f4f3268bb0d86016daffe03f54c70bddcd,2025-02-12T16:15:38.110000 CVE-2023-2939,0,0,5097b0f3fd177e801415b54d7716f4683fb54c1157f3dcb9725b8d5f368e5323,2024-11-21T07:59:36.560000 CVE-2023-2940,0,0,7ad5423ee87e68f755e2cd74221edf5f886bdd506499833f9705f0fa2df479b6,2024-11-21T07:59:36.687000 CVE-2023-29400,0,0,1e44a659f313ac7ea2eae366c8b5a4f17b500bbe5c336da0915df4967f9eda4a,2025-01-24T17:15:12.747000 @@ -223057,7 +223057,7 @@ CVE-2023-29418,0,0,216edffe831d0d592ec0d83d60d807b6fddc27336e8ac8763ba6f9057d2f4 CVE-2023-29419,0,0,eee99d945f06108a5e40a1ec9c523d1176d85c277e5d1c52341cf8f78429a077,2024-11-21T07:57:01.617000 CVE-2023-2942,0,0,3095d00f007f08736781ffefa009546288f761e162006b66520cb0c1c690f4ed,2024-11-21T07:59:36.943000 CVE-2023-29420,0,0,e2b6c7bb8587b7680c7006d5e1355d456a81008ea4d057255a2c0081ee9dd6a5,2024-11-21T07:57:01.760000 -CVE-2023-29421,0,0,3480105a35b1fc45f53ba6202bbea9ada34c4f35cc82b1910e8fe111f5eb12be,2024-11-21T07:57:01.903000 +CVE-2023-29421,0,1,236c15b9df269a365b5f51c706496c8acb4d0d8259ecec17ee326a2d13e3e41e,2025-02-12T17:15:18.467000 CVE-2023-29422,0,0,11d0b8b362c579a59640a4a88f42bc430b3c71c051a72869a1511f4e9f51cbf1,2024-12-09T13:15:27.020000 CVE-2023-29423,0,0,a22c9b9b0fb58e0c90c58921099d165cb9cd3c801aa1e31e81cc43f769d64193,2024-11-21T07:57:02.053000 CVE-2023-29424,0,0,0134e03bcbea6d8fafc372aba0ca9f5c8629785780cf86df3292f1936475e6c2,2024-11-21T07:57:02.167000 @@ -223104,14 +223104,14 @@ CVE-2023-29461,0,0,0276a741f35a6cdc9394b3dd2136f9ea0be4ec8a977d212f0f44b07e0d4a3 CVE-2023-29462,0,0,e44d2364542d4399fc13de6321bb50a7d6d5a8564118cfd0dd6de48207f8049f,2024-12-17T15:52:01.670000 CVE-2023-29463,0,0,85e59c542137bb86594ed48026b483b87dcf323ac320ee81b9a6b2f64ae482c3,2024-11-21T07:57:06.420000 CVE-2023-29464,0,0,146742e622025a0bb49b516993febb531dee7cabec7113609322bce5b7f7dbb6,2024-11-21T07:57:07.377000 -CVE-2023-29465,0,0,4ee89e1db94972a20a672169f1186cd17c0d35cc37ba52d5c98094d2418681e9,2024-11-21T07:57:07.537000 +CVE-2023-29465,0,1,654e769079f9d859a4cb5dce303415f511a178287f378fca562e653db25f0307,2025-02-12T17:15:18.670000 CVE-2023-29468,0,0,e344a9623420f4a28b3beddcdb4b6e13383d59cb73f1dd1767d1315f42035731,2024-11-21T07:57:07.667000 CVE-2023-29469,0,0,c3890ce868fefd9306594daf8d913c48a8613811ed610d020db67af5b487440c,2025-02-04T21:15:23.447000 CVE-2023-2947,0,0,1e6973219073a25d1f0208816042d0de921cb2722b858d13837a7539348ce66a,2024-11-21T07:59:37.553000 CVE-2023-29471,0,0,0c911eeaf2cde00e97fd9b569eae0fbf7f79712347e40bbe2ea7dcd922dec9ee,2025-01-31T19:15:13.353000 -CVE-2023-29473,0,0,962b25368971eecc0256cc5b0b5fd386654955c54f9062b5d68c4eba7d43005e,2024-11-21T07:57:08.040000 -CVE-2023-29474,0,0,4d49bb7998baa32821ffa2bda0888222ce3e7ecfecd2a3e20e56cc265682b2cc,2024-11-21T07:57:08.170000 -CVE-2023-29475,0,0,33c83edd70229d4c831ae9bdd415364683573ea08af12a4ddc98823fa2c19e92,2024-11-21T07:57:08.320000 +CVE-2023-29473,0,1,b079006e4f0dbfef9b29b4c10406c65406baebf6751441dea0da1c0047c10283,2025-02-12T17:15:18.893000 +CVE-2023-29474,0,1,642cf1f53696f1388bcc3acddefc8fbef91195a2616f920e6689127f904149a8,2025-02-12T17:15:19.070000 +CVE-2023-29475,0,1,bff3ea7ab706ac2fffe7936820ab20491750fdddef9b94ca356916bc6deafaa1,2025-02-12T17:15:19.230000 CVE-2023-29476,0,0,689d8f4680b3cf170fab37d2c06369b0b6b0254cd51c9c8d5b5ee515b0ab273a,2024-12-16T18:15:05.407000 CVE-2023-29478,0,0,fdee2842c57716f3ae4d3a06025d4fd8f2edb28da2960b3c619aaf9ab88ac00a,2025-02-11T20:15:32.753000 CVE-2023-29479,0,0,fc0cd00e454368f9af64ad11639baa0490c20964a05bcb24239c91bc28eb5467,2025-02-04T21:15:23.663000 @@ -223645,7 +223645,7 @@ CVE-2023-30447,0,0,1569890595eede7c82f063a3226330cf14bdb91dbd9f4320e4192fa40bda0 CVE-2023-30448,0,0,51400a66db4ecb7bbe2a869b7c920c09d20e56d9c0d81a28043943bb9b2898c8,2024-11-21T08:00:12.210000 CVE-2023-30449,0,0,328e0008aa87724bc1119988042af83d0e7f220a1d71681b98be6a3dc2539c53,2024-11-21T08:00:12.363000 CVE-2023-3045,0,0,5bfcc31d64a917d38b23dada1e5786670dff662cf23fb0e7dec809cfc9d30737,2024-11-21T08:16:18.950000 -CVE-2023-30450,0,0,e8abf2288be578f9aba31e86a7a71291da0ebac6855ef6c8dd30603a62411b3e,2024-11-21T08:00:12.513000 +CVE-2023-30450,0,1,26a049928f39f3187262360f3eff74f721cac75b83e1ef305dfd1cc180b9dd61,2025-02-12T17:15:20.380000 CVE-2023-30451,0,0,8e73bc937560e2499ae7dd02dd63adee96d9b76893fb220c5930fcd72c859320,2024-11-21T08:00:12.673000 CVE-2023-30452,0,0,7cc813c03671747dfd20433bfdf987765f42d3d9636d86717f2f69bbf4b598eb,2025-01-23T16:15:28.487000 CVE-2023-30453,0,0,926bc7eb7d121418cfa67de0f19eae48d919bef0dc4029cb8db196fab44a2a95,2024-12-12T18:15:22.400000 @@ -227848,12 +227848,12 @@ CVE-2023-35945,0,0,964143f928c92bea6b7339b394c3f52b183ddc8b150fc3d1b4dde8fd3c0d2 CVE-2023-35946,0,0,f9a7a11dbb78b03e3e9af373b8f4eae2a401d11e9e75c0bed6486fe6eb92eeb3,2024-11-21T08:09:02.030000 CVE-2023-35947,0,0,1b2f10faecbf42a5b4b42b5db0c4ca826cffd757e3d217eec37c341fdcafa551,2024-11-21T08:09:02.180000 CVE-2023-35948,0,0,c8f862a664d40c2c195d314a7d98cb626df5c9c3c2aa672d9ee56efd7b245dbf,2024-11-21T08:09:02.327000 -CVE-2023-35949,0,1,c768c27adec5e9814e887c8513014a45d398a9c8f2521b73e217b9ebe59f7b5d,2025-02-12T16:10:50.810000 +CVE-2023-35949,0,0,c768c27adec5e9814e887c8513014a45d398a9c8f2521b73e217b9ebe59f7b5d,2025-02-12T16:10:50.810000 CVE-2023-3595,0,0,36c3a800e2fe77bd8d7f41a96cc3e08101edb93e582c3a777dfa2342e3a7af14,2024-11-21T08:17:37.710000 -CVE-2023-35950,0,1,32fe81d427d9545c5db05ae8e8c747a14c859fe4fdbc76c9212e447a934d27e5,2025-02-12T16:10:35.737000 -CVE-2023-35951,0,1,bb2cd00e6e53a4fa4b70bca1be1745a8e9ebd4b81ee8591a6feb01dc9ec936d5,2025-02-12T16:10:26.800000 -CVE-2023-35952,0,1,0eefb5de35b696359d8108b296eef393f67c4d20a074ff798ba34b0b0fe26e14,2025-02-12T16:10:13.873000 -CVE-2023-35953,0,1,49750bef093443385674327f8f884405d160aa0a7257f7483e10f982a6813013,2025-02-12T16:10:01.867000 +CVE-2023-35950,0,0,32fe81d427d9545c5db05ae8e8c747a14c859fe4fdbc76c9212e447a934d27e5,2025-02-12T16:10:35.737000 +CVE-2023-35951,0,0,bb2cd00e6e53a4fa4b70bca1be1745a8e9ebd4b81ee8591a6feb01dc9ec936d5,2025-02-12T16:10:26.800000 +CVE-2023-35952,0,0,0eefb5de35b696359d8108b296eef393f67c4d20a074ff798ba34b0b0fe26e14,2025-02-12T16:10:13.873000 +CVE-2023-35953,0,0,49750bef093443385674327f8f884405d160aa0a7257f7483e10f982a6813013,2025-02-12T16:10:01.867000 CVE-2023-35955,0,0,91c0639a971c00780cac97b1cea018d17f2e427fd30c92e0afbdf80f037bb86d,2024-11-21T08:09:03.093000 CVE-2023-35956,0,0,d0d751f39f1298fdc704a74843149c039cb5f4bceb3641e76a34a61f3d75f97a,2024-11-21T08:09:03.223000 CVE-2023-35957,0,0,e00c1e2d59bde2aa34d3bf82890a934b6edf52786a89e4243452e75601637a3a,2024-11-21T08:09:03.350000 @@ -230033,7 +230033,7 @@ CVE-2023-38559,0,0,95715a3fa13159aaa77b9f9e4d97ac632b6dcce69eec64e57a8eb3f323b42 CVE-2023-3856,0,0,2a4a658aef4b0b2ac6978b4b64df283d98a51505bae85e70181389326e6a2c51,2024-11-21T08:18:13.767000 CVE-2023-38560,0,0,3f4fcbfd887311a924776f7d368799cc82e0f09fb0704736dcadf8fb0a48d2e5,2024-11-21T08:13:49.903000 CVE-2023-38561,0,0,37b987a8dbbad15f22d358ebb4d11b475dc8271b2b624baa7dcfa1ec98fa2c86,2024-11-21T08:13:50.040000 -CVE-2023-38562,0,0,7deff8247f1ea28cb0df03882ecaba5eeb606c8d2add88ea5250e4a853a17d2d,2024-11-21T08:13:50.173000 +CVE-2023-38562,0,1,107485cf39397e11a911bdefd3388b6724c6525d7dc3ef160df59b850543ea3a,2025-02-12T18:51:08.283000 CVE-2023-38563,0,0,917d182b03a952b9b5c20710f71e1b685fc71fb74a0a036ec416b8f840244e6b,2024-11-21T08:13:50.300000 CVE-2023-38564,0,0,c223889522da22eda836840aca9084a7a1e994494ccab7ae6d4485cc4b512d06,2024-11-21T08:13:50.430000 CVE-2023-38565,0,0,e13362b75afc7cbf791e35128d040008ab4a6ad39dd6e4ce1b845e33afb01c87,2024-11-21T08:13:50.550000 @@ -230849,8 +230849,8 @@ CVE-2023-39537,0,0,1404f66804baa722e5483ada96a5050d2c43cfad4ad65079795f3fe4a9037 CVE-2023-39538,0,0,4f74ccdf3e4884a5209a77926e0911079b428c432b983cead172da77622fc947,2024-11-21T08:15:37.950000 CVE-2023-39539,0,0,11727386ac1717b6ff5ff5810e1bab187313c9604e9fa9562eb6476716c7a8cb,2024-11-21T08:15:38.080000 CVE-2023-3954,0,0,8df0b19b35801bac1ed0871ee7516a630837d2d3b3895bae4c112c6ae7255378,2024-11-21T08:18:23.557000 -CVE-2023-39540,0,0,84c0de945e3b9a445d63c162b9ea7a7c4896ce7f1f90ea37e470aa21c2550b72,2024-11-21T08:15:38.210000 -CVE-2023-39541,0,0,ecc733919756ff09556bd1c7135a7b2a18e799495c46fed27ae7e8d4f3400251,2024-11-21T08:15:38.337000 +CVE-2023-39540,0,1,7d25658d170bd18e3510f96473d383d1f50898bdd317db20d32f4a83fcc79185,2025-02-12T18:50:58.057000 +CVE-2023-39541,0,1,ef98eec43f9e2358a264355f6ce8b146c277cdff457c43a4f8575c58db5d9b2b,2025-02-12T18:50:36.947000 CVE-2023-39542,0,0,683414e574c6493b54bc4426d2963683ee3fb8c2f7a7e0fbf988bf0d401ee42c,2024-11-21T08:15:38.450000 CVE-2023-39543,0,0,32aa9c5ce589cd9406bb88bd141cb662f2b13f412cd32404de12325257702b9b,2024-11-21T08:15:38.573000 CVE-2023-39544,0,0,be578dc20d11fea72e49efd1c094f3f7eea238bcd4ba529630eadd8057e412c9,2024-11-21T08:15:38.700000 @@ -234989,7 +234989,7 @@ CVE-2023-45312,0,0,ba2ffc090f4c9a7b83c0a6b162d96291adb333650e9d6d3decf58f939c7e0 CVE-2023-45315,0,0,8eed3dc2c5af70e11c3e671c6ea5b374ed12e5b5c231d45e86dd3593e038a0ef,2024-11-21T08:26:43.770000 CVE-2023-45316,0,0,cbdc5c2bddf959b75f74299237e6f124f6ff2c60a3ec149e4a209e3d335526c2,2024-11-21T08:26:43.897000 CVE-2023-45317,0,0,ffcb0c598aeccbb03c32dfd9655db953224bc7961e130e2938a92e8b2614ec8a,2024-11-21T08:26:44.037000 -CVE-2023-45318,0,0,47be26a1e03da3e3392bf256c48c787f7bf929fdd18cc7ebb9ec6ac3ac4c8b61,2024-11-21T08:26:44.210000 +CVE-2023-45318,0,1,ca0c3b15422d0bb95cfc9ae3e0d06c46674fc0fc44b55e83ae4b62f0e1584e37,2025-02-12T18:50:45.040000 CVE-2023-45319,0,0,f2e0d81e67e885e07e138e27570d2df652ced6b36b05d5f8363ef93baac9373e,2024-11-21T08:26:44.347000 CVE-2023-4532,0,0,c225dd2d924a79bfd340f8188ca51b09bde857faaf3e2d5f269cda5f9b1a1af4,2024-11-21T08:35:21.620000 CVE-2023-45320,0,0,56649d04425793d54b1e6e804c5265442ca0d5c975d53622dfdcf6db2f2def5e,2024-11-21T08:26:44.493000 @@ -238144,7 +238144,7 @@ CVE-2023-49465,0,0,85f592ede9e33bbd79bbd2c850aba40ba963d29628783cdd102fc10419ee9 CVE-2023-49467,0,0,ccfdd8b4b4bed01d2a5cbf227c069582268c93a046efc506e0e66499b5a09dbd,2024-11-21T08:33:26.823000 CVE-2023-49468,0,0,b78f6929ceb3a35b940d92a0df230f857ead3378adc4638a3a8041f9db0307da,2024-11-21T08:33:26.970000 CVE-2023-49469,0,0,bd35c220b2e60cc8c4e4c44e295b6d92fa6ff932fd96afabc1e9909afe53041d,2024-11-21T08:33:27.197000 -CVE-2023-4947,0,1,e478da0e9c72e386dd9d21064d784c4aa16de46cf623691aff1d52bde7ec3fce,2025-02-12T16:02:11.947000 +CVE-2023-4947,0,0,e478da0e9c72e386dd9d21064d784c4aa16de46cf623691aff1d52bde7ec3fce,2025-02-12T16:02:11.947000 CVE-2023-49471,0,0,b3aedcdbf5c2c22919d5fe222006e48c8c22c32d80f1490d607aa2941a69482b,2024-11-21T08:33:27.343000 CVE-2023-49473,0,0,da24daebf1eb8ea092d68cac47bc80e47b66bc61f8b5fa69cd97defcfe685aea,2024-11-21T08:33:27.510000 CVE-2023-4948,0,0,8e5e91b593e9456690177fa740ac53095abc30a31cb01c0f0f8ab9ce7fd799e7,2024-11-21T08:36:19.700000 @@ -238216,7 +238216,7 @@ CVE-2023-49595,0,0,8fc65a47793fc32f84c0a744bf297f283dd69dcc2b15136a2e2fcd19c982b CVE-2023-49598,0,0,e758410bd290a11a398e846d4228fea614a25c82ab963e99462e14bdaa9d6db8,2024-11-21T08:33:37.250000 CVE-2023-49599,0,0,d1843241f8db11fafc599c0daba9e074b74894e48b5aec8ec283f1589c2f8286,2024-11-21T08:33:37.373000 CVE-2023-4960,0,0,4efdb33cc3b8c9e490e625ca3e4a0d80c52b3418324639edab36acb9b27c0262,2024-11-21T08:36:20.780000 -CVE-2023-49600,0,1,e8cd8de4b2ab88bf4f8aa920e4b463bde1ee47923e6fd2d0106580cacd664710,2025-02-12T16:14:59.787000 +CVE-2023-49600,0,0,e8cd8de4b2ab88bf4f8aa920e4b463bde1ee47923e6fd2d0106580cacd664710,2025-02-12T16:14:59.787000 CVE-2023-49602,0,0,a12c06e1c2027365532346b2edbb24aca3a0ac358acd9f611803ef679cef3d63,2024-12-16T19:59:21.097000 CVE-2023-49606,0,0,de58395e940a854debd455905f39ce7fb5cb86ec9f5107aaa70b928793a75cdb,2024-11-21T08:33:37.743000 CVE-2023-49607,0,0,c1d47d2485033d1538c7cfb6f323c8c3e048cbbcf85417d72c0ec588b46db7a8,2024-11-21T08:33:37.887000 @@ -238344,7 +238344,7 @@ CVE-2023-49777,0,0,33c519d5a7962fa4046ad12f5cca27992322c652fb741caea4eb8367807f6 CVE-2023-49778,0,0,32696ac80ddb602c52e8fe776f284fb0ae6da43b7282b564f5a7f39ba2f17407,2024-11-21T08:33:49.730000 CVE-2023-49779,0,0,208a0c4daf9d511825be4208e7428526e848b797a262491bdae905a77266c88f,2024-11-21T08:33:49.890000 CVE-2023-4978,0,0,9bf211ab4eda87736cc28a34ba658d0ccd93638d5da330e5c54fe73d74302125,2024-11-21T08:36:23.437000 -CVE-2023-49780,0,1,9013e7611cf6d23bf15ff23736b8d9b70a7f33951f5ae780b13c0eab1756b4bc,2025-02-12T15:15:12.077000 +CVE-2023-49780,0,0,9013e7611cf6d23bf15ff23736b8d9b70a7f33951f5ae780b13c0eab1756b4bc,2025-02-12T15:15:12.077000 CVE-2023-49781,0,0,3563f4405dfa96098f4f59027cce7c23b059b81f69ad6687b4bbd7d42605bb73,2024-11-21T08:33:50.010000 CVE-2023-49782,0,0,d88bb5846ccf235986a34db8ee7ec2e7c4f993cc0c87f8a5d3589de125363ba3,2024-11-21T08:33:50.137000 CVE-2023-49783,0,0,cd66debb4e559f3c84e5128cc8085a7de9859741fad8a54e1384a18a6f8b2960,2024-11-21T08:33:50.277000 @@ -238719,7 +238719,7 @@ CVE-2023-5030,0,0,fdf00584f94db54433be8cc9b7255e7c76337e4e5ecf664853e635659d8b0b CVE-2023-50303,0,0,577942694687bbb9d20d9e62b97c43d31e6741104a6e0355ef83180bf414652b,2024-12-10T17:57:50.880000 CVE-2023-50304,0,0,8d7cf710ec0b485f385fbbc85e013f83f0695f8067df88dc02b330fdfee0f44f,2024-11-21T08:36:49.433000 CVE-2023-50305,0,0,dabf8219efdb3dd68521f2a5ca58bceb1db63561a1224bc65ebbdd00bf414d61,2024-11-21T08:36:49.587000 -CVE-2023-50306,0,0,b237375bcefaa2a9e278f6692dc4b5969b17da8653a3531dfc9515e32d74e626,2024-11-21T08:36:49.733000 +CVE-2023-50306,0,1,232289e12c03f60066803c3276293eaf16ca3d82db14d055689f581ac2e8d3f5,2025-02-12T17:01:45.710000 CVE-2023-50307,0,0,54dcb069378ef7ce7cf1e378a429a1153c8dcdc770f8f93df646b7251911e08b,2024-11-21T08:36:49.880000 CVE-2023-50308,0,0,f0daddfcaa94c1b3e4528be72f010ad2604cb01fd116e7d24805892a037010cf,2024-11-21T08:36:50.020000 CVE-2023-50309,0,0,3710913107524245e5271ccebac144284551995d27b55911d0ad98d408e701f7,2025-01-23T03:15:08.573000 @@ -239314,9 +239314,9 @@ CVE-2023-51389,0,0,d649e3b2edf5cd45e39e2051986c530abb76abf16e5c8d5a9bbdd06f97aab CVE-2023-5139,0,0,69361bc1a2213f0600fc2fb192d98b406084fbbaf2768468c5067c08059961d2,2024-11-21T08:41:08.487000 CVE-2023-51390,0,0,496dd0af99b7fb72c4ebdc3c318e1a8996c2f7f491249e5fc1088cab7b14ac21,2024-11-21T08:38:00.733000 CVE-2023-51391,0,0,f2097631d097ae23ddb8f8956d024413f324b87cd0f46e72c0193f503c53e7f2,2024-11-21T08:38:00.863000 -CVE-2023-51392,0,0,f4bff1066f934ff86be4adb92ad07996b48a8aecf3ff8c99559b3a95115f5750,2024-11-21T08:38:00.990000 -CVE-2023-51393,0,0,ecd6d8ef2d4e9d0d663eb3817f2bbd75d0e484fab7da89b72d4f6f5f9c6878ac,2024-11-21T08:38:01.120000 -CVE-2023-51394,0,0,414154d29fcf7d58f244655b64e4103af57f7968804c6e550c1375ec821a334b,2024-11-21T08:38:01.250000 +CVE-2023-51392,0,1,f6bf4bdc02bcdd2a015934f601b347a0baf1ab7ebd7d9ba82cb9952842b30f45,2025-02-12T18:49:30.867000 +CVE-2023-51393,0,1,ba468227e653968b46076c0a63860e6e099c2f992609aa5b088b1bf5ec2a69d9,2025-02-12T18:49:22.437000 +CVE-2023-51394,0,1,b825c4c8b8e399438f470cd270df897d3b4b5e99c5a66d98bdddd07cb49ff72c,2025-02-12T18:49:15.683000 CVE-2023-51395,0,0,786aefda3fc214525967d3ea50d54eac0c493099908f3f90b597f8d5b5faf5d5,2024-11-21T08:38:01.377000 CVE-2023-51396,0,0,ac4bcc3d44538bc9cc58409beb4d20e428a64d09cfb5d4dbbf8c8a73e33a2f91,2025-01-16T15:08:00.773000 CVE-2023-51397,0,0,0dcf914117c1e222e2f60ef4004a5b0bfe62d0c01ede337c22c9a42735a7ad40,2024-11-21T08:38:01.650000 @@ -241844,7 +241844,7 @@ CVE-2023-6529,0,0,240c5593c284be620aaef4c418f20fc5ee1fe4c5e2d8935497486f145436ed CVE-2023-6530,0,0,6f6b7111ffff4aa2a32fd22d58df5a9d56d9283836487366f9b29be0cd631a98,2024-11-21T08:44:02.440000 CVE-2023-6531,0,0,2d6149ae0c8a10dbdb11207763b3720a41951691f853d6aae900ea62fb8245ce,2024-11-21T08:44:02.570000 CVE-2023-6532,0,0,d9926ad424c052962b5b1c19ee0cd594cdb74f71af8a29a173c2e62d0ede5027,2024-11-21T08:44:02.720000 -CVE-2023-6533,0,1,94b2775938efdf62fa530a653e964befea9fc91d5aced53f66c24a709c90ad33,2025-02-12T16:57:31.787000 +CVE-2023-6533,0,0,94b2775938efdf62fa530a653e964befea9fc91d5aced53f66c24a709c90ad33,2025-02-12T16:57:31.787000 CVE-2023-6534,0,0,6efa39132533c0da6b2d4f0f7236d9f304ec2707e39c52e825f0a23c7bae1a70,2024-11-21T08:44:02.973000 CVE-2023-6535,0,0,7ab532f096d7a5921f719ab90c9f86b6521cd0a122f9d025fec0f5e300f695b6,2024-11-21T08:44:03.110000 CVE-2023-6536,0,0,f4f5a9ce6587d2c2129ebc948c72e4e0b510fb171991480bb24165dbefca0c68,2024-11-21T08:44:03.303000 @@ -241940,7 +241940,7 @@ CVE-2023-6635,0,0,7332f0b9ee677a2d4d54f0dc110098f72c21ae565ad7df8b623a13744c7d85 CVE-2023-6636,0,0,429cb004753d2958d8159d67d03a4c3da4034ff661609c524ad4820a55c5adc8,2024-11-21T08:44:15.893000 CVE-2023-6637,0,0,658a49059cae63311affd21fa1606543afd182ef89cebe04c989e779114ea7dd,2024-11-21T08:44:16.027000 CVE-2023-6638,0,0,f3b7729d9690cdf79e7af1a70f8733fc6e0ac86a16db8e9baa0550ae1589413e,2024-11-21T08:44:16.170000 -CVE-2023-6640,0,1,4c1de3385a32f286c0b75b0b253dae7e11e4d89cf203bb099ad3f58f6c385c6a,2025-02-12T16:52:28.897000 +CVE-2023-6640,0,0,4c1de3385a32f286c0b75b0b253dae7e11e4d89cf203bb099ad3f58f6c385c6a,2025-02-12T16:52:28.897000 CVE-2023-6645,0,0,18d7b1db6d45d511489f0088fbcda1d70409d9803c5553814d8e2b60fd676b42,2024-11-21T08:44:16.430000 CVE-2023-6646,0,0,43309576514af4cb07e93f126e0f158d82b8629e3c47d5943302d08d30997d61,2024-11-21T08:44:16.600000 CVE-2023-6647,0,0,780302fda21e798fe5ca06edfdf1cebf880447e49cae48df60b9306a284f29c8,2024-11-21T08:44:16.793000 @@ -242197,7 +242197,7 @@ CVE-2023-6932,0,0,5dd742e80bc270aba4b59a44538c4dd8c6811185218069bec971f9f4f4eb16 CVE-2023-6933,0,0,d598bd64df7b1f90f5a4fbee348836ca7a036d43d333519168af348662fcfc40,2024-11-21T08:44:51.933000 CVE-2023-6934,0,0,775630978666c14635bd5a34aef70e9940735e81f166dadcf41ac01815f012d4,2024-11-21T08:44:52.087000 CVE-2023-6935,0,0,ad7e648afd3c153ad4009369fe6e5cfe2af0b9f0392166eedd6efb57fc744a0c,2024-11-21T08:44:52.217000 -CVE-2023-6936,0,0,34877e78b2cfe7f91313a256c20dd309f0c7f592e5cdfd2407c0fdeeb12b2cf5,2024-11-21T08:44:52.383000 +CVE-2023-6936,0,1,83efbac6b69256756d9bf7707281cc47bcc927f7d4d370ce9d055a1b9c86d5d3,2025-02-12T17:01:14.790000 CVE-2023-6937,0,0,a5aa5eca5986de38d01b4b623394dc50fc709c61fbb17db5ee75b8a5dc35b1ab,2024-11-21T08:44:52.503000 CVE-2023-6938,0,0,bf6ce0bd25ccb84e8585516f5f1e96599e70c565d5e6071dfb462f8acaae7aff,2024-11-21T08:44:52.623000 CVE-2023-6939,0,0,9013c4f20cfa53f9418c260cc38f77fa6695014f1b33d48beba0b416f70e2975,2024-11-21T08:44:52.757000 @@ -242650,8 +242650,8 @@ CVE-2024-0139,0,0,97175888b963c6f6c4d9af1853169dc46a253002be2bfcb37fc1cbdc17d019 CVE-2024-0140,0,0,b1c3d4b9e03087faeab3c6b32b57a2d8e93481139427d7ea4f9e253833a83c15,2025-01-28T04:15:08.730000 CVE-2024-0142,0,0,261b501d3b1c6d9204171cc97a2b9eaa15dd08e26ef75f2cf5f87385800414ae,2025-02-12T01:15:08.230000 CVE-2024-0143,0,0,2d6a775a99432800a0b296cde8d2dfd26489facfd8334a2df675b06faf561ec6,2025-02-12T02:15:09.253000 -CVE-2024-0144,0,0,bdb76e9bda487a77b5d7e400acce3daa73596d4ac300f78220fb30f99715119d,2025-02-12T02:15:10.163000 -CVE-2024-0145,0,0,3e1a5d12b12b13ee22f1d69fc3c32f9b40b092eb936e7c0e22e0dfa65e26aa4b,2025-02-12T02:15:10.263000 +CVE-2024-0144,0,1,41cdcf519a880edc9c190bcfa94f26f3a0ac3a6adf8a630f9ea4853703f5659a,2025-02-12T18:15:20.557000 +CVE-2024-0145,0,1,58b871f4d9400f0da60a88f91a5f81be13d81af1d234a6380f51524e5557f1f0,2025-02-12T18:15:20.700000 CVE-2024-0146,0,0,91247f908f4680f036c365cc7286ed9057cd8a10421a385a7ebe691b4e035d85,2025-01-28T04:15:09.447000 CVE-2024-0147,0,0,d266f38b1ebfcf418fb12ec7ba0c16644759f3d46ae142b8376ac2cc8dbc66b0,2025-01-28T04:15:09.590000 CVE-2024-0149,0,0,57c8b5d113e1d5b272dcbe1421dbea4404017873433aea02126d802ef03cb727,2025-01-28T04:15:09.733000 @@ -243182,7 +243182,7 @@ CVE-2024-0711,0,0,9a865d4175fd4a2b0f4fd543a5f08381777cc42c895e286890d791cfe74837 CVE-2024-0712,0,0,5dd4c3122731abb7d7ee3446b47e86ad69bb5bb758d4fe45a8a23b6bb811dd0d,2024-11-21T08:47:11.740000 CVE-2024-0713,0,0,19f60025c4155bf7de0537e7e8eb678261781f77d92ff4f5f15ec17a5758ffd3,2024-04-25T06:15:53.647000 CVE-2024-0714,0,0,74a89f0646eec17d2b9d4d39c1131131b7355508d504978b147df7e1d906110f,2024-11-21T08:47:11.917000 -CVE-2024-0715,0,0,f3d18ed53e59951a530d7b8d1c05cbaaab234ca4c5cefd07128280acc3dca036,2024-11-21T08:47:12.060000 +CVE-2024-0715,0,1,8fe4e7385b4f23caeba3c942fdf62e5ea03ffe44f6477f5d7c59c4f09ee79114,2025-02-12T17:02:20.907000 CVE-2024-0716,0,0,770e476b346f8d0169049e1e551e21684d5d1d890064ac806b4dbd7b9252c77b,2024-11-21T08:47:12.190000 CVE-2024-0717,0,0,3b7e741e63b41789db54a1e2d9c55313217c91f5f8768b8f2258e5a01f0088bf,2024-11-21T08:47:12.370000 CVE-2024-0718,0,0,bd8b1248bc0a52d228788304ed8f38e967fa3e0987b0424bf1f9dba2b7fcc623,2024-11-21T08:47:12.587000 @@ -244627,7 +244627,7 @@ CVE-2024-11339,0,0,79f980d1c213f37a017402750a78ab5a89012c4a7d884549e17aee2fe1c2f CVE-2024-1134,0,0,3b9e316f9f09adef1cfd4f6b3383505dbc9180172570e63197eb1d9f1f72ee08,2024-11-21T08:49:52.330000 CVE-2024-11341,0,0,fe8cd85d684fa85647e91e6c807d0d3948596661a708a57f08c30a79715842f3,2024-12-05T10:31:39.520000 CVE-2024-11342,0,0,e5c7c30c6a212e83bae351facc5b11e3c8030751d949156ac2c5ae223532d502,2024-11-26T04:15:04.030000 -CVE-2024-11343,1,1,a869a0de2f9f6fb54c13515db8faa67b688fcfdf608d6e35180cbeee3b1374a7,2025-02-12T16:15:39.100000 +CVE-2024-11343,0,0,a869a0de2f9f6fb54c13515db8faa67b688fcfdf608d6e35180cbeee3b1374a7,2025-02-12T16:15:39.100000 CVE-2024-11348,0,0,ba9d86f6b53ac054d57d01c4d74e28819553b70bfa2bfa989e191e835487e4ec,2025-01-27T14:15:27.973000 CVE-2024-11349,0,0,3a64113bc68757a74fb5a818e6ed9b7f5872b000d4a6ffe30b5a9251cc55ef53,2024-12-21T05:15:07.017000 CVE-2024-1135,0,0,3aff273363b92899a6e2ea5d9bfb0816a0d4bc7746e2c028bcee049e0905b123,2024-12-20T07:15:12.590000 @@ -244821,7 +244821,7 @@ CVE-2024-11546,0,0,65c33ed6b40113b97d7a85cc0754dc9b7dd13cbda138c6eea60e21dbbc34c CVE-2024-11547,0,0,d2e7d2480bd787adb0a57480a3211f983e73605cbfffe776d693753f0c6731b7,2024-11-25T18:43:31.837000 CVE-2024-11548,0,0,4ad53a19719bfdebf85c85b469bf58e3ad6424ccb726338705943c43a9cf82d3,2024-11-25T18:43:25.887000 CVE-2024-11549,0,0,4146058d2b64f6bca556b100b7a3925bd1b84fc949ad769d2ae1069a91a9361a,2024-11-25T18:43:19.760000 -CVE-2024-1155,0,0,78628c41a86cec38c8803309a381913b97434565df20d50765cb14c9702723f4,2024-11-21T08:49:55.300000 +CVE-2024-1155,0,1,961ba7532775e362a766918897e2968d8b3ed839e786630b586a81b7df5a2059,2025-02-12T18:50:24.383000 CVE-2024-11550,0,0,e65f43cce64f8a26d757b3c93e3bcc903eafdb811731f6a4aaf8d6175b529028,2024-11-25T18:43:04.463000 CVE-2024-11551,0,0,a733118808ad119ae8d1749d00ed2894701a1425fc4d866873354b341fe935a0,2024-11-25T18:42:58.463000 CVE-2024-11552,0,0,59576790b16883796c61e7a416bcf37024a6686d937ab4f4a85c7fc61ecee306,2024-11-25T18:42:53.387000 @@ -244832,7 +244832,7 @@ CVE-2024-11556,0,0,33e5ee24b7f0bb087c8a0cb35b459f6ab909dc8c82364f6007561d1634b5c CVE-2024-11557,0,0,6c5eb402bb508c95e5f86276439761da0c9e1ee74e3e2f2aa2f7dde9427151ba,2024-11-25T18:51:46.153000 CVE-2024-11558,0,0,1b1f554db94aeddd95fb6dc6622b00d26f99392e996c5db37da9b228b2e4e9e1,2024-11-25T18:52:29.450000 CVE-2024-11559,0,0,1ed48c4ff8078745711f1ece6ff6e6d9fdbc8b08abae8817a9b4467f32e4cd99,2024-11-26T11:26:29.503000 -CVE-2024-1156,0,0,689be05f183d327e81503a01cb6eb8b5a9ebc35f823a1c9dffffd638369ffc99,2024-11-21T08:49:55.427000 +CVE-2024-1156,0,1,15ebdc74d47386f3af37a2386b18130c4dac741f8aabea7f76c5e03bbaaaf944,2025-02-12T18:50:02.210000 CVE-2024-11560,0,0,29eca610545f96e0ed40a331eb84d20ea0406c75f73bc6e93c39bc7a705a7c89,2024-11-26T11:26:20.087000 CVE-2024-11561,0,0,c3594ba8cdd7778fdc06b5e3f102040f49f20c523e41c994453dbcbb68285d40,2024-11-26T11:26:06.753000 CVE-2024-11562,0,0,e858e364ea6f921aa279f96a6433f764467adc0018085cc711f933dbc4db0c67,2024-11-26T11:25:58.440000 @@ -244898,6 +244898,8 @@ CVE-2024-11624,0,0,2fbadf82b86c601ba5e3c164ddb11cdb07fbf96914b2d5fb97e205c966153 CVE-2024-11625,0,0,c71612eff4dbfdfd57dcd77786b9f90aeda1003c787b3baa9b3e022b7aa38e14,2025-01-07T09:15:06.560000 CVE-2024-11626,0,0,e05f68563d0cfe4fcf37166c88856797ec0301944e16df5d7b6760557f29956d,2025-01-07T09:15:07.533000 CVE-2024-11627,0,0,9ff1a8df860daf1368acfa4151c0612097655e3c1d986846213632a0d4bd06d7,2025-01-07T09:15:07.633000 +CVE-2024-11628,1,1,0d30c4ae124cfdfb86ea24ea9ddf8a0a0cfcbb22b3e296f47d174f80c98a5817,2025-02-12T17:15:22.067000 +CVE-2024-11629,1,1,d07cb72e6980995220f25d3903fc054cd90e77a97b8201f93450450507de9de1,2025-02-12T17:15:22.200000 CVE-2024-1163,0,0,3534cb0564ba7e08015dfddf52a975a19f7b672cf09e3f78e469f84e669f2cea,2024-11-21T08:49:56.403000 CVE-2024-11630,0,0,602de6590967350fd7f3827b1a11ce4a1c578a1994d3c132149d73cf61dca0eb,2024-11-22T22:15:13.637000 CVE-2024-11631,0,0,ec063b412cc8e1fc69f64e54e806f8de997f3af353f8bd5c4b78d65e3cccfe32,2024-11-25T16:54:46.333000 @@ -244920,15 +244922,15 @@ CVE-2024-11648,0,0,7767a97f87e6ac5b52c62a9ab3e06af98c54488fb6fa6db87ff57d4b59586 CVE-2024-11649,0,0,2e02a1b1ac73e9631e0d1a9797095a406b688cb0877d8f7698e9962760832419,2024-11-25T16:48:37.237000 CVE-2024-1165,0,0,147ae82fc7da12f28aa758dac0e9f077423e57773054525f0229107e43220ddb,2025-01-16T14:48:55.897000 CVE-2024-11650,0,0,c1a83adb5fe7f79d88eb6196b3c8ac6aa781d1511831a253d8e0e7484128306a,2024-11-25T03:15:06.707000 -CVE-2024-11651,0,1,cec44f3b3826a002c3bc76942d1ad595ae20f3e224db724c688b3996e5fb1a6a,2025-02-12T15:33:04.513000 -CVE-2024-11652,0,1,caacbdfea328c0c43c47c3c3328fc88c5bc403f49f56c708cfeeab1a2a8ff78d,2025-02-12T15:32:54.593000 -CVE-2024-11653,0,1,12b60ca8872c73312f4aa317d6452baee1f0f4241adeaae02c8f362c7e157483,2025-02-12T15:33:07.360000 -CVE-2024-11654,0,1,2e41ecd40d167da85d8e68d46eeb3465a4ea85a15576219790bd5b19ed6e5c49,2025-02-12T15:32:56.980000 -CVE-2024-11655,0,1,259e216f1e6212d6db7898b9bb43176bc6ed5ac32efcfa7c40e1697332a96ca7,2025-02-12T15:33:09.620000 -CVE-2024-11656,0,1,202df9e981ceb4b057caed31f3094f775b1e3f6b776cbcb97854a746c3ae80fc,2025-02-12T15:32:59.883000 -CVE-2024-11657,0,1,44d0b826c4f6eb6824a07f05f5f0cf6cd650d559299918832f1a01de5a3497de,2025-02-12T15:33:12.003000 -CVE-2024-11658,0,1,94cbaf807b1e36ff9a394cb3943692f6547231d6f6d214a0189847fb5dd84398,2025-02-12T15:33:02.140000 -CVE-2024-11659,0,1,feff0758fe63ea6f53a4e11e497fb9afb310f52fb6cf92c788729b416c9f77fe,2025-02-12T15:33:14.057000 +CVE-2024-11651,0,0,cec44f3b3826a002c3bc76942d1ad595ae20f3e224db724c688b3996e5fb1a6a,2025-02-12T15:33:04.513000 +CVE-2024-11652,0,0,caacbdfea328c0c43c47c3c3328fc88c5bc403f49f56c708cfeeab1a2a8ff78d,2025-02-12T15:32:54.593000 +CVE-2024-11653,0,0,12b60ca8872c73312f4aa317d6452baee1f0f4241adeaae02c8f362c7e157483,2025-02-12T15:33:07.360000 +CVE-2024-11654,0,0,2e41ecd40d167da85d8e68d46eeb3465a4ea85a15576219790bd5b19ed6e5c49,2025-02-12T15:32:56.980000 +CVE-2024-11655,0,0,259e216f1e6212d6db7898b9bb43176bc6ed5ac32efcfa7c40e1697332a96ca7,2025-02-12T15:33:09.620000 +CVE-2024-11656,0,0,202df9e981ceb4b057caed31f3094f775b1e3f6b776cbcb97854a746c3ae80fc,2025-02-12T15:32:59.883000 +CVE-2024-11657,0,0,44d0b826c4f6eb6824a07f05f5f0cf6cd650d559299918832f1a01de5a3497de,2025-02-12T15:33:12.003000 +CVE-2024-11658,0,0,94cbaf807b1e36ff9a394cb3943692f6547231d6f6d214a0189847fb5dd84398,2025-02-12T15:33:02.140000 +CVE-2024-11659,0,0,feff0758fe63ea6f53a4e11e497fb9afb310f52fb6cf92c788729b416c9f77fe,2025-02-12T15:33:14.057000 CVE-2024-1166,0,0,9a4043bccbd810fe27a7f1e35eefa8a5ff4605f22a20be37f65eb257e1506a5a,2024-11-21T08:49:56.773000 CVE-2024-11660,0,0,c69038363011e72870bf05ba1b77807b46b410512f645c7de24fbe53640bca7c,2024-12-04T17:49:09.103000 CVE-2024-11661,0,0,245f7af368d483b99968c06f6626bb5531f9195deb8e8301e7998f114936ec1c,2024-12-04T18:41:52.773000 @@ -245325,7 +245327,7 @@ CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669 CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000 CVE-2024-12083,0,0,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753fb3,2025-01-14T01:15:09.267000 CVE-2024-12084,0,0,85dd725fc2f0b24c79e999378b1f0199fad5fe5d164b31609c57a84bcb434c0d,2025-01-15T15:15:10.537000 -CVE-2024-12085,0,0,290493b020c095e484ca4f2d43a8e9f354fc0ac2357c6c5251abd71e2c80d434,2025-02-12T04:15:08.523000 +CVE-2024-12085,0,1,4142d9b40f36054f951aae1c16d1df95d4e983f41f1706d8c0f0e49c9524ea69,2025-02-12T18:15:20.823000 CVE-2024-12086,0,0,e5130c03152639985c3e2f822b45f241716bd573825b1ce309364a23fc10467b,2025-01-14T22:15:26.370000 CVE-2024-12087,0,0,083db16c2a7b9baa1b397fd2cd269bff2aa8f7c2646d1851d134f1f8a052e34a,2025-01-14T22:15:26.503000 CVE-2024-12088,0,0,43a2123ff1daddac120d556957600405449568b28a84ca944004ee72fa7fff31,2025-02-10T12:15:28.537000 @@ -245476,7 +245478,7 @@ CVE-2024-12248,0,0,e7cdbc5747de6d45abf0c689b43595399b382712b0a5e35e02147e9a51288 CVE-2024-12249,0,0,e2547863ff0e51895fdd9ac079296565876947375b7269d971dfde5e35972170,2025-01-09T11:15:12.683000 CVE-2024-1225,0,0,1335eabc5dc5752fbd7f31a11bdeda2f1be9be2c21abaca809140eabb8940f2a,2024-11-21T08:50:05.673000 CVE-2024-12250,0,0,e5f748db33ee246e1110b31eaf24b071ff8e9ad960657a91bc37454c3187e14e,2024-12-18T04:15:07.657000 -CVE-2024-12251,1,1,a7e8f48e925dc3d26a8ab48e5a089f2a8baa40b5e154b9242b9d105f912d40a8,2025-02-12T15:15:12.370000 +CVE-2024-12251,0,0,a7e8f48e925dc3d26a8ab48e5a089f2a8baa40b5e154b9242b9d105f912d40a8,2025-02-12T15:15:12.370000 CVE-2024-12252,0,0,f0cb19f49810803840f5ee985f8df8513974df82162830a7e3c14eaee14d9385,2025-01-07T05:15:16.660000 CVE-2024-12253,0,0,ddc85ae180bc30a65db67a43f7fe8d6c4299882333782166c00f6946fb3a98d4,2024-12-07T10:15:06.030000 CVE-2024-12254,0,0,3280f773a0ae5e7bd29340849e7be011f89e7cf22544cd6c884ec0f5814a1b90,2025-02-03T18:15:33.110000 @@ -245533,7 +245535,7 @@ CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654f CVE-2024-12311,0,0,3af6eab31cd30d4c0065a32bdb34b2964678187eb437151de7a1f6c0c5de09e2,2025-01-06T14:15:08.153000 CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b6052467b,2024-12-12T07:15:10.090000 CVE-2024-12313,0,0,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000 -CVE-2024-12315,0,1,c81368421291799946c1993986f600ddb83244553db2c019eb5b39e19e5b1fb2,2025-02-12T15:15:12.527000 +CVE-2024-12315,0,0,c81368421291799946c1993986f600ddb83244553db2c019eb5b39e19e5b1fb2,2025-02-12T15:15:12.527000 CVE-2024-12316,0,0,eca8691c5b3893d514ca6edc1aa6f96dd65d6266b3ab54367da0968d84fc6712,2025-01-22T17:16:27.977000 CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000 CVE-2024-12320,0,0,4634e0ec62d582413588701c85691767f88539a726ad91381c2adf94162c1cd5,2025-01-31T18:25:31.050000 @@ -245589,7 +245591,7 @@ CVE-2024-12370,0,0,d98e18bb49c3fbc75f1f7f6601e58a6353c9748a641846c6cbd7e3ecbf6b2 CVE-2024-12371,0,0,ad8806dfee353fdb9887f497d244b3ccfcec0ca669e819f5ec6c72aa1dddd27b,2024-12-18T20:15:21.193000 CVE-2024-12372,0,0,61d0814cd7351773a7f17ecab5c027fade58fdedeaf091e4269b15064d9c21b9,2024-12-18T20:15:22.167000 CVE-2024-12373,0,0,83b846beefe400aa9231cc84fd600de52fbf3fd7f422b967ec41c6b980048087,2024-12-18T20:15:22.280000 -CVE-2024-12379,1,1,7c6f0d0b2f16fe5189aa74951fea66b9c06c08bd48b3a0d0b83c0a9d5d2e2dd4,2025-02-12T15:15:12.707000 +CVE-2024-12379,0,0,7c6f0d0b2f16fe5189aa74951fea66b9c06c08bd48b3a0d0b83c0a9d5d2e2dd4,2025-02-12T15:15:12.707000 CVE-2024-1238,0,0,5414902a0008d4afb8cb32eb99f42faf6e277ff4edad81d014f1587296eaac4f,2025-01-16T21:19:46.607000 CVE-2024-12381,0,0,68b33f6b694aa45ef73ff06945e737e58ccb7b1c7ea2cfeb4d826136c48b3d1f,2024-12-13T19:25:33.143000 CVE-2024-12382,0,0,f70294886a1865641a484753f3298929660ab1bd7002caff75777615f01f2e87,2024-12-13T19:24:25.137000 @@ -245808,7 +245810,7 @@ CVE-2024-12624,0,0,5e7ff0728298740b51bc71547c6153c6f49e2311f395bfc0566af7f460143 CVE-2024-12626,0,0,dc01f58442ef4eb4425488c755c4a1d0852a1ed618c4541c829e9e2584781b84,2024-12-19T12:15:06.160000 CVE-2024-12627,0,0,022af0cec2036ad3cef4dfbe1da5009a76ffbe6b2f826e6feb835dd2d0810966,2025-01-11T03:15:21.587000 CVE-2024-12628,0,0,f48463b1ecdc4a2ff76d188b8ae44a2e0e32ef1e929dc806ea33e24839d1432f,2024-12-14T07:15:07.213000 -CVE-2024-12629,1,1,ec3e1b882941cc355ab466f5080549c5df178dc523a474039dc4ac567a86a536,2025-02-12T16:15:39.810000 +CVE-2024-12629,0,0,ec3e1b882941cc355ab466f5080549c5df178dc523a474039dc4ac567a86a536,2025-02-12T16:15:39.810000 CVE-2024-1263,0,0,1ded99eb7dd7c25043d30fb557b1a5799a79150045deb56dc782cc48f4b0c898,2024-11-21T08:50:11.303000 CVE-2024-12632,0,0,b2981d9ae0d79f88557270498f7d8919df56f26fc08631dba371165f9d0f4233,2024-12-13T21:15:09.317000 CVE-2024-12633,0,0,aa2de65b34cad526fad2ad4462ad560794d8e7fd2121b7b4323cbcbfceffb766,2025-01-07T06:15:17.417000 @@ -246417,7 +246419,7 @@ CVE-2024-13356,0,0,4c62ebf770eb8ffd31345cb0ef6c5025a9e134a147f2b545dcf049e579341 CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000 CVE-2024-13360,0,0,42c7ef7264873842b1b321dcb1d9eb02287e4b9dd082710569d0b72683473221,2025-01-24T18:58:46.177000 CVE-2024-13361,0,0,796ae81aa903e35e91be1aa59cd637cc5eee53bc205bb2f1ae10309102da0980,2025-01-24T18:55:22.577000 -CVE-2024-13365,0,1,f75700e6ee33a9e00b3278e7bccc8d0b2f27b23b1f758ef9ab41966511ac111b,2025-02-12T15:15:12.860000 +CVE-2024-13365,0,0,f75700e6ee33a9e00b3278e7bccc8d0b2f27b23b1f758ef9ab41966511ac111b,2025-02-12T15:15:12.860000 CVE-2024-13366,0,0,4b12bd5212b118d30ff048db445e6d1c00e6cad223533401dbdc6a341b0a882c,2025-01-17T07:15:26.947000 CVE-2024-13367,0,0,28bc518effbeac20d5854322c01ceb858440caae6a5bae49591369a0a18ef4cb,2025-01-17T07:15:27.123000 CVE-2024-13368,0,0,dbbfa255c3d339e91eb07214cc7014e309e9bdb61391ed3e68917c31e101db69,2025-02-04T19:39:27.553000 @@ -246468,7 +246470,7 @@ CVE-2024-1343,0,0,7c2447499342d3573955d9e9545316db90429adf3b266826e2ed2754189f07 CVE-2024-13432,0,0,2420e31f27384cf3a3b972e6593316283200b18cb659242a854ce1e6ee4aeb4a,2025-01-18T07:15:08.983000 CVE-2024-13433,0,0,2a9d89514e9ca62330f67417cbd4f0a14554f70d781af736185219d7398dc564,2025-01-18T07:15:09.160000 CVE-2024-13434,0,0,292fbae0324c9bc0e0a4304860c64d8e4dabea0f0444b12419bd12eebd083320,2025-01-17T05:15:09.290000 -CVE-2024-13435,0,1,6836fa547d4932c702deb0657bdaa23c9b9d93c4dd8c924aedac3276df2cc3ed,2025-02-12T15:15:13.093000 +CVE-2024-13435,0,0,6836fa547d4932c702deb0657bdaa23c9b9d93c4dd8c924aedac3276df2cc3ed,2025-02-12T15:15:13.093000 CVE-2024-13437,0,0,503d6adff5da567fee536ffb324a5ccc786c3d759f53a9923743108aaa32218f,2025-02-12T10:15:10.920000 CVE-2024-1344,0,0,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000 CVE-2024-13440,0,0,549e7c3669e086bd81446d9710c683b16be57d85613f91aefe2f2a123a5522db,2025-02-11T18:02:02.523000 @@ -246493,12 +246495,12 @@ CVE-2024-13467,0,0,923a38005e4f33b4b00ab497e7b9124480dbc307e6f66ebdda4f5013f61f8 CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000 CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000 CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000 -CVE-2024-13473,0,1,0f99b6e2c0673e2e27c424ad6afa1fbe1c67cf81cd73e5628ef39646bf0f2643,2025-02-12T15:15:13.270000 +CVE-2024-13473,0,0,0f99b6e2c0673e2e27c424ad6afa1fbe1c67cf81cd73e5628ef39646bf0f2643,2025-02-12T15:15:13.270000 CVE-2024-13475,0,0,58d8b87c302e2e66d53481676d4898485dca464c18876016c693f276944834c7,2025-02-12T10:15:11.777000 CVE-2024-13477,0,0,5921551f3a00d1e0f2abcb662326962b5a9eabe718bfa89afb4754cf920a7cfe,2025-02-12T12:15:28.660000 CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000 CVE-2024-13480,0,0,d49c8370e7e39b031003ed9c57a49bfdefc2c8a040e71164a34ff996e4336b26,2025-02-12T12:15:28.840000 -CVE-2024-13484,0,0,b509d432b9417c6dc7770eef09b6babb2b5c674097e16fc65cdfc3ab8c5eaf0d,2025-01-28T19:15:13.753000 +CVE-2024-13484,0,1,4fd55912c77d8dadbebe472ff2c71e4e3fb03970b04450aedc08c21b110060a9,2025-02-12T17:15:23.177000 CVE-2024-13487,0,0,e42f90a861119fddb567fba0eb7966e50fcc402fe16882839f676096df9b809f,2025-02-06T15:15:12.660000 CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000 CVE-2024-13490,0,0,61b1110e3ea573589f69702404cb2c4dc6b4f345244280cfa5a3ba73763f2bda,2025-02-12T10:15:11.973000 @@ -246633,7 +246635,7 @@ CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c CVE-2024-13775,0,0,1960bdf058198508440d85f951a3bd6116d9785e359b0700d7138122fee08aaa,2025-02-01T13:15:22.847000 CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000 CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000 -CVE-2024-13794,0,1,ba7ef0fca3cc69b7258b8ab7e3c3de5879491f3f931ecafb8b722ee17f4e0d5f,2025-02-12T15:15:14.040000 +CVE-2024-13794,0,0,ba7ef0fca3cc69b7258b8ab7e3c3de5879491f3f931ecafb8b722ee17f4e0d5f,2025-02-12T15:15:14.040000 CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000 CVE-2024-13800,0,0,d24862aeca571805a2d7558bc0f1c00468e4df7532225a53769a89d86c445f41,2025-02-12T05:15:12.810000 CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000 @@ -246641,7 +246643,7 @@ CVE-2024-13813,0,0,6191208acb6a8a8377d4636aded0b7fea86db6b2ce6012bae163079aa1f69 CVE-2024-13814,0,0,66e4c5f712d0d3cac700cf324f2c7529d43feaa35c8e1c5e7d866503db95b7b9,2025-02-12T09:15:08.433000 CVE-2024-13817,0,0,b5a69d8e5693042f6213842e77c8ea5e9adad031b258d4d25f98e0b0bd22c27b,2025-01-31T03:15:10.910000 CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a5e,2025-01-21T17:04:33.737000 -CVE-2024-13821,0,1,5b1ee3d380f6761fb93008f96f770c5f4e5b232778bb2785f2bf8699e79c82fa,2025-02-12T15:15:14.643000 +CVE-2024-13821,0,0,5b1ee3d380f6761fb93008f96f770c5f4e5b232778bb2785f2bf8699e79c82fa,2025-02-12T15:15:14.643000 CVE-2024-13829,0,0,b39aa81be1f98cadde5a8564db1794206153bbf387222b17a1b12873f0417acd,2025-02-05T06:15:31.257000 CVE-2024-1383,0,0,59b5f34a837fb68b850c9929786dc2e35071d4c4d7ba3d2784cb584749f9b1cc,2024-11-21T08:50:27.733000 CVE-2024-13830,0,0,134f69652329a8366ec7bf0f4f83ab58cf4e0130ba5b293cb74aa2d647f91906,2025-02-11T16:15:39.363000 @@ -246891,11 +246893,11 @@ CVE-2024-1643,0,0,23a51e500cbbb14eb0edb6213fdbe45992476107d29301a7ac00c541a39901 CVE-2024-1644,0,0,2a0c9bedb7077c42744b0cff4622252c578909ba72cfa38faa02c26586371ff9,2024-12-31T14:30:42.993000 CVE-2024-1645,0,0,03699ee0a8ad7836aa080c25f42b206191e3cf9bd749532c452b30589acf9403,2025-01-21T21:12:54.303000 CVE-2024-1646,0,0,5059540515ce7eb8ae68b15c4eec4ff01ea4b884936486b4b6938c6175d66543,2024-11-21T08:50:59.783000 -CVE-2024-1647,0,0,61673824377e23ed6345f1ce2d3e2dfdab70aa35a8f57fa1b19d6f80febcb2a6,2024-11-21T08:50:59.913000 -CVE-2024-1648,0,0,2b4f9a5bdbbf930dc831a0e6d825e26f3a96b82a0b421ea9c358197a954b7d5c,2024-11-21T08:51:00.050000 +CVE-2024-1647,0,1,ce3be4d8f821f4e1fd6329d319e1ff7d0d27b99ae4ab9eb68d5e807b4d2ce373,2025-02-12T17:03:00.353000 +CVE-2024-1648,0,1,da66215f0c1df2164f9c9e7cbd2a1f4fa1555fadd6639c29f46419bca874d0aa,2025-02-12T17:02:43.703000 CVE-2024-1649,0,0,3995ef5fb459ded8b32a8890e4aedac63a2bb4749fed72dad67aa0191b67d631,2025-01-07T14:36:30.327000 CVE-2024-1650,0,0,a441a3234d4bc9bc6df0346100d67472c50763d928aa51d268163520dd5dbd9b,2025-01-07T14:36:06.543000 -CVE-2024-1651,0,0,5d867065b6520914234c08e56047b2c3524274d1d50f6d2426485c19557f2347,2024-11-21T08:51:00.427000 +CVE-2024-1651,0,1,1c5d4820fb340a2e16582ccac4fd46e85bee196ca0ea8c92b226a31374278919,2025-02-12T17:26:55.357000 CVE-2024-1652,0,0,829bcc0f42952653b751f2d0736178c6da73db354164e04de9820967c5b12004,2025-01-07T14:35:51.790000 CVE-2024-1653,0,0,843379e89a7c6c95fda1d9fc2d8d8cab9b032046e1a3d3596acecdfc83105f99,2025-01-07T14:35:33.360000 CVE-2024-1654,0,0,54b765485da31e34b294f618921ee811c38caafb34113ca3e291e29f9af89fc8,2025-01-23T20:29:56.217000 @@ -246941,8 +246943,8 @@ CVE-2024-1695,0,0,1c5d560e9ce5c3fae0cb5230e680f68a2aeca2413e77781d5be99ab374e415 CVE-2024-1696,0,0,96c8303e535001c6c5d3b6e14d30079b9651c70dc730972b738df81a8696b09e,2024-11-21T08:51:06.550000 CVE-2024-1697,0,0,c470a81452f09db0e40146053a7ca6ac44c10328d8eb381864ced3a9cc5f2c2e,2024-11-21T08:51:06.673000 CVE-2024-1698,0,0,a3817713801dcdd2b6948f039ebd5bf82047ee39d455ae9db40460bcb81f0e4a,2024-11-21T08:51:06.797000 -CVE-2024-1700,0,1,8f0d5e25a0ed37b6b76a334cde88576835fdff98665e5fcb2bc1cf5f764f3feb,2025-02-12T16:58:29.373000 -CVE-2024-1701,0,1,52c8c940f190bcaa163ee22225dbff8fdb651be3e5bfa1b6f375a6ccbccb0dd9,2025-02-12T16:57:05.487000 +CVE-2024-1700,0,0,8f0d5e25a0ed37b6b76a334cde88576835fdff98665e5fcb2bc1cf5f764f3feb,2025-02-12T16:58:29.373000 +CVE-2024-1701,0,0,52c8c940f190bcaa163ee22225dbff8fdb651be3e5bfa1b6f375a6ccbccb0dd9,2025-02-12T16:57:05.487000 CVE-2024-1702,0,0,6bdc90b2a17f9cc720ccacf951a7c6fa4bbea546083aa1d1c8d973e97e935554,2025-02-12T01:01:24.223000 CVE-2024-1703,0,0,967f5b800879b74b8a5834ee2ca69d6ccd277ef7fdf67155513b4a3e4c5c9375,2025-01-03T19:11:33.877000 CVE-2024-1704,0,0,ade83be8825a88be560eefedd4a80ce29b73b997a3bc381116fac086a8487d74,2025-01-03T19:11:28.830000 @@ -248594,7 +248596,7 @@ CVE-2024-21499,0,0,20a7febdd3bb65fef9a5ce1069226a3fcfd17371685ca186693bbcb517dc7 CVE-2024-2150,0,0,11709d6f33f6feac5b4c76a551fdc402bc450d0a937559060df9be2ccc270565,2025-01-02T20:11:35.597000 CVE-2024-21500,0,0,6cd1594c4e223fc3885480361acdb48625b73f48d694e68856a788a09c0a91e8,2024-12-05T21:15:07.243000 CVE-2024-21501,0,0,199ffb3aa23fde5d8d3391df678cad4c6e4de0c519c1101051786020f9390c39,2024-11-21T08:54:33.967000 -CVE-2024-21502,0,0,13bfb4dbba7e0f85019928e2b1f11fff2d1476f6b0fc329d71644535e762af38,2024-11-21T08:54:34.130000 +CVE-2024-21502,0,1,be52d9905683ab294ba785631c963d51dec48843f6b2534015a1e7a491f02394,2025-02-12T18:49:07.160000 CVE-2024-21503,0,0,2d8b1531388019cc86e8879846b75d7a49f3eb88d43b5b3abceab313eaaaeadf,2024-11-21T08:54:34.260000 CVE-2024-21504,0,0,e8fe13dec524ef22a04084d8a5f35cc67321db6138b2eaa770aca609a0d971c4,2024-11-21T08:54:34.390000 CVE-2024-21505,0,0,cd258a182f9342ed7670a1e22721d813cf4bd00e2bd6cd8ace13997d28f4bd7f,2024-11-21T08:54:34.517000 @@ -248854,7 +248856,7 @@ CVE-2024-21781,0,0,d59df7e15b23014f9d4138f1a252e033816e99f61b74caf0305ee028075e6 CVE-2024-21782,0,0,4f8de06e6743ebde6cbaf72bb6d23ba7f75e27332e901fc90d33b8bb8c66b736,2025-01-23T19:47:50.617000 CVE-2024-21783,0,0,9cba49c73f8dcc0af2561160a017ccd14b4646aa0c3f61abaa34a051f2714ac3,2024-11-15T14:00:09.720000 CVE-2024-21784,0,0,271e66d21546e397c2fae271ef065731034c6a3dc48722d555b9bd3eaefcc535,2024-08-14T17:49:14.177000 -CVE-2024-21785,0,0,9a6462e1a4ec679c404234f546462fc2ccedea4788076efb9e4346caa9449e05,2024-11-21T08:55:00.023000 +CVE-2024-21785,0,1,e29865f9e1a8a126c33e02e8da3190e6069c20b6049cc191e536763b8b42bc66,2025-02-12T17:30:02.237000 CVE-2024-21786,0,0,039443c05be587e2aee9be6d7e79e0ba6731ca972b370ba09a7ba630a00d5c5b,2024-12-18T15:06:28.230000 CVE-2024-21787,0,0,02b845fa11d30ef4d6b5248b543c263f9946579e27a5baee61af2daa73424f03,2024-08-14T17:49:14.177000 CVE-2024-21788,0,0,f21ccb1172a6a8490c8a7b23f6c8d3d4723479a27173c2b0f3aa3cc6253ab6f9,2025-01-23T18:35:52.080000 @@ -248871,7 +248873,7 @@ CVE-2024-21798,0,0,0013a211906810d6a9ef53bb3a7f3e21ae41fb033181626567e3d35b7b648 CVE-2024-21799,0,0,15906d985cb5ed1d7fccea8b16ef3741436370664b5830f39616cb04a191e031,2024-11-15T14:00:09.720000 CVE-2024-2180,0,0,b0ddbddaee48d18516d8a257bcbf4491e4e7da2666636df6bb4eea526dd6362d,2025-01-23T19:21:38.040000 CVE-2024-21801,0,0,a8c56141177a7c46a240198629bbb40acbee9f30928445abc53b9c9d5a4f89b4,2024-08-14T17:49:14.177000 -CVE-2024-21802,0,0,6e575bd02a9f26f6a681b03e9d0e6ed519cdd94831e127350ecb1b6d823ded59,2024-11-21T08:55:01.783000 +CVE-2024-21802,0,1,e099568cb4710de6cce90947894ef2bdeea21f3297cc90676f7673917f865019,2025-02-12T18:48:44.720000 CVE-2024-21803,0,0,b9eb989fe5eaec1aa8e4c7ecff68cc889d999bf0f791c530521d0b2363b7095e,2024-11-21T08:55:01.910000 CVE-2024-21805,0,0,78da5cddaa000cadbfc8c97e4677a4a341010cf31e46cdb8666986000b870197,2024-11-21T08:55:02.057000 CVE-2024-21806,0,0,76d4e18b277b03f4ae237a28217dbc1a6a11559f17846f037fef87ba1a7f83ba,2024-08-14T17:49:14.177000 @@ -248891,7 +248893,7 @@ CVE-2024-21820,0,0,8569b92c96b1fa6630eb92e0d683a279af08c00c24a2c76325143fbdaaeba CVE-2024-21821,0,0,e0fb40291da6cae1bea7b8e89e535a0731cdb68b15496d2df71004049278fd12,2024-11-21T08:55:03.880000 CVE-2024-21823,0,0,97a87f9b84abedcad845f4b0617dd3954cceb132a3f8741956e077262ffad213,2024-11-21T08:55:04.043000 CVE-2024-21824,0,0,0b5a6444166cb8b51dc4196d734284a8f25007cfb799306fb045c9509746a0bb,2024-11-21T08:55:04.223000 -CVE-2024-21825,0,0,53f3d60323b48742e07fadf549463823b309ba52745431504a2d29cdc81ce4f6,2024-11-21T08:55:04.440000 +CVE-2024-21825,0,1,89b560555a63faeca668965a51e2cca439fa98ed44e92908926542be6b4affd2,2025-02-12T18:47:51.477000 CVE-2024-21826,0,0,b0efc7f5a4c22e53138a44b26d2cc499c807e8e037949a506587f328c4ccae52,2024-12-16T20:00:03.550000 CVE-2024-21827,0,0,c36386bd432c8750e8234f9244bc193acdc52668f3a181b754e89d9943e1c8e0,2024-11-21T08:55:04.703000 CVE-2024-21828,0,0,b164b76bc7cd799a77840173af04b2a57766f14977ac417f1dd4a3e0cffb84c1,2024-11-21T08:55:04.850000 @@ -248902,7 +248904,7 @@ CVE-2024-21832,0,0,a543193ce14a2f6105c329e10215b4a1a984fbb7cf333eb98ef6c70d95fdb CVE-2024-21833,0,0,5474c8e97495795e56bb5529245d9c4477df95df31071d5afcbaf12bbac86e23,2024-11-21T08:55:05.320000 CVE-2024-21834,0,0,aba5ecdbe6fdbff707907f54f191da45860fa668c1ffa6152c0ea4e0ceacebca,2025-01-02T19:13:29.017000 CVE-2024-21835,0,0,5ca067d858621cfd38789265a3fcddae8684932d6a7c154737e5c2eccf5ad481,2024-11-21T08:55:05.610000 -CVE-2024-21836,0,0,e88af3400ff3424f7f8c555ab05b9703c4631aecd39cbbe5cfd2b7581a0399cc,2024-11-21T08:55:05.760000 +CVE-2024-21836,0,1,628be24a79c7d16caac7a48cb70875a3d888e305ae34e0d62eff9c8804ae1402,2025-02-12T18:53:55.033000 CVE-2024-21837,0,0,71f7abc838656a9c79c8fa7b732ccc7b5e4b357ba54c21e9fc22a0ecd879c129,2025-01-28T17:40:57.187000 CVE-2024-21838,0,0,eb02b2a4b63fa338a56cbcb098d028fc6a4ce0a81ee69030bfb1ab977cce2a92,2025-02-10T22:33:35.600000 CVE-2024-2184,0,0,9e5c40c8a32d1851a954f24d7355c1d9d3bac3a50d336011aa25e72d44ef35b7,2024-11-21T09:09:12.673000 @@ -248948,8 +248950,8 @@ CVE-2024-21887,0,0,909c400ff9d3033f67611ba21426d1ac5bf861c401d35225cb9cdd824badd CVE-2024-21888,0,0,b45f885651aff86683860af6eb8a8226cada34955674ec263b53ac2cbb747474,2024-11-21T08:55:11.993000 CVE-2024-2189,0,0,7ea3e523e8b9e6befbc8a00f5933ce691dcd1de1f6fc8d37f688f1333e38d41b,2024-11-21T09:09:13.347000 CVE-2024-21890,0,0,9ae110de2e6967c7a92f074f40cb8816fc9b5a0773b7f387b9e2d10a53376472,2025-02-12T14:59:58.097000 -CVE-2024-21891,0,1,62ec1c603b63b08282bd5fb8136eec0bd40174e5a4f0327deb69e13e1763f1ff,2025-02-12T15:08:32.153000 -CVE-2024-21892,0,1,0cb6658e08e730ed7964a71f13f7f2146d8aa15793c4cfb2835baa2ff6f03c60,2025-02-12T15:17:34.380000 +CVE-2024-21891,0,0,62ec1c603b63b08282bd5fb8136eec0bd40174e5a4f0327deb69e13e1763f1ff,2025-02-12T15:08:32.153000 +CVE-2024-21892,0,0,0cb6658e08e730ed7964a71f13f7f2146d8aa15793c4cfb2835baa2ff6f03c60,2025-02-12T15:17:34.380000 CVE-2024-21893,0,0,e526f17c4117b0594f892986704f00492d28f916b3e77a051a630f156948cf6b,2024-11-29T15:16:27.133000 CVE-2024-21894,0,0,0b9731024268f26061f06647376dec3d7f52d89500321a515bc8935c7738b3d8,2024-11-21T08:55:12.850000 CVE-2024-21896,0,0,c42b18c0164cd2c45352301f68f85218002e7e90074c3bedfb3af8d8f8061b1d,2024-11-21T08:55:13.107000 @@ -249183,12 +249185,12 @@ CVE-2024-22178,0,0,71254f623e00d5bb1e48d1af2784efb3046cf43ad2784e78ba9346e70b884 CVE-2024-22179,0,0,2b801faed759802b573f8a221bc335b3eb337f69cc84bd6f5d1a06164391d29b,2024-11-21T08:55:44.090000 CVE-2024-2218,0,0,424b1f62fd21e878c4d4af5731bddc2a60c6650d7ec1735a477b3efcab867815,2024-11-21T09:09:16.947000 CVE-2024-22180,0,0,eec6899847f68fcb904a1e50563ead2d05a754b9499da5083b6d7294326fa5fb,2025-01-27T17:58:03.073000 -CVE-2024-22181,0,1,42d6ef95e1add67f3139e90fb60d112a5bee36e3e7aafdfed106763fd11687e2,2025-02-12T16:15:53.237000 +CVE-2024-22181,0,0,42d6ef95e1add67f3139e90fb60d112a5bee36e3e7aafdfed106763fd11687e2,2025-02-12T16:15:53.237000 CVE-2024-22182,0,0,7ac8d878e2d4ca5a283cc9615664edc83ce6d44c467cc8255966406901629afc,2024-11-21T08:55:44.573000 CVE-2024-22184,0,0,b3abf3b3b4e6aac3413b6743bb34a9eb63531951dbfdb58ebc8d0dead3eb9c34,2025-02-04T18:34:23.990000 CVE-2024-22185,0,0,85f91f379b4d59a41a27787f13eaff968636790e8e661ef463dd204a3c8d0bcf,2024-11-15T14:00:09.720000 CVE-2024-22186,0,0,4bb94aa91f9890f5837e92c63eced8f9687c5362fd26bac1064cc79bea12c7fc,2024-11-21T08:55:44.987000 -CVE-2024-22187,0,0,947aa56814fe8b16e5fffe2cb8e8a640149c0d34f9fba0378717f44bea5278c5,2024-11-21T08:55:45.137000 +CVE-2024-22187,0,1,2260b4341272c513edb563dbdf4970ccfb2ccc417e47317a708b11e2494ca509,2025-02-12T17:30:21.533000 CVE-2024-22188,0,0,fc57b181d868c9861fa392b9be51d5a5b1ac48a7fd624418e4d9961a1ace3c2d,2024-11-21T08:55:45.287000 CVE-2024-22189,0,0,a311a8c038638b1f370c52f7ca314d690b879609b96d9aeb4e77cc6abfbbd504,2024-11-21T08:55:45.517000 CVE-2024-22190,0,0,f5cf99c61e6d1afaacf99881a950a9480e0abe8182c1d5df5d78342cf1630b72,2024-11-21T08:55:45.660000 @@ -249237,7 +249239,7 @@ CVE-2024-22231,0,0,00d24777816f67af654168cfcd3ff75468e6779ec207c4463e3916155d2ce CVE-2024-22232,0,0,a58028fb899c58165e782bc20cdfb8e2eabeb083b6ccc045cb5ef6797325f51c,2024-11-21T08:55:51.217000 CVE-2024-22233,0,0,6b84f90a4974331ef0294bb64a8abd7145b43be907362a87a8d5c72bf99f79d0,2024-11-21T08:55:51.347000 CVE-2024-22234,0,0,81c502559f4ee286e35f7f530da1c13f7af490615612d02221903f6ed05e03de,2024-11-21T08:55:51.493000 -CVE-2024-22235,0,1,005a0b50c895e46cf18c49b9029038935bad06fd6e0d412045a501945d6825be,2025-02-12T16:59:46.897000 +CVE-2024-22235,0,0,005a0b50c895e46cf18c49b9029038935bad06fd6e0d412045a501945d6825be,2025-02-12T16:59:46.897000 CVE-2024-22236,0,0,7a7a3e4ac4db4b451767224de6cb82094287c63ab888364cf9711bfcc5f9020f,2024-11-21T08:55:51.770000 CVE-2024-22237,0,0,8988002ac236d4e397c5988a00f219e4b57a88835084054c4efc993ea2b0cf14,2024-11-21T08:55:51.907000 CVE-2024-22238,0,0,e6819e36f5374d23fb71e862817cd3a024dd1ba4a6dafba26ae763447bcf1c0c,2024-11-21T08:55:52.037000 @@ -249460,7 +249462,7 @@ CVE-2024-22463,0,0,d7d862658e3c45f198827763f0f948786983de80b86774f7ea7e7d6abb7a0 CVE-2024-22464,0,0,89df0e10ef44510a8e5904e121c14fc7d7fe04dd8b75af148ba79e6d8aedebac,2024-11-21T08:56:20.280000 CVE-2024-2247,0,0,0ca7d7b7e23609e28e1499a00333ba2939a4606a46ffba5afb79df586f8f7777,2024-11-21T09:09:20.660000 CVE-2024-22472,0,0,cee1f8bd8d53e1f58b74d1b8778f6d5e5846827b53d5cb2194a2b8f2a34bd2ce,2024-11-21T08:56:20.427000 -CVE-2024-22473,0,1,4dee5095e8e11f9692d626fb0e99aba9ecf1bf87d14f8fa1c7018112ef2c5654,2025-02-12T16:52:42.397000 +CVE-2024-22473,0,0,4dee5095e8e11f9692d626fb0e99aba9ecf1bf87d14f8fa1c7018112ef2c5654,2025-02-12T16:52:42.397000 CVE-2024-22475,0,0,b9326cef104e527ebece5a44b8410430ec6ba360374b1b63130781d3fcf25c66,2024-11-21T08:56:20.717000 CVE-2024-22476,0,0,f03934f35360b7025b245717a358830a1748bf912d6afda43db399901cec9280,2024-11-21T08:56:20.933000 CVE-2024-22477,0,0,b8509029d5ec6a4381b6e6bd33da7f50735c23e01284aa814f384a92dcb70695,2024-11-21T08:56:21.077000 @@ -249920,7 +249922,7 @@ CVE-2024-23310,0,0,0b899446194e92b3aba68888de9ede36a30a6a2b6574ab815eecfdd15bf8d CVE-2024-23312,0,0,c66457950e92c000c52798147d176b50f5cb337e36e1eeeef424a02e12bbfb36,2024-11-15T14:00:09.720000 CVE-2024-23313,0,0,314036267a9a855bc9ef168dd544f783cf33a389caaab6bf2129f4e7b0ecb649,2025-01-22T15:30:48.677000 CVE-2024-23314,0,0,13e8827790917d56bb8428dcbde7fc44825a3529fd30c6c0b90305086bd0d66e,2025-01-23T19:52:38.097000 -CVE-2024-23315,0,0,7d1dc70c2077c35cd6479c6b1655e6667530eb2dca011d25832e4c199f02224f,2024-11-21T08:57:29.267000 +CVE-2024-23315,0,1,6630af8c3795df27efd4f30522cf209ebe403cba299e266ba12f2fc3668aa163,2025-02-12T17:30:29.620000 CVE-2024-23316,0,0,f991e4d2bfc533226809c990c7070963c80c9a8181a0ab46cecdef9ea8914294,2024-11-21T08:57:29.393000 CVE-2024-23317,0,0,e6b9da68990e4912ca91ef806a26a48f43c274564774fe76fbd2dacd1f40fbb3,2024-11-21T08:57:29.543000 CVE-2024-23319,0,0,cb939b1af27706b0b9d965b80fff3b0b48221e1917b0fb384d70e0953046b7a0,2024-11-21T08:57:29.683000 @@ -249984,7 +249986,7 @@ CVE-2024-23376,0,0,0cc779f80c19a11eb1a30cd9f5f91ff7c8407808f5ec64714cc981ec803d7 CVE-2024-23377,0,0,bce494f94080966abd252524c8e94fef027378ea35a6a1a9fb0dfdba152f3cd2,2024-11-07T19:59:06.997000 CVE-2024-23378,0,0,fca4266969c98a385338350bf287c1f8abbe4c04028e35e20fa31a2b61afbd7a,2024-10-16T20:00:29.503000 CVE-2024-23379,0,0,a6fcb1d2e5ab8a273d05660dd251072147a7d7f1a6aa011467a709909da01deb,2024-10-16T19:58:40.227000 -CVE-2024-2338,0,1,63ccab098d49f3f14286ede188ec00df2cf55c5c80d8cf952df967aef85e4a93,2025-02-12T16:44:27.073000 +CVE-2024-2338,0,0,63ccab098d49f3f14286ede188ec00df2cf55c5c80d8cf952df967aef85e4a93,2025-02-12T16:44:27.073000 CVE-2024-23380,0,0,aba99a59df2c2c346822eef37c8a218574268c842b84113945ebc3473932778a,2024-11-21T08:57:40.700000 CVE-2024-23381,0,0,ac25b7a14d3a0aa4ad89b202d31b44a8295413335e466d08b1510c8ed7aa8468,2024-11-26T16:41:56.927000 CVE-2024-23382,0,0,61f2bab4ac828f7bd3ba9781b55dd2dc8270538ab53136bee7503d0a574f6aa5,2024-11-26T16:42:26.457000 @@ -249995,7 +249997,7 @@ CVE-2024-23386,0,0,a7685861d3b56f97f0034695e8270bc3c8543ef05deaff79f9997b472988a CVE-2024-23387,0,0,1b53231df06e7a2d9934d39ab746c9b238609b530843b990a50d92f2690c35d9,2024-11-21T08:57:42.283000 CVE-2024-23388,0,0,1337a0df1f3253f3e8955607179c908109edef648b6bcdbe60ad3ab856f5e39b,2024-11-21T08:57:42.427000 CVE-2024-23389,0,0,1d11e622c776e9a9a50ca0ae0018ba529c3fbce33040947ad969922ea6b2982c,2025-01-01T00:15:38.047000 -CVE-2024-2339,0,1,ac38041c62ad71b9ae2a288cf0e23986d3394897591f64cbc488199047ee8c60,2025-02-12T16:44:09.467000 +CVE-2024-2339,0,0,ac38041c62ad71b9ae2a288cf0e23986d3394897591f64cbc488199047ee8c60,2025-02-12T16:44:09.467000 CVE-2024-23390,0,0,db7b254e783f1a147fc80864fc99a15ca5acacf835209b6aaca8df2c453ce819,2025-01-01T00:15:38.103000 CVE-2024-23391,0,0,d233b84b01e1aed370cebf4f94e7d7c7bd9fc32c12aa7bd1bb5ee4154c23fae6,2025-01-01T00:15:38.163000 CVE-2024-23392,0,0,feba15e5d554b5934fc8ee6e31d652ff25fcc1f2cb877bf245257f721d2e11d7,2025-01-01T00:15:38.227000 @@ -250108,7 +250110,7 @@ CVE-2024-23492,0,0,72b93e9a584dbde5d8ab0fb7df4a6ec3063f70ded2f2a29640b63af190905 CVE-2024-23493,0,0,f23dc0829aa555a40c0195eac98a1683b3d99281b1fe3b5c0b60764820081f10,2025-01-10T15:34:43.287000 CVE-2024-23494,0,0,78a0143ef70eeda681b16e5dbaf59dfc105374fb144f18ff2a49707e216b0991,2024-11-21T08:57:49.617000 CVE-2024-23495,0,0,784641c99d1c05ee8a67e1f9360adfbc5835008a814a7ce6cd17ffbf39eccba7,2024-08-31T03:38:43.080000 -CVE-2024-23496,0,0,51615d0b1eb611f158a0b5f983b8931eb0421d85bb78165a91df251e6b029a8f,2024-11-21T08:57:49.887000 +CVE-2024-23496,0,1,18e0b2256f0dbf516949e9f9e9394420252f9cdd757b8bfdc8cb5781cab32fca,2025-02-12T18:53:44.893000 CVE-2024-23497,0,0,690754b376a4f826260c5e2a1f7823688f134f93841ecc8abc87700360e9531f,2024-09-12T18:26:15.673000 CVE-2024-23499,0,0,a567f67f8a898cecf56cd3e99b45d46285aa97e9b1102b601cf155c788a0b10e,2024-09-06T20:43:04.353000 CVE-2024-2350,0,0,4f138608b38538f75ace942d9d7c41e26d39aeed0567a4de9bc6de3f94bd6d26,2024-11-21T09:09:34.270000 @@ -250187,10 +250189,10 @@ CVE-2024-23597,0,0,1138102b02798c4cf2e065c36b9c461a341ae35663c847804fe1587c612bc CVE-2024-23599,0,0,ac617dc26759d5168554de73d21ef4fa81e4b6b87aeb306b6262c136f5fad884,2024-09-16T18:03:16.707000 CVE-2024-2360,0,0,72eb16f212792366c82a04edec63da5f77102fcb5d9964442491e4a7f172eaf6,2024-11-21T09:09:35.537000 CVE-2024-23600,0,0,f34082bd9192489fa5275f7efc30e7a35fabb02eb0f67563ac353c4e36b0fe1f,2024-11-21T08:57:58.917000 -CVE-2024-23601,0,0,ca7f67f2eee0becf70f57a8dfe360cc7f33c9ee2f3cf65add8eac8273640fe0f,2024-11-21T08:57:59.050000 +CVE-2024-23601,0,1,b0d86a50e05a932ab38d83c0ccb534c3f4ebcc6506782150958246244f2f5fec,2025-02-12T17:30:39.290000 CVE-2024-23603,0,0,385cd1da19f9f814b37d46a252792eece53dc5fba36c8bad0a0244cf15993622,2025-01-23T19:52:26.203000 CVE-2024-23604,0,0,dc5cd839af33b7b3dcb48b002d81e48ae97043185456c58e26e0040b5dd4ee1e,2024-11-21T08:57:59.313000 -CVE-2024-23605,0,0,6feaaf8078973106d62b89fd77d8350c669a4c873ff6f3514aa9598da39c9a5e,2024-11-21T08:57:59.433000 +CVE-2024-23605,0,1,cd8e3ab40368127668f9babb60974a68fb7e547c58851815f7b8d252542d79e6,2025-02-12T18:53:36.843000 CVE-2024-23606,0,0,29997b26a92eb62ace56664ebd405775eb345e3afd91cb43cd5981d3cb444142,2025-01-22T14:58:56.600000 CVE-2024-23607,0,0,3fec5058d10d6cf455674d1c6284bb37392a28907ec5aace1fd1b3a1426cb5d1,2025-01-24T16:03:56.080000 CVE-2024-23608,0,0,f4f0d3dc90613d42fc8485a3197c71394b07fbc0df27981f4d6ad3675d04a364,2024-11-21T08:57:59.797000 @@ -250519,12 +250521,12 @@ CVE-2024-23941,0,0,377e40ad54a332b818df016f5e6db38286f42aa52aa09ea13a642fb9c9a22 CVE-2024-23944,0,0,52d30435d5fece2084654095f6cb22c51963787cdd07ba430e66badb23fb97d7,2024-11-21T08:58:44.067000 CVE-2024-23945,0,0,6288ec63e170b40e8b88ad06551a319a321a83698cafc7fd025d8491ff974b19,2024-12-24T02:15:05.303000 CVE-2024-23946,0,0,9c898cf09e521a2a31019dd3080db79ce9c32f7697e5321cb7301cafff4ddf89,2024-11-21T08:58:44.260000 -CVE-2024-23947,0,0,f911293c6af8cf8e2a4c71b3a16ce5c03d9ac810bd789b6ce8a33c36c29ca1c5,2024-11-21T08:58:44.480000 -CVE-2024-23948,0,0,d6d4011f0c2b673928e54c2b884e178d06b968843ed951ce2e90e73776691214,2024-11-21T08:58:44.607000 -CVE-2024-23949,0,1,d0362ae3925c21ea55d7175be64cd1f332c6f064e6790697c029261c8b73955e,2025-02-12T15:27:09.327000 +CVE-2024-23947,0,1,b601f9c0d1648014a144a57832c6f16ce538cb1ecc8876be0c31f95239777453,2025-02-12T18:43:20.107000 +CVE-2024-23948,0,1,f818a48e0ffa942e9b2ed8551122dd0e1be972d19034b433c708be70a7d5f01f,2025-02-12T18:43:24.687000 +CVE-2024-23949,0,0,d0362ae3925c21ea55d7175be64cd1f332c6f064e6790697c029261c8b73955e,2025-02-12T15:27:09.327000 CVE-2024-2395,0,0,af5ee44ed4e5a55dc7cee72e73dd87c7eca19f4fdfa76a380a7f63de620cfa5f,2025-01-22T17:38:35.133000 -CVE-2024-23950,0,1,a25694506be65627971d118ef0996de49f121864a4c393a4f64e7ed306dbe9f4,2025-02-12T15:27:11.963000 -CVE-2024-23951,0,1,2c1111104c3a80f1816366b6e03301e81b07c7121a3d81a108a46a5d9d035856,2025-02-12T15:27:18.610000 +CVE-2024-23950,0,0,a25694506be65627971d118ef0996de49f121864a4c393a4f64e7ed306dbe9f4,2025-02-12T15:27:11.963000 +CVE-2024-23951,0,0,2c1111104c3a80f1816366b6e03301e81b07c7121a3d81a108a46a5d9d035856,2025-02-12T15:27:18.610000 CVE-2024-23952,0,0,d956573f944b52b54178c073558282ca45131f0d187b6cc2538746038d148592,2024-11-21T08:58:45.077000 CVE-2024-23953,0,0,b0285d41e2da0253438aa75d630142c382c2bb0604a39903d4f79ed54be0a285,2025-01-28T18:15:37.223000 CVE-2024-23957,0,0,ccb57b4ba0507fbac13ac2445d2cac9760854f91ae7da4707e72f394ea98e263,2024-10-03T17:37:47.743000 @@ -250743,7 +250745,7 @@ CVE-2024-24398,0,0,da6cc8139652a1eee6cfae48cff7b09d25ac4ed2c5b9d657ede876b7ba90d CVE-2024-24399,0,0,bb2eddb994e88bfdb604ce903ad2971bf2fe285b9c97350eea6bcc5df32e4306,2024-11-21T08:59:14.690000 CVE-2024-2440,0,0,83378454086363d7ca4f57beb9690f64458469c3707996c259c9c7cf2668d08e,2024-11-21T09:09:45.437000 CVE-2024-24401,0,0,71e4ae3c681bf9b1d76b85f2490244760ec98ea3c8d8cb9c503af1362e66c9be,2024-11-21T08:59:14.860000 -CVE-2024-24402,0,0,25a206eeb87ea57e9f663fb4a0246c6ca0211fa91bfb24e495ccfb1d78141bae,2024-11-21T08:59:15.080000 +CVE-2024-24402,0,1,e33255ab4ae2eefa7d80d74951161493a0aae7df30d3dc4c6e44696d3b23dc1c,2025-02-12T18:53:28.123000 CVE-2024-24403,0,0,9dfd8d2383a51e07b61f370007222fc6207ac481d048277e8f500a7d8b0ad907,2024-05-01T20:15:12.510000 CVE-2024-24407,0,0,9854b2123d3cb61fbea945bc5c28ab7e9c5e67ad8f91d9c6262853438f2d5551,2024-11-21T08:59:15.243000 CVE-2024-24409,0,0,2b5b94cb6623257f634c08bd886ff97512dff9af22f16e80107479043a99a530,2024-11-13T20:35:44.963000 @@ -250984,8 +250986,8 @@ CVE-2024-2479,0,0,2fb1fd55feb7e72408dd6a3d54c9d1ec428f0054935334decf5dffe5280da6 CVE-2024-24790,0,0,1c6c25def6e78137e3fb9fe340e439c2b615f5bfed064f7d15771b9d1ca4b970,2024-11-21T08:59:42.813000 CVE-2024-24791,0,0,95d350869c872f634399877990d9006caf3f157c76eb6cacc64ce604dd72219a,2024-11-21T08:59:43.013000 CVE-2024-24792,0,0,7b793717714ca10458ebd040909b1ee6238d58e113a3e42e27b0e683446e6b97,2024-11-21T08:59:43.203000 -CVE-2024-24793,0,0,330a435b2c4cfe0dc5ea5742aa7f19938902f1d0f885674e5c4fc52d950668eb,2024-11-21T08:59:43.383000 -CVE-2024-24794,0,0,beb2d0a169ca80e2355f59f9dded11bae2f694ca80173c0cd7cb35fc39f7e1f0,2024-11-21T08:59:43.507000 +CVE-2024-24793,0,1,ddeab196cf29ea2576ffe5967ee0cbfcfdb2f491fbf779712be80cc335bac735,2025-02-12T18:52:00.803000 +CVE-2024-24794,0,1,b8857417498fb54ab9a65a75d388bc5ab2a3c65883d320d379a005f653654e7d,2025-02-12T18:51:15.867000 CVE-2024-24795,0,0,2da97a6e56c40203aadd88660348ec99ae7b68424772c3720e921ac678e728f1,2024-11-21T08:59:43.633000 CVE-2024-24796,0,0,936f569a4e34fb4d4aac1ba450fe67ab1232609d0c0323046d33e8e209938b91,2024-11-21T08:59:43.837000 CVE-2024-24797,0,0,067d8188b693e0ee4b12c52f8b196bfe51310c68f65d14af22bddd959f943a34,2024-11-21T08:59:43.973000 @@ -251047,7 +251049,7 @@ CVE-2024-24848,0,0,4c111a7b3bda17b2f7f0cb61fe7135433ebc8ceeb9bdbd4e678bce0337cec CVE-2024-24849,0,0,d6fa97d34a9f8ee5cd27ec0b205f20369d7c9f2e74bdce13f8ada0b878beff1f,2024-11-21T08:59:50.900000 CVE-2024-2485,0,0,adb1797256b1beed5858dfc25960a724942db9de19f1b038e5acd84a4e61c2a0,2025-01-14T15:04:40.223000 CVE-2024-24850,0,0,358a48632f493dca7103f0e0c7ddd1ca29e6043f56e8ec4ac8435732328792c6,2024-11-21T08:59:51.027000 -CVE-2024-24851,0,0,0af01cccd5009edcfbf596bc6c7612cbe1de8955aa2312b9f4aaa3ac5422299b,2024-11-21T08:59:51.157000 +CVE-2024-24851,0,1,8a0de2d372cc00e0501058469de2ba4c4c3dd1c300c2bacaa49d22d23637a75b,2025-02-12T17:30:47.617000 CVE-2024-24853,0,0,cabcc981e6fa2d934ba79408b0a2d2dcaaaa86c51cc576fd027cf73ab1548003,2024-08-14T17:49:14.177000 CVE-2024-24855,0,0,2d2cc7e7d5fb06a33f26ef44e1f1e7a2395fd03f1ba9c19687037bbddaf43e03,2024-11-21T08:59:51.400000 CVE-2024-24856,0,0,edb9e16ab701f1d81ac7cd6a8857e1142fec8ecd54bd3157273d221937841e28,2024-11-21T08:59:51.540000 @@ -251138,18 +251140,18 @@ CVE-2024-24941,0,0,fa0d1586eeb626539cff2e8bf22b728aa85462712b484b0e1230b11eecaab CVE-2024-24942,0,0,563210d81811f20dca2f0d31fb8a3f809a103faa9f572a2543ac563f930d5f1e,2024-11-21T09:00:01.683000 CVE-2024-24943,0,0,39797c58f877efcb960a5c14e3952b4ed965705c28abbc91788b0766abbf7e47,2024-11-21T09:00:01.907000 CVE-2024-24945,0,0,1a32182f01b8efb3b584bcd9740c8c6b7f92a97eac5ec81f3a38816d6387c7e5,2024-11-21T09:00:02.077000 -CVE-2024-24946,0,0,468678429f22b9ff544dc869777216cd46a660b0ce825beaeac5a485d888d44f,2024-11-21T09:00:02.237000 -CVE-2024-24947,0,0,e1f3adb532d236777c29b078470f36fc564e3609355d97bd56bdc30dbb335086,2024-11-21T09:00:02.367000 +CVE-2024-24946,0,1,6e1766ca1b48ddc97e37caac6e87887cf9d35afcf4513c96a2130795607ee10f,2025-02-12T18:34:36.453000 +CVE-2024-24947,0,1,4ca04ca961ffa2c96ce1cd4ff018754921d1195c2c56a51519b328d38807ddfa,2025-02-12T18:30:42.337000 CVE-2024-2495,0,0,bd4f8634593ff81cb17e20628f6195b87d6b1a7ff0eee06d72d356d112925df6,2024-11-21T09:09:52.873000 -CVE-2024-24954,0,0,27f281006304e0bde7559c22e64f81cc8a2d88fa9268bb8e08cc4f388c14a887,2024-11-21T09:00:02.493000 -CVE-2024-24955,0,0,7c3c725f782b785abdc41e9a18a46f3d7798195763d919d208c73eac1d8cd4a0,2024-11-21T09:00:02.620000 -CVE-2024-24956,0,0,4c52f2ffc9e2253196f5eec94fb8b777a422b770caec3f85ebc8e11b44866f00,2024-11-21T09:00:02.743000 -CVE-2024-24957,0,0,a4a531e8acc0923e2f793666f837ca52566ea03bba3a26837f629469fd810e46,2024-11-21T09:00:02.867000 -CVE-2024-24958,0,0,817d6a80855e736a39e2e199904c914f134f0a4d6baefed63f010d403a7c4d4a,2024-11-21T09:00:02.990000 -CVE-2024-24959,0,0,f667cd518cecd672ddc53caa544dbd027883a277534fa1ea3f94066db5571faa,2024-11-21T09:00:03.117000 +CVE-2024-24954,0,1,9e81e689a300e5d54b2cec335fed963ca2904549d465794eeba898865678b7ec,2025-02-12T18:30:49.627000 +CVE-2024-24955,0,1,7148364b6e70fb3fbf9c869f973afc84e1c8b5b176b9ab283a17d9b7324241d4,2025-02-12T18:31:05.193000 +CVE-2024-24956,0,1,c2a5bd245e1d4d253e968f8ebcb0346c2f0bfad71ca2ee7b78d16be6e69237d6,2025-02-12T18:31:17.050000 +CVE-2024-24957,0,1,f5538d011521f604eb4f1c558ddb9e0c5a6a8b9f31855b2719e3da5475d6a486,2025-02-12T17:03:40.950000 +CVE-2024-24958,0,1,527c1451e793518e00c18fe6b2670f2e7bd5a513105d9a01c3741e602eb7681a,2025-02-12T18:31:11.083000 +CVE-2024-24959,0,1,694af09c402bb04a432a9114478ed7de7611779253cef4ad2aa61954429d1495,2025-02-12T18:31:34.233000 CVE-2024-2496,0,0,051579418359f85bbcda93fbe22a82cdbe6432c139ab0c0ffad8ae83e4581f99,2024-11-21T09:09:53 -CVE-2024-24962,0,0,1cebc93e4d6c3df34e57cb9df2964db84f2563e9a4c0bd93e3ff40e70b58c267,2024-11-21T09:00:03.243000 -CVE-2024-24963,0,0,f9ad2b45a0d9754f789fd77f11d0d6bd197c6b1494b09d688edc3d878ec75bf1,2024-11-21T09:00:03.350000 +CVE-2024-24962,0,1,462526816590ace8be0822706ac0315b9ed293e99ef0b9e5c0875302ab11ec1f,2025-02-12T18:31:24.260000 +CVE-2024-24963,0,1,c3ccea828eefdc726220c28926ef37931db8f41d0ee27dd9d1feafaf13a8a3d0,2025-02-12T18:31:43.123000 CVE-2024-24964,0,0,f2f90e1f53bc2e9057a1ed570baa4ea348ebae1fccc952c0417838ff4dd829be,2024-11-21T09:00:03.480000 CVE-2024-24966,0,0,7f40249452ab29b78281e89da3b43963bc92b9dafe5558c0305b23f778ea8514,2025-01-24T16:03:35.577000 CVE-2024-24968,0,0,400e490118c16083e36fd26c85d27bd24dddeb131874caab82b3947794aa5942,2024-09-16T18:03:16.707000 @@ -251363,7 +251365,7 @@ CVE-2024-25239,0,0,62d1960a75816647dd0824c1a6dd7522a9b290438071c728f2122144b08a1 CVE-2024-2524,0,0,6f9563611770eaf74cbd654fb70e346ae094dcd9f1b5e7576a2f4a96999510fc,2024-11-21T09:09:56.390000 CVE-2024-25247,0,0,8f27432758a2853eba1d5c1a91c7da083827266e4e63e595dc12f3b358565fca,2024-11-21T09:00:31.417000 CVE-2024-25248,0,0,f376989aab963fd4c9f0643f5eb00e48c1e0cd4eea0df49b3289d75cd1c24fd0,2024-11-21T09:00:31.653000 -CVE-2024-25249,0,1,7cbde78c75e4d8497d99a20ea8ce98a726a45fe216dbf1b4e6c8ae0251db6893,2025-02-12T16:44:43.817000 +CVE-2024-25249,0,0,7cbde78c75e4d8497d99a20ea8ce98a726a45fe216dbf1b4e6c8ae0251db6893,2025-02-12T16:44:43.817000 CVE-2024-2525,0,0,f8856386120b0b0e2a9a9905b06df8076256bd6ec85ecd75f598d7df4c9f1e7c,2024-11-21T09:09:56.523000 CVE-2024-25250,0,0,db72313d2b8a86eec26ab519ea1baaf7ac154d306dc7534c2e8c4d26bd439334,2024-11-21T09:00:31.943000 CVE-2024-25251,0,0,6dea5af83ad1e7e7deeb31cb468a1c94ab5c1e06beee69c782e91b5b37b29796,2024-11-21T09:00:32.163000 @@ -251849,7 +251851,7 @@ CVE-2024-2597,0,0,12819aacd06167f31ba85b0d4a34b39aec569fa6ce913a831ae88cc4629804 CVE-2024-25970,0,0,ebf60a3ad2d3e6b65a7a9f52e6917b310ffa65f405eac59713b95729b171f87b,2025-01-09T15:59:09.817000 CVE-2024-25971,0,0,e8f77238884da976b87807493fdca13cb74d8982df4384bfe1db22cc8621d6ab,2025-01-27T18:55:14.810000 CVE-2024-25972,0,0,543cca97c7af8256686918a28901f39a26e893c97637fc882b573eae8fe693c7,2024-11-21T09:01:40.610000 -CVE-2024-25973,0,0,92921a8dafff904fc569ae8f889b79524526f977774b8eabb79a6657a833a77a,2024-11-21T09:01:40.783000 +CVE-2024-25973,0,1,1d9c16d3f9445665028e51034922e103ed1481eada54c9d995792f5bf9d01db8,2025-02-12T18:51:24.363000 CVE-2024-25974,0,0,09138e23b97540d30a977571629f4962d810fc7ee64de0b4541e73a977cb5004,2024-11-21T09:01:40.907000 CVE-2024-25975,0,0,fee7c444e9d1a5b2b3d4ced48c805e0b9b8c69d5a441852e2fd099be02223377,2024-11-21T09:01:41.097000 CVE-2024-25976,0,0,cb1f6b0b42d899e774f78b832ccf3948900f89462061f58ae1e38592f4baf306,2024-11-21T09:01:41.313000 @@ -253776,9 +253778,9 @@ CVE-2024-28190,0,0,70b823e132fdaf915de1928040350b0ea87b81d33aa6e2ce37203b7b5b322 CVE-2024-28191,0,0,5b6c074ab018067c965562c5bbc6ca0ef417251157d63225a65bdafc747bece3,2025-01-17T15:39:22.060000 CVE-2024-28192,0,0,7508d9021ccc1565db3035af688147509fee676c90504fc13b4f73c460b6ef3c,2025-01-24T15:11:10.747000 CVE-2024-28193,0,0,8d227e8eb16fb4de0e704d7a312f2e5ac3bfb0063d0e3bd7134246d61929666c,2025-01-24T14:56:33.120000 -CVE-2024-28194,0,1,dc839140e9918f60622128b4ae95c79a28377a1e1e047fa3ba0a032ecfaa5910,2025-02-12T15:19:53.610000 -CVE-2024-28195,0,1,88cba2fb83e2245fa11cccdd922264095a701ee8b7109600d8beb431566d861a,2025-02-12T15:16:31.260000 -CVE-2024-28196,0,1,1aa739351558571e5c561707d080be08f96c798273d193f204af239cbed8c655,2025-02-12T15:18:34.053000 +CVE-2024-28194,0,0,dc839140e9918f60622128b4ae95c79a28377a1e1e047fa3ba0a032ecfaa5910,2025-02-12T15:19:53.610000 +CVE-2024-28195,0,0,88cba2fb83e2245fa11cccdd922264095a701ee8b7109600d8beb431566d861a,2025-02-12T15:16:31.260000 +CVE-2024-28196,0,0,1aa739351558571e5c561707d080be08f96c798273d193f204af239cbed8c655,2025-02-12T15:18:34.053000 CVE-2024-28197,0,0,1ae2047ecd0c4043e0bdc00ceaccfcd5a2d21148692c0ff8a3261be8b479f2bf,2025-01-07T15:54:40.987000 CVE-2024-28198,0,0,761cba225c385d498bdd6fba40bd3dda8cd3d08c2183e5b794fada4afb002ea1,2024-11-21T09:06:00.677000 CVE-2024-28199,0,0,ce7b5d92a4f57c9e2aa64edecef6ee8520d5af49c8b77489080d765a812d8d41,2024-11-21T09:06:00.800000 @@ -254133,7 +254135,7 @@ CVE-2024-28864,0,0,6919dc757799fc59366e697569cb5bdd8699249bf5bc3570fad906c652ff8 CVE-2024-28865,0,0,0062a5145de87a14ca15ec6331d5ef90bfc88715baf3d6b5befa43f41fa814fa,2024-11-21T09:07:04.317000 CVE-2024-28866,0,0,b4d9a9c7cae11a8cc5512d01e0e004336928eba97a541638291b9c9a9385428b,2024-11-21T09:07:04.453000 CVE-2024-28867,0,0,13de37d1251837764571928cd6979ba699a7aa83d7eae7fbaaf533c23265ad8c,2024-11-21T09:07:04.590000 -CVE-2024-28868,0,1,eb611e363be714e3967489367b2768d2aad8d5b204059d84423a8d33f9241371,2025-02-12T15:23:09.683000 +CVE-2024-28868,0,0,eb611e363be714e3967489367b2768d2aad8d5b204059d84423a8d33f9241371,2025-02-12T15:23:09.683000 CVE-2024-28869,0,0,37b1b2db8728242f0e02311908952ceff63256ca368c823beb03f1803daff4a5,2024-11-21T09:07:04.857000 CVE-2024-2887,0,0,70a96806611abc951986b04e22c239259f8682e359651c93ff6f67c8b4acffc6,2024-12-20T13:48:51.147000 CVE-2024-28870,0,0,1948db6c1330344e0305cc9883b822c2b1c7846eda6f6ae64a39b3f568697ade,2024-11-21T09:07:05.013000 @@ -254297,7 +254299,7 @@ CVE-2024-29031,0,0,43885b264be637e71494b7988bfccd07c0c261c20bf20a201a9b30066be50 CVE-2024-29032,0,0,e4982184528b3910b9311a270985ad61418d068232bdcad658d089c012dde188,2024-11-21T09:07:24.850000 CVE-2024-29033,0,0,b30ff3b4288d6655f5f21132ae3c9d7becfaa96ec23d2d0ae74db6c2d1c1b5eb,2024-11-21T09:07:24.973000 CVE-2024-29034,0,0,f93a9cafcc84d32af021041aad35322e19a81121d9859b23a24caec8bdffe1e8,2024-11-21T09:07:25.100000 -CVE-2024-29035,0,1,ef070b7e2246729f1c81fdb7adbddc3bb2de12297c6114bc6cf2e9e3860cc232,2025-02-12T15:26:10.717000 +CVE-2024-29035,0,0,ef070b7e2246729f1c81fdb7adbddc3bb2de12297c6114bc6cf2e9e3860cc232,2025-02-12T15:26:10.717000 CVE-2024-29036,0,0,e9111c2bda4a8c52794b1d916cb4324b7edad3f1eb225d5de173609179c57fb0,2024-11-21T09:07:25.367000 CVE-2024-29037,0,0,07c5d00e82c63a2e1f8060633a0057734cf3176ca69685a1f25b09381e8c2a24,2024-11-21T09:07:25.500000 CVE-2024-29038,0,0,3c254eef01b264ba7c9a7863c0c7c05ed3bb36430fe13b91034a1d06e142cacf,2024-11-21T09:07:25.623000 @@ -255206,7 +255208,7 @@ CVE-2024-30264,0,0,14d2ca971995eba71386004463a81219c2276b3f7a585e4633a736eb9ec97 CVE-2024-30265,0,0,d4abcb1516125280d237f8b0221ea0c7b8b27200e1515d4ab137a5bf465457cc,2024-11-21T09:11:35.073000 CVE-2024-30266,0,0,67e04e8eb3dcb7f8513793284b38f7b18af769a45ad5bf76770f184b30b88de6,2024-11-21T09:11:35.233000 CVE-2024-30268,0,0,f2baebef5adfdab208bfccca1e110b69180f089cce60c19c74ed9f6e8ec5f11a,2024-11-21T09:11:35.370000 -CVE-2024-30269,0,0,0907f68c50a62c216b5891b061498b5e0ba07652dd0fb7b0fbdeede72b95a54d,2024-11-21T09:11:35.500000 +CVE-2024-30269,0,1,f6dd8c39d0db31acc315732edb90b1990fc5ece595cc175f0d2cae5b2377c231,2025-02-12T17:50:06.097000 CVE-2024-3027,0,0,23dad2a79a7e18b3a8bed388d4ced28c713fc1abeabcf41e6fca95218a27eab9,2024-11-21T09:28:42.920000 CVE-2024-30270,0,0,234d13056701558cae6d6fcdc949b078b5f784327b1bb030e2b4e2a066aff102,2024-12-12T21:15:07.817000 CVE-2024-30271,0,0,5ff29c206fcf61a4bfcdabcad7eac5ce0a041ffcaf55506d27bdd3039e851ff7,2024-12-04T14:57:13.823000 @@ -256150,7 +256152,7 @@ CVE-2024-31432,0,0,91f30ef1f01f1ba5ad4b4c23ebf50ae7a312901ed673962deaeb8bc3f1b8b CVE-2024-31433,0,0,56354ddbc3946f08210223d9849d97b25234f8c66e0b3fe31c53a6ade37caa22,2024-11-21T09:13:31.393000 CVE-2024-31434,0,0,36f1f7fc92a838f9f9df4b218ee3ebdf0b30403fbbc6059e9836dc7372d2e4ea,2024-11-21T09:13:31.510000 CVE-2024-3144,0,0,b657c28b5b9c6c42807049828f1e42ccf9590440514ac1f5a31fb0ac440871bb,2025-01-15T18:47:12.967000 -CVE-2024-31441,0,0,0efb076f52101157f6b2acd7d4e2f2bd8d89d1ccb4f094aecc9b4ca0e3ae8da9,2024-11-21T09:13:31.627000 +CVE-2024-31441,0,1,aad8eaafcdcca0e11551471859999b769a5284bddd4d25c6d6c5510d2f84e3b6,2025-02-12T17:49:35.443000 CVE-2024-31442,0,0,f41750395dbe71510e4a19583ae309e3ceab138b882aadf845293962b4aadc3a,2024-11-21T09:13:31.740000 CVE-2024-31443,0,0,68aa4b623192258d5faafb05ed3e7b2481e219e907399fce61d9717e57c362f6,2024-12-18T18:28:19.237000 CVE-2024-31444,0,0,91f7b200c505c79dbc932eb0c200ca07d3e6ad62c9195eea28e7f1da5f273ca0,2024-12-18T18:28:58.617000 @@ -257174,7 +257176,7 @@ CVE-2024-32833,0,0,2f6b6db4ebf550ab6abc8090dd8e329317573fd251f942534bdd268f93130 CVE-2024-32834,0,0,a227e1ccf0152a47fd85db9549d82fdb8761b715ed85b010cbc316593bbd6e17,2024-11-21T09:15:49.263000 CVE-2024-32835,0,0,05b62705f8fe1947a07363b4e892df8f42409b05042069433afef41ce49f6c53,2024-11-21T09:15:49.390000 CVE-2024-32836,0,0,ea0f93a2bb527667ea20b3ee245821cb666f4877955ddb999c58bdb00d1eda3c,2024-11-21T09:15:49.520000 -CVE-2024-32838,0,0,2de77f34b12f6d3820c0608dd3023889b2339c0f8b087084de89f3acb9292000,2025-02-12T10:15:13.043000 +CVE-2024-32838,0,1,78ad5fff7c8a99e3af60c547fd4db8c66eded26a140133d5161245ff92121229,2025-02-12T18:15:21.633000 CVE-2024-32839,0,0,effbb78e054c1e702b27672f49d98c97e8196be19e4c903bd6639cf8548989eb,2024-11-13T17:35:03.780000 CVE-2024-32840,0,0,f81f56762fcdecdeada25fe978b6c3c4e0defbd18145eaff57266ffe44bdeb6a,2024-09-12T22:35:01.747000 CVE-2024-32841,0,0,cb04c1ed9fc3a164fd94ab42162387504166891d188c1af1c4f36b0577f48202,2024-11-13T17:01:16.850000 @@ -257909,7 +257911,7 @@ CVE-2024-3388,0,0,e9b6f72b0b1c0b7f2c418e35fbf58cf2690eb64e09bf5e3388b48417000ae3 CVE-2024-33880,0,0,e592b0fcc1945574e62b07791cd81dcd61e6efd0a8817280337b8ece817c4469,2024-11-21T09:17:39.983000 CVE-2024-33881,0,0,c1b886fc16abf7aae010d3cd0b6df126ac4a7dacff52bac3f012a72388bd5eb6,2024-11-21T09:17:40.110000 CVE-2024-33883,0,0,a60b6dbe01d0df4525fad217549abc289e2dc3142ec07f81c8d9b45c0506b159,2024-11-21T09:17:40.303000 -CVE-2024-33891,0,1,dd477fbb1ee0bfbcfc6ef6b47357972caedec865080fe0f9a90e527403cff11a,2025-02-12T15:15:14.827000 +CVE-2024-33891,0,0,dd477fbb1ee0bfbcfc6ef6b47357972caedec865080fe0f9a90e527403cff11a,2025-02-12T15:15:14.827000 CVE-2024-33892,0,0,f21b90c720809376ffb3c9eecbc31f204d7c233378324abc8dff77b0ef47f349,2024-09-03T19:18:42.870000 CVE-2024-33893,0,0,a9035f1be92e93d5c09f50566b3aa661370e6c7e813861ada45e03598f96018f,2024-11-21T09:17:40.830000 CVE-2024-33894,0,0,24ce8dbd25568714013b779c2f910e0c51cbe7395b534ce912626b0d41e22217,2024-11-21T09:17:41.037000 @@ -258078,7 +258080,7 @@ CVE-2024-34068,0,0,7f74bbca4e2db397199e15e665a073c5d30a617f5b6e634f61d035c77e231 CVE-2024-34069,0,0,272daf01091fd40b7e79c1d5d4afc7c83f6a52a4b429177799d0b69f29ec7ffa,2024-11-21T09:18:01.527000 CVE-2024-3407,0,0,1dd5d82b06a7cc20a14e63b07e1ddd6e99e77ef41257161f9f7dfedc8de831cf,2024-11-21T09:29:32.093000 CVE-2024-34070,0,0,5f1575a2d850d50c576f98c42a1ebac69cc9b6e5bffefc5b41bc301cd97009a0,2024-11-21T09:18:01.680000 -CVE-2024-34071,0,1,ffc35012c653d1b9edadd40a1fccd85a11c326f53822c11dd0077d4d3aab57be,2025-02-12T15:39:05.367000 +CVE-2024-34071,0,0,ffc35012c653d1b9edadd40a1fccd85a11c326f53822c11dd0077d4d3aab57be,2025-02-12T15:39:05.367000 CVE-2024-34072,0,0,0328017c25689b65deea8e6b5d9d864dcf5fbd8df8293d860b65d7cb7e44d96c,2024-11-21T09:18:01.967000 CVE-2024-34073,0,0,f7ad871910a24067ef07cc0245fd8074bbbce15b6e5922886339bf185df98b53,2024-11-21T09:18:02.103000 CVE-2024-34074,0,0,02adc0170b5030b9c74011e1341a900ec167561775046c5f84ea0d7e875fd048,2024-11-21T09:18:02.237000 @@ -258285,7 +258287,7 @@ CVE-2024-34367,0,0,7ff699636f6e7df739faa6cbcd9892725049411bdc1e39c1dc23c16ee03b2 CVE-2024-34368,0,0,bce2602f4869e8f4c1959d12f95f4e3944e55e2d8b8e4b27b47a03c1e42d5df1,2024-11-21T09:18:31.427000 CVE-2024-34369,0,0,6b8234cb255d707fb50e584fdbdaa726e242e7210bcc33ca056263ae6e18c1da,2024-11-21T09:18:31.557000 CVE-2024-3437,0,0,8177dd8175b079f136411c113a9d0bac6a0635d85550ff7dcc7564fd6e22ff9e,2025-02-10T16:15:30.727000 -CVE-2024-34370,0,1,3a2819603ce351747c3cc9df2f920cb8c37a163dfe688fbde1aba91f59b588bd,2025-02-12T15:42:09.867000 +CVE-2024-34370,0,0,3a2819603ce351747c3cc9df2f920cb8c37a163dfe688fbde1aba91f59b588bd,2025-02-12T15:42:09.867000 CVE-2024-34371,0,0,e846a2fe676040566f4e6efa50b35269655bad9983cf7c77a9c9788717f4eaee,2024-11-21T09:18:31.803000 CVE-2024-34372,0,0,6e08f9389cdc780953f7d11dfd76b886412e9c780b4d6714a57a67ed1541b47a,2024-11-21T09:18:31.923000 CVE-2024-34373,0,0,9a3853e05633db0457c23a26560ddf3c076d45e1bd24a34d6a00a0c54d2bec35,2025-01-29T16:41:21.897000 @@ -258490,7 +258492,7 @@ CVE-2024-34595,0,0,9e7778fdf455da2137cad71138f4d7b04b512071b57f6c8fcad630cdf1957 CVE-2024-34596,0,0,f3826dba7f5578245d8a6ee3d8f2e02fd250b5940fb106b55f170390470d5292,2024-11-21T09:19:02.710000 CVE-2024-34597,0,0,177e74cc84ab26472ddf89ba13c1485437043f4639b469fea00e41634d3ec98b,2024-11-21T09:19:02.843000 CVE-2024-34599,0,0,cf7052458c0d0767f934707d8abbd559c0875986c94ac6693429963460f92f50,2024-11-21T09:19:02.963000 -CVE-2024-3460,0,1,29b5240f8e1f349c703c7b618a2caeea1fcbb3150ec58f69e279db6105f9eec9,2025-02-12T15:36:15.813000 +CVE-2024-3460,0,0,29b5240f8e1f349c703c7b618a2caeea1fcbb3150ec58f69e279db6105f9eec9,2025-02-12T15:36:15.813000 CVE-2024-34600,0,0,acc93e75e2c654676889731158073e66b5724f27e6fde33a2de4352805d7c486,2024-11-21T09:19:03.100000 CVE-2024-34601,0,0,25a332c4a579011bb0c18e1d4a21b19636411ff6f28cbf9020b3962c90461a30,2025-01-03T19:15:49.823000 CVE-2024-34602,0,0,4d7ed54c46dcade2e8696d5e18f840ba7f0df79c7f91cdd2a16daad9d77e4421,2024-11-21T09:19:03.373000 @@ -258501,7 +258503,7 @@ CVE-2024-34606,0,0,7b1792b534d9b777c70020ea0bc4c7d26bc283027d45db7163587ccf987c2 CVE-2024-34607,0,0,06c03f66cf42192447645613f28036fcf0c2024a8799848e6f569b1b03a05a9e,2024-08-12T18:36:20.393000 CVE-2024-34608,0,0,1c494ef4e98f9c48dff87bc6fabc1ba6522fdf3bd782370e6a1c5e4c50382e00,2024-08-12T18:36:30.313000 CVE-2024-34609,0,0,304950e03b6b5f79c3c13be353fc442ee41c8caed227b08c3110893e1589840a,2024-08-12T18:36:40.413000 -CVE-2024-3461,0,1,ffa509b6626dc89a41dd54f1920be2fd6fe483abf5f37b4c0dc0df4c545ef22c,2025-02-12T15:37:59.677000 +CVE-2024-3461,0,0,ffa509b6626dc89a41dd54f1920be2fd6fe483abf5f37b4c0dc0df4c545ef22c,2025-02-12T15:37:59.677000 CVE-2024-34610,0,0,8224b6d22b90d43f7d65c5aef3c67d8735b48c70203926524646253eb47b66ab,2024-08-12T18:37:41.617000 CVE-2024-34611,0,0,1c6753dc55ef167624ad4f265ebd490e90ca6027871aa8c494537a4bda520a4d,2024-08-12T18:38:00.283000 CVE-2024-34612,0,0,cd0b63ccb62b91f27224f50157ed09bd228e119acbeb43814ccf35b6c17057bd,2024-08-12T18:38:07.797000 @@ -258935,7 +258937,7 @@ CVE-2024-35212,0,0,1a405bcf7250f1933eb3f4bee1db12d8147201318727ea6239931f5b2bf93 CVE-2024-35213,0,0,d27aa615adf58ac20bc1951b2addf5ca8e7b4eb8c566309fc13fe17bdf37ef6a,2024-11-21T09:19:57.283000 CVE-2024-35214,0,0,4e2884995e0f83ed7a7f5e2b395a1eaa2e201b72715fe198f5e7de3222ee12ff,2024-11-21T09:19:57.420000 CVE-2024-35215,0,0,879deb671ff9265178f52a0500d8f2ad05da78ca9f853506424439d0f5388b26,2024-10-10T12:56:30.817000 -CVE-2024-35218,0,0,96b11ef6cda8d5ab8f6c0b3a47a3257b2f9af22752bb2cd9d961b2cbb6171d27,2024-11-21T09:19:57.623000 +CVE-2024-35218,0,1,5233908220476f45c251d23ceb1060c2d76463bcccff3973ca7c299ff551147e,2025-02-12T17:46:28.833000 CVE-2024-35219,0,0,d1ad64ed4cb59e55fd618607935df9480f28eb4fde9a08261b89b15d756a6012,2024-11-21T09:19:57.753000 CVE-2024-3522,0,0,921ae0217029693cf99ee944bb19f1ec6ad1a318e61e75f4b26bb85c10ca4abc,2024-11-21T09:29:46.533000 CVE-2024-35220,0,0,d920b608827ae01dfd236684862006c7d568dc896b60a48ddc3cb95c2f7d481e,2024-11-21T09:19:57.883000 @@ -262334,7 +262336,7 @@ CVE-2024-39426,0,0,83982f7fdfeaa807165acfe18d0cad5ca5e47963386065143fcab9fe76521 CVE-2024-39427,0,0,7b7b8e0a3562ecdc26839a72808719e73a9c9f77c8bc63945b07f085b8af8943,2024-11-21T09:27:40.310000 CVE-2024-39428,0,0,7d1707af162b1d4d406f7bbbd19dc570b90779856a2606b9337dd453afa46029,2024-11-21T09:27:40.480000 CVE-2024-39429,0,0,e018e2d37f70674152617e811468ed611a1924ead2ff6b7800e384a166b49041,2024-11-21T09:27:40.620000 -CVE-2024-3943,0,1,e4cdb02cc62acb727aa35c031654b5d4b5a56c867352badc43e6886fb513cbfb,2025-02-12T16:26:27.347000 +CVE-2024-3943,0,0,e4cdb02cc62acb727aa35c031654b5d4b5a56c867352badc43e6886fb513cbfb,2025-02-12T16:26:27.347000 CVE-2024-39430,0,0,676e35275b326d39e01f6979baef933c2acdc8ac3021c1d5c5882757ff0a277f,2024-11-21T09:27:40.760000 CVE-2024-39431,0,0,3c249123a76ed41db06fc333d6487eebee132a6cf808510f304512d922aa7fe5,2024-09-30T18:09:30.780000 CVE-2024-39432,0,0,0d1b7bf8dd34d739673dfa5f623e01deafa7cf611509566b2d4d37b0b5a02b97,2024-09-30T18:12:04.437000 @@ -262347,11 +262349,11 @@ CVE-2024-39438,0,0,24206dc13e5c569ce4ed39f81926d8b7d31d87ead875693b60dd57a2673ab CVE-2024-39439,0,0,ce75ad981b5a0d9d1a3b44ff24f21db07abb0f10b7cc9c0104da458e8f884ead,2024-10-17T17:32:05.890000 CVE-2024-3944,0,0,b4ac3a6cc8bdc3d4562ec3251954cb7d98b5fdc3cd00cb185f6de2c2a7491615,2024-10-04T13:19:51.383000 CVE-2024-39440,0,0,4f2c0d9e1a449f4e7f0abbc3c14ac2d1b80f295000e70aed068814c8c26e6bdc,2024-10-17T17:33:48.143000 -CVE-2024-3945,0,1,7093e87a0bcef232ea8887066fd83c1aa636503474edf23e55d40151afe0235f,2025-02-12T16:26:04.993000 +CVE-2024-3945,0,0,7093e87a0bcef232ea8887066fd83c1aa636503474edf23e55d40151afe0235f,2025-02-12T16:26:04.993000 CVE-2024-39457,0,0,200f1d3fc23798fbfd97f204ad1c3a109ac863e4640147e347dba97a39f0518e,2024-11-21T09:27:42.080000 CVE-2024-39458,0,0,600f68b554d8ca33ceea3ca3c437286132be7e855f795cc4e4b3eacc73ca7029,2024-11-21T09:27:42.223000 CVE-2024-39459,0,0,84163e8ef3d49be1fafbc48a09c7ad9ff761c361af71174eb5e30edb12f717d2,2024-11-21T09:27:42.417000 -CVE-2024-3946,0,1,49f43e30d22b0441f1e5a48b3bfb8d8a5e3ae8d7d93195abcf8eb9f6e8f62f64,2025-02-12T16:25:25.547000 +CVE-2024-3946,0,0,49f43e30d22b0441f1e5a48b3bfb8d8a5e3ae8d7d93195abcf8eb9f6e8f62f64,2025-02-12T16:25:25.547000 CVE-2024-39460,0,0,9d61a536a27d65684c6084e992b80cf96ee2aa8701ccc8a9334b62260368ed4f,2024-11-29T16:15:10.243000 CVE-2024-39461,0,0,b41a22cc2e09ff68e921c279b09c51ff8f51194646e70786ea7a32f4b7947d93,2024-11-21T09:27:42.720000 CVE-2024-39462,0,0,15386dd370a6b0355a36c67130ba8a370ee55deb7c19c38c28df252a427dd11f,2024-11-21T09:27:42.857000 @@ -262362,7 +262364,7 @@ CVE-2024-39466,0,0,b041eb19cb7e44352da4439cf5631bbcc6b6f6d07932571e0c1df313025df CVE-2024-39467,0,0,f8b096103a7cd9fe514c14ad1458a5fdab112d0b5fdc16ac5fe6e5cb7370b2fe,2024-11-21T09:27:43.647000 CVE-2024-39468,0,0,4edfe26ed53b093f2dc91c57e5c504c28886c5044e711e6c41099de3068057d5,2024-11-21T09:27:43.777000 CVE-2024-39469,0,0,90dbfbf82d07283b34da66b7ea54266f98951a2d29cc67a3bb60db8ee26522e1,2024-11-21T09:27:43.917000 -CVE-2024-3947,0,1,03aa080e705f6b309fe6cebe8580fb91e66a8f879c3cfd81d416886988994ab5,2025-02-12T16:23:45.067000 +CVE-2024-3947,0,0,03aa080e705f6b309fe6cebe8580fb91e66a8f879c3cfd81d416886988994ab5,2025-02-12T16:23:45.067000 CVE-2024-39470,0,0,8f39bbcefe24fbf68321b261e4ed65e0b7db56ef6c63fd1a3047b9b298e9fb06,2024-11-21T09:27:44.047000 CVE-2024-39471,0,0,d95568823aa8e4727b84a8b5644f02e786ca93cf25423e0833fe9b97687f0286,2024-11-21T09:27:44.163000 CVE-2024-39472,0,0,f8baf6ba41486258761861d10b0901d7b547b4ccfd023dd9252425ff6010d14c,2024-11-21T09:27:44.303000 @@ -263282,8 +263284,8 @@ CVE-2024-40884,0,0,ed9954ff74e93284dab776e5f85f657d7b2f3e463ef905e91d917d70faae6 CVE-2024-40885,0,0,c819fb6dd4b0136231d7f32857f3d24a5008c3818051b19ae2000f42a9494ee6,2024-11-15T14:00:09.720000 CVE-2024-40886,0,0,d6046df7f06d5f5712a2972118d791b3c29f6fc6001fad542f39cc79b75e1580,2024-08-23T16:09:31.887000 CVE-2024-4089,0,0,7a035608d08862b8a3927991cbc7bcfd8e0cb13815d39b3b58eaf685ec21d6c5,2024-10-17T19:41:36.467000 -CVE-2024-40890,0,0,a2545f7bb3a1bbfdaf9948a013d36581b2d3b0971e991c0417acda97a4bb7112,2025-02-12T02:00:01.980000 -CVE-2024-40891,0,0,da753debbb056ccce6e92cb3a629df90a9c092073c1b0fbda1dae1b05e2f10de,2025-02-12T02:00:01.980000 +CVE-2024-40890,0,1,aa090ac05e8963e1ca90e2c05cdc3b230d4c12a97e1ac99273701898832d1be2,2025-02-12T18:12:16.130000 +CVE-2024-40891,0,1,cd384657f2d111008bfd470fb69eb7ea4bde608b2882d3a0b77536f9c9b56dfa,2025-02-12T18:11:58.790000 CVE-2024-40892,0,0,0bef0c096de1fd9b74596dba063b1cf9ffb172ff0abd417611d342278b46245f,2024-08-21T18:15:09.710000 CVE-2024-40893,0,0,291c1cc414cfaa66f88e6f282a2cb52f9787a1f732797e904eca670adbd8e574,2024-08-21T18:15:09.803000 CVE-2024-40895,0,0,9bfbe451c0a62cc469c348ecf829cab564e06b39ab7ab75fbb9a00c7abd49483,2024-11-21T09:31:48.250000 @@ -264984,7 +264986,7 @@ CVE-2024-43164,0,0,af1cf52e9e5daf0524d227ca91881ef1661a1e31cfb7baa9b781d652d8651 CVE-2024-43165,0,0,d6b26bb563a0e6badcd424e8717f3eee2117ad61bb0aaa9e33b8f5d6bf543f4c,2024-08-13T12:58:25.437000 CVE-2024-43167,0,0,1f0299dd298e58ae7d0320a556b5cc8080d25729e8c4fc9c4051248a2f05ca8c,2024-11-21T09:35:06.587000 CVE-2024-43168,0,0,a00133049ed1a922ca0a7599f98603d24e2d8039ab92bf6ffa7a406368253241,2024-10-21T12:15:04.327000 -CVE-2024-4317,0,1,db0abb41f20407d83ae6da5ad6bf273d95c1b6dc6d76af61523cb7222e98db9f,2025-02-12T16:17:31.043000 +CVE-2024-4317,0,0,db0abb41f20407d83ae6da5ad6bf273d95c1b6dc6d76af61523cb7222e98db9f,2025-02-12T16:17:31.043000 CVE-2024-43173,0,0,d8d2ac885c1902e546063772016f5d0005860b114ffe9d7489140ac6cd8bfc67,2024-10-25T15:40:19.977000 CVE-2024-43176,0,0,67ef639d68302e5458cf789165bf8b534cafee061131b6437c0c7535ddbce0f4,2025-01-09T15:15:15.737000 CVE-2024-43177,0,0,0d4884cc3bb5ef316ac2268cbd50954452c99cbd34944a23e957f2b36af6ec01,2024-10-25T16:05:15.777000 @@ -266004,7 +266006,7 @@ CVE-2024-44215,0,0,e32762ff0bf2f6f2e22b7422e9deddd79856979cb2bda3d837557df7bdb5d CVE-2024-44216,0,0,e207c9047398aa16280b349e1f263399dd58d00878c7a8d8ca180fe88f7ada73,2024-12-12T19:38:27.887000 CVE-2024-44217,0,0,a0eecfcb7bb8a1d6b2356fe5b76f307bcb6cb65108fa31b3d375cfc7672399a8,2024-12-12T19:55:20.407000 CVE-2024-44218,0,0,f11365ca91eee54b03c90ea2492115b72c14e7e1b502a66bb17b9ea40f96966f,2024-10-30T17:24:01.703000 -CVE-2024-4422,0,1,4a8df766f5ddaa896d051860123a74dd5313b726510bd02ff373fe7bedc390f4,2025-02-12T16:29:48.533000 +CVE-2024-4422,0,0,4a8df766f5ddaa896d051860123a74dd5313b726510bd02ff373fe7bedc390f4,2025-02-12T16:29:48.533000 CVE-2024-44220,0,0,bad2b508e552d1a09c11c8017d22721370fec111da93bdc30606a926bfe3892d,2024-12-18T18:37:48.003000 CVE-2024-44222,0,0,73a3c689e7090451963deac3a94c7bd82e8f2ad14cb50c55b40009dcf9370f17,2024-10-30T17:25:30.903000 CVE-2024-44223,0,0,e7c24ca22da306873e19ce1beaefb0f8a859aa352b193df7d6f03bb6b9e568ac,2025-01-06T13:38:02.493000 @@ -266041,7 +266043,7 @@ CVE-2024-44256,0,0,4f0f1a114f877f4585adb86a9d1785a0ed16207b0923723e8ec264acdefbc CVE-2024-44257,0,0,bc36fc25358e3fe0b559677b44ece93b30ed47701945377f20895583fd086699,2024-12-12T18:28:58.817000 CVE-2024-44258,0,0,b9a751f91557dd3ab0500580cec00561525ca507ea060ba008584e768ee04176,2024-11-06T14:35:02.583000 CVE-2024-44259,0,0,7840059ec23ad4e0890ff31c5401691372d865ee50b84fd574bde49a1d54e491,2024-12-11T18:29:11.187000 -CVE-2024-4426,0,1,b6d39a5d26426f9706e3191c67ebe4a7a8c7619da8ca33d2ce29f5ded44dad06,2025-02-12T16:29:15.587000 +CVE-2024-4426,0,0,b6d39a5d26426f9706e3191c67ebe4a7a8c7619da8ca33d2ce29f5ded44dad06,2025-02-12T16:29:15.587000 CVE-2024-44260,0,0,efa10ee749be06b6ff293117fb9189d3b9901ddb5dd166b86d7ea01257835480,2024-12-12T18:19:21.727000 CVE-2024-44261,0,0,faa469041a43d1fdc729623424014a61aa05639472f8e744062ab95ba97c94df,2024-12-11T18:28:45.787000 CVE-2024-44262,0,0,216f942ab6946c91db934f20abb4be07ce9b18ecbb90ae92edc94facbee54171,2024-10-30T21:35:08.940000 @@ -266050,7 +266052,7 @@ CVE-2024-44264,0,0,ee0924179708704586a947f8cb1bfc3250aa2f192047d549667f366c53b09 CVE-2024-44265,0,0,2a35e1f543866e069d19984c92081c66c8b71cadcb6f6181093964e7539adb55,2024-10-30T19:35:20.800000 CVE-2024-44267,0,0,a998007de4d2f37cefd77b01798057f7e8712e22e07027587ff9faa51feecfc5,2024-10-30T18:39:55.167000 CVE-2024-44269,0,0,cd94b5c2b28bd00f6bd3c5bd35107676552800aeee1f867a6d0535ed56a9aee1,2024-12-09T15:15:15.947000 -CVE-2024-4427,0,1,9c2223af452db947a19fc0ab8b1b401893e6caa4222bada6a0e47c2734b08c2b,2025-02-12T16:28:31.400000 +CVE-2024-4427,0,0,9c2223af452db947a19fc0ab8b1b401893e6caa4222bada6a0e47c2734b08c2b,2025-02-12T16:28:31.400000 CVE-2024-44270,0,0,51d4b52a115ad2f279bed3a378d4fb4fa92b6583bd4c55801137fe6a87bcf63a,2024-10-30T18:44:35.083000 CVE-2024-44273,0,0,caae658c20ea929becd6a50f15cc5040f32d55f5bf0889d84daca4b410aa6c36,2024-12-09T15:15:16.147000 CVE-2024-44274,0,0,d4611874fae8cf46b4ebeede4c74afb829adabc974787d5151107510971373f7,2024-10-30T21:35:09.203000 @@ -269703,7 +269705,7 @@ CVE-2024-49777,0,0,2267bc9ff93ef330d0a1f69ee1d413cb1459de2363d63c74f1eb9f7789687 CVE-2024-49778,0,0,ce01f58133a3eca198de9ca85c44a1634d3ab246b582a1e70ee7b9bae211ce29,2024-11-15T18:35:36.260000 CVE-2024-4978,0,0,de30ddfe983833699ad8e2f2543285ea22a567f389ca513dff29646a99a121fd,2025-01-27T21:42:09.123000 CVE-2024-49785,0,0,dcbbdbf2606fdedeb39b6a5ca475a1ee2b528c61106132a119120d628a37dbeb,2025-01-12T02:15:18.973000 -CVE-2024-49791,0,0,88abab5fd9f2e420641666d8a2f449b37f275cf174e1fee394cfd5ca8dbd58ee,2025-02-06T00:15:26.420000 +CVE-2024-49791,0,1,436e3ec68e0463377f56d61753d1a9ed190ae95d7dd892d9e3c8a12bd564a16b,2025-02-12T18:59:58.627000 CVE-2024-49792,0,0,b90a57d3cf9b396f1721bd37b7468aeec9870c0f26241a1ff505e5e5b6b9d56a,2025-02-06T00:15:26.570000 CVE-2024-49793,0,0,d2d9572a11de0eb95da0d7a97b5cb8fd0bf644e3c25eff78b74223729c5495be,2025-02-06T00:15:26.723000 CVE-2024-49794,0,0,d27b20e4f9e1ddc860a77327adae4f44d79187da851f9afef659ed6dcf1d121d,2025-02-06T00:15:26.873000 @@ -269712,7 +269714,7 @@ CVE-2024-49796,0,0,1614a6040c2439b7327144c5aa1720d94c7ab8ec81d9d4144355a7e4fbd34 CVE-2024-49797,0,0,dd5e38623f04ad2e5232376a2ee829527adb85fd6924cf584fe91c58b04e5412,2025-02-06T00:15:27.330000 CVE-2024-49798,0,0,012086a86251ba4b4317641fecbd5a729c9188f3cee11393a624ed51b6b033be,2025-02-06T00:15:27.473000 CVE-2024-4980,0,0,323b998d90112310b6dbc550d0fd2ce6571acbfdf9fd80fd9aad030f5e003b0f,2024-11-21T09:43:59.940000 -CVE-2024-49800,0,0,66bc2bb20de4221def6b8e4d1319b9c25d55ce52d0bf5f33081f07f2c62bcecb,2025-02-06T00:15:27.620000 +CVE-2024-49800,0,1,c2e08020b86a0127deb4cad0f0d72546a923f7dec86c67481406e56d8f0cb7c3,2025-02-12T17:58:29.817000 CVE-2024-49803,0,0,dce2571c74ef2a0370fd776967085d9deabfc567ee6d4ba12e558c5f495e1b60,2025-01-29T21:23:51.343000 CVE-2024-49804,0,0,ac9e0f55577ef9257227b614ccd7a1b01a15602bfa23a61ff3bdb6906b004a44,2025-01-29T21:24:00.387000 CVE-2024-49805,0,0,8c1aaacc8d12be331d70aab0e8f7279b981c807cbe4aba5debb78bc30d6f0d29,2025-01-29T21:24:36.337000 @@ -272820,7 +272822,7 @@ CVE-2024-54157,0,0,651aaab1ba3fa67919b2a83ef120e30379ceac97443b3f5f57e4b98ff3e21 CVE-2024-54158,0,0,8c6dc67958b420fa6c8d095b96806595ddd0e8ce477f8baa35f7cadb7e0151dd,2025-01-30T21:50:32.770000 CVE-2024-54159,0,0,a6966b82b06dc6cc6ffe535670f7fe423d90e23d66a5791ea4c4b55b9827bb58,2024-12-03T15:15:12.097000 CVE-2024-5416,0,0,2cc8eb5abc95e0327999359a16ced825b9a25c50e0044d232fce1c6bda48c682,2024-09-26T14:37:59.290000 -CVE-2024-54160,1,1,f1c40d3cda0d23d0f4928e272d371e80332a2621ca29b9d07b061a13560813a7,2025-02-12T15:15:15.050000 +CVE-2024-54160,0,0,f1c40d3cda0d23d0f4928e272d371e80332a2621ca29b9d07b061a13560813a7,2025-02-12T15:15:15.050000 CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc2553d,2024-10-07T15:44:01.830000 CVE-2024-54171,0,0,0b1e68485272d4832574ebb9e2b9b7d4e5d9f12a8c58fc003ccc374e2ce65830,2025-02-06T21:15:21.453000 CVE-2024-54176,0,0,1d22afff13116a5ec5700906a2d882f14295c99348d00475c7572a5a8fb2a6c7,2025-02-08T17:15:21.643000 @@ -273259,10 +273261,10 @@ CVE-2024-54887,0,0,7af3cad075b59623b7b3e30dd1983d85e5a9b2bf998f2ab9a001666a2a4fd CVE-2024-5489,0,0,6c00a6a2badf83516471ea1d81b619bbe482cb4a54de89ffa7bd06f7fa1ffabd,2024-11-21T09:47:46.807000 CVE-2024-5490,0,0,7e66a0f19af78ba5ab311e474f6c7a834b406cb5857b42d263e55e1190767452,2024-08-27T14:36:10.033000 CVE-2024-54907,0,0,80a392b1154d757e3dee13d617bee74a64b3baf8f41f4c6bebbb399698b18a69,2024-12-26T20:15:21.800000 -CVE-2024-54909,0,1,e09df11f9fd23515b803ba3007fd40230638945f3a2c3c6e417f7f2b8d8f42bc,2025-02-12T15:15:15.220000 +CVE-2024-54909,0,0,e09df11f9fd23515b803ba3007fd40230638945f3a2c3c6e417f7f2b8d8f42bc,2025-02-12T15:15:15.220000 CVE-2024-5491,0,0,e331b82e31ebdfe13500034914a1c37ca8ae8114dde41994ac12e59a5b4284ca,2024-11-21T09:47:47.017000 CVE-2024-54910,0,0,6581157280a10462a6b1d5622c98ff4607d8f7315bb6a89f500333c22a07f58a,2025-01-14T16:15:32.953000 -CVE-2024-54916,0,1,7a0dccad4793c9d5ee8482e55eec1c618ab1c20951125a4aedd6dcbd29752662,2025-02-12T16:15:42.160000 +CVE-2024-54916,0,0,7a0dccad4793c9d5ee8482e55eec1c618ab1c20951125a4aedd6dcbd29752662,2025-02-12T16:15:42.160000 CVE-2024-54918,0,0,8d1c74ed435285d94b09f28fd23f5ea9a7eeb2cd4aab9028349afde0dfc746c6,2024-12-12T18:15:25.790000 CVE-2024-54919,0,0,d240fd7b13ed8b141b8975d3eb4f4e201c9093f582cb0ecbb49a96c5b085f2d9,2024-12-10T18:15:42.770000 CVE-2024-5492,0,0,bef41c141414e91a737f6b5c4fcaf83f2ee31e6e95a9e2405d6f4dc30a93092c,2024-11-21T09:47:47.140000 @@ -273416,7 +273418,7 @@ CVE-2024-5549,0,0,523dae47b6780776874c36c71ab66f8ac6e8e99599490648ee341f214b628e CVE-2024-55492,0,0,8ed1b6fc2ceef3fd61acd090adb38bc92ce31dd641c3b527d1e8f1507c1a53ee,2024-12-18T19:15:11.777000 CVE-2024-55494,0,0,a1b10176f7d1839512005775c9e7583ed311f893fd691a402dee6bebdd80dd5c,2025-01-13T22:15:14.153000 CVE-2024-55496,0,0,c5e38095d75676960b7fbf7f58bdc885b4b159f2f77ece315454c30d8284a24b,2024-12-20T21:15:09.090000 -CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e870c,2024-11-21T09:47:54.640000 +CVE-2024-5550,0,1,7c59d799cc75229bc373ee72fd75d817a225bf373e99fca682a5e076e676d290,2025-02-12T17:31:38.343000 CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000 CVE-2024-55503,0,0,01a804c79c1137dc6f6a99f161e5ec4960fdb74ed53d202af527ca6f31c7464b,2025-01-31T21:15:10.640000 CVE-2024-55504,0,0,860b49bd638bc2d5a003845485e874e0bc9b85f4d9b1a1d6187969336e05d39e,2025-02-04T16:15:38.353000 @@ -274332,7 +274334,7 @@ CVE-2024-56990,0,0,d73542476af2136f4500771d27d3e44f35a9b22fb9d2fc461dbdfee0bbfd6 CVE-2024-56997,0,0,b9e3b1a369f281014b3d6ae47db288812e253e2c05f0cfa169a74fad7957b7e9,2025-01-21T20:15:35.757000 CVE-2024-56998,0,0,f5f48efbc8b4fff5f7922bcdd7558331389f08761b2f0b3a0f88eaf8ce382ca8,2025-01-21T20:15:35.937000 CVE-2024-5700,0,0,03b60b2b2d02d40bfad068e0335a335857a618ee5b010c631028ca7b55a329d1,2024-11-21T09:48:11.903000 -CVE-2024-57000,0,1,22ae1adeeb8dde49b9cab48884a03b2d82548286eed8225c13790358889d77d6,2025-02-12T16:15:42.317000 +CVE-2024-57000,0,0,22ae1adeeb8dde49b9cab48884a03b2d82548286eed8225c13790358889d77d6,2025-02-12T16:15:42.317000 CVE-2024-57004,0,0,f586a360af706a58378cf0329b6a642e0d827f8c0f318cf23dcc24fe8bb6abf1,2025-02-03T19:15:12.777000 CVE-2024-5701,0,0,9915dfee3e359182f9adc135791d10f705664babe0d2fafe943bf47d66747252,2024-11-21T09:48:12.093000 CVE-2024-57011,0,0,e423cf8108eeaccf1a4a6a564034672c57143be7df30237f44f891951f76e1ce,2025-01-16T15:15:13.873000 @@ -275081,6 +275083,7 @@ CVE-2024-6093,0,0,6dbc67443e4b04e1510a9f434106f20f0d4b21fa7954dab14d70346cb63c7a CVE-2024-6094,0,0,c0063848c5678cbe8875c1cd2d611558ef1b2bedd1d3f0daf0312a05b3c23485,2024-11-21T09:48:56.847000 CVE-2024-6095,0,0,72a84856c6dc84e022fee2d83bf212c06138ba071d956716ea4585f1eb431808,2024-11-21T09:48:57.030000 CVE-2024-6096,0,0,30c8a6f3f48a49dc00c2209e174c85d15aa3ca6b541dfd14b186d9c5e032413b,2024-11-21T09:48:57.163000 +CVE-2024-6097,1,1,da72dddbd7e35c660cf7aa1ea84cef517a2557497f04531ae6b0cb8558ab7ba1,2025-02-12T18:15:21.977000 CVE-2024-6098,0,0,d4c7adc44731702753d0124808854f5b98a81b60c6056d91c26330342372c46a,2024-08-19T13:00:23.117000 CVE-2024-6099,0,0,cc17f7e0786c81cc119e330d3b84e782c19ad0a2a5948fa53f7dc08469c5b91e,2024-11-21T09:48:57.357000 CVE-2024-6100,0,0,a8d8275ad94c76a149682c08fbe2bb7dcf585addf21c98ff178e4f2a3ac8b9a4,2024-11-21T09:48:57.493000 @@ -278343,7 +278346,7 @@ CVE-2024-9866,0,0,a0ba39e4ebba7a797233c2839de60b66f2e325e113630d15fc927dabf744cb CVE-2024-9867,0,0,af8c04cf7fe39d8c9c939bd4960d3e5a1bae720dbdabcedf4d767e596e9cc6a2,2024-11-08T16:00:04.640000 CVE-2024-9868,0,0,8b03b248bb9c12232453fd15a6ded978c56b8620d35965eebe04c58e726ecdaf,2024-11-04T13:44:51.370000 CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000 -CVE-2024-9870,1,1,6eab47920613cf24cddb6cce684d0b1b28db401f9fd9cc882f2ef4e1d8c7f6de,2025-02-12T16:15:42.563000 +CVE-2024-9870,0,0,6eab47920613cf24cddb6cce684d0b1b28db401f9fd9cc882f2ef4e1d8c7f6de,2025-02-12T16:15:42.563000 CVE-2024-9872,0,0,0e7d68583c29c66a5270292b98ec23a33c9fb82f2b56b0d5c54817e06e66bdd5,2024-12-06T09:15:09.040000 CVE-2024-9873,0,0,33bc81d0177b9feda09bc4924ad1b908e4d83e088ea8b1403a6d411bd77364fe,2024-10-16T16:38:14.557000 CVE-2024-9874,0,0,2c854e5be476fde52ee3df7991e955456b213438a6a861fb37fed209f8a3d727,2024-11-12T13:56:24.513000 @@ -278575,7 +278578,7 @@ CVE-2025-0318,0,0,43ba6204cbaa4c110e5bf9b669f9a8b449a31e92da6e4bc8237af066e2eac2 CVE-2025-0321,0,0,949a46e9b053903a4a5e7760dec47f1d94e986bd99c2cdf86cabc314ed2bfdb6,2025-01-30T17:39:45.447000 CVE-2025-0328,0,0,983a37850e7593e52c7049d9c87a360510a226adf3c659d5ad2fe111082fc07f,2025-01-09T17:15:17.330000 CVE-2025-0331,0,0,dbc642b98482c7a868d38d7a4b1240421a9e262e76044ff9bb695321876694a4,2025-01-09T17:15:17.933000 -CVE-2025-0332,1,1,b835c5b45376db1eaf12cf3c2ebf45121eb88483211e6713c18695181a471bf1,2025-02-12T16:15:42.703000 +CVE-2025-0332,0,0,b835c5b45376db1eaf12cf3c2ebf45121eb88483211e6713c18695181a471bf1,2025-02-12T16:15:42.703000 CVE-2025-0333,0,0,3183afb9350c8085fce656cea7939729bf7b0c3b383c8f7105e9da54dedb25bd,2025-01-09T17:15:18.077000 CVE-2025-0334,0,0,e3a8c3debfd678ee7c1344f925152dfd8cfa42591be5b844f5f2a9504bc9f616,2025-01-09T06:15:15.610000 CVE-2025-0335,0,0,ba6bd83ac72a18cacfb4c8aed3dc5b6304b883b41ec133eb940fb09de3e363fd,2025-01-09T06:15:15.850000 @@ -278606,7 +278609,7 @@ CVE-2025-0369,0,0,968f1c7b7fff7a404f2212aa81591bd64fc1ef313f079e18ed81ef90b8b129 CVE-2025-0371,0,0,de30e603b077e64693a9f53a95b364cbc495f2694acb2d5aef6b2eb3aaaea9a8,2025-01-31T20:16:11.363000 CVE-2025-0373,0,0,c896e2039f1868b25d47604a1b505a94cc3030671c646849df8ad1a697ac14ca,2025-02-07T17:15:30.760000 CVE-2025-0374,0,0,8869dd713bc48baec5d2bd3f0b3f9adaccbc12e420edf3f19dd609cc3be6ee1a,2025-02-07T17:15:30.903000 -CVE-2025-0376,1,1,451d07b494536b6facb8189af2373cdf4fd8368ab1d06f95e2f95eed47d1ce5d,2025-02-12T15:15:15.477000 +CVE-2025-0376,0,0,451d07b494536b6facb8189af2373cdf4fd8368ab1d06f95e2f95eed47d1ce5d,2025-02-12T15:15:15.477000 CVE-2025-0377,0,0,1df5153b8a72b25478d0a1c4aa2347b3a7ff1e86a04300cb39dc18c1f91a367e,2025-01-21T16:15:14.290000 CVE-2025-0390,0,0,a9cacf0ddfe16d7ce6aba119743e725f69b4f5561bb60e372a0dcb6744d412ca,2025-01-11T08:15:26.527000 CVE-2025-0391,0,0,ab8f7905746a492810fe86765faefb1fff997fc4d75bb4be776d20c58a35599f,2025-01-11T09:15:05.937000 @@ -278629,7 +278632,7 @@ CVE-2025-0407,0,0,8d1bea41d96dceb0e8000e5eb9f589c13396bad4054ce09f0d87bbcc36005a CVE-2025-0408,0,0,2729cf9415a38755adad695073dad161acc79ef38638b787879efcd1f5040e8e,2025-01-13T14:15:10.073000 CVE-2025-0409,0,0,9622ef176974a666883ccef87aa9961f8329f556e68cbb6ca3f25010c47796f0,2025-01-13T18:15:21.430000 CVE-2025-0410,0,0,77fcc9d20cbc72a10bd98fd8a0d76eb1f68bad51f3fb695c8bb4e738dc713659,2025-01-13T18:15:21.730000 -CVE-2025-0411,0,0,bf7ea4ae7a041075259439e85dc8639e8943db88afb9c3c51332235483247f51,2025-02-07T17:15:31.047000 +CVE-2025-0411,0,1,963fb93dc9f22be5b01fb4ee24ffe0ff364fead29af110d8c8255d7fa3a39b9c,2025-02-12T18:14:13.143000 CVE-2025-0412,0,0,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb69a,2025-01-13T04:15:06.477000 CVE-2025-0413,0,0,93800ba82ed487e2324b7ceece686cde9ee28fb29053c0e6e34c1a22e09e9631,2025-02-05T00:15:28.173000 CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6db,2025-01-24T20:56:49.767000 @@ -278693,14 +278696,14 @@ CVE-2025-0499,0,0,42871b7d04896bad08e4e2a0f52be498a4b936aaa56513408d624ca2987d2d CVE-2025-0500,0,0,ef67500424af835c1f75d32db89a4d3f8d70b570d80dc7e061c5614d7c9ed205,2025-01-29T19:15:18.870000 CVE-2025-0501,0,0,548edfbc8288b6ff7e57bf4d8a97bca009c549459d9d27e51c8af872c31d24f2,2025-01-29T19:15:18.993000 CVE-2025-0502,0,0,bf19161cdd08710fcd7f99c1f7c838e68552d69acf9f5504bdead56cab49bd6c,2025-01-15T18:15:24.650000 -CVE-2025-0506,0,1,4a6852805f36f30ad94ceceb0f4a0d31ff4937d2fd2fd233631287ffb7576ed3,2025-02-12T15:15:15.613000 +CVE-2025-0506,0,0,4a6852805f36f30ad94ceceb0f4a0d31ff4937d2fd2fd233631287ffb7576ed3,2025-02-12T15:15:15.613000 CVE-2025-0507,0,0,0741f2f025f4b48581d4d58f022e9dc19c48a922e6141a54aefd8981045d22c9,2025-01-31T05:15:10.280000 CVE-2025-0509,0,0,5c3664ffdd7f56763bb1b43873c2b214da02799f3bd4d544bc23e17ac3c97665,2025-02-04T20:15:49.763000 CVE-2025-0510,0,0,05652079849e71bfd50a60b32906a66a5fcd428ffe6c5caaa29432e1f6b204cf,2025-02-06T21:15:22.083000 CVE-2025-0511,0,0,bea8aba2d4058a594c2d6768a3ab9a2a20bcf3b8345b874df9ed98ad0444eb2e,2025-02-12T12:15:29.210000 CVE-2025-0513,0,0,d77995424ca84a8cb2f2fcb871053560789e57471ec763f3bc051ef53db6bd07,2025-02-11T15:15:19.257000 CVE-2025-0515,0,0,5ac36c3cf0188576defc5041e4d2f1cb1b09ae44d7e3c5256fa040d2f88a4731,2025-01-18T07:15:09.903000 -CVE-2025-0516,1,1,ea1922d06ac031903617831b38ffa32fc472c31e237d305ac2a29a182dfc3a66,2025-02-12T16:15:42.883000 +CVE-2025-0516,0,0,ea1922d06ac031903617831b38ffa32fc472c31e237d305ac2a29a182dfc3a66,2025-02-12T16:15:42.883000 CVE-2025-0517,0,0,59a53be50b99baee653b756881cc0ee4d0832bd3c59bfa5e70566936733554ba,2025-02-08T22:15:28.823000 CVE-2025-0518,0,0,6d3c5b8ffb150f75c389bd7e05b7aa905d22be4fb895631f5a9526d167be6180,2025-01-16T17:15:12.577000 CVE-2025-0522,0,0,7e3a5d181cd4b32ab493cc2c6b5d2e91736d8261a7e3c0e2dba5b00274469570,2025-02-06T15:15:17.127000 @@ -278723,7 +278726,7 @@ CVE-2025-0541,0,0,2bcf4b49dafe0ca8072dca95d533896ed37e1521635c2f052072b52c75beca CVE-2025-0542,0,0,20d694a09804286361feeafaf90a4c3710af9ee4f076a4817f46453b45a4bf83,2025-01-25T17:15:21.030000 CVE-2025-0543,0,0,97c8d3fe60003fabb6ebf6a84fa27757230cb958341ec2b8d0886e83538320e0,2025-01-25T17:15:21.720000 CVE-2025-0554,0,0,d63933ab2a1fc2c70aefeeec5806ddf95b1569c2ec4a93f64ef98e2e1c34bb43,2025-01-18T06:15:28.160000 -CVE-2025-0556,1,1,33665ab93cb53f2cfc4237aee22aab9954624502d0563735fde8bf6568ff3e83,2025-02-12T16:15:43.030000 +CVE-2025-0556,0,0,33665ab93cb53f2cfc4237aee22aab9954624502d0563735fde8bf6568ff3e83,2025-02-12T16:15:43.030000 CVE-2025-0557,0,0,e808bac35fe14e1bd365beea3de65d9f8e7338d7448163ead06636689058d369,2025-01-18T09:15:07.710000 CVE-2025-0558,0,0,27ffe131a6321b0cb805cae5fc680fb74b1dcbc47a4ad8efbfdf40a5f678d3c5,2025-01-18T13:15:20.417000 CVE-2025-0559,0,0,0a800171c944689ff17e82031a900e5ceea035631c8364601a835471cdd72821,2025-01-18T14:15:25.420000 @@ -278881,13 +278884,15 @@ CVE-2025-0901,0,0,fa0643610900980f3b44609ccbd19a7a3bb488afaa8ccb746ca93d1e57b816 CVE-2025-0902,0,0,b4a4de040174940f0d1eb0957f3d00a1466f2758a90b26bb23705714ab4c0019,2025-02-11T20:15:34.610000 CVE-2025-0903,0,0,bc4103829e9193800b14e5de94d83b632ebf7241f9a27ac836102d3455ab6859,2025-02-11T20:15:34.737000 CVE-2025-0904,0,0,1a922ee5ec9682bb08615ab13e6634c60f15b39068af64767521b1caa75d495c,2025-02-11T20:15:34.867000 -CVE-2025-0905,0,0,f0bc565c82521bedd8dc189277423494e51c4e63df4ce8d3c69202a185fb5240,2025-02-11T20:15:34.997000 -CVE-2025-0906,0,0,41c28f4eea780327df76ad1752f1484df13cda27a48eb86c0dca57e0e86fa988,2025-02-11T20:15:35.113000 -CVE-2025-0907,0,0,da385c5ed75b274985c2ced96201d411143c8afd132d2c6579e6388b340f0fdb,2025-02-11T20:15:35.240000 -CVE-2025-0908,0,0,49305d7c3b4786b9c352fb6a9f02c3a189d85e8b7bb3096835feef722fc8b2d2,2025-02-11T20:15:35.370000 -CVE-2025-0909,0,0,023eba727a29decc55a5515219686cfcd0c02c2809ecb7a099ba5ccefcb8c287,2025-02-11T20:15:35.500000 -CVE-2025-0910,0,0,5375383d9c16ce1f893acc19db5993c8fffaec87d3fbf6b2d6d4126d3e2d6d52,2025-02-11T20:15:35.633000 +CVE-2025-0905,0,1,05042d1b82a8283ae6d9b58778fea8255405ce7a45d2808e61c6bc4ac0008a31,2025-02-12T19:00:08.500000 +CVE-2025-0906,0,1,ba048b418cbc6e80247d45c75bdcfa0e2acba473f2ff1dd8f83fc408203ab65d,2025-02-12T18:59:53.950000 +CVE-2025-0907,0,1,f6fa15cad071a41b1978a4125f00263a945147c04484a51808242e3798d2c0a2,2025-02-12T18:59:44.813000 +CVE-2025-0908,0,1,d299598e6a9f28ce78543471bc7557b8f443bf108ba075d719a9c0a22f15b664,2025-02-12T18:59:38.310000 +CVE-2025-0909,0,1,1ff7d78519026d4b0df5324b5b84f781600c6266238b96b6e6fda4fafcd94e70,2025-02-12T18:59:31.043000 +CVE-2025-0910,0,1,5441c161f7257bb6355c09b7b0bb2df312d9b6c6d59e58e837649ec8c68777c9,2025-02-12T18:59:18.447000 CVE-2025-0911,0,0,a9f48768bf4ba3b4bf054b87bf6f310de58ef4197197866ef5a86f81caed4cd8,2025-02-11T20:15:35.770000 +CVE-2025-0919,1,1,f3c40a8c3e9859b98dc4dbb233022019405b6bb3a32be39636bc5e978bd23a1b,2025-02-12T17:15:23.357000 +CVE-2025-0925,1,1,96e6ae1415f7de21f9d2302b09edfb8f35c8ed2d838c20a02e0bb3cb8fbcd173,2025-02-12T17:15:23.437000 CVE-2025-0929,0,0,bcacb82faee52c17b22479d26474b4df04f76f99e634ac515f50cccea0dc9587,2025-01-31T14:15:34.130000 CVE-2025-0930,0,0,e48470a5aeaab134703b9f1449e9c6f114cca0e6b49cd331dee21f5acc590fd8,2025-01-31T14:15:34.293000 CVE-2025-0934,0,0,7e8683a58aa69f3607600fa24f0df4be73434b45019b29527732747368e49539,2025-01-31T20:15:32.893000 @@ -278931,7 +278936,7 @@ CVE-2025-1022,0,0,3584ff46175d68101a45d5993906f4257360866bbe28a87215bbd752fc41d7 CVE-2025-1025,0,0,169d790f70af0dd93c224d268df788909eaff4f4264ab0847532881b40bea08d,2025-02-05T20:15:45.593000 CVE-2025-1026,0,0,4962716a888aff2530344f294a2ddb1ab75b4c1e13e8d22f2bf72465d4df20aa,2025-02-05T05:15:10.687000 CVE-2025-1028,0,0,e6b466122e3fc2d0ee27df4e2f7cd7a187e72415f42ddc27a98c68b86b7822c0,2025-02-05T04:15:06.543000 -CVE-2025-1042,1,1,727597b2df8c6e5925af064d1c047222ac7870d4fb0653bc96def494163afd0b,2025-02-12T15:15:16.230000 +CVE-2025-1042,0,0,727597b2df8c6e5925af064d1c047222ac7870d4fb0653bc96def494163afd0b,2025-02-12T15:15:16.230000 CVE-2025-1044,0,0,f2d901015fc0e6049437a84a32809b8c4712e1d9cd344db9b24ed666ed368479,2025-02-11T20:15:35.913000 CVE-2025-1052,0,0,2558dc5aa326f4b5ba9a0b42415250f88c10a360fd02b001eec15ae5cce74dea,2025-02-11T20:15:36.070000 CVE-2025-1061,0,0,6a23092bda6a59b35939be3869c0d77fbfb36191dc775a19d3c3e005aa053667,2025-02-07T02:15:29.587000 @@ -279002,12 +279007,12 @@ CVE-2025-1179,0,0,0ad6d408a4c217fcd2f0909da4acda484e872fa130d8cbaf0a20fe64a3a013 CVE-2025-1180,0,0,d1d8d021051706334ac9a6030ae7ee53a7be8dad213687a1d844e003d2aa2979,2025-02-11T15:15:20.260000 CVE-2025-1181,0,0,5744a84c9cc40c25fd0c78ba42e9c10937962bb69eac9a569d4d076d61e43914,2025-02-11T15:15:20.393000 CVE-2025-1182,0,0,813fe4ea4720937754bba6fc4a1d1e3d64c610460d89e01f2f7be5cbad40fd72,2025-02-11T15:15:20.523000 -CVE-2025-1183,0,1,774bc5a8ee17c16ab02429df24e868edd2457f975924e971035ffcaf542b17ef,2025-02-12T15:15:16.520000 -CVE-2025-1184,0,1,a80fcc54a11609a5a903676e90c3038371980beaec234244c6e4d5dcbd7f3db1,2025-02-12T15:15:16.723000 -CVE-2025-1185,0,1,c83e5452fff0328a1e8da8da2083316337f86f3a81adf0b7358081e7c7fcd81c,2025-02-12T15:15:16.917000 -CVE-2025-1186,0,1,9576b7d4ea8b3cccc8eb9e8b907ade221983acd6c5734f425f9ff4db24f2feb3,2025-02-12T15:15:17.140000 +CVE-2025-1183,0,0,774bc5a8ee17c16ab02429df24e868edd2457f975924e971035ffcaf542b17ef,2025-02-12T15:15:16.520000 +CVE-2025-1184,0,0,a80fcc54a11609a5a903676e90c3038371980beaec234244c6e4d5dcbd7f3db1,2025-02-12T15:15:16.723000 +CVE-2025-1185,0,0,c83e5452fff0328a1e8da8da2083316337f86f3a81adf0b7358081e7c7fcd81c,2025-02-12T15:15:16.917000 +CVE-2025-1186,0,0,9576b7d4ea8b3cccc8eb9e8b907ade221983acd6c5734f425f9ff4db24f2feb3,2025-02-12T15:15:17.140000 CVE-2025-1187,0,0,43f3ee88fa37af31ad67e166fbe6ad94a2bfae0a2b2c2cfaf9fc12673460f41b,2025-02-12T09:15:08.613000 -CVE-2025-1188,0,1,1efd87eb623a2ea1602b65efb7de507f9509c349aa55c87850be5d94618279ae,2025-02-12T15:15:17.407000 +CVE-2025-1188,0,0,1efd87eb623a2ea1602b65efb7de507f9509c349aa55c87850be5d94618279ae,2025-02-12T15:15:17.407000 CVE-2025-1189,0,0,1e88f29d1eddbfa7a88b6fffffc75999f3d987abafd9713fdca1605bf31701ac,2025-02-12T10:15:14.540000 CVE-2025-1190,0,0,da811d3d30f112190fe172c4b017c4318948c541b09c054d804548ae31d5325a,2025-02-12T10:15:14.740000 CVE-2025-1191,0,0,5aa818843f7a22909fc3a5a1705ae5196aa4ef915cc6666902591e7b2650aa60,2025-02-12T11:15:08.480000 @@ -279015,21 +279020,25 @@ CVE-2025-1192,0,0,6662abddb119a1bb2c91cccf7b709a688f2700556834ad9992fdbf2fe1f52a CVE-2025-1193,0,0,fcc052109589eb1970f90d1d7ff13b99a2b86ca08fe73a0a45a738ed06ce3eca,2025-02-10T18:15:34.273000 CVE-2025-1195,0,0,1d5f3753255234f81d63fc32e8cbd40738b3a19f44c9909eb40a82bf5fa2574d,2025-02-12T12:15:29.397000 CVE-2025-1196,0,0,bdc527bc42a2927bc910f55434082c1c0a1ed3e2c45952ca78ca5e2ee1724965,2025-02-12T12:15:29.640000 -CVE-2025-1197,0,1,5354355ae236a276a3f65e5eda2738c028cb5c94e47feecf12db2011e1245866,2025-02-12T15:15:17.670000 +CVE-2025-1197,0,0,5354355ae236a276a3f65e5eda2738c028cb5c94e47feecf12db2011e1245866,2025-02-12T15:15:17.670000 CVE-2025-1199,0,0,40308126959111aa48c274698df5d37756e819953db27b036d6fb4be271f3515,2025-02-12T13:15:09.537000 CVE-2025-1200,0,0,ec3c8cc9571e223ae9867f7c93ea0eec88d8b939a6541467854106d434eb6669,2025-02-12T14:15:32.090000 CVE-2025-1201,0,0,24e3bd420cbcfaff5a7e819062f5cc675cd65d98fded880a84770beffbe4b0cf,2025-02-12T14:15:32.297000 -CVE-2025-1202,1,1,68ea7b6e33aa360ea653c2269e7bd31276265b58ef1ad4588d5cc5c63f0fd0d4,2025-02-12T15:15:17.920000 -CVE-2025-1206,1,1,1b63ab94a407914f1000aacda050b0a8aace04a77122bccf98ade88f280850b4,2025-02-12T15:15:18.093000 -CVE-2025-1207,1,1,7bb162a11374602cabef0a58114bb5e7ffacc992738e1b786794f1ef79474809,2025-02-12T16:15:44.393000 -CVE-2025-1208,1,1,4e2425a56d9b8fcaf9e973fed5e1d7aa050e90c0b8188ddb2cd5342cc89a1147,2025-02-12T16:15:44.613000 +CVE-2025-1202,0,0,68ea7b6e33aa360ea653c2269e7bd31276265b58ef1ad4588d5cc5c63f0fd0d4,2025-02-12T15:15:17.920000 +CVE-2025-1206,0,0,1b63ab94a407914f1000aacda050b0a8aace04a77122bccf98ade88f280850b4,2025-02-12T15:15:18.093000 +CVE-2025-1207,0,0,7bb162a11374602cabef0a58114bb5e7ffacc992738e1b786794f1ef79474809,2025-02-12T16:15:44.393000 +CVE-2025-1208,0,0,4e2425a56d9b8fcaf9e973fed5e1d7aa050e90c0b8188ddb2cd5342cc89a1147,2025-02-12T16:15:44.613000 +CVE-2025-1209,1,1,39df1f532a2d9d9573c21f211dd0313ad2d568b2202c0f4ce39c4b23cf181dda,2025-02-12T17:15:23.497000 +CVE-2025-1210,1,1,2e292c0723726264658fe8f8f32c69df9a1b75b6c58f1e3892f3ec6ccd53e9e0,2025-02-12T17:15:23.673000 CVE-2025-1211,0,0,6ad766f197b6f1fef6e3f3a893bb15bcbebd409cf163deb595b57c10dde2bea9,2025-02-11T16:15:50.660000 -CVE-2025-1212,1,1,98d80cb73dedae96f8bcc23c42b9fd82cdc0bbfed669e845fdc4caee22b5a462,2025-02-12T15:15:18.290000 +CVE-2025-1212,0,0,98d80cb73dedae96f8bcc23c42b9fd82cdc0bbfed669e845fdc4caee22b5a462,2025-02-12T15:15:18.290000 +CVE-2025-1213,1,1,68b0c9e37f46f9aec77275fa9abd0f6d730345a74d8832c46c0ff993ad281706,2025-02-12T18:15:22.180000 +CVE-2025-1214,1,1,67f5daa14dedfe7089e4e91b944bd7c1de456db300d97da41b918edaa501569c,2025-02-12T18:15:22.417000 CVE-2025-1230,0,0,f5f2c5099eb280f9d04dd16fe504952a8bf38601f6c57755a8e738275e60ce0c,2025-02-12T11:15:11.230000 CVE-2025-1231,0,0,649e1b02ffb9b2bdea0c0d5302a32991e98ee2dd95c7154e6cc11a5ff00876a1,2025-02-11T15:15:20.643000 CVE-2025-1240,0,0,9246fa8e04ff02b401e811c0a0ea877726af12834c8315ffa6c43657c8f2f12a,2025-02-11T22:15:29.800000 CVE-2025-1243,0,0,ce5d6de4aa6c9e357b98e042ebbfccf5742c455f48067e48b6f93d2620d3c5f5,2025-02-12T01:15:09.073000 -CVE-2025-1244,1,1,3a7066df433eb03dbb1a5156667b9922c9a48d520391bb584a7af3176d35b733,2025-02-12T15:15:18.430000 +CVE-2025-1244,0,0,3a7066df433eb03dbb1a5156667b9922c9a48d520391bb584a7af3176d35b733,2025-02-12T15:15:18.430000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,58d0a26aacf6cc700c9707f22937d4a9fd06e9e8ac5a17ed011c7efb874a7f40,2025-02-05T18:15:29.573000 @@ -279348,7 +279357,7 @@ CVE-2025-21386,0,0,587925b9f51c6f3c61d2c5fdab169ea945b83965a4922958f2a0d4035a486 CVE-2025-21387,0,0,45b75cfa0e3c3024e9e9758b140c1e6a57941eb5f03adacfbe13ff717267ca19,2025-02-11T18:15:37.337000 CVE-2025-21389,0,0,e0837d0e37718f09b2f4f6a27094db9197593cd197ddd111d928061563fd763e,2025-01-17T15:44:04.177000 CVE-2025-21390,0,0,14697f02c8baf4b55b17c007d56cdc55e364c61db4a64d4a3dca6609d3016329,2025-02-11T18:15:37.523000 -CVE-2025-21391,0,0,0010a0d8103c312adae0e6ab52ff5b2f6efb1301caae82c7257918d8825b7799,2025-02-12T02:00:01.980000 +CVE-2025-21391,0,1,83d419fda69ced06d53cbd61e13158fe3e31c56b8681059f3bb731201858f5f1,2025-02-12T18:14:53.363000 CVE-2025-21392,0,0,faf0d0e3f0fb591c7fa30ae6371bf66c37572648e7b14e075224882a96d4548d,2025-02-11T18:15:37.907000 CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000 CVE-2025-21394,0,0,17cc60461eb9eb8df29e62503902c081c32c2e62dd8a0d75bc2ce09b707ad17e,2025-02-11T18:15:38.100000 @@ -279371,7 +279380,7 @@ CVE-2025-21413,0,0,92246b94b6ff8ad6af923e8c9e956388783c15bc49ee5b2dd584abbbec413 CVE-2025-21414,0,0,3e2427e2ed7c2a71e7ca3cdd20bff3b54a00c32904d4ae8308a39097ff4a1289,2025-02-11T18:15:39.787000 CVE-2025-21415,0,0,a73e69cb370d0dac47b98a4826a11694e5572b74f5784ab533acee4e37f95f59,2025-02-07T14:11:24.557000 CVE-2025-21417,0,0,2747c56c84381d3763059eec5080d6fa07a433b2e87fb1f1180b0a05545552d9,2025-01-16T20:34:03.303000 -CVE-2025-21418,0,0,3ae3c511b74f45afb2582057b40d6d6e504500f2e441f4a2e37971243dae5c45,2025-02-12T02:00:01.980000 +CVE-2025-21418,0,1,286c461de95fba525ffd95fe19188a97b0613df56bf1afe14ca9be4aa494d718,2025-02-12T18:14:34.870000 CVE-2025-21419,0,0,8d4a4ce1854ce64d5e9a1632a620dc74ee76e1214f2cab758271d527d93a2f57,2025-02-11T18:15:40.227000 CVE-2025-21420,0,0,4b5efeb1f002453a12ea1479627a151320581653d00a87f90e1240101e9780c2,2025-02-11T18:15:40.427000 CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000 @@ -280023,7 +280032,7 @@ CVE-2025-23088,0,0,845d9312418bf4c13a6587b45a3978c9579f09ecb2202802a6894efed1c83 CVE-2025-23089,0,0,3ae0cb484c93b409c89c5203f6cad39f49e4ea73c8d9d46c331f864ca1913e9e,2025-02-10T23:15:15.960000 CVE-2025-23090,0,0,db1a04b33215738ef9ff89e7dd3243ce6839535b0728d9bb0d1927af1170accb,2025-02-11T00:15:29.570000 CVE-2025-23091,0,0,985e1a5bbb967b5c47b75684c18e18b6f1b255a13df4e133de56c4c9f7af4ed8,2025-02-01T07:15:08.277000 -CVE-2025-23093,0,1,7320826aecf4e98ab5895586ea1e6e8575244a0f095c3e1b8e12bb0d362e3614,2025-02-12T15:15:18.597000 +CVE-2025-23093,0,0,7320826aecf4e98ab5895586ea1e6e8575244a0f095c3e1b8e12bb0d362e3614,2025-02-12T15:15:18.597000 CVE-2025-23094,0,0,7cea7e6e51afc006925b4e48de2308fe64516f9177080ff30f9a60f654ae9082,2025-02-11T22:15:30.597000 CVE-2025-23108,0,0,0867ae52bf9537919e00df206497183b5abf45a3a43e56579f476cc3d26e8d6c,2025-01-13T18:15:22.680000 CVE-2025-23109,0,0,4d519c5c41161d21ebd8f814ea3659acc2224a598528dd7d3e4c7b87a5ad8cc0,2025-01-13T18:15:22.903000 @@ -280315,7 +280324,7 @@ CVE-2025-23794,0,0,8097f4da128cc9925b9ca616a7ea5eba076c4b40e08f589897a5a808ba282 CVE-2025-23795,0,0,f110438d2af14e24d173b3605ff2ed725867872c4e87dee92040f4ebb58e5378,2025-01-16T21:15:20.567000 CVE-2025-23796,0,0,0a3fabd756343760fb9fd7ea1faf1fd87c92ac1431e709162d1ddbc10e973b0c,2025-01-16T21:15:20.727000 CVE-2025-23797,0,0,082b5b5ea2fb63d11c655fbf0b483df0d8fb7cfd44eb169c32045a13b0f3b570,2025-01-16T21:15:20.877000 -CVE-2025-23798,0,1,707c49293c33d181ff5a97e7158413a43279428c770e750f95afaf56a8f385d6,2025-02-12T16:15:45.630000 +CVE-2025-23798,0,0,707c49293c33d181ff5a97e7158413a43279428c770e750f95afaf56a8f385d6,2025-02-12T16:15:45.630000 CVE-2025-23799,0,0,11bdf56dd0c8d60a8e7ce20b6fe107d6d81aa05ec15436d7d55867128885bddf,2025-02-03T15:15:22.843000 CVE-2025-23800,0,0,878d719ae1f903e32e2d6add2209886c141de252f651652314e69251a4a34fb9,2025-01-16T21:15:21.040000 CVE-2025-23801,0,0,f35c3b1c7ca35d2725621e19aa2aa2edc970115b0f68db658f0c8dc9dcb2d2ec,2025-01-16T21:15:21.190000 @@ -280985,7 +280994,9 @@ CVE-2025-25166,0,0,f5428199d8b191f5ec9fa7a05ec98d82647ebea96576afd260370950cb514 CVE-2025-25167,0,0,e14b9eb6e466e19d148bb81d5cb2df8f805c1241e9a9e8cd6260db11c719e980,2025-02-11T18:22:46.253000 CVE-2025-25168,0,0,93fb1477ac0fd147322a0beee26e3b74949bd1187f727ff11033ff5c839391ea,2025-02-11T18:21:01.407000 CVE-2025-25181,0,0,4d67ec539e847fe84660f43fd38b8d53f4b38c60fadbe4831b0e67bce31509f3,2025-02-06T18:15:33.030000 +CVE-2025-25182,1,1,64280d7db04109963693dbc8015e92170c0284dbb6fcfe83001673344b00fbca,2025-02-12T17:15:23.857000 CVE-2025-25183,0,0,a47fca60ce37f6e1f3d8c94fd73efeedc3b0f25b6d56a99cb911f6f7e296e3c6,2025-02-07T20:15:34.083000 +CVE-2025-25184,1,1,da1f308555a06e8b02c320706e3f5316212b3a6aaa78cf93b3c9bb2145b60550,2025-02-12T17:15:24 CVE-2025-25186,0,0,0205c857b4612f901b3cb92f8e70791e0cbe09c1a93a7c537cdaad0cfd7899a7,2025-02-10T16:15:39.457000 CVE-2025-25187,0,0,2b81c5f951bb7e07fb63bf54d1bd2aed0ca277e6f07fbddfbea8ce9282b1b7f5,2025-02-10T18:15:35.703000 CVE-2025-25188,0,0,c9450c0ac62ca2c2003d4bcce62b087763421ef3d868f3e4422e47bb0dd652e8,2025-02-10T18:15:35.827000 @@ -280993,14 +281004,17 @@ CVE-2025-25189,0,0,d83847fe96d00072b7a8190c91ae5b2afdfef2e676164ac0785259c0f2731 CVE-2025-25190,0,0,e0da5cc0fc69e9aeec609eb916069649e239fce8ec02b2e1997642ab3a06ba52,2025-02-11T16:15:52.420000 CVE-2025-25193,0,0,6313f18b0cc99557f7bb698f851fc47bc1114c9ea466bbb50c1e509a16b993db,2025-02-11T16:15:52.523000 CVE-2025-25194,0,0,3cfb92d0adf1aa48727a5bef815057c2df69f4fc0b8dbd2b306994cdf6b88680,2025-02-10T23:15:16.067000 +CVE-2025-25198,1,1,d4f423b8575a2b0e0c47d1cd874c15fb2da6a6a46ceaec62c0bfc272e6cf57b7,2025-02-12T18:15:27.757000 +CVE-2025-25199,1,1,55e40815cd021635d25d7610751f977ce7b772f67293cccb8c9a688735660385,2025-02-12T18:15:27.933000 +CVE-2025-25200,1,1,d6d93214f4d6798953c0e0fa47b183b15bf44476b4a6776cbce9ace0bba1be52,2025-02-12T18:15:28.110000 CVE-2025-25202,0,0,44a9f4b6846ddccd75106a09a7d9e63e6d44f1833e59d9edfd1f84930b624155,2025-02-11T19:15:18.690000 CVE-2025-25203,0,0,fafc3c78a1f4e39a87b4d68e2295b38c2910ef2359dd9409bb1510258a4c87e7,2025-02-11T23:15:09.450000 CVE-2025-25241,0,0,3f1a5e9f52cb19b464445ba11bc8902290ee3de6281565f07fab135133fb799f,2025-02-11T06:15:24.120000 CVE-2025-25243,0,0,4a1fb2a2f647dbb24d92bc1eec2013806163e245973af288dc8e801924ea4b36,2025-02-11T06:15:24.330000 CVE-2025-25246,0,0,0ae0916aaea4283fe6ce79729127d0aa8edfdf07242f3416b5c2d5ec885c2c98,2025-02-05T05:15:11.663000 CVE-2025-25247,0,0,2690485555121cc3195beb93ff27e2a62b28c4f65e937f10f15ef11f9c4f824a,2025-02-10T15:15:13.333000 -CVE-2025-25349,1,1,1719e1721d7487688b7bcc870b24d655aa6de7ad5dd7048ecc08987a1985507b,2025-02-12T16:15:46.323000 -CVE-2025-25351,1,1,cdcd8e58bc2d04652968c3d47eedc1a7504f4c099db31cb878d22be60d38fffe,2025-02-12T16:15:46.453000 +CVE-2025-25349,0,0,1719e1721d7487688b7bcc870b24d655aa6de7ad5dd7048ecc08987a1985507b,2025-02-12T16:15:46.323000 +CVE-2025-25351,0,0,cdcd8e58bc2d04652968c3d47eedc1a7504f4c099db31cb878d22be60d38fffe,2025-02-12T16:15:46.453000 CVE-2025-25522,0,0,134d853c7acffe14f61ea9663eafcc5a3836051c19c8c173c6beae54efc4aa8e,2025-02-11T19:15:18.883000 CVE-2025-25523,0,0,be3d6367d2839ada2e950cba54f10f43e3987782bf2b0625985a3811b208de0b,2025-02-11T19:15:19 CVE-2025-25524,0,0,266e58e31a39a594c7ade747d38a7ddd90ae4d066937745ff84387f801bb03fe,2025-02-11T19:15:19.110000 @@ -281010,13 +281024,18 @@ CVE-2025-25527,0,0,314211c8189b7aa6a1a7e96a439066093948b3b95219e59fa2c06aefb556d CVE-2025-25528,0,0,5b917e62e0ef1905194ac4a608df812ee8814d382f2458a64eace04d90b10d0b,2025-02-11T20:15:39.090000 CVE-2025-25529,0,0,3b7615b283527305fc75ac9cfd1583c3a2f40f867f0fe9298be0be0d4f070094,2025-02-11T20:15:39.217000 CVE-2025-25530,0,0,b297970422a9009f3519f09d12d391c8a089497e9f856b7f5a138869935d03dd,2025-02-11T20:15:39.327000 +CVE-2025-25741,1,1,22c247f082a192b17144b46680a5eeb4753c15967349cf8359d498374cba430c,2025-02-12T18:15:28.293000 +CVE-2025-25742,1,1,7436abbf9896837a8de9002dbff5d07a1a7a57435c6244cea579f542c949c30d,2025-02-12T17:15:24.150000 +CVE-2025-25743,1,1,b33e96b73fe5d43e977fc05d5d723c6f65971127b3785cb42153a064e7d1dfa8,2025-02-12T17:15:24.270000 +CVE-2025-25744,1,1,628a606d8113015dc92f83451c33b7ec9f2d546fbac6214e1a09b8ec06580c92,2025-02-12T17:15:24.390000 +CVE-2025-25746,1,1,c4b5e6feeed888e613a77cde223f386a53a94e2f5f7e2eda511c12e6c183117d,2025-02-12T17:15:24.500000 CVE-2025-26339,0,0,bf29cf27bf0313878ff158c2baab3319b314e90402d364b4bae80b0ff3690b84,2025-02-12T14:15:33.510000 CVE-2025-26340,0,0,b066968dbbcdbf77631ff8578b94ee75e5d24efc878ed88726b86433606826d8,2025-02-12T14:15:33.650000 CVE-2025-26341,0,0,66ba8ee45cc95ad8cd01c50f18902be4ac8bf5285c3bc5f97b6c1e0be981e1ce,2025-02-12T14:15:33.857000 CVE-2025-26342,0,0,ec590c8f9a9ed71815ba8dc7d1d5274f9fb3cdbb158dcafc881d5c3e868b5bcc,2025-02-12T14:15:33.990000 CVE-2025-26343,0,0,960dad3fa07bb87cc9332137716edb3330260b7ab45b51fcec9fea40519bf486,2025-02-12T14:15:34.130000 -CVE-2025-26344,0,1,4ef803a2f81991b5d659cb2827cea363defd6bba023204f95b005089922a982e,2025-02-12T15:15:18.757000 -CVE-2025-26345,0,1,5c179481c8be0ec34986e1d99bcd057b8698cdc095e04bcfaf1d5c623e6c83ab,2025-02-12T15:15:18.930000 +CVE-2025-26344,0,0,4ef803a2f81991b5d659cb2827cea363defd6bba023204f95b005089922a982e,2025-02-12T15:15:18.757000 +CVE-2025-26345,0,0,5c179481c8be0ec34986e1d99bcd057b8698cdc095e04bcfaf1d5c623e6c83ab,2025-02-12T15:15:18.930000 CVE-2025-26346,0,0,ff46d94f3110b344929b215ebaf0199f7406977b937594b1a9a41e51235b705e,2025-02-12T14:15:34.547000 CVE-2025-26347,0,0,07d9e939484eaa1ff4cdabd23cc3e3b64f9cc51758eba62a62b4576177e93bd5,2025-02-12T14:15:34.687000 CVE-2025-26348,0,0,2549e0690fe0b2289debff5715a31c0858579e4a52666873108e808e7a1391f3,2025-02-12T14:15:34.827000