From 76544d586c8be3d169182a217e5f3f7ca7b72994 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 27 Jan 2025 17:04:07 +0000 Subject: [PATCH] Auto-Update: 2025-01-27T17:00:41.178643+00:00 --- CVE-2021/CVE-2021-471xx/CVE-2021-47183.json | 79 ++++++- CVE-2023/CVE-2023-358xx/CVE-2023-35888.json | 71 ++++++- CVE-2023/CVE-2023-471xx/CVE-2023-47159.json | 56 +++++ CVE-2023/CVE-2023-522xx/CVE-2023-52292.json | 56 +++++ CVE-2023/CVE-2023-526xx/CVE-2023-52646.json | 205 ++++++++++++++++-- CVE-2024/CVE-2024-103xx/CVE-2024-10360.json | 42 +++- CVE-2024/CVE-2024-127xx/CVE-2024-12774.json | 27 ++- CVE-2024/CVE-2024-21xx/CVE-2024-2131.json | 74 ++++++- CVE-2024/CVE-2024-223xx/CVE-2024-22316.json | 56 +++++ CVE-2024/CVE-2024-22xx/CVE-2024-2255.json | 84 +++++++- CVE-2024/CVE-2024-25xx/CVE-2024-2558.json | 97 ++++++++- CVE-2024/CVE-2024-25xx/CVE-2024-2559.json | 87 +++++++- CVE-2024/CVE-2024-268xx/CVE-2024-26863.json | 224 ++++++++++++++++++-- CVE-2024/CVE-2024-268xx/CVE-2024-26866.json | 114 +++++++++- CVE-2024/CVE-2024-268xx/CVE-2024-26879.json | 148 +++++++++++-- CVE-2024/CVE-2024-268xx/CVE-2024-26893.json | 131 ++++++++++-- CVE-2024/CVE-2024-291xx/CVE-2024-29101.json | 52 ++++- CVE-2024/CVE-2024-291xx/CVE-2024-29106.json | 52 ++++- CVE-2024/CVE-2024-299xx/CVE-2024-29920.json | 52 ++++- CVE-2024/CVE-2024-345xx/CVE-2024-34562.json | 52 ++++- CVE-2024/CVE-2024-375xx/CVE-2024-37527.json | 56 +++++ CVE-2024/CVE-2024-383xx/CVE-2024-38320.json | 60 ++++++ CVE-2024/CVE-2024-383xx/CVE-2024-38325.json | 56 +++++ CVE-2024/CVE-2024-38xx/CVE-2024-3879.json | 111 +++++++++- CVE-2024/CVE-2024-38xx/CVE-2024-3880.json | 101 ++++++++- CVE-2024/CVE-2024-38xx/CVE-2024-3881.json | 111 +++++++++- CVE-2024/CVE-2024-38xx/CVE-2024-3882.json | 111 +++++++++- CVE-2024/CVE-2024-41xx/CVE-2024-4111.json | 111 +++++++++- CVE-2024/CVE-2024-41xx/CVE-2024-4112.json | 111 +++++++++- CVE-2024/CVE-2024-41xx/CVE-2024-4114.json | 111 +++++++++- CVE-2024/CVE-2024-455xx/CVE-2024-45598.json | 60 ++++++ CVE-2024/CVE-2024-506xx/CVE-2024-50697.json | 43 +++- CVE-2024/CVE-2024-575xx/CVE-2024-57590.json | 21 ++ CVE-2024/CVE-2024-575xx/CVE-2024-57595.json | 60 ++++++ CVE-2025/CVE-2025-235xx/CVE-2025-23529.json | 56 +++++ CVE-2025/CVE-2025-235xx/CVE-2025-23531.json | 56 +++++ CVE-2025/CVE-2025-235xx/CVE-2025-23574.json | 56 +++++ CVE-2025/CVE-2025-236xx/CVE-2025-23656.json | 56 +++++ CVE-2025/CVE-2025-236xx/CVE-2025-23669.json | 56 +++++ CVE-2025/CVE-2025-237xx/CVE-2025-23752.json | 56 +++++ CVE-2025/CVE-2025-237xx/CVE-2025-23754.json | 56 +++++ CVE-2025/CVE-2025-237xx/CVE-2025-23756.json | 56 +++++ CVE-2025/CVE-2025-238xx/CVE-2025-23849.json | 56 +++++ CVE-2025/CVE-2025-239xx/CVE-2025-23982.json | 56 +++++ CVE-2025/CVE-2025-245xx/CVE-2025-24537.json | 56 +++++ CVE-2025/CVE-2025-245xx/CVE-2025-24538.json | 56 +++++ CVE-2025/CVE-2025-245xx/CVE-2025-24540.json | 56 +++++ CVE-2025/CVE-2025-245xx/CVE-2025-24590.json | 56 +++++ CVE-2025/CVE-2025-245xx/CVE-2025-24593.json | 56 +++++ CVE-2025/CVE-2025-246xx/CVE-2025-24600.json | 56 +++++ CVE-2025/CVE-2025-246xx/CVE-2025-24603.json | 56 +++++ CVE-2025/CVE-2025-246xx/CVE-2025-24606.json | 56 +++++ CVE-2025/CVE-2025-246xx/CVE-2025-24626.json | 56 +++++ CVE-2025/CVE-2025-246xx/CVE-2025-24628.json | 56 +++++ CVE-2025/CVE-2025-246xx/CVE-2025-24653.json | 56 +++++ CVE-2025/CVE-2025-246xx/CVE-2025-24662.json | 56 +++++ CVE-2025/CVE-2025-246xx/CVE-2025-24665.json | 56 +++++ CVE-2025/CVE-2025-246xx/CVE-2025-24667.json | 56 +++++ CVE-2025/CVE-2025-246xx/CVE-2025-24671.json | 56 +++++ CVE-2025/CVE-2025-246xx/CVE-2025-24680.json | 56 +++++ CVE-2025/CVE-2025-246xx/CVE-2025-24689.json | 56 +++++ CVE-2025/CVE-2025-247xx/CVE-2025-24708.json | 56 +++++ CVE-2025/CVE-2025-247xx/CVE-2025-24734.json | 56 +++++ CVE-2025/CVE-2025-247xx/CVE-2025-24740.json | 56 +++++ CVE-2025/CVE-2025-247xx/CVE-2025-24741.json | 56 +++++ CVE-2025/CVE-2025-247xx/CVE-2025-24742.json | 56 +++++ CVE-2025/CVE-2025-247xx/CVE-2025-24743.json | 56 +++++ CVE-2025/CVE-2025-247xx/CVE-2025-24744.json | 56 +++++ CVE-2025/CVE-2025-247xx/CVE-2025-24747.json | 56 +++++ CVE-2025/CVE-2025-247xx/CVE-2025-24782.json | 56 +++++ CVE-2025/CVE-2025-247xx/CVE-2025-24783.json | 40 ++++ README.md | 91 ++++---- _state.csv | 158 +++++++++----- 73 files changed, 4879 insertions(+), 308 deletions(-) create mode 100644 CVE-2023/CVE-2023-471xx/CVE-2023-47159.json create mode 100644 CVE-2023/CVE-2023-522xx/CVE-2023-52292.json create mode 100644 CVE-2024/CVE-2024-223xx/CVE-2024-22316.json create mode 100644 CVE-2024/CVE-2024-375xx/CVE-2024-37527.json create mode 100644 CVE-2024/CVE-2024-383xx/CVE-2024-38320.json create mode 100644 CVE-2024/CVE-2024-383xx/CVE-2024-38325.json create mode 100644 CVE-2024/CVE-2024-455xx/CVE-2024-45598.json create mode 100644 CVE-2024/CVE-2024-575xx/CVE-2024-57590.json create mode 100644 CVE-2024/CVE-2024-575xx/CVE-2024-57595.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23529.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23531.json create mode 100644 CVE-2025/CVE-2025-235xx/CVE-2025-23574.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23656.json create mode 100644 CVE-2025/CVE-2025-236xx/CVE-2025-23669.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23752.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23754.json create mode 100644 CVE-2025/CVE-2025-237xx/CVE-2025-23756.json create mode 100644 CVE-2025/CVE-2025-238xx/CVE-2025-23849.json create mode 100644 CVE-2025/CVE-2025-239xx/CVE-2025-23982.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24537.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24538.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24540.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24590.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24593.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24600.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24603.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24606.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24626.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24628.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24653.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24662.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24665.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24667.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24671.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24680.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24689.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24708.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24734.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24740.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24741.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24742.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24743.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24744.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24747.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24782.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24783.json diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47183.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47183.json index 9859fc0ef3b..cb7d13edda8 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47183.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47183.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47183", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:47.287", - "lastModified": "2024-11-21T06:35:34.553", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T15:03:17.013", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,88 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: lpfc: Se soluciona el procesamiento de enlace inactivo para abordar la desreferencia de puntero NULL Si una transici\u00f3n de enlace inactivo FC mientras hay PLOGI pendientes para direcciones conocidas de Fabric, las solicitudes ABTS pendientes pueden resultar en una desreferencia de puntero NULL. Las solicitudes de descarga del controlador pueden bloquearse con mensajes de registro \"2878\" repetidos. El procesamiento de enlace inactivo da como resultado solicitudes ABTS para solicitudes ELS pendientes. Los WQE de cancelaci\u00f3n se env\u00edan para los ELS antes de que el controlador haya establecido el estado del enlace en inactivo. Por lo tanto, el controlador env\u00eda la cancelaci\u00f3n con la expectativa de que se env\u00ede una ABTS en el cable. La solicitud de cancelaci\u00f3n se detiene esperando que se active el enlace. En algunas condiciones, el controlador puede completar autom\u00e1ticamente los ELS, por lo que si el enlace se activa, las finalizaciones de cancelaci\u00f3n pueden hacer referencia a una estructura no v\u00e1lida. Se soluciona asegur\u00e1ndose de que la cancelaci\u00f3n establezca el indicador para evitar el tr\u00e1fico de enlace si se emite debido a condiciones en las que el enlace fall\u00f3." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.5", + "matchCriteriaId": "B2845F69-264B-45BD-B7E7-D12B24338382" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1854f53ccd88ad4e7568ddfafafffe71f1ceb0a6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/28de48a7cea495ab48082d9ff4ef63f7cb4e563a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1854f53ccd88ad4e7568ddfafafffe71f1ceb0a6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/28de48a7cea495ab48082d9ff4ef63f7cb4e563a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35888.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35888.json index 46170b5b7f8..3274f1ca943 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35888.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35888.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35888", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-20T14:15:08.183", - "lastModified": "2024-11-21T08:08:55.497", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T15:18:19.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -49,24 +69,63 @@ "value": "CWE-311" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_verify_governance:10.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A0412C4E-CCDF-4DAE-88B2-1D006F696ED7" + } + ] + } + ] } ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/258375", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7144228", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/258375", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7144228", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47159.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47159.json new file mode 100644 index 00000000000..6e1164d00cc --- /dev/null +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47159.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47159", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-27T16:15:29.593", + "lastModified": "2025-01-27T16:15:29.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Sterling File Gateway 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.1 could allow an authenticated user to enumerate usernames due to an observable discrepancy in request responses." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-204" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7176083", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52292.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52292.json new file mode 100644 index 00000000000..d360f29c4cf --- /dev/null +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52292.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-52292", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-27T16:15:29.767", + "lastModified": "2025-01-27T16:15:29.767", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Sterling File Gateway 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7176079", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52646.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52646.json index a3b63651d84..f73cefab02c 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52646.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52646.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52646", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-26T13:15:46.453", - "lastModified": "2024-11-21T08:40:16.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T15:09:48.333", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,63 +15,234 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: aio: corrige mremap despu\u00e9s de la bifurcaci\u00f3n null-deref Commit e4a0d3e720e7 (\"aio: Make it posible reasignar el anillo aio\") introdujo un null-deref si se llama a mremap en un mapeo aio antiguo despu\u00e9s de la bifurcaci\u00f3n como mm->ioctx_table se establecer\u00e1 en NULL. [jmoyer@redhat.com: soluciona el problema de 80 columnas]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.19", + "versionEndExcluding": "4.14.306", + "matchCriteriaId": "5265EE87-658B-4C39-8539-7587327F4439" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.273", + "matchCriteriaId": "FC86F278-A337-4A8A-A7BB-758898345802" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.232", + "matchCriteriaId": "9C6E0696-3702-4B0C-A102-2753BDC8C3D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.169", + "matchCriteriaId": "D8E6784B-A00F-47F0-882B-7209E1F374B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.95", + "matchCriteriaId": "8508F80E-8588-4976-A2BA-7A2D85018C4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.13", + "matchCriteriaId": "CE354BE6-0C0F-47EB-AD8A-1433F041AC20" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*", + "matchCriteriaId": "D34127CC-68F5-4703-A5F6-5006F803E4AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*", + "matchCriteriaId": "4AB8D555-648E-4F2F-98BD-3E7F45BD12A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C64BDD9D-C663-4E75-AE06-356EDC392B82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc8:*:*:*:*:*:*", + "matchCriteriaId": "26544390-88E4-41CA-98BF-7BB1E9D4E243" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/178993157e8c50aef7f35d7d6d3b44bb428199e1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4326d0080f7e84fba775da41d158f46cf9d3f1c2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/808f1e4b5723ae4eda724d2ad6f6638905eefd95", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/81e9d6f8647650a7bead74c5f926e29970e834d1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af126acf01a12bdb04986fd26fc2eb3b40249e0d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c261f798f7baa8080cf0214081d43d5f86bb073f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d8dca1bfe9adcae38b35add64977818c0c13dd22", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/178993157e8c50aef7f35d7d6d3b44bb428199e1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4326d0080f7e84fba775da41d158f46cf9d3f1c2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/808f1e4b5723ae4eda724d2ad6f6638905eefd95", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/81e9d6f8647650a7bead74c5f926e29970e834d1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af126acf01a12bdb04986fd26fc2eb3b40249e0d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c261f798f7baa8080cf0214081d43d5f86bb073f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d8dca1bfe9adcae38b35add64977818c0c13dd22", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10360.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10360.json index 137244af94c..0362045c442 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10360.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10360.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10360", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T11:15:03.797", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T15:19:13.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,50 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moveaddons:move_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.6", + "matchCriteriaId": "C1A8351E-C1BD-45F0-BD3E-1F611E9822A6" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3176341/move-addons", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eafe73b4-b492-45c7-adca-d9a3042144b4?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12774.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12774.json index a8c1b034bb2..0b5925cc402 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12774.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12774.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12774", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-27T06:15:22.860", - "lastModified": "2025-01-27T06:15:22.860", + "lastModified": "2025-01-27T15:15:09.803", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Altra Side Menu WordPress plugin through 2.0 does not have CSRF checks in some places, which could allow attackers to make logged in admins delete arbitrary menu via a CSRF attack" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/8decbef5-f106-488b-925c-42b3b280460a/", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2131.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2131.json index 6913cf7e464..920aeac3347 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2131.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2131.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2131", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-23T02:15:47.300", - "lastModified": "2024-11-21T09:09:05.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T15:20:06.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moveaddons:move_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.0", + "matchCriteriaId": "6189F804-2AA9-427A-9ADE-B53C2C65D877" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3048903%40move-addons&new=3048903%40move-addons&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7b6af5a-ad44-4dd6-9ce1-6fcbd28f8ebe?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3048903%40move-addons&new=3048903%40move-addons&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7b6af5a-ad44-4dd6-9ce1-6fcbd28f8ebe?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22316.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22316.json new file mode 100644 index 00000000000..b2016d8e68a --- /dev/null +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22316.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-22316", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-27T16:15:30.637", + "lastModified": "2025-01-27T16:15:30.637", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Sterling File Gateway 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.1 could allow an authenticated user to perform unauthorized actions to another user's data due to improper access controls." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7176083", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2255.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2255.json index 4ed62bd40b2..60aadec4d6a 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2255.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2255.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2255", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-20T04:15:10.840", - "lastModified": "2024-11-21T09:09:21.510", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T15:26:09.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.5.3", + "matchCriteriaId": "A8DE6632-2C11-41D3-8D51-53F973A1743A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/essential-blocks/tags/4.5.2/blocks/TableOfContents.php#L120", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3053199/essential-blocks/trunk/blocks/TableOfContents.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cfcd59ae-085f-47d2-a4d2-2d1239f035d2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/essential-blocks/tags/4.5.2/blocks/TableOfContents.php#L120", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3053199/essential-blocks/trunk/blocks/TableOfContents.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cfcd59ae-085f-47d2-a4d2-2d1239f035d2?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2558.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2558.json index adf2652ed29..c1bd06bb713 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2558.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2558.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2558", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T09:15:07.253", - "lastModified": "2024-11-21T09:10:00.450", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T16:56:47.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,32 +94,93 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*", + "matchCriteriaId": "4D5CB727-FC6B-4212-A61E-2888A0DADFB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF9F8AF9-F921-4348-922B-EE5E6037E7AC" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formexeCommand.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257057", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257057", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formexeCommand.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257057", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257057", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2559.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2559.json index c524d2ea082..ffa45acc290 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2559.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2559.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2559", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T10:15:06.923", - "lastModified": "2024-11-21T09:10:00.610", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T16:50:41.160", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -76,30 +96,81 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*", + "matchCriteriaId": "4D5CB727-FC6B-4212-A61E-2888A0DADFB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF9F8AF9-F921-4348-922B-EE5E6037E7AC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolReboot.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257058", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257058", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolReboot.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257058", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257058", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26863.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26863.json index 0691fc0bf43..70622580f35 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26863.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26863.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26863", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.100", - "lastModified": "2024-11-21T09:03:14.533", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T15:05:39.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,87 +15,265 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: hsr: corrigi\u00f3 el acceso a valores uninit en hsr_get_node() KMSAN inform\u00f3 el siguiente problema de acceso a valores uninit [1]: ============== ======================================= ERROR: KMSAN: valor uninit en hsr_get_node+0xa2e /0xa40 net/hsr/hsr_framereg.c:246 hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246 fill_frame_info net/hsr/hsr_forward.c:577 [en l\u00ednea] hsr_forward_skb+0xe12/0x30e0 net/hsr/hsr_forward.c :615 hsr_dev_xmit+0x1a1/0x270 net/hsr/hsr_device.c:223 __netdev_start_xmit include/linux/netdevice.h:4940 [en l\u00ednea] netdev_start_xmit include/linux/netdevice.h:4954 [en l\u00ednea] xmit_one net/core/dev.c :3548 [en l\u00ednea] dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564 __dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349 dev_queue_xmit include/linux/netdevice.h:3134 [en l\u00ednea] paquete_xmit+0x9c/ 0x6b0 net/packet/af_packet.c:276 paquete_snd net/packet/af_packet.c:3087 [en l\u00ednea] paquete_sendmsg+0x8b1d/0x9f30 net/packet/af_packet.c:3119 sock_sendmsg_nosec net/socket.c:730 [en l\u00ednea] __sock_sendmsg neto /socket.c:745 [en l\u00ednea] __sys_sendto+0x735/0xa10 net/socket.c:2191 __do_sys_sendto net/socket.c:2203 [en l\u00ednea] __se_sys_sendto net/socket.c:2199 [en l\u00ednea] __x64_sys_sendto+0x125/0x1c0 socket.c:2199 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x63/0x6b Uninit se cre\u00f3 en slab_post_alloc_hook+0x129/ 0xa70 mm/slab.h: 768 slab_alloc_node mm/slub.c: 3478 [inline] kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c: 3523 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c: 560 __b.biloc. 740 net/core/skbuff.c:651 alloc_skb include/linux/skbuff.h:1286 [en l\u00ednea] alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334 sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787 paquete_alloc_skb net/packet/af_packet.c:2936 [en l\u00ednea] paquete_snd net/packet/af_packet.c:3030 [en l\u00ednea] paquete_sendmsg+0x70e8/0x9f30 net/packet/af_packet.c:3119 sock_sendmsg_nosec net/socket.c:730 [en l\u00ednea ] __sock_sendmsg net/socket.c:745 [en l\u00ednea] __sys_sendto+0x735/0xa10 net/socket.c:2191 __do_sys_sendto net/socket.c:2203 [en l\u00ednea] __se_sys_sendto net/socket.c:2199 [en l\u00ednea] x125/ 0x1c0 net/socket.c:2199 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x63/0x6b CPU: 1 PID: 5033 Comm: syz-executor334 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 17/11/2023 ============== ======================================== Si el campo ID de tipo de paquete en el encabezado Ethernet es ETH_P_PRP o ETH_P_HSR, pero no va seguido de una etiqueta HSR, hsr_get_skb_sequence_nr() lee un valor no v\u00e1lido como un n\u00famero de secuencia. Esto causa el problema anterior. Este parche soluciona el problema al devolver NULL si el encabezado Ethernet no va seguido de una etiqueta HSR." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.17", + "versionEndExcluding": "4.19.311", + "matchCriteriaId": "C74CBB27-D006-49E7-95E9-B9636C39B956" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.273", + "matchCriteriaId": "620FD8B7-BF03-43E0-951A-0A58461D4C55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.214", + "matchCriteriaId": "65987874-467B-4D3B-91D6-68A129B34FB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.153", + "matchCriteriaId": "ACB69438-845D-4E3C-B114-3140611F9C0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "121A07F6-F505-4C47-86BF-9BB6CC7B6C19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/09e5cdbe2cc88c3c758927644a3eb02fac317209", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1ed222ca7396938eb1ab2d034f1ba0d8b00a7122", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/39cc316fb3bc5e7c9dc5eed314fe510d119c6862", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7fb2d4d6bb1c85f7a23aace0ed6c86a95dea792a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/889ed056eae7fda85b769a9ab33c093379c45428", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/97d2148ea435dff4b4e71817c9032eb321bcd37e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a809bbfd0e503351d3051317288a70a4569a4949", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ddbec99f58571301679addbc022256970ca3eac6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e3b2bfb8ff1810a537b2aa55ba906a6743ed120c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/09e5cdbe2cc88c3c758927644a3eb02fac317209", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1ed222ca7396938eb1ab2d034f1ba0d8b00a7122", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/39cc316fb3bc5e7c9dc5eed314fe510d119c6862", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7fb2d4d6bb1c85f7a23aace0ed6c86a95dea792a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/889ed056eae7fda85b769a9ab33c093379c45428", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/97d2148ea435dff4b4e71817c9032eb321bcd37e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a809bbfd0e503351d3051317288a70a4569a4949", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ddbec99f58571301679addbc022256970ca3eac6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e3b2bfb8ff1810a537b2aa55ba906a6743ed120c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26866.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26866.json index b158b60ecb1..cc519d81c98 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26866.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26866.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26866", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.253", - "lastModified": "2024-11-21T09:03:15.000", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T15:08:19.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: lpspi: evita el posible use-after-free en probe() fsl_lpspi_probe() est\u00e1 asignando/eliminando memoria manualmente con spi_alloc_host()/spi_alloc_target(), pero usa devm_spi_register_controller() . En caso de error despu\u00e9s de la \u00faltima llamada, la memoria se liberar\u00e1 expl\u00edcitamente en la funci\u00f3n de sonda mediante la llamada a spi_controller_put(), pero la administraci\u00f3n \"devm\" externa a probe() la utilizar\u00e1 despu\u00e9s (spi_unregister_controller() <- devm_spi_unregister() a continuaci\u00f3n). No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000070... Rastreo de llamadas: kernfs_find_ns kernfs_find_and_get_ns sysfs_remove_group sysfs_remove_groups device_remove_attrs device_del spi_unregister_controller devm_spi_unregister release_nodes devres_release _todos realmente_probe driver_probe_device __device_attach_driver bus_for_each_drv __device_attach dispositivo_initial_probe bus_probe_device deferred_probe_work_func proceso_one_work trabajador_hilo kthread ret_from_fork" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "A2D8AF06-BD2B-4408-99B0-5EE4CF1A092B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1543418e82789cc383cd36d41469983c64e3fc7f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2ae0ab0143fcc06190713ed81a6486ed0ad3c861", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/996ce839606afd0fef91355627868022aa73eb68", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/da83ed350e4604b976e94239b08d8e2e7eaee7ea", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1543418e82789cc383cd36d41469983c64e3fc7f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2ae0ab0143fcc06190713ed81a6486ed0ad3c861", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/996ce839606afd0fef91355627868022aa73eb68", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/da83ed350e4604b976e94239b08d8e2e7eaee7ea", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26879.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26879.json index 7e958628f27..ee8da8891f6 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26879.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26879.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26879", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.913", - "lastModified": "2024-11-21T09:03:16.793", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T15:12:45.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,55 +15,173 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: clk: meson: Agregar relojes faltantes a axg_clk_regmaps Faltaban algunos relojes en axg_clk_regmaps, lo que provoc\u00f3 p\u00e1nico en el kernel durante cat /sys/kernel/debug/clk/clk_summary [ 57.349402] No se puede manejar Kernel Null Pointer Derferencia en la direcci\u00f3n virtual 0000000000000001FC ... [57.430002] PState: 6000000005 (NZCV DAIF -PAN -UAO -TCO -DIT -SSBS BTYPE = -) [57.436900] PC: RegMap_read+0x1c/0x888 [57.44060608] CLK_REGMAP_GATE_IS_Enabled+0x3c/0xb0 [57.445611] SP: FFFFF800082F1B690 [57.448888] x29: ffff800082f1b690 x28: 0000000000000000000000000000808080B9A70 [57. 000000000007 x25: 000000000000000016 X24: 000000000000000000 [57.463033] X23: FFFF800080E8B488 X22: 000000000000000015 X21: FFFFFF00000E7E7000 [57.470106] X20: FFFF00000400EC00 X19: 000000000000000000 X18: FFFFFFFFFFFFFFF [57.477178] x17: 00000000000000000000000016: 000000000000000000 X15: FFFFFFFF0000042A3000 [57.484251] X14 2fec x12: 000000000005F5E100 [57.491323] x11: ABCC77118461CEFD x10: 0000000000000020 X9: FFFF8000805E4B24 [57.498396] x8: FFFF0000028063C0 X7: FFFF800082F1B710 X6: FFFF800082F1B710 [57.505468] x5: 0000000000ffffd0 x4: ffffff800082f1b6e0 x3: 00000000001000 [57.512541] 0000000000012C x0: 000000000000000000 [57.519615] Traza de llamada: [57.522030] regMap_read+0x1c/0x88 [57.525393] clk_regmap_gate_is_enabled+ 0x3c/0xb0 [ 57.530050] clk_core_is_enabled+0x44/0x120 [ 57.534190] clk_summary_show_subtree+0x154/0x2f0 [ 57.538847] clk_summary_show_subtree+0x220/0x2f0 [ 57.543505 ] clk_summary_show_subtree+0x220/0x2f0 [ 57.548162] clk_summary_show_subtree+0x220/0x2f0 [ 57.552820] clk_summary_show_subtree+0x220/ 0x2f0 [ 57.557477] clk_summary_show_subtree+0x220/0x2f0 [ 57.562135] clk_summary_show_subtree+0x220/0x2f0 [ 57.566792] clk_summary_show_subtree+0x220/0x2f0 [ 57.571450] cl k_summary_show+0x84/0xb8 [ 57.575245] seq_read_iter+0x1bc/0x4b8 [ 57.578954] seq_read+0x8c/0xd0 [ 57.582059] full_proxy_read+0x68/0xc8 [ 57.585767] vfs_read+0xb0/0x268 [ 57.588959] ksys_read+0x70/0x108 [ 57.592236] __arm64_sys_read+0x24/0x38 [ 57.59 6031] invoke_syscall+0x50/0x128 [ 57.599740] el0_svc_common.constprop.0+0x48/ 0xf8 [ 57.604397] do_el0_svc+0x28/0x40 [ 57.607675] el0_svc+0x34/0xb8 [ 57.610694] el0t_64_sync_handler+0x13c/0x158 [ 57.615006] /0x198 [ 57.618635] C\u00f3digo: a9bd7bfd 910003fd a90153f3 aa0003f3 (b941fc00) [ 57.624668] -- -[ seguimiento final 0000000000000000 ]--- [jbrunet: agregar etiqueta de correcciones faltantes]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.153", + "matchCriteriaId": "ACB69438-845D-4E3C-B114-3140611F9C0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "121A07F6-F505-4C47-86BF-9BB6CC7B6C19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0cbefc7b5bdad86b18a263d837450cdc9a56f8d7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7ae1b0dc12ec407f12f80b49d22c6ad2308e2202", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9f3e5df38b4528213449e55b80f0316864f2a1c8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a03ed00787b0ce7a83eebabd0fa95ecc4a5cac84", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a860aaebacbc908fa06e2642402058f40bfffe10", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ba535bce57e71463a86f8b33a0ea88c26e3a6418", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0cbefc7b5bdad86b18a263d837450cdc9a56f8d7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7ae1b0dc12ec407f12f80b49d22c6ad2308e2202", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9f3e5df38b4528213449e55b80f0316864f2a1c8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a03ed00787b0ce7a83eebabd0fa95ecc4a5cac84", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a860aaebacbc908fa06e2642402058f40bfffe10", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ba535bce57e71463a86f8b33a0ea88c26e3a6418", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26893.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26893.json index 08108269dc0..47f5c4322e7 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26893.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26893.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26893", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.577", - "lastModified": "2024-11-21T09:03:19.143", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T15:14:28.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,152 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: arm_scmi: Correcci\u00f3n de doble liberaci\u00f3n en la ruta de limpieza del transporte SMC Cuando el c\u00f3digo SCMI gen\u00e9rico destruye un canal, llama a la funci\u00f3n de devoluci\u00f3n de llamada chan_free, definida por cada transporte. Dado que varios protocolos pueden compartir el mismo miembro transport_info, es posible que chan_free() desee limpiar el mismo miembro varias veces dentro de la implementaci\u00f3n de transporte SCMI determinada. En este caso se trata de transporte SMC. Esto dar\u00e1 lugar a una desreferencia del puntero NULL la segunda vez: | scmi_protocol scmi_dev.1: Canal TX en modo de sondeo habilitado - prot_id:16 | firmware arm-scmi: scmi: Notificaciones SCMI: n\u00facleo habilitado. | firmware arm-scmi: scmi: no se puede comunicar con SCMI | No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000000 | Informaci\u00f3n de cancelaci\u00f3n de memoria: | ESR = 0x0000000096000004 | EC = 0x25: DABT (EL actual), IL = 32 bits | CONJUNTO = 0, FnV = 0 | EA = 0, S1PTW = 0 | FSC = 0x04: error de traducci\u00f3n de nivel 0 | Informaci\u00f3n de cancelaci\u00f3n de datos: | ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 | CM = 0, WnR = 0, TnD = 0, Acceso a etiquetas = 0 | GCS = 0, Superposici\u00f3n = 0, DirtyBit = 0, Xs = 0 | pgtable de usuario: p\u00e1ginas de 4k, VA de 48 bits, pgdp=0000000881ef8000 | [0000000000000000] pgd=0000000000000000, p4d=0000000000000000 | Error interno: Ups: 0000000096000004 [#1] SMP ANTICIPADO | M\u00f3dulos enlazados en: | CPU: 4 PID: 1 Comunicaciones: swapper/0 No contaminado 6.7.0-rc2-00124-g455ef3d016c9-dirty #793 | Nombre del hardware: FVP Base RevC (DT) | pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) | ordenador personal: smc_chan_free+0x3c/0x6c | lr: smc_chan_free+0x3c/0x6c | Rastreo de llamadas: | smc_chan_free+0x3c/0x6c | idr_for_each+0x68/0xf8 | scmi_cleanup_channels.isra.0+0x2c/0x58 | scmi_probe+0x434/0x734 | sonda_plataforma+0x68/0xd8 | realmente_probe+0x110/0x27c | __driver_probe_device+0x78/0x12c | dispositivo_sonda_controlador+0x3c/0x118 | __driver_attach+0x74/0x128 | bus_for_each_dev+0x78/0xe0 | driver_attach+0x24/0x30 | bus_add_driver+0xe4/0x1e8 | registro_controlador+0x60/0x128 | __platform_driver_register+0x28/0x34 | scmi_driver_init+0x84/0xc0 | do_one_initcall+0x78/0x33c | kernel_init_freeable+0x2b8/0x51c | kernel_init+0x24/0x130 | ret_from_fork+0x10/0x20 | C\u00f3digo: f0004701 910a0021 aa1403e5 97b91c70 (b9400280) | ---[ end trace 0000000000000000 ]--- Simplemente verifique que el puntero de estructura sea NULL antes de intentar acceder a sus miembros, para evitar esta situaci\u00f3n. Esto se encontr\u00f3 cuando un transporte realmente no funciona (por ejemplo, sin servicio SMC), las rutinas de la sonda intentan limpiarse y provocan un bloqueo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.8", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "E8D30B4C-D66E-4ECB-8103-8CD9DFE724AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0d276d9f335f41d6524258d58c0c0241ef9a83a4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/857f56db8c3a71f9871922b6984ff74ad588cb2c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8ffaa17ccb1eb1b65cf85db63225a3581c303773", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ead445dd3d681020af333649a27306160eee761d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f1d71576d2c9ec8fdb822173fa7f3de79475e9bd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0d276d9f335f41d6524258d58c0c0241ef9a83a4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/857f56db8c3a71f9871922b6984ff74ad588cb2c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8ffaa17ccb1eb1b65cf85db63225a3581c303773", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ead445dd3d681020af333649a27306160eee761d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f1d71576d2c9ec8fdb822173fa7f3de79475e9bd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29101.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29101.json index 82fbf8d13c5..fe6753da397 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29101.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29101.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29101", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-19T16:15:12.330", - "lastModified": "2024-11-21T09:07:33.363", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T16:21:01.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jegtheme:jeg_elementor_kit:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.3", + "matchCriteriaId": "9CBBC8A3-6BF3-40E0-B7D7-117D6AACC714" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/jeg-elementor-kit/wordpress-jeg-elementor-kit-plugin-2-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/jeg-elementor-kit/wordpress-jeg-elementor-kit-plugin-2-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29106.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29106.json index 9a7c4f9244a..e10ade2c8b7 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29106.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29106.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29106", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-19T16:15:14.853", - "lastModified": "2024-11-21T09:07:34.030", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T16:11:23.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.10.16", + "matchCriteriaId": "BB3B5CCF-3888-48D7-A872-E183BD7A9A4D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/premium-addons-for-elementor/wordpress-premium-addons-for-elementor-plugin-4-10-16-cross-site-scripting-xss-vulnerability-2?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/premium-addons-for-elementor/wordpress-premium-addons-for-elementor-plugin-4-10-16-cross-site-scripting-xss-vulnerability-2?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29920.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29920.json index 3dc6cebc2dd..c13e23cf05f 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29920.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29920.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29920", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T08:15:39.137", - "lastModified": "2024-11-21T09:08:37.313", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T15:20:38.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moveaddons:move_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.0", + "matchCriteriaId": "6189F804-2AA9-427A-9ADE-B53C2C65D877" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/move-addons/wordpress-move-addons-for-elementor-plugin-1-2-9-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/move-addons/wordpress-move-addons-for-elementor-plugin-1-2-9-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34562.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34562.json index 32c50bbb0ca..65ce43650fa 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34562.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34562.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34562", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-08T11:15:24.193", - "lastModified": "2024-11-21T09:18:56.500", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T15:20:56.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moveaddons:move_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.1", + "matchCriteriaId": "9BD4EB49-8A6E-4A9A-986C-4172C39A5AF0" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/move-addons/wordpress-move-addons-for-elementor-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/move-addons/wordpress-move-addons-for-elementor-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37527.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37527.json new file mode 100644 index 00000000000..98506982fd8 --- /dev/null +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37527.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-37527", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-27T16:15:30.840", + "lastModified": "2025-01-27T16:15:30.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM OpenPages with Watson 8.3 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7171880", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38320.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38320.json new file mode 100644 index 00000000000..9128ea4bb70 --- /dev/null +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38320.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-38320", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-27T16:15:30.973", + "lastModified": "2025-01-27T16:15:30.973", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Storage Protect for Virtual Environments: Data Protection for VMware\u00a0and Storage Protect Backup-Archive Client 8.1.0.0 through 8.1.23.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7173462", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7173465", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38325.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38325.json new file mode 100644 index 00000000000..0ecfec5dc9d --- /dev/null +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38325.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38325", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-27T16:15:31.117", + "lastModified": "2025-01-27T16:15:31.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Storage Defender 2.0.0 through 2.0.7 on-prem defender-sensor-cmd CLI \n\ncould allow a remote attacker to obtain sensitive information, caused by sending network requests over an insecure channel. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-311" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7168640", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3879.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3879.json index 6799ca88898..3f55971882b 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3879.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3879.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3879", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-16T19:15:08.133", - "lastModified": "2024-11-21T09:30:37.120", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T16:24:40.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\\(633\\):*:*:*:*:*:*:*", + "matchCriteriaId": "535AF764-B5CF-44FA-89C6-2FDFFDCD0A32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:w30e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02FBE634-0D3F-4439-B4A6-F427C82967C7" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formSetCfm.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.260913", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260913", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312822", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formSetCfm.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.260913", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260913", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312822", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3880.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3880.json index 7784afa0b9e..74cec642e9d 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3880.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3880.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3880", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-16T19:15:08.357", - "lastModified": "2024-11-21T09:30:37.263", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T16:24:26.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,99 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\\(633\\):*:*:*:*:*:*:*", + "matchCriteriaId": "535AF764-B5CF-44FA-89C6-2FDFFDCD0A32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:w30e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02FBE634-0D3F-4439-B4A6-F427C82967C7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formWriteFacMac.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.260914", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260914", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312823", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formWriteFacMac.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.260914", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260914", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312823", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3881.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3881.json index 17f7dff573d..0d0c58a8790 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3881.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3881.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3881", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-16T20:15:10.280", - "lastModified": "2024-11-21T09:30:37.407", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T16:25:02.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\\(633\\):*:*:*:*:*:*:*", + "matchCriteriaId": "535AF764-B5CF-44FA-89C6-2FDFFDCD0A32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:w30e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02FBE634-0D3F-4439-B4A6-F427C82967C7" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.260915", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260915", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312824", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.260915", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260915", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312824", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3882.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3882.json index 85f0c69cb2c..b34964989b9 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3882.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3882.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3882", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-16T20:15:10.523", - "lastModified": "2024-11-21T09:30:37.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T16:24:52.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\\(633\\):*:*:*:*:*:*:*", + "matchCriteriaId": "535AF764-B5CF-44FA-89C6-2FDFFDCD0A32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:w30e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02FBE634-0D3F-4439-B4A6-F427C82967C7" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromRouteStatic.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.260916", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260916", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312825", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromRouteStatic.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.260916", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260916", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312825", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4111.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4111.json index c432a42d988..b496596b606 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4111.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4111.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4111", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-24T14:15:45.713", - "lastModified": "2024-11-21T09:42:12.460", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T16:25:51.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:tx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:*", + "matchCriteriaId": "4D7650EF-9C51-400B-96A8-342D1DF8A601" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:tx9_pro:-:*:*:*:*:*:*:*", + "matchCriteriaId": "086A4597-3A8E-4F94-98A8-D31C46453E15" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/SetLEDCfg.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.261854", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261854", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.317205", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/SetLEDCfg.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.261854", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261854", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.317205", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4112.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4112.json index d906e589f18..bc5b6a89139 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4112.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4112.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4112", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-24T15:15:48.667", - "lastModified": "2024-11-21T09:42:12.590", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T16:25:42.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:tx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:*", + "matchCriteriaId": "4D7650EF-9C51-400B-96A8-342D1DF8A601" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:tx9_pro:-:*:*:*:*:*:*:*", + "matchCriteriaId": "086A4597-3A8E-4F94-98A8-D31C46453E15" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/formSetVirtualSer.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.261855", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261855", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.317206", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/formSetVirtualSer.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.261855", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261855", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.317206", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4114.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4114.json index f56eca1f7d0..dbc77310cd4 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4114.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4114.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4114", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-24T15:15:49.107", - "lastModified": "2024-11-21T09:42:12.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T16:37:59.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:tx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:*", + "matchCriteriaId": "4D7650EF-9C51-400B-96A8-342D1DF8A601" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:tx9_pro:-:*:*:*:*:*:*:*", + "matchCriteriaId": "086A4597-3A8E-4F94-98A8-D31C46453E15" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/setSmartPowerManagement.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.261857", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261857", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.317218", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/setSmartPowerManagement.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.261857", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261857", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.317218", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45598.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45598.json new file mode 100644 index 00000000000..a0d728ebcb5 --- /dev/null +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45598.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-45598", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-27T16:15:31.267", + "lastModified": "2025-01-27T16:15:31.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cacti is an open source performance and fault management framework. Prior to 1.2.29, an administrator can change the `Poller Standard Error Log Path` parameter in either Installation Step 5 or in Configuration->Settings->Paths tab to a local file inside the server. Then simply going to Logs tab and selecting the name of the local file will show its content on the web UI. This vulnerability is fixed in 1.2.29." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Cacti/cacti/commit/eca52c6bb3e76c55d66b1040baa6dbf37471a0ae", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Cacti/cacti/security/advisories/GHSA-pv2c-97pp-vxwg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50697.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50697.json index 2284c38ae11..46941160647 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50697.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50697.json @@ -2,16 +2,55 @@ "id": "CVE-2024-50697", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-24T23:15:09.253", - "lastModified": "2025-01-24T23:15:09.253", + "lastModified": "2025-01-27T16:15:31.423", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In SunGrow WiNet-SV200.001.00.P027 and earlier versions, when decrypting MQTT messages, the code that parses specific TLV fields does not have sufficient bounds checks. This may result in a stack-based buffer overflow." + }, + { + "lang": "es", + "value": "En SunGrow WiNet-SV200.001.00.P027 y versiones anteriores, al descifrar mensajes MQTT, el c\u00f3digo que analiza campos TLV espec\u00edficos no tiene suficientes comprobaciones de los l\u00edmites. Esto puede provocar un desbordamiento del b\u00fafer basado en la pila." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://en.sungrowpower.com/security-notice-detail-2/5961", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57590.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57590.json new file mode 100644 index 00000000000..698c6e9377e --- /dev/null +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57590.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-57590", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-27T15:15:11.463", + "lastModified": "2025-01-27T15:15:11.463", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TRENDnet TEW-632BRP v1.010B31 devices have an OS command injection vulnerability in the CGl interface \"ntp_sync.cgi\",which allows remote attackers to execute arbitrary commands via parameter \"ntp_server\" passed to the \"ntp_sync.cgi\" binary through a POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/IdaJea/IOT_vuln_1/blob/master/tew632/ntp_sync.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57595.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57595.json new file mode 100644 index 00000000000..bf4dcf177da --- /dev/null +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57595.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-57595", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-27T15:15:11.580", + "lastModified": "2025-01-27T16:15:31.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DLINK DIR-825 REVB 2.03 devices have an OS command injection vulnerability in the CGl interface apc_client_pin.cgi, which allows remote attackers to execute arbitrary commands via the parameter \"wps_pin\" passed to the apc_client_pin.cgi binary through a POST request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/IdaJea/IOT_vuln_1/blob/master/DIR825/wps_pin.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23529.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23529.json new file mode 100644 index 00000000000..b317c291413 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23529.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23529", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:11.813", + "lastModified": "2025-01-27T15:15:11.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Blokhaus Minterpress allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Minterpress: from n/a through 1.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/minterpress/vulnerability/wordpress-minterpress-plugin-1-0-5-arbitrary-content-deletion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23531.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23531.json new file mode 100644 index 00000000000..626b411d5ba --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23531.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23531", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:11.963", + "lastModified": "2025-01-27T15:15:11.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David F. Carr RSVPMaker Volunteer Roles allows Reflected XSS. This issue affects RSVPMaker Volunteer Roles: from n/a through 1.5.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rsvpmaker-volunteer-roles/vulnerability/wordpress-rsvpmaker-volunteer-roles-plugin-1-5-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23574.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23574.json new file mode 100644 index 00000000000..8e658de77e8 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23574.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23574", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:12.123", + "lastModified": "2025-01-27T15:15:12.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jonathan Lau CubePM allows Reflected XSS. This issue affects CubePM: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cubepm/vulnerability/wordpress-cubepm-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23656.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23656.json new file mode 100644 index 00000000000..167c2104e75 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23656.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23656", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:12.267", + "lastModified": "2025-01-27T15:15:12.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Saul Morales Pacheco Donate visa allows Stored XSS. This issue affects Donate visa: from n/a through 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/donate-visa/vulnerability/wordpress-donate-visa-plugin-1-0-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23669.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23669.json new file mode 100644 index 00000000000..47db999b687 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23669.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23669", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:12.423", + "lastModified": "2025-01-27T15:15:12.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nurul Amin, Mohammad Saiful Islam WP Smart Tooltip allows Stored XSS. This issue affects WP Smart Tooltip: from n/a through 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-smart-tool-tip/vulnerability/wordpress-wp-smart-tooltip-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23752.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23752.json new file mode 100644 index 00000000000..09a02aabd0e --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23752.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23752", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:12.570", + "lastModified": "2025-01-27T15:15:12.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound CGD Arrange Terms allows Reflected XSS. This issue affects CGD Arrange Terms: from n/a through 1.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/shopp-arrange/vulnerability/wordpress-cgd-arrange-terms-plugin-1-1-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23754.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23754.json new file mode 100644 index 00000000000..edf977e5483 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23754.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23754", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:12.727", + "lastModified": "2025-01-27T15:15:12.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ulrich Sossou The Loops allows Reflected XSS. This issue affects The Loops: from n/a through 1.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/the-loops/vulnerability/wordpress-the-loops-plugin-1-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23756.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23756.json new file mode 100644 index 00000000000..04a1619adf6 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23756.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23756", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:12.877", + "lastModified": "2025-01-27T15:15:12.877", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ivan Chernyakov LawPress \u2013 Law Firm Website Management allows Reflected XSS. This issue affects LawPress \u2013 Law Firm Website Management: from n/a through 1.4.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/lawpress/vulnerability/wordpress-lawpress-plugin-1-4-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23849.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23849.json new file mode 100644 index 00000000000..17ecd66d37a --- /dev/null +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23849.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23849", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:13.087", + "lastModified": "2025-01-27T15:15:13.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Benjamin Piwowarski PAPERCITE allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects PAPERCITE: from n/a through 0.5.18." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/papercite/vulnerability/wordpress-papercite-plugin-0-5-18-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23982.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23982.json new file mode 100644 index 00000000000..908bf9c5b3d --- /dev/null +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23982.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23982", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:13.247", + "lastModified": "2025-01-27T15:15:13.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Marian Kanev Cab fare calculator allows Stored XSS. This issue affects Cab fare calculator: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cab-fare-calculator/vulnerability/wordpress-fare-calculator-plugin-1-1-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24537.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24537.json new file mode 100644 index 00000000000..4f4b72dc14e --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24537.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24537", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:13.440", + "lastModified": "2025-01-27T15:15:13.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in The Events Calendar The Events Calendar allows Cross Site Request Forgery. This issue affects The Events Calendar: from n/a through 6.7.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/the-events-calendar/vulnerability/wordpress-the-events-calendar-plugin-6-7-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24538.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24538.json new file mode 100644 index 00000000000..8cd0f499889 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24538.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24538", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:13.607", + "lastModified": "2025-01-27T15:15:13.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in slaFFik BuddyPress Groups Extras allows Cross Site Request Forgery. This issue affects BuddyPress Groups Extras: from n/a through 3.6.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/buddypress-groups-extras/vulnerability/wordpress-buddypress-groups-extras-plugin-3-6-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24540.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24540.json new file mode 100644 index 00000000000..fbcb217d656 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24540.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24540", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:13.753", + "lastModified": "2025-01-27T15:15:13.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in SeedProd Coming Soon Page, Under Construction & Maintenance Mode by SeedProd allows Cross Site Request Forgery. This issue affects Coming Soon Page, Under Construction & Maintenance Mode by SeedProd: from n/a through 6.18.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/coming-soon/vulnerability/wordpress-website-builder-by-seedprod-plugin-6-18-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24590.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24590.json new file mode 100644 index 00000000000..98e10333f75 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24590.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24590", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:13.947", + "lastModified": "2025-01-27T15:15:13.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Haptiq picu \u2013 Online Photo Proofing Gallery allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects picu \u2013 Online Photo Proofing Gallery: from n/a through 2.4.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/picu/vulnerability/wordpress-picu-online-photo-proofing-gallery-plugin-2-4-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24593.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24593.json new file mode 100644 index 00000000000..3f1cd33a63d --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24593.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24593", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:14.090", + "lastModified": "2025-01-27T15:15:14.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WisdmLabs Edwiser Bridge allows Reflected XSS. This issue affects Edwiser Bridge: from n/a through 3.0.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/edwiser-bridge/vulnerability/wordpress-edwiser-bridge-plugin-3-0-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24600.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24600.json new file mode 100644 index 00000000000..dab19b6825c --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24600.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24600", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:14.233", + "lastModified": "2025-01-27T15:15:14.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in David F. Carr RSVPMarker . This issue affects RSVPMarker : from n/a through 11.4.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rsvpmaker/vulnerability/wordpress-rsvpmaker-plugin-11-4-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24603.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24603.json new file mode 100644 index 00000000000..43cca667cdb --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24603.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24603", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:14.437", + "lastModified": "2025-01-27T15:15:14.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in UkrSolution Print Barcode Labels for your WooCommerce products/orders. This issue affects Print Barcode Labels for your WooCommerce products/orders: from n/a through 3.4.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/a4-barcode-generator/vulnerability/wordpress-print-labels-with-barcodes-create-price-tags-product-labels-order-labels-for-woocommerce-plugin-3-4-10-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24606.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24606.json new file mode 100644 index 00000000000..c03f2dfac18 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24606.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24606", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:14.587", + "lastModified": "2025-01-27T15:15:14.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Sprout Invoices Client Invoicing by Sprout Invoices allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Client Invoicing by Sprout Invoices: from n/a through 20.8.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/sprout-invoices/vulnerability/wordpress-client-invoicing-by-sprout-invoices-easy-estimates-and-invoices-for-wordpress-plugin-20-8-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24626.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24626.json new file mode 100644 index 00000000000..8be8f83e420 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24626.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24626", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:14.777", + "lastModified": "2025-01-27T15:15:14.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodePeople Music Store allows Reflected XSS. This issue affects Music Store: from n/a through 1.1.19." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/music-store/vulnerability/wordpress-music-store-wordpress-ecommerce-plugin-1-1-19-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24628.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24628.json new file mode 100644 index 00000000000..e3d8463b578 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24628.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24628", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:14.923", + "lastModified": "2025-01-27T15:15:14.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Authentication Bypass by Spoofing vulnerability in BestWebSoft Google Captcha allows Identity Spoofing. This issue affects Google Captcha: from n/a through 1.78." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/google-captcha/vulnerability/wordpress-recaptcha-by-bestwebsoft-plugin-1-78-captcha-bypass-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24653.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24653.json new file mode 100644 index 00000000000..feb2faaf812 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24653.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24653", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:15.070", + "lastModified": "2025-01-27T15:15:15.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in NotFound Admin and Site Enhancements (ASE) Pro allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Admin and Site Enhancements (ASE) Pro: from n/a through 7.6.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/admin-site-enhancements-pro/vulnerability/wordpress-admin-and-site-enhancements-ase-pro-plugin-7-6-1-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24662.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24662.json new file mode 100644 index 00000000000..a26f6bf6582 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24662.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24662", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:15.227", + "lastModified": "2025-01-27T15:15:15.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in NotFound LearnDash LMS allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects LearnDash LMS: from n/a through 4.20.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/sfwd-lms/vulnerability/wordpress-learndash-lms-plugin-4-20-0-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24665.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24665.json new file mode 100644 index 00000000000..29f80057c89 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24665.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24665", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:15.427", + "lastModified": "2025-01-27T15:15:15.427", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eniture Technology Small Package Quotes \u2013 Unishippers Edition allows SQL Injection. This issue affects Small Package Quotes \u2013 Unishippers Edition: from n/a through 2.4.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/small-package-quotes-unishippers-edition/vulnerability/wordpress-small-package-quotes-plugin-2-4-8-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24667.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24667.json new file mode 100644 index 00000000000..7f03f3c88a6 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24667.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24667", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:15.563", + "lastModified": "2025-01-27T15:15:15.563", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eniture Technology Small Package Quotes \u2013 Worldwide Express Edition allows SQL Injection. This issue affects Small Package Quotes \u2013 Worldwide Express Edition: from n/a through 5.2.17." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/small-package-quotes-wwe-edition/vulnerability/wordpress-small-package-quotes-plugin-5-2-17-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24671.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24671.json new file mode 100644 index 00000000000..00c7ec89a42 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24671.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24671", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:15.703", + "lastModified": "2025-01-27T15:15:15.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in Pdfcrowd Save as PDF plugin by Pdfcrowd allows Object Injection. This issue affects Save as PDF plugin by Pdfcrowd: from n/a through 4.4.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/save-as-pdf-by-pdfcrowd/vulnerability/wordpress-save-as-pdf-plugin-by-pdfcrowd-plugin-4-4-0-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24680.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24680.json new file mode 100644 index 00000000000..d915c4bebaf --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24680.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24680", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:15.863", + "lastModified": "2025-01-27T15:15:15.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in WpMultiStoreLocator WP Multi Store Locator allows Reflected XSS. This issue affects WP Multi Store Locator: from n/a through 2.4.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-multi-store-locator/vulnerability/wordpress-wp-multi-store-locator-plugin-2-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24689.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24689.json new file mode 100644 index 00000000000..d2fd65087fe --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24689.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24689", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:16.073", + "lastModified": "2025-01-27T15:15:16.073", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in codection Import and export users and customers allows Retrieve Embedded Sensitive Data. This issue affects Import and export users and customers: from n/a through 1.27.12." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-538" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/import-users-from-csv-with-meta/vulnerability/wordpress-import-and-export-users-and-customers-plugin-1-27-12-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24708.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24708.json new file mode 100644 index 00000000000..9cecf8dbe44 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24708.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24708", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:16.230", + "lastModified": "2025-01-27T15:15:16.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CRM Perks WP Dynamics CRM for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms allows Reflected XSS. This issue affects WP Dynamics CRM for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms: from n/a through 1.1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cf7-dynamics-crm/vulnerability/wordpress-wp-dynamics-crm-plugin-1-1-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24734.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24734.json new file mode 100644 index 00000000000..2ab5cc4f334 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24734.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24734", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:16.390", + "lastModified": "2025-01-27T15:15:16.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in CodeSolz Better Find and Replace allows Privilege Escalation. This issue affects Better Find and Replace: from n/a through 1.6.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/real-time-auto-find-and-replace/vulnerability/wordpress-better-find-and-replace-plugin-1-6-7-privilege-escalation-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24740.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24740.json new file mode 100644 index 00000000000..ed0be5d8a77 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24740.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24740", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:16.537", + "lastModified": "2025-01-27T15:15:16.537", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in ThimPress LearnPress. This issue affects LearnPress: from n/a through 4.2.7.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/learnpress/vulnerability/wordpress-learnpress-plugin-4-2-7-1-open-redirection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24741.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24741.json new file mode 100644 index 00000000000..1590af33845 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24741.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24741", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:16.680", + "lastModified": "2025-01-27T15:15:16.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in KB Support KB Support. This issue affects KB Support: from n/a through 1.6.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/kb-support/vulnerability/wordpress-kb-support-plugin-1-6-7-open-redirection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24742.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24742.json new file mode 100644 index 00000000000..e9e234183fd --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24742.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24742", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:16.830", + "lastModified": "2025-01-27T15:15:16.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in WP Go Maps (formerly WP Google Maps) WP Go Maps. This issue affects WP Go Maps: from n/a through 9.0.40." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-google-maps/vulnerability/wordpress-wp-google-maps-plugin-9-0-40-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24743.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24743.json new file mode 100644 index 00000000000..838bba54003 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24743.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24743", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:16.977", + "lastModified": "2025-01-27T15:15:16.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Rometheme RomethemeKit For Elementor. This issue affects RomethemeKit For Elementor: from n/a through 1.5.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rometheme-for-elementor/vulnerability/wordpress-romethemekit-for-elementor-plugin-1-5-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24744.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24744.json new file mode 100644 index 00000000000..bf7d2f2d658 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24744.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24744", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:17.117", + "lastModified": "2025-01-27T15:15:17.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in NotFound Bridge Core. This issue affects Bridge Core: from n/a through 3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bridge-core/vulnerability/wordpress-bridge-core-plugin-3-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24747.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24747.json new file mode 100644 index 00000000000..38649b8e7a0 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24747.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24747", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:17.253", + "lastModified": "2025-01-27T15:15:17.253", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Houzez.co Houzez. This issue affects Houzez: from n/a through 3.4.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/houzez/vulnerability/wordpress-houzez-theme-3-4-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24782.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24782.json new file mode 100644 index 00000000000..ebc7cf3fb7d --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24782.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24782", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-27T15:15:17.450", + "lastModified": "2025-01-27T15:15:17.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in wpWax Post Grid, Slider & Carousel Ultimate allows PHP Local File Inclusion. This issue affects Post Grid, Slider & Carousel Ultimate: from n/a through 1.6.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/post-grid-carousel-ultimate/vulnerability/wordpress-post-grid-slider-carousel-ultimate-with-shortcode-gutenberg-block-elementor-widget-plugin-1-6-10-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24783.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24783.json new file mode 100644 index 00000000000..e2895e53ca0 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24783.json @@ -0,0 +1,40 @@ +{ + "id": "CVE-2025-24783", + "sourceIdentifier": "security@apache.org", + "published": "2025-01-27T15:15:17.610", + "lastModified": "2025-01-27T15:15:17.610", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "security@apache.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "** UNSUPPORTED WHEN ASSIGNED ** Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) vulnerability in Apache Cocoon.\n\nThis issue affects Apache Cocoon: all versions.\n\nWhen a continuation is created, it gets a random identifier. Because the random number generator used to generate these identifiers was seeded with the startup time, it may not have been sufficiently unpredictable, and an attacker could use this to guess continuation ids and look up continuations they should not have had access to.\n\nAs a mitigation, you may enable the \"session-bound-continuations\" option to make sure continuations are not shared across sessions.\n\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-335" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/pk86jp5cvn41432op8wv1k8p14mp27nz", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 291ebaf589b..43f423f1269 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-27T15:00:20.341465+00:00 +2025-01-27T17:00:41.178643+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-27T14:59:26.887000+00:00 +2025-01-27T16:56:47.900000+00:00 ``` ### Last Data Feed Release @@ -33,50 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -279038 +279084 ``` ### CVEs added in the last Commit -Recently added CVEs: `12` +Recently added CVEs: `46` -- [CVE-2022-4975](CVE-2022/CVE-2022-49xx/CVE-2022-4975.json) (`2025-01-27T14:15:27.210`) -- [CVE-2024-11348](CVE-2024/CVE-2024-113xx/CVE-2024-11348.json) (`2025-01-27T14:15:27.973`) -- [CVE-2025-22513](CVE-2025/CVE-2025-225xx/CVE-2025-22513.json) (`2025-01-27T14:15:28.233`) -- [CVE-2025-23457](CVE-2025/CVE-2025-234xx/CVE-2025-23457.json) (`2025-01-27T14:15:28.373`) -- [CVE-2025-23792](CVE-2025/CVE-2025-237xx/CVE-2025-23792.json) (`2025-01-27T14:15:28.510`) -- [CVE-2025-24533](CVE-2025/CVE-2025-245xx/CVE-2025-24533.json) (`2025-01-27T14:15:28.653`) -- [CVE-2025-24584](CVE-2025/CVE-2025-245xx/CVE-2025-24584.json) (`2025-01-27T14:15:28.797`) -- [CVE-2025-24601](CVE-2025/CVE-2025-246xx/CVE-2025-24601.json) (`2025-01-27T14:15:28.927`) -- [CVE-2025-24612](CVE-2025/CVE-2025-246xx/CVE-2025-24612.json) (`2025-01-27T14:15:29.063`) -- [CVE-2025-24664](CVE-2025/CVE-2025-246xx/CVE-2025-24664.json) (`2025-01-27T14:15:29.197`) -- [CVE-2025-24685](CVE-2025/CVE-2025-246xx/CVE-2025-24685.json) (`2025-01-27T14:15:29.333`) -- [CVE-2025-24754](CVE-2025/CVE-2025-247xx/CVE-2025-24754.json) (`2025-01-27T14:15:29.477`) +- [CVE-2025-24540](CVE-2025/CVE-2025-245xx/CVE-2025-24540.json) (`2025-01-27T15:15:13.753`) +- [CVE-2025-24590](CVE-2025/CVE-2025-245xx/CVE-2025-24590.json) (`2025-01-27T15:15:13.947`) +- [CVE-2025-24593](CVE-2025/CVE-2025-245xx/CVE-2025-24593.json) (`2025-01-27T15:15:14.090`) +- [CVE-2025-24600](CVE-2025/CVE-2025-246xx/CVE-2025-24600.json) (`2025-01-27T15:15:14.233`) +- [CVE-2025-24603](CVE-2025/CVE-2025-246xx/CVE-2025-24603.json) (`2025-01-27T15:15:14.437`) +- [CVE-2025-24606](CVE-2025/CVE-2025-246xx/CVE-2025-24606.json) (`2025-01-27T15:15:14.587`) +- [CVE-2025-24626](CVE-2025/CVE-2025-246xx/CVE-2025-24626.json) (`2025-01-27T15:15:14.777`) +- [CVE-2025-24628](CVE-2025/CVE-2025-246xx/CVE-2025-24628.json) (`2025-01-27T15:15:14.923`) +- [CVE-2025-24653](CVE-2025/CVE-2025-246xx/CVE-2025-24653.json) (`2025-01-27T15:15:15.070`) +- [CVE-2025-24662](CVE-2025/CVE-2025-246xx/CVE-2025-24662.json) (`2025-01-27T15:15:15.227`) +- [CVE-2025-24665](CVE-2025/CVE-2025-246xx/CVE-2025-24665.json) (`2025-01-27T15:15:15.427`) +- [CVE-2025-24667](CVE-2025/CVE-2025-246xx/CVE-2025-24667.json) (`2025-01-27T15:15:15.563`) +- [CVE-2025-24671](CVE-2025/CVE-2025-246xx/CVE-2025-24671.json) (`2025-01-27T15:15:15.703`) +- [CVE-2025-24680](CVE-2025/CVE-2025-246xx/CVE-2025-24680.json) (`2025-01-27T15:15:15.863`) +- [CVE-2025-24689](CVE-2025/CVE-2025-246xx/CVE-2025-24689.json) (`2025-01-27T15:15:16.073`) +- [CVE-2025-24708](CVE-2025/CVE-2025-247xx/CVE-2025-24708.json) (`2025-01-27T15:15:16.230`) +- [CVE-2025-24734](CVE-2025/CVE-2025-247xx/CVE-2025-24734.json) (`2025-01-27T15:15:16.390`) +- [CVE-2025-24740](CVE-2025/CVE-2025-247xx/CVE-2025-24740.json) (`2025-01-27T15:15:16.537`) +- [CVE-2025-24741](CVE-2025/CVE-2025-247xx/CVE-2025-24741.json) (`2025-01-27T15:15:16.680`) +- [CVE-2025-24742](CVE-2025/CVE-2025-247xx/CVE-2025-24742.json) (`2025-01-27T15:15:16.830`) +- [CVE-2025-24743](CVE-2025/CVE-2025-247xx/CVE-2025-24743.json) (`2025-01-27T15:15:16.977`) +- [CVE-2025-24744](CVE-2025/CVE-2025-247xx/CVE-2025-24744.json) (`2025-01-27T15:15:17.117`) +- [CVE-2025-24747](CVE-2025/CVE-2025-247xx/CVE-2025-24747.json) (`2025-01-27T15:15:17.253`) +- [CVE-2025-24782](CVE-2025/CVE-2025-247xx/CVE-2025-24782.json) (`2025-01-27T15:15:17.450`) +- [CVE-2025-24783](CVE-2025/CVE-2025-247xx/CVE-2025-24783.json) (`2025-01-27T15:15:17.610`) ### CVEs modified in the last Commit -Recently modified CVEs: `19` +Recently modified CVEs: `25` -- [CVE-2023-37029](CVE-2023/CVE-2023-370xx/CVE-2023-37029.json) (`2025-01-27T14:39:48.927`) -- [CVE-2023-37030](CVE-2023/CVE-2023-370xx/CVE-2023-37030.json) (`2025-01-27T14:34:58.587`) -- [CVE-2023-37031](CVE-2023/CVE-2023-370xx/CVE-2023-37031.json) (`2025-01-27T14:32:16.700`) -- [CVE-2023-37032](CVE-2023/CVE-2023-370xx/CVE-2023-37032.json) (`2025-01-27T14:34:38.477`) -- [CVE-2023-37033](CVE-2023/CVE-2023-370xx/CVE-2023-37033.json) (`2025-01-27T14:32:02.720`) -- [CVE-2023-37034](CVE-2023/CVE-2023-370xx/CVE-2023-37034.json) (`2025-01-27T14:34:20.203`) -- [CVE-2023-37036](CVE-2023/CVE-2023-370xx/CVE-2023-37036.json) (`2025-01-27T14:31:51.503`) -- [CVE-2023-37037](CVE-2023/CVE-2023-370xx/CVE-2023-37037.json) (`2025-01-27T14:34:03.640`) -- [CVE-2023-37038](CVE-2023/CVE-2023-370xx/CVE-2023-37038.json) (`2025-01-27T14:31:33.687`) -- [CVE-2024-24416](CVE-2024/CVE-2024-244xx/CVE-2024-24416.json) (`2025-01-27T14:33:50.793`) -- [CVE-2024-24417](CVE-2024/CVE-2024-244xx/CVE-2024-24417.json) (`2025-01-27T14:30:53.340`) -- [CVE-2024-24418](CVE-2024/CVE-2024-244xx/CVE-2024-24418.json) (`2025-01-27T14:33:26.093`) -- [CVE-2024-24419](CVE-2024/CVE-2024-244xx/CVE-2024-24419.json) (`2025-01-27T14:29:49.253`) -- [CVE-2024-24422](CVE-2024/CVE-2024-244xx/CVE-2024-24422.json) (`2025-01-27T14:32:56.950`) -- [CVE-2024-24423](CVE-2024/CVE-2024-244xx/CVE-2024-24423.json) (`2025-01-27T14:39:57.160`) -- [CVE-2024-26649](CVE-2024/CVE-2024-266xx/CVE-2024-26649.json) (`2025-01-27T14:50:35.380`) -- [CVE-2024-26770](CVE-2024/CVE-2024-267xx/CVE-2024-26770.json) (`2025-01-27T14:58:19.130`) -- [CVE-2024-26771](CVE-2024/CVE-2024-267xx/CVE-2024-26771.json) (`2025-01-27T14:59:26.887`) -- [CVE-2024-56012](CVE-2024/CVE-2024-560xx/CVE-2024-56012.json) (`2025-01-27T14:15:28.123`) +- [CVE-2021-47183](CVE-2021/CVE-2021-471xx/CVE-2021-47183.json) (`2025-01-27T15:03:17.013`) +- [CVE-2023-35888](CVE-2023/CVE-2023-358xx/CVE-2023-35888.json) (`2025-01-27T15:18:19.737`) +- [CVE-2023-52646](CVE-2023/CVE-2023-526xx/CVE-2023-52646.json) (`2025-01-27T15:09:48.333`) +- [CVE-2024-10360](CVE-2024/CVE-2024-103xx/CVE-2024-10360.json) (`2025-01-27T15:19:13.047`) +- [CVE-2024-12774](CVE-2024/CVE-2024-127xx/CVE-2024-12774.json) (`2025-01-27T15:15:09.803`) +- [CVE-2024-2131](CVE-2024/CVE-2024-21xx/CVE-2024-2131.json) (`2025-01-27T15:20:06.373`) +- [CVE-2024-2255](CVE-2024/CVE-2024-22xx/CVE-2024-2255.json) (`2025-01-27T15:26:09.810`) +- [CVE-2024-2558](CVE-2024/CVE-2024-25xx/CVE-2024-2558.json) (`2025-01-27T16:56:47.900`) +- [CVE-2024-2559](CVE-2024/CVE-2024-25xx/CVE-2024-2559.json) (`2025-01-27T16:50:41.160`) +- [CVE-2024-26863](CVE-2024/CVE-2024-268xx/CVE-2024-26863.json) (`2025-01-27T15:05:39.390`) +- [CVE-2024-26866](CVE-2024/CVE-2024-268xx/CVE-2024-26866.json) (`2025-01-27T15:08:19.563`) +- [CVE-2024-26879](CVE-2024/CVE-2024-268xx/CVE-2024-26879.json) (`2025-01-27T15:12:45.210`) +- [CVE-2024-26893](CVE-2024/CVE-2024-268xx/CVE-2024-26893.json) (`2025-01-27T15:14:28.090`) +- [CVE-2024-29101](CVE-2024/CVE-2024-291xx/CVE-2024-29101.json) (`2025-01-27T16:21:01.500`) +- [CVE-2024-29106](CVE-2024/CVE-2024-291xx/CVE-2024-29106.json) (`2025-01-27T16:11:23.087`) +- [CVE-2024-29920](CVE-2024/CVE-2024-299xx/CVE-2024-29920.json) (`2025-01-27T15:20:38.483`) +- [CVE-2024-34562](CVE-2024/CVE-2024-345xx/CVE-2024-34562.json) (`2025-01-27T15:20:56.620`) +- [CVE-2024-3879](CVE-2024/CVE-2024-38xx/CVE-2024-3879.json) (`2025-01-27T16:24:40.757`) +- [CVE-2024-3880](CVE-2024/CVE-2024-38xx/CVE-2024-3880.json) (`2025-01-27T16:24:26.973`) +- [CVE-2024-3881](CVE-2024/CVE-2024-38xx/CVE-2024-3881.json) (`2025-01-27T16:25:02.423`) +- [CVE-2024-3882](CVE-2024/CVE-2024-38xx/CVE-2024-3882.json) (`2025-01-27T16:24:52.420`) +- [CVE-2024-4111](CVE-2024/CVE-2024-41xx/CVE-2024-4111.json) (`2025-01-27T16:25:51.970`) +- [CVE-2024-4112](CVE-2024/CVE-2024-41xx/CVE-2024-4112.json) (`2025-01-27T16:25:42.507`) +- [CVE-2024-4114](CVE-2024/CVE-2024-41xx/CVE-2024-4114.json) (`2025-01-27T16:37:59.997`) +- [CVE-2024-50697](CVE-2024/CVE-2024-506xx/CVE-2024-50697.json) (`2025-01-27T16:15:31.423`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 390c2d4b872..1e276315fff 100644 --- a/_state.csv +++ b/_state.csv @@ -187405,7 +187405,7 @@ CVE-2021-47179,0,0,a8b6b384d1d3dd4500e62419e8055586dec0b9099243b3a6cfff7cfb16fe0 CVE-2021-47180,0,0,04d7ef49a6dbe27745e9ac88054127415a124aa60051eed7e0cd4e5e824fa8ec,2025-01-07T17:17:24.333000 CVE-2021-47181,0,0,c987c8c832cf3c59bca5d287fe34238d65206d3d339884f075eab0b776cf4e0a,2024-12-20T14:31:22.240000 CVE-2021-47182,0,0,639ad06be2a6517cd3152f844460c6d89d5631a9bb3a9b0d16574f25f9340342,2024-11-21T06:35:34.437000 -CVE-2021-47183,0,0,a9bb398532188a17f9d9e7e29a9240ceb3bcc107d2c5780a8514f84cafb3d1b7,2024-11-21T06:35:34.553000 +CVE-2021-47183,0,1,a6b52c941b31a268622bdcac7229e9ed96a7a8d63c15312452fa966d6e2d9693,2025-01-27T15:03:17.013000 CVE-2021-47184,0,0,d3f6da044f20b443e32a18293da1d6a01b702e6354de9a5b57ed13aafdd07dd1,2025-01-14T16:41:58.690000 CVE-2021-47185,0,0,45623a7520c43f2a5e6e681d610545dca832cc64c1f9e193f4443e9b4459ee0b,2024-11-21T06:35:34.797000 CVE-2021-47186,0,0,a394c86f0d639d2ea19b5f4049d6893cfec880c1b84d050667fdab1792f266c2,2024-11-21T06:35:35.017000 @@ -213152,7 +213152,7 @@ CVE-2022-4971,0,0,8284339847d56a982dc79d79b0900fdcef988337c6504d3d0fb43eff5f9bcb CVE-2022-4972,0,0,dd0bba328c6c263b4470904688c48aab55242d31bd9c6ea9c0560b0bf0ebaa74,2024-10-30T16:34:55.117000 CVE-2022-4973,0,0,3f7bb8af7d8ad41d4b8c2b6df6303f0dad9415526c1ebfae5140748d302176bc,2024-10-30T15:58:30.907000 CVE-2022-4974,0,0,b3c59950ee3eade0f74a15ade2edad03cf700537d377a12415779325d85e4da4,2024-10-16T16:38:14.557000 -CVE-2022-4975,1,1,01b913d27018a4d1ce8e2ab1ba4724f4889aeeacd0fc1868c7495ed6a4688be3,2025-01-27T14:15:27.210000 +CVE-2022-4975,0,0,01b913d27018a4d1ce8e2ab1ba4724f4889aeeacd0fc1868c7495ed6a4688be3,2025-01-27T14:15:27.210000 CVE-2023-0001,0,0,2dfbf6dbe59b530ec18f5af443ba14cd4d2a5b201d3a1ffcc25574a8da444091,2024-11-21T07:36:22.050000 CVE-2023-0002,0,0,d4360529168fea353efb6226181fd2ab0e85944e3049df689718cf07491ef7ac,2024-11-21T07:36:22.187000 CVE-2023-0003,0,0,ce4e4eb40c2c38c502dbf8359644cc1e23facd857372a9d601cc7545a4ea8d79,2024-11-21T07:36:22.303000 @@ -227738,7 +227738,7 @@ CVE-2023-35883,0,0,1e723e1a6d59575047eab3ce3444e746ff2622c5d1776b171d1151a445f40 CVE-2023-35884,0,0,18c3d22c18d47b7a585cf213aa70ca7b99505e03785725084d5822812652b215,2024-11-21T08:08:55.010000 CVE-2023-35885,0,0,9ca1f5f1779561172eaee3069b6e3eec6f3050b1039f21143b0b68665e5754fb,2024-12-09T19:15:11.947000 CVE-2023-35887,0,0,76a5831afd9a0cf68a148a72ecedb4d9f74013a2c1d65482318d9531cedc3be8,2024-11-21T08:08:55.333000 -CVE-2023-35888,0,0,725560018e0ddb8a5b9947afa13a1ec3a43e86e36f132dc3b9b8225336c6d97f,2024-11-21T08:08:55.497000 +CVE-2023-35888,0,1,9fdf7c421ec865773f38e3f577a45d6831a6864d4758ea608686063dbfc76618,2025-01-27T15:18:19.737000 CVE-2023-3589,0,0,d4e4514f3594900f83558ac47011be53a0abfb4fdc67e271ca374ed1e8ec3bd7,2024-11-21T08:17:36.953000 CVE-2023-35890,0,0,433d02ca4cfc26d677083a7f98480f3491ee5b99d0da1e6d0efc9a9e16b48cbb,2024-11-21T08:08:56.057000 CVE-2023-35892,0,0,8eabf2f6b50eb1bf3eb04857e09c4cf1b264ae2300f41f7ac6297de2767c03ea,2024-11-21T08:08:56.190000 @@ -228661,17 +228661,17 @@ CVE-2023-37025,0,0,33bc7b812664e9275c3bfb23b6d53cbfefd4368ab864d63e6acddf0e1a53b CVE-2023-37026,0,0,61e46660d78cf955ae84e8e6591d596e7e87156504936378555fdb48a5003b9e,2025-01-23T18:15:28.537000 CVE-2023-37027,0,0,91beb5dd340a2ca54c55e25ee0aabe436b43c2179e0c9e4ab7d35730b3f91707,2025-01-23T16:15:32.543000 CVE-2023-37028,0,0,b17f27dec429070f83800c68afdc54fd88a66eb2c6dd49083c00e6201303a0bc,2025-01-23T16:15:32.740000 -CVE-2023-37029,0,1,20555aa0e429f62fcc758a828ad1093a7dcae95378abc0a82b9d5583c33dcd36,2025-01-27T14:39:48.927000 +CVE-2023-37029,0,0,20555aa0e429f62fcc758a828ad1093a7dcae95378abc0a82b9d5583c33dcd36,2025-01-27T14:39:48.927000 CVE-2023-3703,0,0,e793c1538a953443cfd9717dd4892eed9653e7e0e15a19f28233b00c03531ba9,2024-11-21T08:17:52.740000 -CVE-2023-37030,0,1,ffd423437931da3f61709e7a52b13f2770c749e8b8eb74ad736dfe43de31f387,2025-01-27T14:34:58.587000 -CVE-2023-37031,0,1,e8ab243977e63a8e590eea1f8ec81d5d047e2e8868f118818cec508973bf6af9,2025-01-27T14:32:16.700000 -CVE-2023-37032,0,1,5ad5854209ece94eaefd571bfe9fb7d29882c03d07c47b94431e45066c701607,2025-01-27T14:34:38.477000 -CVE-2023-37033,0,1,dc471a3f90ee681f4e541c9b0d14ad2cd5bafa94cc3dc0a6856c1b045ab6de79,2025-01-27T14:32:02.720000 -CVE-2023-37034,0,1,8c53f3fc39a069e03584f421459c37984f763ff3f2e4e9b763d3f6824b901e1b,2025-01-27T14:34:20.203000 +CVE-2023-37030,0,0,ffd423437931da3f61709e7a52b13f2770c749e8b8eb74ad736dfe43de31f387,2025-01-27T14:34:58.587000 +CVE-2023-37031,0,0,e8ab243977e63a8e590eea1f8ec81d5d047e2e8868f118818cec508973bf6af9,2025-01-27T14:32:16.700000 +CVE-2023-37032,0,0,5ad5854209ece94eaefd571bfe9fb7d29882c03d07c47b94431e45066c701607,2025-01-27T14:34:38.477000 +CVE-2023-37033,0,0,dc471a3f90ee681f4e541c9b0d14ad2cd5bafa94cc3dc0a6856c1b045ab6de79,2025-01-27T14:32:02.720000 +CVE-2023-37034,0,0,8c53f3fc39a069e03584f421459c37984f763ff3f2e4e9b763d3f6824b901e1b,2025-01-27T14:34:20.203000 CVE-2023-37035,0,0,6fd1f0fcf8e0fd7b5fff245ed675e79d0e28b5c9d56b589ad47f9b27426f565f,2025-01-22T15:15:12.017000 -CVE-2023-37036,0,1,bc8e5e291a081bc83ea2bcbafe55176071db892d59f45f20f6615d6eb6ba20f9,2025-01-27T14:31:51.503000 -CVE-2023-37037,0,1,ada1ead2e05e72ba7c6cf67857b9a467082f615f6ba935c182ee06e846aac5b0,2025-01-27T14:34:03.640000 -CVE-2023-37038,0,1,7e9858f574c7fc017c07e62fc3c38abe51d3e596d105426e9cde8f97462154fa,2025-01-27T14:31:33.687000 +CVE-2023-37036,0,0,bc8e5e291a081bc83ea2bcbafe55176071db892d59f45f20f6615d6eb6ba20f9,2025-01-27T14:31:51.503000 +CVE-2023-37037,0,0,ada1ead2e05e72ba7c6cf67857b9a467082f615f6ba935c182ee06e846aac5b0,2025-01-27T14:34:03.640000 +CVE-2023-37038,0,0,7e9858f574c7fc017c07e62fc3c38abe51d3e596d105426e9cde8f97462154fa,2025-01-27T14:31:33.687000 CVE-2023-37039,0,0,bf7173be26c9eefb93ad0d8cd495290d0105438946c02d85f951912b90a93493,2025-01-23T15:15:10.443000 CVE-2023-3704,0,0,f6e670c2d83474f0123d0af7a87775cbeb898fda49a9a2d86b14ac103d673216,2024-11-21T08:17:52.930000 CVE-2023-37049,0,0,a50fac4cd820db018d62b9574142c1c91225888e27f635ecbb9c39f9da56db63,2024-11-21T08:11:00.767000 @@ -236317,6 +236317,7 @@ CVE-2023-47148,0,0,125c9b6eff45b4c4f4e98898ffc8939f83bab8e9e7741dc73fd5013c70708 CVE-2023-47150,0,0,39b8e6e38790365133c91f98743cb6362cd9f47470d0fb8b0febb10399d2b26f,2024-11-21T08:29:52.247000 CVE-2023-47152,0,0,bcba57c6075b792d7c6cdc81b94418e9d986179abba79b9d2e8692a11a4bbb29,2024-11-21T08:29:52.370000 CVE-2023-47158,0,0,15f414bea2d2a1a9e4cade4c1576622ce6f6cb87ae101e48296a2d9c0094ad10,2024-11-21T08:29:52.553000 +CVE-2023-47159,1,1,37f2ba17452479059eca821b413951e8e971d7b14b3e1155d6ec2d0c5f4889c9,2025-01-27T16:15:29.593000 CVE-2023-4716,0,0,181493a0bc47d8b6179e4d7c992bfdb6e0ed0566be00ad76cc7e801ee98290ea,2024-11-21T08:35:49.137000 CVE-2023-47161,0,0,daeccb22b0ce16ed468a02cafa5602752c58c890bfe9c6e91d73aa4a0cf9b4c8,2024-11-21T08:29:52.717000 CVE-2023-47162,0,0,9399a8bd268b1083de4daf0bf90d8f0edb5f56b653ea68cb53c8ecf2c4beeb7e,2024-11-21T08:29:52.850000 @@ -239957,6 +239958,7 @@ CVE-2023-52289,0,0,e6a2e54dd3a1c3f4b065cdeb7cba7713e3add3ea64ff3d39a79ca5e040c82 CVE-2023-5229,0,0,18bbb0701fdfc1eb961720131b947089c1dc194f24cd377eeba5cbe489702c68,2024-11-21T08:41:20.133000 CVE-2023-52290,0,0,f81c1307f271823fe5b2fc9b059a6b49b0b523729ebd16ad87ea28109735272c,2024-11-21T08:39:31.530000 CVE-2023-52291,0,0,07bfceb67ee5ea6051410ea49ad7e6a77499d49c5dc75e901a99178dd8db6d04,2024-11-21T08:39:31.723000 +CVE-2023-52292,1,1,2888e8494b0d9dd8bcc835fa59297d8aa982fd13c5ac80d35d687e079ba17ad6,2025-01-27T16:15:29.767000 CVE-2023-52296,0,0,f37bbfb20e2925224d0b3b1045f2a31ac4df06590656ad39807523ee035f1e98,2024-11-21T08:39:31.927000 CVE-2023-5230,0,0,3cf502703ae5b648f307f80b76738bfea8747ada0db2366c9923cb7b273a080e,2024-11-21T08:41:20.240000 CVE-2023-52302,0,0,3df11091ed3603d6054aae0b4f32b2cddf705616c93df1718ba0a0c79d96053f,2024-11-21T08:39:32.043000 @@ -240298,7 +240300,7 @@ CVE-2023-52642,0,0,05d60fedf578d1ba56385f5513e46bbdf0600669e68de5121a528e674c343 CVE-2023-52643,0,0,d50d31e5bb6a9cdf07b3e088fc3b5fda79f9ea816bd8b6d8c44559eebb408f0c,2025-01-14T14:58:40.580000 CVE-2023-52644,0,0,c34c6ce67f7bd1744e5ffb2bc7e1ab174b24b6c795ada11f0160dd6a25188de3,2024-11-21T08:40:16.333000 CVE-2023-52645,0,0,b7243e0650448847f32080e14db91cf203d54c57d7b28acbe818fbd2b13c53f4,2024-11-21T08:40:16.490000 -CVE-2023-52646,0,0,eaf388e3abe85a3c7ccf557c92f94f7e76ed266a116245f38a3cdb551dfcdb03,2024-11-21T08:40:16.687000 +CVE-2023-52646,0,1,6ecde45ea86cb44e0829ef3156f414dfbbcea27ea88c5d6fcb6314e4210af497,2025-01-27T15:09:48.333000 CVE-2023-52647,0,0,e2976bef8bc92e0adeadd89937440a86e758817f278db22054eaa69f951695d6,2024-11-21T08:40:16.850000 CVE-2023-52648,0,0,bf327e16fd314087311880b9907320568dc951df7031e7a2a98e2b4c960ed3dc,2024-11-21T08:40:16.977000 CVE-2023-52649,0,0,a99e2d150671082fa4d3c37d35f0947b0eb528b79f37ab81343c41664ce0ad3a,2024-12-23T19:14:57.980000 @@ -243627,7 +243629,7 @@ CVE-2024-10355,0,0,edd144d42239514a5040e45977c91b9661e0e5e1ef732ff2d1a515e8bda77 CVE-2024-10356,0,0,c3e482948a6c3b0414b5e4eefd2b603eabb27c390a3ec36c480e9a647e34cbb6,2024-12-17T13:15:17.520000 CVE-2024-10357,0,0,f74db7863bca5ebee822970d3cc478c034d37a24b722ae5ec1659b0e7d8c1550,2024-10-28T13:58:09.230000 CVE-2024-1036,0,0,d25b8d26af000f07669729b06ebb447206ede2960015e2fed660e23eae75a886,2024-11-21T08:49:39.210000 -CVE-2024-10360,0,0,613c38c9ab1a87b22c3be425e755ef4037b6e0ecdbe0afd2f4ea1f631e7f920c,2024-10-29T14:34:04.427000 +CVE-2024-10360,0,1,49b9d570c045e2259e89921d406064d5e455c0a7c41e77df302b1e3e299adf2f,2025-01-27T15:19:13.047000 CVE-2024-10365,0,0,4fe48020ede3297b6900c2d074afa9cfc695d825a2faa2d82338ba40f9460ff8,2024-11-26T20:36:08.280000 CVE-2024-10367,0,0,047cdf86e80e6b3edd3a8f103515455deeb9cc4fb024de212789283fdbccd2cb,2024-11-01T12:57:03.417000 CVE-2024-10368,0,0,1229bdc9c63256465d1d199349299fe27e9ef0d56f2669e496ca7acd06a3962b,2024-10-30T16:46:30.783000 @@ -244484,7 +244486,7 @@ CVE-2024-11339,0,0,79f980d1c213f37a017402750a78ab5a89012c4a7d884549e17aee2fe1c2f CVE-2024-1134,0,0,3b9e316f9f09adef1cfd4f6b3383505dbc9180172570e63197eb1d9f1f72ee08,2024-11-21T08:49:52.330000 CVE-2024-11341,0,0,fe8cd85d684fa85647e91e6c807d0d3948596661a708a57f08c30a79715842f3,2024-12-05T10:31:39.520000 CVE-2024-11342,0,0,e5c7c30c6a212e83bae351facc5b11e3c8030751d949156ac2c5ae223532d502,2024-11-26T04:15:04.030000 -CVE-2024-11348,1,1,b73533c28283ab7bf818da7c7790d575d089f2c941bc36e98c95c674c09fcc6b,2025-01-27T14:15:27.973000 +CVE-2024-11348,0,0,b73533c28283ab7bf818da7c7790d575d089f2c941bc36e98c95c674c09fcc6b,2025-01-27T14:15:27.973000 CVE-2024-11349,0,0,3a64113bc68757a74fb5a818e6ed9b7f5872b000d4a6ffe30b5a9251cc55ef53,2024-12-21T05:15:07.017000 CVE-2024-1135,0,0,3aff273363b92899a6e2ea5d9bfb0816a0d4bc7746e2c028bcee049e0905b123,2024-12-20T07:15:12.590000 CVE-2024-11350,0,0,8bb38c60aa0db48736d4dedc1ca25ec56ff9a53397f36b2b728e85c0405da224,2025-01-08T09:15:06.460000 @@ -245684,7 +245686,7 @@ CVE-2024-1276,0,0,7fd672f8ab2d0313a55eef11978a3cbaaea942b78d4dfb1702b583b731b53a CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000 CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000 CVE-2024-12773,0,0,b7dc1716c8eea97c30add684f80026b79afc5415bfe8900c9ca4108d7f69e8bc,2025-01-27T06:15:22.747000 -CVE-2024-12774,0,0,e0f6dffb1a6ec85cff997d86a5a989037a6bf59382fb0ac7a62e7d0a034a7dc7,2025-01-27T06:15:22.860000 +CVE-2024-12774,0,1,831f06cba5c40ca0ae40312b61d66a0fcc179465b4ec30109a7e37db55ec771b,2025-01-27T15:15:09.803000 CVE-2024-1278,0,0,304f88731c9c2e93f283a152f19a1ac852d3cf0fda0d38c9b82c242ac4604519,2024-11-21T08:50:13.287000 CVE-2024-12781,0,0,c74d8fa49d4e1ce3b752d35981d8b052a93e3f1d0fb27ff932f88f085f9b3bc6,2025-01-07T07:15:27.937000 CVE-2024-12782,0,0,a220a59df3c04cfe812d51b3c5d226e092dd063fd83863ac7ea9515a10725c6a,2024-12-27T08:15:04.917000 @@ -247980,7 +247982,7 @@ CVE-2024-21306,0,0,2a370a0aee5d92bbbe454d1fdf5ed058cd5c6c363a0e02cdc4a816823a09f CVE-2024-21307,0,0,6dc2710569e776546cc4f624cada8ba22376217566b47669f18adc9d69851b4e,2024-11-21T08:54:04.307000 CVE-2024-21308,0,0,f6a379d41c4cd5133050a31bdc4ca5e24f06dd737032839685d9ee434bfbe4a1,2025-01-15T22:44:09.030000 CVE-2024-21309,0,0,b3bb2afb81b8de5377de8c6125fbd52c99c699ccbea021f8b9db6bc7ca4cde8c,2024-11-21T08:54:04.583000 -CVE-2024-2131,0,0,b1b07f83cc4815619d8a340f7f607f09dab71b73ec5b8e6029c7eae4cf12e8ca,2024-11-21T09:09:05.730000 +CVE-2024-2131,0,1,70dc621cd4bbc2ffd43873ae60c48379095e55f2d69c7b86131d4107abb5914f,2025-01-27T15:20:06.373000 CVE-2024-21310,0,0,07e8f724d65a59640e46d5cde5e1148b80be9e027bb9661a3d8d6a1b12f33d89,2024-11-21T08:54:04.720000 CVE-2024-21311,0,0,4d6ad1816d0e66f3c61e7cdb92c11956c9e3c55be6ee8b7971fca359d0bb88cd,2024-11-21T08:54:04.860000 CVE-2024-21312,0,0,6bf7a111a639274be7bd1d96a6200472536c850ea46f2604e81064d0b20c2d44,2024-11-21T08:54:05.020000 @@ -248910,6 +248912,7 @@ CVE-2024-22310,0,0,dd859d6b306e0c9874ff3f33a829690f44f8dffe8aedd8ff6cd5b1b571687 CVE-2024-22311,0,0,3a63d6bee662ba0a6f15b807c0947fe7a1e5a2631da80da5e7333d664c69e682,2024-11-21T08:56:02.480000 CVE-2024-22312,0,0,2d6d3b890becb8a03981f799e8b5044e1f347c4412e0821c61a022cf4e163ae7,2024-11-21T08:56:02.603000 CVE-2024-22313,0,0,ddd1d33bfc1b5af1520350c2c7005426db2b2a5d727ff982649017ed5b9c287c,2024-11-21T08:56:02.770000 +CVE-2024-22316,1,1,dc085e3ed5915890c6053d11530b220073d391856575fdc4da02f3d18c8018a9,2025-01-27T16:15:30.637000 CVE-2024-22317,0,0,b3b9afe087a314d2d9a2da4cfb50d8e65a45b5deac79991b6f88cbee779b8b65,2024-11-21T08:56:02.910000 CVE-2024-22318,0,0,aa4fd17a016da578c4e40f8bf867f49d73509a0efd564d0d9ff3a305b818b22d,2024-11-21T08:56:03.063000 CVE-2024-22319,0,0,94c8971dc172b8316a6a132bdd3732cbb8e1ee1ea0d1539ebe9e0956f604ec80,2024-11-21T08:56:03.247000 @@ -249084,7 +249087,7 @@ CVE-2024-22546,0,0,997003eeabd55afd13ddbeebe6550d7262d8869e557416789e584a9094c3b CVE-2024-22547,0,0,0133090a54f8606cef07626b9e620f96367b93c79f99ca3bc075b2ce0712def3,2024-11-21T08:56:26.220000 CVE-2024-22548,0,0,3bddf409ca88fc0749d327d45cb0d00ca337c1ce8636699dfaa665651c15c3fd,2024-11-21T08:56:26.440000 CVE-2024-22549,0,0,675ffdd8f168a9762f5a79b4cbe36a992bd2d143f3ddef6a0f310cd9c0117265,2024-11-21T08:56:26.580000 -CVE-2024-2255,0,0,7820304244a223107853443023ed595b897a7355c9c95b4533f87af6dc37cb6e,2024-11-21T09:09:21.510000 +CVE-2024-2255,0,1,c38a1053c701220d5e01bbcf68bc70dfa4b5faf3090ba50a446a2c7b031db66d,2025-01-27T15:26:09.810000 CVE-2024-22550,0,0,ed96f0a80d539bcb01e0ab9294d11d1f803860b0b0bab7c55b1fed5ab75147a5,2024-11-21T08:56:26.723000 CVE-2024-22551,0,0,1e93c60dd52f09f6cd2dcd56d4a711553385c5433699e8ae1f44fe69a35bc9ed,2024-11-21T08:56:26.960000 CVE-2024-22559,0,0,36d8d40d85cf4ef45bc2b02dbe49188c093e02a56b7d30ed2946edd5a0d6608f,2024-11-21T08:56:27.107000 @@ -250316,15 +250319,15 @@ CVE-2024-24403,0,0,9dfd8d2383a51e07b61f370007222fc6207ac481d048277e8f500a7d8b0ad CVE-2024-24407,0,0,9854b2123d3cb61fbea945bc5c28ab7e9c5e67ad8f91d9c6262853438f2d5551,2024-11-21T08:59:15.243000 CVE-2024-24409,0,0,2b5b94cb6623257f634c08bd886ff97512dff9af22f16e80107479043a99a530,2024-11-13T20:35:44.963000 CVE-2024-2441,0,0,f3d49cbdbc9b254da53d38040e54aa2ae2b37be0aa445ff971a41eaad48ea6ab,2024-11-21T09:09:45.583000 -CVE-2024-24416,0,1,da33c517cb74def6e1fcfef7dbd868e89c0da524a1124be507323f34f2efd14d,2025-01-27T14:33:50.793000 -CVE-2024-24417,0,1,d81037acb56b281f2b4c1d5b873f54e5a7074ba7899c1dfbb0274d0b6a1546d9,2025-01-27T14:30:53.340000 -CVE-2024-24418,0,1,0fab44bc995f2600bbdc82f28c7dc2e3288d8f362a140d73d148b542ddb96a4b,2025-01-27T14:33:26.093000 -CVE-2024-24419,0,1,56700223a0e086671686b9de5764f46c672029a2fc4dcca4bbdefc834b3e45ac,2025-01-27T14:29:49.253000 +CVE-2024-24416,0,0,da33c517cb74def6e1fcfef7dbd868e89c0da524a1124be507323f34f2efd14d,2025-01-27T14:33:50.793000 +CVE-2024-24417,0,0,d81037acb56b281f2b4c1d5b873f54e5a7074ba7899c1dfbb0274d0b6a1546d9,2025-01-27T14:30:53.340000 +CVE-2024-24418,0,0,0fab44bc995f2600bbdc82f28c7dc2e3288d8f362a140d73d148b542ddb96a4b,2025-01-27T14:33:26.093000 +CVE-2024-24419,0,0,56700223a0e086671686b9de5764f46c672029a2fc4dcca4bbdefc834b3e45ac,2025-01-27T14:29:49.253000 CVE-2024-2442,0,0,253b87e62399d3a6af245d178e21fd710ca2545ac6e1dfd17779d2dcf3253a0c,2024-11-21T09:09:45.697000 CVE-2024-24420,0,0,5a5bc176c375a6ae3c1f1f1aaa7fa8c118b011f44384ef34091460eeed674d90,2025-01-23T16:15:34.687000 CVE-2024-24421,0,0,fa164804ff284d241187d08b344fa9d54b6fd94cc28a5540cb8e981223f48d19,2025-01-23T16:15:34.883000 -CVE-2024-24422,0,1,f3f0534a786051b37c144f7151af796ef19b19e57f0ade091855b0a4335b14fc,2025-01-27T14:32:56.950000 -CVE-2024-24423,0,1,4332048877011f69640a5632437597c26d366dfe8d490ac2bd8c4fd3daef6485,2025-01-27T14:39:57.160000 +CVE-2024-24422,0,0,f3f0534a786051b37c144f7151af796ef19b19e57f0ade091855b0a4335b14fc,2025-01-27T14:32:56.950000 +CVE-2024-24423,0,0,4332048877011f69640a5632437597c26d366dfe8d490ac2bd8c4fd3daef6485,2025-01-27T14:39:57.160000 CVE-2024-24424,0,0,512c38d36e5aa9c9f79f68e96ae95b4f93b2be8c28966f0070415d2ad484813e,2025-01-23T16:15:35.453000 CVE-2024-24425,0,0,f020647313a266e9b26d920d7b3ff0c5a70298ceb4b38f72086ac27d496b3748,2024-11-19T17:35:09.450000 CVE-2024-24426,0,0,1ba202c66d22ec01d9165c4229044ba2d8de45fa575e097063ba053bd7d0b3a7,2024-12-03T17:15:09.400000 @@ -251118,13 +251121,13 @@ CVE-2024-25575,0,0,1018bd05e409a13236c5dcb2237c77906e7f23238c36cbe4ff25ea1f8323e CVE-2024-25576,0,0,95b8b2fe29c3b8fa31fbe37491add9737a675d1ce27c7ad5d9b93d6c253067d8,2024-09-06T20:17:14.003000 CVE-2024-25578,0,0,cd7bc684525a22b1c5771942ff4ae262fdc7036bf854cdb96ec3e2374a3eeb34,2024-11-21T09:01:01.047000 CVE-2024-25579,0,0,53dc5740ced037e66b1a2ba8c7a85647afdc0321b2de6a97263699799a9bccc1,2024-11-26T08:15:04.400000 -CVE-2024-2558,0,0,4c290bc425a5a167cdd2127e86122f516379dfb57df269146f8c6f2f4c616487,2024-11-21T09:10:00.450000 +CVE-2024-2558,0,1,02ce2f2a64668ffe21ec4c1d0315a119eeef07446a2ef7cf12a8781dc0fd14f3,2025-01-27T16:56:47.900000 CVE-2024-25580,0,0,c4b0afd79a1474589c375c8ffabbee3d018fad8e4c0933a7f12523ed1f4b9156,2024-11-21T09:01:01.400000 CVE-2024-25581,0,0,d9cf41000e40894e1e57e66e69bd839bdf75b2cba10804a3bcb1ccd687a5175f,2024-11-21T09:01:01.620000 CVE-2024-25582,0,0,14689a0079cb9d91c28249ad9323f9afd0c6579c6fd0dfae82c9052534820133,2024-08-19T12:59:59.177000 CVE-2024-25583,0,0,ca939b3dad6e6f74b1ff49a658bdf716ccdd446c737a5cdf17f568d1249b9dd1,2024-11-21T09:01:01.823000 CVE-2024-25584,0,0,7a4aedd8c8bd4a4f6cf57e5a5b34fefd3a570c6f165ab147cc791809cd369790,2024-09-06T16:46:26.830000 -CVE-2024-2559,0,0,125d50d052f7ba4d30e7ac796be0d551aa5c6a8224db7ab8c7c361c5513d8486,2024-11-21T09:10:00.610000 +CVE-2024-2559,0,1,a52abdb9dee7a2b9cf97549fffda288e9bd244b1c049b8886c2cb84eff671485,2025-01-27T16:50:41.160000 CVE-2024-25590,0,0,8d02885f747c962ae03bad6ccc691cb5a7f3c754a0055c180ff7ee84094108bf,2024-11-21T09:01:02.033000 CVE-2024-25591,0,0,fa8458e4721010bc4a3e953326e37e290e504ea9adf2514e3f0f84525f97c3df,2024-11-21T09:01:02.157000 CVE-2024-25592,0,0,c51d707636e64d3c59c6e49a5717983c2ff2b616a397ba175409796652173f8b,2025-01-23T19:32:59.350000 @@ -251926,7 +251929,7 @@ CVE-2024-26645,0,0,bdee23b950a8dff0fe3120bc636185265634a180ed90c1f8f21f6b1361aee CVE-2024-26646,0,0,5c3b675eed417f04e79fbe9a962446c0936c3d49eec6b3e012c1e53cad995753,2024-11-21T09:02:45.490000 CVE-2024-26647,0,0,0087defa8b2daf5e29c0c380220574740551b7537aefbd17ea5876ff9a0ca272,2025-01-07T20:15:48.587000 CVE-2024-26648,0,0,57660c3f5372b373298dbe0cd29fd4332764e7181a5b50e285b698a5ae516b44,2024-11-21T09:02:45.723000 -CVE-2024-26649,0,1,affc58726c4d9b6522d6bde29012b9a628801f04a98430ddf530cfc9d83cbf05,2025-01-27T14:50:35.380000 +CVE-2024-26649,0,0,affc58726c4d9b6522d6bde29012b9a628801f04a98430ddf530cfc9d83cbf05,2025-01-27T14:50:35.380000 CVE-2024-2665,0,0,7d353e3768885e4e4ccec25142dfea412a0d57b9ef35aaee4fe4d95b6836feb0,2025-01-08T20:05:50.257000 CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d980d,2024-05-23T14:15:09.293000 CVE-2024-26651,0,0,898711d0c00a026cf190f460e3b24d2751f2699fd4b1b6a25eb50a9711c0c7b9,2024-11-21T09:02:46.027000 @@ -252060,8 +252063,8 @@ CVE-2024-26767,0,0,e4a372ff53fbe10d1d76dcedc9f9b1e20359a57170473ffbbac7226ab5aeb CVE-2024-26768,0,0,6fafd2ec3e7cdf9346d5cf413e5e98785829ef156a7452d7bcbd56c557bb4b27,2024-11-21T09:03:01.570000 CVE-2024-26769,0,0,9ba21540aec936514403e64bdad200b6edb1d7f751bc14c530bdb954115ae255,2024-11-21T09:03:01.763000 CVE-2024-2677,0,0,26dcb9af2819d0d0588d926fb3dd41c7ea730a94b3629b44404ab4750d5cc55c,2024-11-21T09:10:16.287000 -CVE-2024-26770,0,1,8d08eaa70a2e2e3d40574f2b704a77374cb9e6669a6ba5b5bad3773130c490ac,2025-01-27T14:58:19.130000 -CVE-2024-26771,0,1,5e3318a5219a1562a00396de2c61a0fa558f01729e9603c0306f834212e0432f,2025-01-27T14:59:26.887000 +CVE-2024-26770,0,0,8d08eaa70a2e2e3d40574f2b704a77374cb9e6669a6ba5b5bad3773130c490ac,2025-01-27T14:58:19.130000 +CVE-2024-26771,0,0,5e3318a5219a1562a00396de2c61a0fa558f01729e9603c0306f834212e0432f,2025-01-27T14:59:26.887000 CVE-2024-26772,0,0,fe8524e99fc68d449508f3ebfd8f6afb4c482f632501c09f5f84e454baa54b83,2024-11-21T09:03:02.190000 CVE-2024-26773,0,0,7ef5aed49abdb8b41013d862bea1395e73f0e319d07ad740410642ca0777300e,2024-11-21T09:03:02.380000 CVE-2024-26774,0,0,e1b47f609864ec2bf2c985b00a1f42e9a22977ef025fa7997c7afa306e1199e8,2024-11-21T09:03:02.507000 @@ -252162,10 +252165,10 @@ CVE-2024-2686,0,0,fec0f14b6d657e98130580c8bcb63b2672efadf690146c9437f8751fa56e7f CVE-2024-26860,0,0,00d381323672664bc41f4e4cd89b44b51ee6c36af10590042488ae21013d2872,2025-01-07T17:13:52.260000 CVE-2024-26861,0,0,f06c56909e76d83d3acf8485d5478c6ae2d0d83b82e0b9091c4412ec634a0ec7,2024-11-21T09:03:14.277000 CVE-2024-26862,0,0,94216787489441c2b38672b60a8ef4910c5138aedfb248664baddac7173ed4ec,2024-11-21T09:03:14.403000 -CVE-2024-26863,0,0,a1c14b17ce135228a17199be1615c6fc84242883495a3d51c54f59d25f8a4c3a,2024-11-21T09:03:14.533000 +CVE-2024-26863,0,1,78c2119d6f80f4b28c4729d61ca4bc7c89001a1792d2bf795929ec1734e40dc8,2025-01-27T15:05:39.390000 CVE-2024-26864,0,0,eb2f6d1cc842168692d58368c5385a125dd9b538c58507cdba23f5736373b299,2024-11-21T09:03:14.663000 CVE-2024-26865,0,0,425ec1e666ffd707bf5be9f39ce33453ce0f57a20ff8f1bd74eaf4b15ccb3949,2025-01-07T17:14:10.927000 -CVE-2024-26866,0,0,44df02b3ff709e7d797fe24d95c0f49c8eecceb31154798d532826eb61c68d7c,2024-11-21T09:03:15 +CVE-2024-26866,0,1,756688ec73c3d1d3b26008c60785a42a61b0c4d24a84e40b003bd3a768e2191a,2025-01-27T15:08:19.563000 CVE-2024-26867,0,0,f4c3e98cf18f5362ba9d8cbace769954683f72425fbef623fdb1cff3c29bca91,2024-11-21T09:03:15.117000 CVE-2024-26868,0,0,470780f3eedbe54e0715c09aacacd15d602e690928f9f1f3cc056aa7f149c140,2025-01-14T14:45:52.020000 CVE-2024-26869,0,0,02922038ad2af42246888c4202e00a6e69990dd39e8a7ee4b0bde6c82bbc6099,2024-11-21T09:03:15.370000 @@ -252179,7 +252182,7 @@ CVE-2024-26875,0,0,94239f41f42b905c954bc6edc97b0cf15f6dec0d8fdfb2fd1b19e8e24e9c8 CVE-2024-26876,0,0,cae97524862d4115e788a327d03cf0da2acf0edba8249dc998aedc8a21a3f2d4,2024-11-21T09:03:16.380000 CVE-2024-26877,0,0,54721b8ba6c7b4d0a18ed9c595e6136296498a569bd20bfeb4ea6cc3920631ea,2024-11-21T09:03:16.520000 CVE-2024-26878,0,0,2c398350514fb54f2342aa6342ce493830beeb75951d27f14bae83050dc81b26,2025-01-14T14:49:44.283000 -CVE-2024-26879,0,0,dc370a9579629bfc3c9d316d1724c887ec484f6ade9c1976583f08dbcecc8983,2024-11-21T09:03:16.793000 +CVE-2024-26879,0,1,50ff069537c649739dc4e54aaf76e53263911635458780c341afcdd614bc45bb,2025-01-27T15:12:45.210000 CVE-2024-2688,0,0,93325ede5335c7cfe6caa2a8077a03a339fd6598ac72c158a197fc34644bc992,2025-01-07T17:17:38.673000 CVE-2024-26880,0,0,b775bc30b873c71ce0741bd89eb501a0811ff9c595ceddd964535015994b3d7e,2024-11-21T09:03:16.923000 CVE-2024-26881,0,0,c9147da975715d7d9e15d8a477237dbe48b93c3e840440ef85c748b4931c6aee,2024-11-21T09:03:17.140000 @@ -252195,7 +252198,7 @@ CVE-2024-2689,0,0,efd9c698169d4dc6b507d633d5c5bca5635fd88f4fbab04c5f54592266ffc9 CVE-2024-26890,0,0,d28148780134fe9d4fd26b89472d475a8cd9fd94507e1d0beb5192c2d01a8c30,2024-11-21T09:03:18.677000 CVE-2024-26891,0,0,18ef1231e3dab94fd46bd51769a57b4742af39b60702f0ac393cf1e3791be7b3,2024-11-21T09:03:18.877000 CVE-2024-26892,0,0,dff3724f39f4f7d27824ec776eef6bd6154cf578f200db90d4aaf7ae8dcb96a7,2025-01-14T14:34:50.407000 -CVE-2024-26893,0,0,a32b93693aea02e2d2b15b97f491f25df71cab99d38e3b872b8f185bf53bc45a,2024-11-21T09:03:19.143000 +CVE-2024-26893,0,1,e4bf7717acd3051131184678ae9316b9694bedab35a35205f2cd9fa955761ef6,2025-01-27T15:14:28.090000 CVE-2024-26894,0,0,a0a3505846084c5b38d2ae3c10f78c77094fefe62fef76a336ba2b60789b1f16,2024-11-21T09:03:19.273000 CVE-2024-26895,0,0,c7dae02178f516d4283340a4f7cce896c92a3602b8fb81a9ffba367ad09ef0ce,2025-01-14T14:33:40.417000 CVE-2024-26896,0,0,c6e43fd686585240ffa18e62a933c3ad899a2ecd05bffcaba7c10cff96b5c484,2024-11-21T09:03:19.633000 @@ -253915,12 +253918,12 @@ CVE-2024-29098,0,0,9b1008b83cbe94703d043bfdf5904f8bef4f3123ac6a8137d811039c2b1c4 CVE-2024-29099,0,0,57f43cd8f74c6e6cf95b7da1e8708cfbdd3bc617c2558dc4505d3cb2cde59023,2024-11-21T09:07:33.100000 CVE-2024-2910,0,0,bbc5651269bc757d63b4a047fd6f50531f9ae2606d9c89885eef5674cb9b94c0,2024-11-21T09:10:48.977000 CVE-2024-29100,0,0,4b4ea50e8b1a5f3add3c62cc09873ccb1c0bad3dcfd266a73de4fe697a412abf,2024-11-21T09:07:33.233000 -CVE-2024-29101,0,0,4c53f37d823edfb3c9fd2b1e626679ebce47a1566475ce9408f13527f7202b51,2024-11-21T09:07:33.363000 +CVE-2024-29101,0,1,3e1f7a72e6c54872472cb6493d5562d1ab4eb10c553370d58053a928dd03f787,2025-01-27T16:21:01.500000 CVE-2024-29102,0,0,ed935bbc4f82c0c84be43e4d1a7b61d5ebce7f3fd54cf950c79feff7a35ac46f,2024-11-21T09:07:33.500000 CVE-2024-29103,0,0,d41735cb9da95e849a5b45306d53d28ce564494ecee17e60023a3cbe91f78521,2024-11-21T09:07:33.623000 CVE-2024-29104,0,0,f1f189a63b7a01d1d49f3a6b0cae20a47961d88101d8514d2c423c4ec2f149ef,2024-11-21T09:07:33.760000 CVE-2024-29105,0,0,c66a7fda0a5c9f8df47a07bbce9c424c595eafc32fe89bcf2c583a37e4654e1f,2024-11-21T09:07:33.893000 -CVE-2024-29106,0,0,5358d902cefa6be44c0ee6c2d2f511319af57f2f7012640f44e3f1013fa1cdc1,2024-11-21T09:07:34.030000 +CVE-2024-29106,0,1,5a400ac8943d75afdda2010adfe40fe98b71565a3f87da2e7f1bf30416ae4ab8,2025-01-27T16:11:23.087000 CVE-2024-29107,0,0,575a378e14d23427f30e92b1c894a1fb54c90fb958b2d4efde6fff0a505f35f7,2024-11-21T09:07:34.160000 CVE-2024-29108,0,0,0ae5c87de818ee6d85336d44fecde11bf0ad3f784ce5bb54a4b6c764bf7af8c3,2025-01-08T16:30:17.263000 CVE-2024-29109,0,0,4d51f8f3341e8657e6c8c880f4f2d73bd95482441c6ac3a26d0a8cd436b3b41c,2024-11-21T09:07:34.440000 @@ -254411,7 +254414,7 @@ CVE-2024-29917,0,0,26002c5dbce9d5777a47fe26cf8c981f233fd4f8a95f76aa44370c6e2de3a CVE-2024-29918,0,0,a57618c3fb51dbee6f018076fd6e632fdeec606ca829af7180033f4e9040c547,2024-11-21T09:08:37.053000 CVE-2024-29919,0,0,ac098cacaad21d239504a2c5ebecf9b813bc711e379f46354a8c421b03e7425c,2024-11-21T09:08:37.187000 CVE-2024-2992,0,0,55bbd6115b2de17ac5872344f17f9eecdf8654fc7cbe39085e40803186207c8b,2025-01-22T17:59:00.077000 -CVE-2024-29920,0,0,581a8a03ba9787c287fbcaaf180ab7a4e4a61be263962bb7b2b47bcd0dad3d9f,2024-11-21T09:08:37.313000 +CVE-2024-29920,0,1,e35d088a188e6bfa8190741a74c74b247349ba8f715ee70eaaedc435c2232bb7,2025-01-27T15:20:38.483000 CVE-2024-29921,0,0,867bb45d677d0dc68c74a78c2826c6adab41a83b47b3c52810ab95377ef5a86f,2024-11-21T09:08:37.447000 CVE-2024-29922,0,0,72dae7d1c92fd306a11a646a4720aeaa6df484efff05a113be2d239141b3f2fa,2024-11-21T09:08:37.560000 CVE-2024-29923,0,0,8225650ead409b8f85369357d44055c6eaddbde5fe28dbef52825bbb60efcf72,2024-11-21T09:08:37.677000 @@ -257993,7 +257996,7 @@ CVE-2024-34559,0,0,add1f51454556128ecef0e724a3bc62f9a607a7086d3443048f323f79f5a3 CVE-2024-3456,0,0,666f10caf8d4abc2c878e20fa7643e23a4280263bd59ca1aee750ef6bdda76a6,2024-11-21T09:29:38.203000 CVE-2024-34560,0,0,fe1b4d6afe9d36e3fa396501ce1f462db208a9cc6b4287f7f3e0675c5e8eb1f1,2024-11-21T09:18:56.233000 CVE-2024-34561,0,0,94a3a4a32680e52abd396f991fa3f3091d097ef31d868ad3111ea0a4b4409a56,2024-11-21T09:18:56.363000 -CVE-2024-34562,0,0,50df53f6e1c6c5425184cd1540cca4bcd667f9efb7b62abe55cc5756349a20a3,2024-11-21T09:18:56.500000 +CVE-2024-34562,0,1,22e9af7c3c7972513883b09b828274e40ff3fe33753cfb2dd3842a5691b687b4,2025-01-27T15:20:56.620000 CVE-2024-34563,0,0,040e10566a3859791595a0c0a3fd8df23d5dfb5e509404b6b78f66aa609377b8,2024-11-21T09:18:56.630000 CVE-2024-34564,0,0,cda6ebc66c36b8b0b609a35365d30e1dec81e59451dcb9e93db6bc2f43d200c0,2024-11-21T09:18:56.760000 CVE-2024-34565,0,0,cad1f1315da853e64ba67f67cf4501a859399268359dcdf02f7b21194a3856e0,2024-11-21T09:18:56.890000 @@ -260373,6 +260376,7 @@ CVE-2024-37520,0,0,c2601772804e1cfee195894ab6b7cf60b06b0ebb1999f0d1b12743ce6abf1 CVE-2024-37521,0,0,94bcfda156f2b0afbf34ae65d204fdf89b55e41cfa34ea7594fd744cf1c838af,2024-11-21T09:23:59.870000 CVE-2024-37522,0,0,3295cd978c20643eaff8d6fc73318ce6121ff0f18fc4f60672eec9a4623d1a39,2024-11-21T09:24:00.330000 CVE-2024-37523,0,0,4a58bbd7feffbbcd6d15592605f20e33ff3174176d45dec67c359454fa9e0b47,2024-11-21T09:24:00.747000 +CVE-2024-37527,1,1,a5af77d7b6365e6adc04f6e4c32c4fce6880d7fd833ee45fe5914d4fb64fb502,2025-01-27T16:15:30.840000 CVE-2024-37528,0,0,0e5038324fe3b6f9799a31c377c6705ebf03b5d5e405d251a1f9d9fdb58c17c2,2024-11-21T09:24:00.887000 CVE-2024-37529,0,0,acfccbcbfe6dfb16aecab8f7e844483580e6eb70a780b71713524bc635ce4565,2024-08-23T18:55:48.257000 CVE-2024-3753,0,0,3b84e54e67f6139460e801ecfefc293595c2c267d83aaee816ff9139d106a385,2024-11-21T09:30:19.350000 @@ -260993,9 +260997,11 @@ CVE-2024-38314,0,0,7f72becf752c493d63d9011af9e40e717b070fb953c18b5df93807710a713 CVE-2024-38315,0,0,7f80cda9dd8e03aa7f11a3ebca194914cfdb9ca994dcb1bc1568ef69817f8f68,2024-09-20T14:09:24.733000 CVE-2024-38319,0,0,85d07cf6ac4c3d39aed41b78f9915ec0d57e1f4cef6712c4aaaab05d2f91be0b,2024-11-21T09:25:22.177000 CVE-2024-3832,0,0,54d7cd70608d6ebf4d58d321fb2c71a056073b40f73450ca63d747b8e4ec1006,2024-12-19T14:53:34.190000 +CVE-2024-38320,1,1,15afdcbb12e8e8819a29ca7abd828d95a5b9e03b0e5d65c0530ebfff7e3b43cd,2025-01-27T16:15:30.973000 CVE-2024-38321,0,0,451e43fd7c3ce8a95a4f1d37398e013e2483fd40917c790d6dc74b359b1d32d9,2024-09-06T14:50:53.583000 CVE-2024-38322,0,0,8e573827e3fa52cf97ec6d2ef345cd31ae55ff6b4c10220d85ef83b3ce3ac344,2024-11-21T09:25:22.520000 CVE-2024-38324,0,0,6983d8cad1fd6c0c78413c4456f22354583612d01ccc038ac7f0199fa2c57812,2024-09-30T14:10:18.597000 +CVE-2024-38325,1,1,ce10677b3048ca308690463488aea61fbd24bbabcd1603adb726b781a7cad432,2025-01-27T16:15:31.117000 CVE-2024-38329,0,0,9da02cb1c1e6e0ee0df6910cf16cd32ad52cc4fe1d821c256d156fa9c41a4422,2024-11-21T09:25:22.867000 CVE-2024-3833,0,0,70f71fc362a5e7d48ef4a06bca848d6c2e550860bbb53e401c6074b0eadf1358,2024-12-19T14:46:01.697000 CVE-2024-38330,0,0,f29c2fed4aa255682376d1bf1fe6f029c9aeaf29cb91e5ed615ddc69bd26c654,2024-11-21T09:25:23.523000 @@ -261447,7 +261453,7 @@ CVE-2024-38786,0,0,a3945d26053fac2588fcb2b904e0a138f2d9f54dc61623305952d8af8bf01 CVE-2024-38787,0,0,ce7fa025b58714f14aacaeb7eb2f416bc7734c686cf55df8ca8a5a341cb30431,2024-08-13T12:58:25.437000 CVE-2024-38788,0,0,3b35408d3a24d65f413e2071d9e6ff186341b76a67f561c74fad26cddceb0418,2024-11-21T09:26:49.940000 CVE-2024-38789,0,0,616de834d0980fad84dd5d262c2a5a5c3ff6ad2da413d7a0377141b71b3dbc26,2025-01-02T12:15:23.633000 -CVE-2024-3879,0,0,b3f62511bfdc726f0a4ad7ec2b72e4d548f75fa34f76b9097220affff929e03e,2024-11-21T09:30:37.120000 +CVE-2024-3879,0,1,074bc3e4972b3513101e0e678069b78f6c106732c850ff6e35dd0948fcaffd97,2025-01-27T16:24:40.757000 CVE-2024-38790,0,0,405d212e30fbe17293eda7c0b0455d1fb06eb6a3f764318aeaba7963c03a8eb1,2025-01-02T12:15:23.763000 CVE-2024-38791,0,0,7eb8f94e68bf3536fdb2800ab03bca013d555a84b835d5cdd5aafe7b3cf9aade,2024-08-02T12:59:43.990000 CVE-2024-38792,0,0,e62ad1d58d17db35f23147b02103d010f9465e0c2ed86e9d15a60072344a696f,2024-11-01T20:24:53.730000 @@ -261455,12 +261461,12 @@ CVE-2024-38793,0,0,3abb4fadd98983f9c8a3f71f42811284ca10c92d1b43b534ec7aa2558a41a CVE-2024-38794,0,0,0e611d7d55b2e6c94eee9312ed11241297f8a473362db39470b8ea85723f38b2,2024-11-01T20:24:53.730000 CVE-2024-38795,0,0,e1f5c80ecd4b719afc803bc01646b0dbf082a41e566b00ce3cef907c999501ae,2024-08-30T16:31:03.887000 CVE-2024-38796,0,0,c4c33fa7474078d5c275288ac0c26a4a7de9b623a9c9f1253ec9f217f7c619bc,2024-12-06T14:15:20.437000 -CVE-2024-3880,0,0,05ad02535029fe300c22028f294905db3effcae3d9f6a9c08e2e8efe572ad3c1,2024-11-21T09:30:37.263000 +CVE-2024-3880,0,1,0eca95febe9a4060aec92e25865874329486aff06b8e962d558db43d39fb2b5e,2025-01-27T16:24:26.973000 CVE-2024-38806,0,0,d61f695019d50acbdde73a7d510a5092b17da85fe958cba5e056d8daccd509f6,2024-11-21T09:26:50.667000 CVE-2024-38807,0,0,a2204cf6b5219cfc11a43201b1c9348674855cf3d23c1a37596020de7a79348a,2025-01-17T20:15:28.130000 CVE-2024-38808,0,0,f7692822ed338e14423df682d7a8e1dac807541fdd1521515ac7671d4f021e00,2024-11-21T09:26:50.877000 CVE-2024-38809,0,0,b3225093dd47dfd033e478c0e383a7b7582769a0a5104863121ecb9b337915fa,2024-11-21T09:26:51.010000 -CVE-2024-3881,0,0,1c9f85fd80cca491c38bc78c8ef5005187e956d6680406848ed713e292f20d1d,2024-11-21T09:30:37.407000 +CVE-2024-3881,0,1,38ab6d7d284c0ca3e6b9161a425cbc55ade2a75172ea4255ce3e799638ef4528,2025-01-27T16:25:02.423000 CVE-2024-38810,0,0,5eca7ced7ced269f1d8b6c6c4298e21e756532564a3f32db8863a6f0cdf6c0d5,2024-08-20T15:44:20.567000 CVE-2024-38811,0,0,e90c16a207e5ff636d7114e5326f61042c05eb2d83b5698a9b4fa38a3dcbf1d3,2024-09-17T13:33:32.957000 CVE-2024-38812,0,0,2e704a7e06ecb019d5085676217a7390700a3558f717063ea75069351632bd32,2024-11-22T02:00:03.353000 @@ -261471,7 +261477,7 @@ CVE-2024-38816,0,0,65fd0cf5f0fe6505681fcc328b56e581fddf781c33094976bd261108a87a0 CVE-2024-38817,0,0,d35b7b204aab6983c6c262b508cc4ec8ea32f0ec3634fab0504cad88bd52a03a,2024-10-10T12:51:56.987000 CVE-2024-38818,0,0,f3b0a463e446554a0bbb57d124414991153a9fb40d9dc2ce6360b72156684b2b,2024-10-10T12:51:56.987000 CVE-2024-38819,0,0,c298508c17117e1259d3bfe55735b04be8f822cea51854f73ce47b1bd6cf019b,2025-01-10T13:15:09.287000 -CVE-2024-3882,0,0,d37dc3616c740393b4e1b16d38d2bd3ccee2a1af91c97d5fbd3f6f75e095d7d6,2024-11-21T09:30:37.540000 +CVE-2024-3882,0,1,ff357033633ea83089941ee72ffb1ed520c8dd6a221dd7e52cb47b408a9921af,2025-01-27T16:24:52.420000 CVE-2024-38820,0,0,517fdb1091af57612900b39a11b0b83e3890144a7a4d4cb71cfb71c69b405fa9,2024-11-29T12:15:07.007000 CVE-2024-38821,0,0,74b8175803172fc63d22dc332a41fdd98b88e2c1ead7e686074b3e1c775d2446,2025-01-24T20:15:32.427000 CVE-2024-38826,0,0,aa0be29968eb435ec090127c9d271f3db29778a1347f10ec378a7a1554409ee7,2024-11-12T13:55:21.227000 @@ -262993,7 +262999,7 @@ CVE-2024-41098,0,0,338154d5c432c0e0ee0395715fa8ca7d8a8d003c58d81c84bc992eb663406 CVE-2024-41107,0,0,83c6526fdfb6ef6dff929ade85ab9b522a180ab80000abd63dbedca479d8d331,2024-11-21T09:32:14.700000 CVE-2024-41108,0,0,85bcf4b3bee4475a1b0965555c8b6cfa268f15dd754911b3b3bd214e1e4db83a,2024-09-05T16:27:50.103000 CVE-2024-41109,0,0,0544d00889fd70a6306bb2ecc94e1e71af3d9bb7a8ecd81ec693e3e34a9bebab,2024-11-21T09:32:15.027000 -CVE-2024-4111,0,0,05616bf67c156f4fc952ef18ecc9f259bcee60477f33c814a7d583c91a7ba5d0,2024-11-21T09:42:12.460000 +CVE-2024-4111,0,1,d268156164f48b0f0e9e51ae197234d15d46877663cf4d3313a338684ed5680f,2025-01-27T16:25:51.970000 CVE-2024-41110,0,0,0828a9e37b792ec7f9f315cd5176ea4a8f587e66960bc38baf07e1b9b29654d9,2024-11-21T09:32:15.160000 CVE-2024-41111,0,0,665f20b9d755c6c7bb267dbd73a6180909ddc5c8215f76600ab07bc7c5da96d6,2024-11-21T09:32:15.313000 CVE-2024-41112,0,0,bc8e5f69dde8d72eb450e345c435e85ed4a2143be127dbff47fbc17d72bf816d,2024-11-21T09:32:15.440000 @@ -263004,7 +263010,7 @@ CVE-2024-41116,0,0,5546a46444bccb9de9544b6f3ce4d5e22554446a9d23dd1fc02569af6f6fd CVE-2024-41117,0,0,4748a235c3c4962c29c365cb725994bf3ffbdf2e4973cf7b4d29cf72eb877f3c,2024-11-21T09:32:16.157000 CVE-2024-41118,0,0,1c22d307e0d598e43676928b7e223a48ef13b5d81b0bf18408bb144799d21861,2024-11-21T09:32:16.303000 CVE-2024-41119,0,0,789ab2836440cdadc06d40217aae0baed51674d6118b6b91c971322c275e3367,2024-11-21T09:32:16.440000 -CVE-2024-4112,0,0,9bc0f5f209106fb82ffabf66b4775078e13784b0401056688ab8694af415cd98,2024-11-21T09:42:12.590000 +CVE-2024-4112,0,1,a6db2571a66ef7484d96c8eb2232de2ae1b7c9704f52b5c6cd3ce5a6d5c86a9b,2025-01-27T16:25:42.507000 CVE-2024-41120,0,0,5b938dd69bd2492a246908a754283ba6e9688c03153ff57c918b4a00a2e575dd,2024-11-21T09:32:16.570000 CVE-2024-41121,0,0,374711efd90f8bef888fc0a990e1377a432545303c0f660f4c0aa92e85f6e951,2024-11-21T09:32:16.693000 CVE-2024-41122,0,0,45d752aacfa539a5e009f40936a14e6a360821e6c83ae104526079fdf4e09c41,2024-11-21T09:32:16.823000 @@ -263025,7 +263031,7 @@ CVE-2024-41135,0,0,fcaf63fba315037fb68d1d925bded9bb7982510c754a09114db334bb9fd16 CVE-2024-41136,0,0,66a4dbf89fd7bd255917c11d586b96496446804dff8f7630b0119f8fa3ef493c,2024-11-21T09:32:18.327000 CVE-2024-41138,0,0,2f7a818785ef2934dbddd109df6f3e2783aff9964fe63637e4cf14a1f84cecd7,2024-12-18T23:15:07.813000 CVE-2024-41139,0,0,7edd0013f12a87999917409c6bc16963bebc3db7d6977be656bb6d2dc33a8c71,2024-11-21T09:32:18.463000 -CVE-2024-4114,0,0,bffdfff59b8e8c1973fa293ec179ba5ad5b6804845f0d8c3580b8b465845a4ff,2024-11-21T09:42:12.847000 +CVE-2024-4114,0,1,df47c128dd44e8de848f43cd2e4eaabcbab418e785226a36dd24dff1b6e661e3,2025-01-27T16:37:59.997000 CVE-2024-41141,0,0,9fdd7a5cfa6dfcf4e31de8f662634169e83526c98d82fdea951ee52f3c3bade3,2024-11-21T09:32:18.643000 CVE-2024-41143,0,0,8799e9b8f93d667e7053f384d3b50025554822f122dd37c394e433231808cac2,2024-11-21T09:32:18.823000 CVE-2024-41144,0,0,d705e4f77b5a2c06974e9e65f896eaf4fba04d31882cccffe75db10bb34113df,2024-09-04T17:25:48.123000 @@ -266316,6 +266322,7 @@ CVE-2024-45594,0,0,651cebc99a25a678ed80943347c1bd3bdd4d373d64b9fb0bdc90402f17bb7 CVE-2024-45595,0,0,ed73f265e4cc26a14ea0ef98c1ed160999b148dbe2046a7b8a319cd1ad837073,2024-09-20T19:59:02.963000 CVE-2024-45596,0,0,a620d8302107635d7f8871dcd65118f72878398568927fef8140037a0b256d98,2024-09-11T16:26:11.920000 CVE-2024-45597,0,0,087955741b4733da11a2028fe8eb3cfea1534628f3b702c7289ba61a14f82b2a,2024-09-11T16:26:11.920000 +CVE-2024-45598,1,1,4d894788c00da99f7580f72608a2c6769987481b92858fed7e5a8d000297de2b,2025-01-27T16:15:31.267000 CVE-2024-45599,0,0,336dcc223b338e03a3d5e62e7e0b320a6d04f231025b64ee6820c74e273fb906,2024-09-26T13:32:02.803000 CVE-2024-4560,0,0,77026720b012435fe27b280a69c912322a6f69fd18d9b68eb4c768a521dc0638,2024-11-21T09:43:06.550000 CVE-2024-45600,0,0,5e421d273aed3e2190a0fe3fca5657a151966ed61665125955352b8401139444,2024-12-26T22:15:13.583000 @@ -269949,7 +269956,7 @@ CVE-2024-50690,0,0,9d5fa667da25b907f6a8d87ed87c65d16d14dce5412c7abd336edf942643f CVE-2024-50692,0,0,fec59c437336f571adcbf83fec674e931b40d1cf7b23eb876e2a61aa2f9cabfc,2025-01-24T23:15:08.893000 CVE-2024-50694,0,0,c4a29afb99bd1e874c60e1d69672eac5fd9e1fe06d6cb9ed86352c05fa98a55f,2025-01-24T23:15:09 CVE-2024-50695,0,0,ba9592191562dd4b73b0b9f3dc66267a4d0aae1cf21634e627c788fb039c6890,2025-01-24T23:15:09.130000 -CVE-2024-50697,0,0,44480bba42848065bf0e807d881b5cf04b331a1ddf64b6d62fd6405bd648f176,2025-01-24T23:15:09.253000 +CVE-2024-50697,0,1,c2b3d7cf93175f8b68f23abd86de617bca86742f6a72538d4881c90354fc14f6,2025-01-27T16:15:31.423000 CVE-2024-50698,0,0,df6c508ce768af8f3e964c09d1903f787ab399323d7035e459e6e13ed4e33c03,2025-01-24T23:15:09.380000 CVE-2024-50699,0,0,b7bfb9ce8d871e66c8bc846d040c669e65be2a2e4a5ca2c2838499d7e02651cc,2024-12-11T16:15:12.720000 CVE-2024-50701,0,0,a80b1dc6acfa0163b2b418f9af2de103abd46652e86be76b69c935d1bde098bf,2024-12-30T16:15:11.387000 @@ -272891,7 +272898,7 @@ CVE-2024-56009,0,0,96f071c94111451d291e37d056df8453fec397f0dfaf0daf702005d50f48a CVE-2024-5601,0,0,acbfc7658ae08d87e0393a42bceb6ed0cbea62f439f049ccb260c38457891d44,2024-11-21T09:47:59.930000 CVE-2024-56010,0,0,abfee7a614fa30718c572403d14ed9d8aaf5c96a3a3d6be2d2210bb3eb57e7a4,2024-12-18T12:15:11.790000 CVE-2024-56011,0,0,df80f8d7d3163fed1af288dc48d84f051092d97eab0b32a7296de9bf9805f102,2024-12-16T15:15:27.803000 -CVE-2024-56012,0,1,bfb40795940ae36cb9510bf7d47d48ddfa2c9c4aa4920024a77866ab0c924df6,2025-01-27T14:15:28.123000 +CVE-2024-56012,0,0,bfb40795940ae36cb9510bf7d47d48ddfa2c9c4aa4920024a77866ab0c924df6,2025-01-27T14:15:28.123000 CVE-2024-56013,0,0,66afe1219cf5092e0bf59ef7fb7049edb9487332252559e650d10503ecabda2b,2024-12-16T15:15:28.090000 CVE-2024-56014,0,0,81e2006f49a53a95301038d6b1cd19a62b2179e0709f0e1b07273452a175a95f,2025-01-02T13:15:07.803000 CVE-2024-56015,0,0,dfe5c22265c2efda8e516b0d8c875d07a90e2f08f73621c0911a45a6859c217d,2024-12-16T15:15:28.230000 @@ -273675,6 +273682,8 @@ CVE-2024-57581,0,0,d33766716cfcc1229c50a7310d1424328b4dc7c6b3c33c20370b98899cfad CVE-2024-57582,0,0,2a1d35e4fc860c65eb8a4315ed1ba4c31f49b01c911d5b356fd3e8b7f891a8b3,2025-01-17T17:15:12.797000 CVE-2024-57583,0,0,a02bfc66fca0e321afc33c8ed95edf293ab0d78b8736a62da8c5a6dc7f2892d3,2025-01-22T16:53:20.263000 CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000 +CVE-2024-57590,1,1,46c496c435b48512be9b0e1fd5d874cd6c907680662c52962d0f94c9a9940fe0,2025-01-27T15:15:11.463000 +CVE-2024-57595,1,1,e945c5b3578d3dde99010919578995e95b82ad320cb57326cf2ce4ca0414d822,2025-01-27T16:15:31.613000 CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 CVE-2024-57611,0,0,e23c6948d65a5243c368ddb9d20386aa125c64c82a7a8dbb52b2d18c0c979c46,2025-01-16T16:15:33.893000 @@ -278247,7 +278256,7 @@ CVE-2025-22508,0,0,5d8664a0aa0edd6273a6b83a3d209997381a4764cb066100315f48a722d20 CVE-2025-22510,0,0,8cd09caaa1386b81418691abc835ea46a509fc6ea5bfc34f8e8072eb06430e1c,2025-01-09T16:16:27.590000 CVE-2025-22511,0,0,e63694e2e15e227a326b6b7e4e9fd05c2b9f3ab5d4ee2553e80b77cf618afe5b,2025-01-07T16:15:46.180000 CVE-2025-22512,0,0,4cedaa7556b030850a6c6378befcffe73cef9d1cc7a9b8b6aba772cc15bae404,2025-01-07T16:15:46.320000 -CVE-2025-22513,1,1,fe7ab0ce96f60a89f7ead483aca4cb5a9f1ed3cf3c8f6ac9594d0ec36f1ced8b,2025-01-27T14:15:28.233000 +CVE-2025-22513,0,0,fe7ab0ce96f60a89f7ead483aca4cb5a9f1ed3cf3c8f6ac9594d0ec36f1ced8b,2025-01-27T14:15:28.233000 CVE-2025-22514,0,0,d3fea3865cb0e9cbdd48ba69178aff5ea61ee16cb9d92ed1522341dc3c9564eb,2025-01-13T14:15:11.290000 CVE-2025-22515,0,0,51b7aadc030c956d2c5358cbbea157a89fe0c8781c0772024e256d945eaf061c,2025-01-07T16:15:46.497000 CVE-2025-22516,0,0,1e00a835018f3d8a5a2146e73ca06f663e6b5f20899e52befe5b59b682de3f14,2025-01-07T16:15:46.653000 @@ -278559,7 +278568,7 @@ CVE-2025-23453,0,0,559af2b40776602b954faf6eb051d0ee733c24375fc61f4efde0fb69b8546 CVE-2025-23454,0,0,ace1a82fe5cff36bdca7766343683a02cd2df950eb3a0de3ea36f28eddda747b,2025-01-21T18:15:16.223000 CVE-2025-23455,0,0,b68e42bf1b83a50e0ae3f133160e0d1ee1a7c47161ff1547208b101f38e9ccf6,2025-01-16T20:15:36.033000 CVE-2025-23456,0,0,b9d69f441ecef487989469cbcdd543bce473422ca06c51c0b02404c7506af3d0,2025-01-16T20:15:36.247000 -CVE-2025-23457,1,1,6e057ab08bb741e89a0ffea7e8dea8985eae05b6f9cc096c88b14b8f2cead473,2025-01-27T14:15:28.373000 +CVE-2025-23457,0,0,6e057ab08bb741e89a0ffea7e8dea8985eae05b6f9cc096c88b14b8f2cead473,2025-01-27T14:15:28.373000 CVE-2025-23461,0,0,98b2580e5c2e45a2882850561564e0c4ed549e275719c2e53782b2517aab4e0b,2025-01-21T18:15:16.387000 CVE-2025-23462,0,0,1cbda40c7b026a7751435703bbbcd0136a0f74272df54465e1461cee90b3e6e0,2025-01-22T15:15:15.800000 CVE-2025-23463,0,0,98d57f4a46d47d157b5ed19edc615443bfb511b5852b7cb0045c98e9789a1faf,2025-01-16T20:15:36.397000 @@ -278590,7 +278599,9 @@ CVE-2025-23513,0,0,b49e0ef03f655c5857bfec7a9b723b31c64932dc8261d0e026a3117175ad4 CVE-2025-23514,0,0,34e07e624b89702dfcb5b7bfffc35f3e8691ecd3b879348a43ce40f20c111b68,2025-01-16T20:15:38.337000 CVE-2025-23522,0,0,98ad48d238b58e05014b495e757593673327270f911d4e0eb6b8c40c96dd710a,2025-01-24T11:15:10.290000 CVE-2025-23528,0,0,12168907b0864434d8a4020bcee1f63e4e5adfac10d77e79ea19c426fc40d9ce,2025-01-16T20:15:38.480000 +CVE-2025-23529,1,1,7c49e2722b714953d08192912f197c560ce62c5bae83cb8ae69a000dd9552fd3,2025-01-27T15:15:11.813000 CVE-2025-23530,0,0,8ec89260a35cc3a80dc4111e53382b9b64fc77741f1d33c294cb6047b2afd7ab,2025-01-16T20:15:38.630000 +CVE-2025-23531,1,1,4670c6590086f49674e69b2116a3ddfd10459247a34dc78c173fd8ffc6170555,2025-01-27T15:15:11.963000 CVE-2025-23532,0,0,deffa93a5742d05598342f489a5313af6567bbdcc8641635c5652a151952e2c9,2025-01-16T20:15:38.783000 CVE-2025-23533,0,0,2feaf795f1df273221ac6faa2b92c08d09ccb79103144b0efc3eedd5b4158baa,2025-01-16T20:15:38.930000 CVE-2025-23535,0,0,3d511b60f3f593e8a9f930b9c1bcde4706da165ad4e13c65d31e0f22e6a2e21e,2025-01-22T15:15:17.290000 @@ -278612,6 +278623,7 @@ CVE-2025-23567,0,0,a5334e3a1104d1d3b6196126e4f57ba74f8e92384c039079a9ba04e3f6d27 CVE-2025-23569,0,0,e1a856fd806178c29488dac0d174aee24c02bc663bf84b5b8e41189ca4debaaf,2025-01-16T20:15:40.230000 CVE-2025-23572,0,0,de6082afe4a128b0f4da24928b9919e3a956306fd340d20a91397a5cf127b9da,2025-01-16T20:15:40.403000 CVE-2025-23573,0,0,47a2bcb665ab1e714c4b6c92d3ce819a124f5bc1e2f376db1bb99620f62cdb15,2025-01-16T20:15:40.740000 +CVE-2025-23574,1,1,bbc9c25cbfc7104d2eddf794ebf5301264245f038b4d9e44b0ed37c1cdde53c5,2025-01-27T15:15:12.123000 CVE-2025-23577,0,0,3b4af4e716479b74840f3095c9fd247d1229a5054ee21299e6427c4aa395d98c,2025-01-16T20:15:40.877000 CVE-2025-23578,0,0,06d6355f414f82fbd5bf55726a97e1bfcad56da2ed33fa8e52f7f055aa010983,2025-01-22T15:15:17.687000 CVE-2025-23580,0,0,59e55d87bb1152c0b33f0e647e86e7e0bf5bdb957c7b17144cb4b97c87ffc264,2025-01-21T18:15:17.133000 @@ -278653,12 +278665,14 @@ CVE-2025-23643,0,0,3da60483c0db5a8dc05580f03d199bb8be013bf0c2d67c3cf934aac37d8d4 CVE-2025-23644,0,0,326651915de9287cf85320be6c8601ed58c356f5737bd31685f6785764f50a52,2025-01-16T20:15:42.323000 CVE-2025-23649,0,0,a43a99cf921270df6f54630a1d678841e6741ab04c2bf8f250e77ecaecfc577f,2025-01-16T20:15:42.463000 CVE-2025-23654,0,0,e18c9b36c57bb400d64806c75d784772ed09a49c73653ec930b121712ce380df,2025-01-16T20:15:42.607000 +CVE-2025-23656,1,1,34623765832494c9f427e32362d335e8212fabaf06c59b8b508619e471edee33,2025-01-27T15:15:12.267000 CVE-2025-23659,0,0,dcc772503bf7bc48b2053f59e0fd1354f6d6525325330e2053b738a9e72bb73e,2025-01-16T20:15:42.750000 CVE-2025-23660,0,0,2cc733431a94cdb8a648f8f3373a33c06d517783298c1f87affd6dd6af956d0c,2025-01-16T20:15:42.893000 CVE-2025-23661,0,0,1f7f57e7bde62e643387dd0bb1448a0354f6c08b04d2c093fc9523e9645f79aa,2025-01-16T20:15:43.037000 CVE-2025-23662,0,0,551ab5d2ddda20a665b042bd77267fd330911bfdaae473af13983770c49d1a4c,2025-01-16T20:15:43.167000 CVE-2025-23664,0,0,5eaae3d9bb9680e71179473e67178d8041daabfe633ea61ccf7a551976bb9be7,2025-01-16T20:15:43.320000 CVE-2025-23665,0,0,df3a85fb9b6ff519cb09c58b53e0bb17cb58cc0d047b57ae4c9ab7778577a02d,2025-01-16T20:15:43.460000 +CVE-2025-23669,1,1,9d3b37ccadd2ee69ebcf7dda5f5c3274138874e1b048df0c9bf6fb374b103459,2025-01-27T15:15:12.423000 CVE-2025-23672,0,0,9b4e91d2a971d6e816e88b382cc31c2340c56e76479cf040d6e0c5290d97a21a,2025-01-22T15:15:20.287000 CVE-2025-23673,0,0,29cefcd5e33b42efd9dd838456a4202e1ca110aefe8c270bd5abccdd213d0d3b,2025-01-16T20:15:43.620000 CVE-2025-23674,0,0,82d0f47596aa91a27d7206050e2f23fe27e33f61b61152aa1cea9075ecc820e7,2025-01-22T15:15:20.420000 @@ -278712,6 +278726,9 @@ CVE-2025-23743,0,0,803f800009872449a18217dc53667bf2ed09ca71991d264f6860698994827 CVE-2025-23745,0,0,09ea8b53d4365edcfe38eb3fcbe51bfbcfdfed88a9df4c2f4d1f35c6770b51bd,2025-01-16T20:15:46.687000 CVE-2025-23746,0,0,01c9493c9d9f35137d949e9259b4b92a38e781d34f3f66cad8da83d524975422,2025-01-22T15:15:22.783000 CVE-2025-23749,0,0,6aa13db4e4c786d5dfaed7476f7ecb15c17aa377119bb300a3e3bb269b753986,2025-01-16T20:15:46.830000 +CVE-2025-23752,1,1,c4a79df1175fc8304cc7d0bc1439213a7f94dd9651e5758ccfd85de4caf11e24,2025-01-27T15:15:12.570000 +CVE-2025-23754,1,1,21c71491dc1049f80bc2b3d0ef81d089692e692ff20a4894b4b54787667340c8,2025-01-27T15:15:12.727000 +CVE-2025-23756,1,1,b189fbbb2b658c767f0f6a4b533dbbc808056809be370f040f7098f77febf47e,2025-01-27T15:15:12.877000 CVE-2025-23758,0,0,8eed9a0b591b6f7c4da32f087513eca80ea069aba6fbd197956f1fc2df31f12b,2025-01-22T15:15:22.907000 CVE-2025-23760,0,0,c926328276013ba4c92054487020a2c00b6299d54746739ff21a4a2b0e4582aa,2025-01-16T21:15:18.257000 CVE-2025-23761,0,0,54955953ddba7da6b8dc6db7af99134b4479d6ff349ea65bc12f9e3c7ac517a4,2025-01-16T21:15:18.410000 @@ -278734,7 +278751,7 @@ CVE-2025-23783,0,0,87e60e041b1b360cdc15ef5034f69c2a2df8e80bf19196341df29f91771cd CVE-2025-23784,0,0,8c0d6e67f08bcd712d7618a2fdaed5576d6fe4cd62138647e95a874adb22e650,2025-01-22T15:15:23.713000 CVE-2025-23785,0,0,8fa57e244fde111a8cf011b78b0ec1aa32722f2ffac730a959e493b1a51f13a5,2025-01-16T21:15:19.967000 CVE-2025-23791,0,0,0a4e14fe20d5edd4b851b0fffb1f61f6e7f8fd7d1002fde34a1dd39504f5e9f6,2025-01-16T21:15:20.113000 -CVE-2025-23792,1,1,aa8a534e57fa1fe04836c78a67c4dc88758c04e35eedcc8b40f2730571b15e2a,2025-01-27T14:15:28.510000 +CVE-2025-23792,0,0,aa8a534e57fa1fe04836c78a67c4dc88758c04e35eedcc8b40f2730571b15e2a,2025-01-27T14:15:28.510000 CVE-2025-23793,0,0,75d4eba66871712d0a39959a57f39e10c86950a377381e50afae76d31dc84af5,2025-01-16T21:15:20.267000 CVE-2025-23794,0,0,8097f4da128cc9925b9ca616a7ea5eba076c4b40e08f589897a5a808ba282b72,2025-01-16T21:15:20.397000 CVE-2025-23795,0,0,f110438d2af14e24d173b3605ff2ed725867872c4e87dee92040f4ebb58e5378,2025-01-16T21:15:20.567000 @@ -278782,6 +278799,7 @@ CVE-2025-23842,0,0,2b0139d7daa7e9dee90c237d483621e8535d39bd8efb9a3ce143d2d5a6b0d CVE-2025-23844,0,0,86105cb76b38d6ea0728b9c1232799c3e34ea63adb94598d263dfa4f4d3924ce,2025-01-16T21:15:25.080000 CVE-2025-23846,0,0,114fb14cb9da08075fcfc087aa4768cbe85e21250c7be555b4cbae1d924c3409,2025-01-22T15:15:24.570000 CVE-2025-23848,0,0,89a987df9d0bbdbc45b1ea1fdc383b4ea7fa77b656809c9e88d08eb1cb2905d0,2025-01-16T21:15:25.220000 +CVE-2025-23849,1,1,bf70545cda3ebf325b56b2f2693bbb11f9011740b066c0073d88333206143d7b,2025-01-27T15:15:13.087000 CVE-2025-23854,0,0,d260b02665c562e6c59db554faa1d37d019f8ad115df9a55a6f95eb87b662a62,2025-01-16T21:15:25.357000 CVE-2025-23856,0,0,a5c5728227279c4b26e1b13f4ba8f4d185c4e16a374fd50014963dfe066d3a3b,2025-01-16T21:15:25.507000 CVE-2025-23859,0,0,a1c51c1c52968719b42e86176997a2a2b50c7736a939e2e16e5640ee70ac9861,2025-01-16T21:15:25.667000 @@ -278877,6 +278895,7 @@ CVE-2025-23962,0,0,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96 CVE-2025-23963,0,0,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000 CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000 CVE-2025-23966,0,0,0e6c6a1caa3d328f215893bbd7894611dd4559bc9c207666f24bc83d16a65051,2025-01-22T15:15:26.950000 +CVE-2025-23982,1,1,7dfe3e48e718999b3739cbfc59b600560c8c7feccf14557bc94cb8c8978377d9,2025-01-27T15:15:13.247000 CVE-2025-23991,0,0,09c292242e39739888eb9fe6d97bdb10055d45d713f6ffa829b0733e0b5456d2,2025-01-24T16:15:38.723000 CVE-2025-23992,0,0,6d44f95ed9666a8a68923c67dcffd2f515365a6c1e7800071790e2d881846261,2025-01-22T16:15:32.120000 CVE-2025-23994,0,0,db61266fc09611137499867f42a15cfdb3d24abf264ca83daab38bc4b3bec239,2025-01-21T18:15:17.313000 @@ -278924,7 +278943,10 @@ CVE-2025-24460,0,0,91287787f4d848d8e28c04d17a6364c6b1da8dd244cdf6af640fa2b8371b6 CVE-2025-24461,0,0,ad0935e17c290ba8ab95f02ea53cd2528798caff1030b0f8ad947dd515e65dfd,2025-01-21T18:15:19.260000 CVE-2025-24529,0,0,659084d0f901a45c8b21d541729e6cc04c83a80a3825fa751f6337219739cf86,2025-01-23T06:15:27.710000 CVE-2025-24530,0,0,4a56bb568b6bd32a8936d0fb868cc9221851e3049a709c6787a03d46cd9e8858,2025-01-23T06:15:27.893000 -CVE-2025-24533,1,1,7b36821849ab798d81c60afcd620ba9ed617eb480eb18f61a881f0c2f7c8a39d,2025-01-27T14:15:28.653000 +CVE-2025-24533,0,0,7b36821849ab798d81c60afcd620ba9ed617eb480eb18f61a881f0c2f7c8a39d,2025-01-27T14:15:28.653000 +CVE-2025-24537,1,1,06c9da6fbc6f8c7d8022c609da167bba6221fe718dd9e4ef9e6a1c0e2d457262,2025-01-27T15:15:13.440000 +CVE-2025-24538,1,1,0f8d31f1296887dcb26ac5acc0a368526d03dde9efa05b94d9d3fe598ce981df,2025-01-27T15:15:13.607000 +CVE-2025-24540,1,1,cd6ea69ba28b1ebb10b70369bc57bb82429bc2558c0fbb08776f05fe155ad78b,2025-01-27T15:15:13.753000 CVE-2025-24542,0,0,06390c27c63870cfb207e6b1afc38cc2bd70c54f2ceb6de8405d7ce03a0795ae,2025-01-24T18:15:32.550000 CVE-2025-24543,0,0,a8808a4cea2b4649f0717c8217dced1494e1792562a41700280f034c2d3ba9ea,2025-01-24T18:15:32.703000 CVE-2025-24546,0,0,685ea9d400c8b68f55f713daec1971d56383230bb2c0cc8dfdd7487103aa25d1,2025-01-24T18:15:32.893000 @@ -278943,26 +278965,33 @@ CVE-2025-24578,0,0,9ebad620682ffd1f3787c587a27256d6a506f18cbd8a1ce1d1120fd892563 CVE-2025-24579,0,0,39320e1ca3cff811d077bb02f394492c461e2541554c51a875dd94da458bac42,2025-01-24T18:15:35.090000 CVE-2025-24580,0,0,ab85777d568cb058beb30f27c69bfb0e37c8ac9491945266f51ef971bad94724,2025-01-24T18:15:35.247000 CVE-2025-24582,0,0,209ec204e7084e59b84c8b89cb45a02f8bb82fd1340ff31459e78d9843eb29cf,2025-01-24T18:15:35.397000 -CVE-2025-24584,1,1,ec624d1fe00528a4d78cb393fa88bdd0f3f84e5ff50c15e452e60d5158f27631,2025-01-27T14:15:28.797000 +CVE-2025-24584,0,0,ec624d1fe00528a4d78cb393fa88bdd0f3f84e5ff50c15e452e60d5158f27631,2025-01-27T14:15:28.797000 CVE-2025-24585,0,0,47779c8be502d2f8974ad64490e1a1e82fed824b118a7bd216044006040b6fc0,2025-01-24T18:15:35.550000 CVE-2025-24587,0,0,83dadf6f5943ab35b4261110272e8c994fb8e55edbeb6272ceca4207329750cd,2025-01-24T18:15:35.697000 CVE-2025-24588,0,0,d9036330eda1737d297809da894b62625833067225784b7fe8acb6888f6403f3,2025-01-24T18:15:35.867000 CVE-2025-24589,0,0,1f4b8875ec04a580b47ea3d833e6473e46bfd047bc1844b72331a542c8eb134e,2025-01-24T18:15:36.013000 +CVE-2025-24590,1,1,580c4727e14b3c72d8f1177bc055b65b534b114c0c672831f103a1a27dfd8f0d,2025-01-27T15:15:13.947000 CVE-2025-24591,0,0,c06501d874c7779d16221de3e54b0ff73ada530cf2b09da8b6bd7cda4da17cfd,2025-01-24T18:15:36.160000 +CVE-2025-24593,1,1,9c36266dcac20d200a08525d83ae20f675d64d14e2bb734ccd76bf4940d786e2,2025-01-27T15:15:14.090000 CVE-2025-24594,0,0,1f51a1d2e76cef969f6771fdca9d4628f716965e3d22ebbbb8948ae8c6232723,2025-01-24T18:15:36.330000 CVE-2025-24595,0,0,fbc09565a4f924c0a009b4638cc6ed5e9d14e449e9654f8ef695d4106c965b5a,2025-01-24T18:15:36.497000 CVE-2025-24596,0,0,4a462b85d7c20eb1e51f14e1da141104983de82ee010f1f7b247f3fd81c9e8c1,2025-01-24T18:15:36.657000 -CVE-2025-24601,1,1,db505c493b963cd133491367007025a7a3eeb79293d5855e01deb30a1e81f5f1,2025-01-27T14:15:28.927000 +CVE-2025-24600,1,1,dcdd8cdf482b8e22d2a48b0e2f348d3c7f88226c6331542bf0912f288b741729,2025-01-27T15:15:14.233000 +CVE-2025-24601,0,0,db505c493b963cd133491367007025a7a3eeb79293d5855e01deb30a1e81f5f1,2025-01-27T14:15:28.927000 +CVE-2025-24603,1,1,cc1c8cd1942a1d516a081ea3f5d2c128e09834a700f6e631e4df98b4ec31c06c,2025-01-27T15:15:14.437000 CVE-2025-24604,0,0,62a39d9b09aae3795a1a5623a917bfa7211aaa213197284781446d74cdc483ea,2025-01-24T18:15:36.823000 +CVE-2025-24606,1,1,5a6e3000a389ad1fa9dbb9a960a9755d84ee1b04bf140fb25209a300fb4fcd1a,2025-01-27T15:15:14.587000 CVE-2025-24610,0,0,13a39d2f135170db910afda2a99191d77f2a29be1fdfb9d97efc58222978983e,2025-01-24T18:15:36.980000 CVE-2025-24611,0,0,5715cfb8338e1d2a6890eac94e9d49d3d44cfa21d68c17c839c3a2944696055d,2025-01-24T18:15:37.133000 -CVE-2025-24612,1,1,2e20863c253051aaaea60ecd45f224a8c2678654eaa53b81ed896c6a14b65efa,2025-01-27T14:15:29.063000 +CVE-2025-24612,0,0,2e20863c253051aaaea60ecd45f224a8c2678654eaa53b81ed896c6a14b65efa,2025-01-27T14:15:29.063000 CVE-2025-24613,0,0,a70c00764d3411f7b1338b628fc12a47b1328b33b9da5afc488f76f92c8b96df,2025-01-24T18:15:37.277000 CVE-2025-24618,0,0,da3544734c42b41de5d6a3c3e9e18a2c81f4e457d3ca0a84f080e276d1914cb5,2025-01-24T18:15:37.430000 CVE-2025-24622,0,0,4b49230d23e5067c05caf1084f2ec10486574296a79fe30ed3f1144d7ae78365,2025-01-24T18:15:37.577000 CVE-2025-24623,0,0,b4d38c40443e89d7d83b964704d024031307ae190e58bbadc657ccbcaf15f87f,2025-01-24T18:15:37.727000 CVE-2025-24625,0,0,c78d300f1f0ba711e3f863a83d368167a911692a6dfd48749e68c965f6f009fa,2025-01-24T18:15:37.897000 +CVE-2025-24626,1,1,a470e4da4e034c9f2ab445a591e418acc188dd505508f456d0941bc394263b92,2025-01-27T15:15:14.777000 CVE-2025-24627,0,0,02ed717fe8cb73f0e136d781f500cc8f29934ec76495d5547688a475083bddd4,2025-01-24T18:15:38.050000 +CVE-2025-24628,1,1,921a9ab162d6fedf70ed90c3acec080864c3f2a85c667b57a58565282ba9c543,2025-01-27T15:15:14.923000 CVE-2025-24633,0,0,b407bcbade3843581c653e2df1781329c3dc7476fcc6243a7b85dc7360c755e6,2025-01-24T18:15:38.200000 CVE-2025-24634,0,0,2bd24fdaae28a006ea4038da848c5e593d0eecbe902bfc5110e8d66be395288f,2025-01-24T18:15:38.350000 CVE-2025-24636,0,0,66aa9f526ce1fd7f3d18159e839d4ebddd24821053620416273bd4a4e01bf4a1,2025-01-24T18:15:38.507000 @@ -278972,25 +279001,32 @@ CVE-2025-24647,0,0,f6ab095caebb935495a3077e569d4af7bedb49dd976f7af33513a1117411a CVE-2025-24649,0,0,3b3a4824fb68967b1f582d342beee2b3ff647491ee0f270bf1d2a2b1f72a5b08,2025-01-24T18:15:39.167000 CVE-2025-24650,0,0,6ea9b4337dbcbf323aedc2ca0b5a46ef1d4a239be7cbebf3b610ead1dd97c2fd,2025-01-24T18:15:39.347000 CVE-2025-24652,0,0,c353cde4161115497d4426748cbd42af741bfe8e05dd4c6a54196751723082a6,2025-01-24T18:15:39.517000 +CVE-2025-24653,1,1,408e86a56d40c8f1c0b312c60889ac307abc053e0e8c018bdc2bca0d36d2d1d5,2025-01-27T15:15:15.070000 CVE-2025-24657,0,0,34382b4ec4b370cd77a5479eb06b63be1dbf14efa49a41334a11289472d53685,2025-01-24T18:15:39.680000 CVE-2025-24658,0,0,33f621aca80f81bae17c30018c844fddd51a5d84b90b6ebafe9a2b8fd90c132a,2025-01-24T18:15:39.853000 CVE-2025-24659,0,0,654ad6b5ec0df1e9ebaf722f52ff857a359566f5b00efc1f6e3cb28f0db38c25,2025-01-24T18:15:40.020000 +CVE-2025-24662,1,1,27878902ec55f4204bcf626ed0428d032df6e4bd607c7cf2341e48b70e6c7048,2025-01-27T15:15:15.227000 CVE-2025-24663,0,0,f3711c9accc4b12ad7834685e3e4aaacbb7fccfd4d32f811bf4f2577f1939900,2025-01-24T18:15:40.203000 -CVE-2025-24664,1,1,e142f1d81388788ba783728cd696a786cdd602c54bb1d2ebfadc69d775ffab0a,2025-01-27T14:15:29.197000 +CVE-2025-24664,0,0,e142f1d81388788ba783728cd696a786cdd602c54bb1d2ebfadc69d775ffab0a,2025-01-27T14:15:29.197000 +CVE-2025-24665,1,1,81034157e6db7312064705af9ce24a8c0be15161b323b0f7f8171673d558ba8a,2025-01-27T15:15:15.427000 CVE-2025-24666,0,0,be6ec7879094dc001b0696cb821c2095ad2a8f7c7c793b6dd00a635361dbdb0c,2025-01-24T18:15:40.400000 +CVE-2025-24667,1,1,1e0906759416e9f4c0ab78fbcb920dc0c37d792a28a3a9703816635fd9271669,2025-01-27T15:15:15.563000 CVE-2025-24668,0,0,c89d00e75f790c015d667678d46e8274cdadbf70f8ab8fd19b8cecf64c2996ec,2025-01-24T18:15:40.563000 CVE-2025-24669,0,0,2bd984196325f9359369d146852c6e5bd5675e7d8664e79d08418b733167f3ba,2025-01-24T18:15:40.730000 +CVE-2025-24671,1,1,80414cb3ee53e07eb9a801fa6bfa16ece239e0582dc4d21928c4c0b694e22f8d,2025-01-27T15:15:15.703000 CVE-2025-24672,0,0,32dbfa19e8e8f7f5545c2ecc56f14444dce0b5c958c67364d096b5716255a83e,2025-01-24T18:15:40.890000 CVE-2025-24673,0,0,e540a505904aceef2cc98c7bfe2f11010b78fb974d615918190efab538273b60,2025-01-24T18:15:41.033000 CVE-2025-24674,0,0,99c3f4c4fe9a4e224716f4005c8714cf9f289295dfd9326bf4cc77892f03492a,2025-01-24T18:15:41.190000 CVE-2025-24675,0,0,51e821f54bd8ecbcb5cfb06e587c8dca98b57e93613b7ac8b1b6133b06a2fd06,2025-01-24T18:15:41.340000 CVE-2025-24678,0,0,2bbd55332471912e791fac5e14be971b126ef8718f19e1b02bcd492cfbd40804,2025-01-24T18:15:41.477000 CVE-2025-24679,0,0,879343bd10e103078696d5c045c74727d598b6e1533bbbb4ccca5b8c7a6890c5,2025-01-24T18:15:41.630000 +CVE-2025-24680,1,1,ee92ab35d8ea62f4412a0c5790b423c24efec8268d9bcf8b858ef4c57752a78d,2025-01-27T15:15:15.863000 CVE-2025-24681,0,0,605fdc2e36dc827462c36791192232d92dd296cecf5b41187efd4a46c704eab8,2025-01-24T18:15:41.767000 CVE-2025-24682,0,0,ca5f8a1b03b0ffb82cb43100159f5b8a9d5c286a9ed1e11204650e11edcdf612,2025-01-24T18:15:41.947000 CVE-2025-24683,0,0,bd281ec7d77c6dd8b1732719895ece773bf0791905499e1cf46a62b4feaf0c85,2025-01-24T18:15:42.133000 -CVE-2025-24685,1,1,3935ef96229daa1b4c692226c2accf1fba103f1acefb63d2634035e3247a2886,2025-01-27T14:15:29.333000 +CVE-2025-24685,0,0,3935ef96229daa1b4c692226c2accf1fba103f1acefb63d2634035e3247a2886,2025-01-27T14:15:29.333000 CVE-2025-24687,0,0,a97e3c851507d885e2534c8d23f0ef9f7027aca0eec7a3965703f56e53f67d20,2025-01-24T18:15:42.283000 +CVE-2025-24689,1,1,1de513e8e8f691d40e4b3e7d3658a5a290626246a247d5f74e6d4f1c5b396ca3,2025-01-27T15:15:16.073000 CVE-2025-24691,0,0,8f9407c7a90579300dd1854e170d65459a01a3bff3d853f2b1c7f87668044003,2025-01-24T18:15:42.433000 CVE-2025-24693,0,0,f35145384e64db76c047b09c9b47c63eeb337ad6b5d0dccb1624efec40465bf8,2025-01-24T18:15:42.597000 CVE-2025-24695,0,0,c04e4c7660d18da5bf4fbb386df60dba6cc296536b0f421a0b91361548036f9a,2025-01-24T18:15:42.740000 @@ -279002,6 +279038,7 @@ CVE-2025-24703,0,0,53afab872f7388167263b805962dd844307667888eb889ce9f196026e4f41 CVE-2025-24704,0,0,43aa1057b326b12aa4a75847e7646bdd016b51bb0e7184f81c5a88630a642b2b,2025-01-24T18:15:43.680000 CVE-2025-24705,0,0,0d29a10c3c131298ef8bd5a8cb9217ebb025888c7cb5d2d97a7633b27b032767,2025-01-24T18:15:43.840000 CVE-2025-24706,0,0,310d3f61486b57a678867c52af7a3873d74ff33456f7825d148f48af59ebe640,2025-01-24T18:15:44.003000 +CVE-2025-24708,1,1,92ede108f27ffdee04adb376065e31ecf2859fc8c1a57b0e6ab76efd11e64544,2025-01-27T15:15:16.230000 CVE-2025-24709,0,0,6d23c7aa23f5f0132f167fb051a07c37a43447273edf0a534d427fd5c040c301,2025-01-24T18:15:44.170000 CVE-2025-24711,0,0,2b6393d74f40d976d8e5d885b625242518c74534f12353db2bfa977c486e6f90,2025-01-24T18:15:44.330000 CVE-2025-24712,0,0,ad5ee3989300fa678ccc1aeeb2c1408d12155cb4b9c591212188ab9aa01bb7df,2025-01-24T18:15:44.480000 @@ -279025,15 +279062,24 @@ CVE-2025-24730,0,0,de57057c50132029cabb407237df8b5f924deea8b827b83bc9ff22cd2540b CVE-2025-24731,0,0,deda6cfa64b0cb7c0758fd613b83afe4503aa9279575d0f21abd67c134bf98d1,2025-01-24T18:15:47.370000 CVE-2025-24732,0,0,3fd26d751d57e24224f295e32d4ca4a749ee196e54ebbf1f721f129b551a0c08,2025-01-24T18:15:47.530000 CVE-2025-24733,0,0,c2d5a3c564f85643df1d4ddd0c0ca25091224d21af48a3e0572cad63c6815829,2025-01-24T18:15:47.697000 +CVE-2025-24734,1,1,776dc8fab06354245b63813cb1f46c60a31f47b9db2c0d9d07dc48517820de35,2025-01-27T15:15:16.390000 CVE-2025-24736,0,0,21d5e200a5148e73bd5dafff50040c7b3e1154ecc968b11ea3570877dfd8772a,2025-01-24T18:15:47.850000 CVE-2025-24738,0,0,5d5988528bb650b6634abd793a96cb9def937ba17e73005bacf017bf3351b910,2025-01-24T18:15:48.017000 CVE-2025-24739,0,0,a33756c91d7136f68d0e64bb0fd64169a674dd2c3fbd5af74ade3b1148c42aee,2025-01-24T18:15:48.177000 +CVE-2025-24740,1,1,3ed38d5262ac02fff3a663f5f949c11c0cd89a7d54d800c75b45e3c0ffe8fb12,2025-01-27T15:15:16.537000 +CVE-2025-24741,1,1,72c065bd1bcd5bc54d46ae78dae1d4290adb8b0339f70c091a76971244cb31f3,2025-01-27T15:15:16.680000 +CVE-2025-24742,1,1,fdc8b63c6ff274e5ad2c81e4e78067e07196646ebfce59fa5e30bad60678d76b,2025-01-27T15:15:16.830000 +CVE-2025-24743,1,1,41c0ba755259a09bb78d30034dfcceff3f65521049087232d94552c5b5203844,2025-01-27T15:15:16.977000 +CVE-2025-24744,1,1,e89d8ff4eca838607435ef9e0329695df1c3d2f7f7da2a6a7138e174e3ce48dc,2025-01-27T15:15:17.117000 CVE-2025-24746,0,0,76b6359f26bba7626bbf7027b062daab552b87a782fc60d7a7da64d1ce3753c9,2025-01-24T18:15:48.437000 +CVE-2025-24747,1,1,0ef68093fe47b6e703556413c3e771c9fd229228f186762cf3469f52d01e5aa5,2025-01-27T15:15:17.253000 CVE-2025-24750,0,0,e2f4a9b31b86d06509f886277e82ff83239dd5a8a7c14cdf3ecc2568e5cf5c3e,2025-01-24T18:15:48.663000 CVE-2025-24751,0,0,4aa19aa90aab45ec9714df6e468e19599d2a1949dc2de4e4c8d985f84e38f858,2025-01-24T18:15:48.810000 CVE-2025-24753,0,0,87b78dd3e11c90af6930cbca7a5346ee214e24237caa8b3601406532dfdbc4de,2025-01-24T18:15:48.950000 -CVE-2025-24754,1,1,446b7c60cd96b0e32a7f09e92e7701d3aab0c6425e9989f98bb0ca587651fae5,2025-01-27T14:15:29.477000 +CVE-2025-24754,0,0,446b7c60cd96b0e32a7f09e92e7701d3aab0c6425e9989f98bb0ca587651fae5,2025-01-27T14:15:29.477000 CVE-2025-24755,0,0,0e39e774c30955a9f13b754dc33d0bc563de45fb71998c25f43b8191a534aac2,2025-01-24T18:15:49.160000 CVE-2025-24756,0,0,ff4539720b20166980f34d623a65288c03d097bfc09671d9931f9e736be019cf,2025-01-24T18:15:49.307000 +CVE-2025-24782,1,1,b4fa6a41696f91f5ce0608f417a81cf845f9bd6ff8126bfed5e4c1648799b13f,2025-01-27T15:15:17.450000 +CVE-2025-24783,1,1,983739b4b6db772062f234d204411da7c6d0f02691f8ac115fc04130ed2519bd,2025-01-27T15:15:17.610000 CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000 CVE-2025-24858,0,0,d12649c9d5260ddeed993adcd8689bf34bfabe29dfc43567bb27e34f71ab98dd,2025-01-26T07:15:09.237000