diff --git a/CVE-2021/CVE-2021-263xx/CVE-2021-26354.json b/CVE-2021/CVE-2021-263xx/CVE-2021-26354.json index 498273a8d50..4694ce2dfb5 100644 --- a/CVE-2021/CVE-2021-263xx/CVE-2021-26354.json +++ b/CVE-2021/CVE-2021-263xx/CVE-2021-26354.json @@ -2,7 +2,7 @@ "id": "CVE-2021-26354", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:10.670", - "lastModified": "2024-11-21T05:56:11.643", + "lastModified": "2025-01-28T16:15:27.930", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-263xx/CVE-2021-26356.json b/CVE-2021/CVE-2021-263xx/CVE-2021-26356.json index 842a3e7df9b..7304f529222 100644 --- a/CVE-2021/CVE-2021-263xx/CVE-2021-26356.json +++ b/CVE-2021/CVE-2021-263xx/CVE-2021-26356.json @@ -2,7 +2,7 @@ "id": "CVE-2021-26356", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:10.737", - "lastModified": "2024-11-21T05:56:12.070", + "lastModified": "2025-01-28T16:15:29.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-263xx/CVE-2021-26365.json b/CVE-2021/CVE-2021-263xx/CVE-2021-26365.json index ab8bfabe2dd..7efb06b5e2c 100644 --- a/CVE-2021/CVE-2021-263xx/CVE-2021-26365.json +++ b/CVE-2021/CVE-2021-263xx/CVE-2021-26365.json @@ -2,7 +2,7 @@ "id": "CVE-2021-26365", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:10.780", - "lastModified": "2024-11-21T05:56:13.093", + "lastModified": "2025-01-28T16:15:29.400", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-263xx/CVE-2021-26371.json b/CVE-2021/CVE-2021-263xx/CVE-2021-26371.json index fa9516dbefb..63fa4c07b63 100644 --- a/CVE-2021/CVE-2021-263xx/CVE-2021-26371.json +++ b/CVE-2021/CVE-2021-263xx/CVE-2021-26371.json @@ -2,7 +2,7 @@ "id": "CVE-2021-26371", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:10.820", - "lastModified": "2024-11-21T05:56:14.083", + "lastModified": "2025-01-28T16:15:29.637", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2021/CVE-2021-263xx/CVE-2021-26379.json b/CVE-2021/CVE-2021-263xx/CVE-2021-26379.json index a17e17e28da..27578f67948 100644 --- a/CVE-2021/CVE-2021-263xx/CVE-2021-26379.json +++ b/CVE-2021/CVE-2021-263xx/CVE-2021-26379.json @@ -2,7 +2,7 @@ "id": "CVE-2021-26379", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:10.863", - "lastModified": "2024-11-21T05:56:15.457", + "lastModified": "2025-01-28T16:15:29.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2021/CVE-2021-263xx/CVE-2021-26397.json b/CVE-2021/CVE-2021-263xx/CVE-2021-26397.json index 741909c2de6..19e0a8dba11 100644 --- a/CVE-2021/CVE-2021-263xx/CVE-2021-26397.json +++ b/CVE-2021/CVE-2021-263xx/CVE-2021-26397.json @@ -2,7 +2,7 @@ "id": "CVE-2021-26397", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:10.903", - "lastModified": "2024-11-21T05:56:17.807", + "lastModified": "2025-01-28T16:15:30.127", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, diff --git a/CVE-2021/CVE-2021-264xx/CVE-2021-26406.json b/CVE-2021/CVE-2021-264xx/CVE-2021-26406.json index 1bca92e0d9f..0f45c7cd17c 100644 --- a/CVE-2021/CVE-2021-264xx/CVE-2021-26406.json +++ b/CVE-2021/CVE-2021-264xx/CVE-2021-26406.json @@ -2,7 +2,7 @@ "id": "CVE-2021-26406", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:10.943", - "lastModified": "2024-11-21T05:56:18.897", + "lastModified": "2025-01-28T16:15:30.307", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2021/CVE-2021-453xx/CVE-2021-45345.json b/CVE-2021/CVE-2021-453xx/CVE-2021-45345.json index da8d04963e0..36c5ab72a67 100644 --- a/CVE-2021/CVE-2021-453xx/CVE-2021-45345.json +++ b/CVE-2021/CVE-2021-453xx/CVE-2021-45345.json @@ -2,7 +2,7 @@ "id": "CVE-2021-45345", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T20:15:09.427", - "lastModified": "2024-11-21T06:32:07.427", + "lastModified": "2025-01-28T16:15:30.527", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46749.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46749.json index 2033648c56d..1c1c0103119 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46749.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46749.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46749", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:10.997", - "lastModified": "2024-11-21T06:34:37.847", + "lastModified": "2025-01-28T16:15:30.747", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46753.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46753.json index f1317b30a2e..8424f6c64e8 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46753.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46753.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46753", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:11.040", - "lastModified": "2024-11-21T06:34:38.127", + "lastModified": "2025-01-28T16:15:31.070", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46755.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46755.json index 1cfa1dd2e5b..16318dbf107 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46755.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46755.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46755", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T20:15:12.157", - "lastModified": "2024-11-21T06:34:38.670", + "lastModified": "2025-01-28T16:15:31.403", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46756.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46756.json index 698eaf105db..82ed14187e2 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46756.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46756.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46756", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T20:15:12.200", - "lastModified": "2024-11-21T06:34:38.833", + "lastModified": "2025-01-28T16:15:31.723", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46763.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46763.json index eed4dff77f6..39ac684fb42 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46763.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46763.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46763", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:11.123", - "lastModified": "2024-11-21T06:34:40.117", + "lastModified": "2025-01-28T16:15:32.050", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46764.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46764.json index d7e9c3051c5..3da5dc4880f 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46764.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46764.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46764", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:11.160", - "lastModified": "2024-11-21T06:34:40.283", + "lastModified": "2025-01-28T16:15:32.250", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46769.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46769.json index ebd05134ee5..186ecc653fe 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46769.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46769.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46769", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:11.200", - "lastModified": "2024-11-21T06:34:41.030", + "lastModified": "2025-01-28T16:15:32.440", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46773.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46773.json index d110f3abfbe..1bc6e367cc4 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46773.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46773.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46773", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T20:15:12.370", - "lastModified": "2024-11-21T06:34:41.453", + "lastModified": "2025-01-28T16:15:32.647", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46775.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46775.json index 16afb527767..472b3b2a3e4 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46775.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46775.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46775", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:11.240", - "lastModified": "2024-11-21T06:34:41.953", + "lastModified": "2025-01-28T16:15:32.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46792.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46792.json index 3f20c304d30..6c310435b0e 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46792.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46792.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46792", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T20:15:12.413", - "lastModified": "2024-11-21T06:34:43.910", + "lastModified": "2025-01-28T16:15:33.137", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46794.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46794.json index ac79538fb69..432328bab8f 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46794.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46794.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46794", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T20:15:12.463", - "lastModified": "2024-11-21T06:34:44.127", + "lastModified": "2025-01-28T16:15:33.417", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-238xx/CVE-2022-23818.json b/CVE-2022/CVE-2022-238xx/CVE-2022-23818.json index 50ecbba780f..388b393e6b0 100644 --- a/CVE-2022/CVE-2022-238xx/CVE-2022-23818.json +++ b/CVE-2022/CVE-2022-238xx/CVE-2022-23818.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23818", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:11.367", - "lastModified": "2024-11-21T06:49:18.543", + "lastModified": "2025-01-28T16:15:33.747", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-33xx/CVE-2022-3365.json b/CVE-2022/CVE-2022-33xx/CVE-2022-3365.json index 1891e62661b..1e391d4bbb8 100644 --- a/CVE-2022/CVE-2022-33xx/CVE-2022-3365.json +++ b/CVE-2022/CVE-2022-33xx/CVE-2022-3365.json @@ -2,8 +2,8 @@ "id": "CVE-2022-3365", "sourceIdentifier": "cve@rapid7.com", "published": "2025-01-28T01:15:08.277", - "lastModified": "2025-01-28T01:15:08.277", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:34.643", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "Due to reliance on a trivial substitution cipher, sent in cleartext, and the reliance on a default password when the user does not set a password, the Remote Mouse Server by Emote Interactive can be abused by attackers to inject OS commands over theproduct's custom control protocol. A Metasploit module was written and tested against version 4.110, the current version when this CVE was reserved." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "cve@rapid7.com", diff --git a/CVE-2022/CVE-2022-380xx/CVE-2022-38090.json b/CVE-2022/CVE-2022-380xx/CVE-2022-38090.json index 0125a89a0ed..8eb9edd75bd 100644 --- a/CVE-2022/CVE-2022-380xx/CVE-2022-38090.json +++ b/CVE-2022/CVE-2022-380xx/CVE-2022-38090.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38090", "sourceIdentifier": "secure@intel.com", "published": "2023-02-16T21:15:13.760", - "lastModified": "2024-11-21T07:15:46.340", + "lastModified": "2025-01-28T16:15:34.100", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20520.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20520.json index aac77dacd2a..4b956b30fd1 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20520.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20520.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20520", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:11.507", - "lastModified": "2024-11-21T07:41:04.147", + "lastModified": "2025-01-28T16:15:34.843", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20524.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20524.json index 9d15993f526..96b8242edf3 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20524.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20524.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20524", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T19:15:11.550", - "lastModified": "2024-11-21T07:41:04.847", + "lastModified": "2025-01-28T16:15:35.090", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25646.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25646.json index 3e856859a9e..d594f321629 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25646.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25646.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25646", "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-06-20T07:15:41.340", - "lastModified": "2024-11-21T07:49:51.623", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T16:29:58.553", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -49,16 +69,61 @@ "value": "CWE-281" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zte:zxhn_h388x_firmware:10.1_agzhm_1.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5B505C00-1388-4B53-B2E0-A43D5C794A10" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zte:zxhn_h388x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B08F94E-4211-4592-9919-4F2D0CD688E7" + } + ] + } + ] } ], "references": [ { "url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1035844", - "source": "psirt@zte.com.cn" + "source": "psirt@zte.com.cn", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1035844", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31689.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31689.json index 678bfff4cf1..8397bb46160 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31689.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31689.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31689", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T20:15:10.887", - "lastModified": "2024-11-21T08:02:09.323", + "lastModified": "2025-01-28T16:15:35.497", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31742.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31742.json index 24f87a09f0a..09d57a1210c 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31742.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31742.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31742", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T17:15:09.477", - "lastModified": "2024-11-21T08:02:13.737", + "lastModified": "2025-01-28T16:15:35.723", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32568.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32568.json index d4b6fc05f84..5662ddc2e73 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32568.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32568.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32568", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T05:15:11.990", - "lastModified": "2024-11-21T08:03:37.133", + "lastModified": "2025-01-28T16:15:35.987", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32569.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32569.json index 809869c48ec..e81ccb3ccc9 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32569.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32569.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32569", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T05:15:12.103", - "lastModified": "2024-11-21T08:03:37.287", + "lastModified": "2025-01-28T16:15:36.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32570.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32570.json index 243a37552d1..a492d69375c 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32570.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32570.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32570", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T05:15:12.190", - "lastModified": "2024-11-21T08:03:37.430", + "lastModified": "2025-01-28T16:15:36.333", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12723.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12723.json index ef1fbacdf29..08731317d32 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12723.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12723.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12723", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-28T06:15:31.370", - "lastModified": "2025-01-28T06:15:31.370", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:37.430", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "The Infility Global WordPress plugin through 2.9.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/d9053b8b-c05c-42fd-913e-f85c799df807/", diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12807.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12807.json index 06215b95643..0ae08de6a7d 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12807.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12807.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12807", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-28T06:15:31.680", - "lastModified": "2025-01-28T06:15:31.680", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:37.633", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "The Social Share Buttons for WordPress plugin through 2.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/fcce0839-bb1d-4aa3-b236-ff5f5e9b6120/", diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22064.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22064.json index 07dbd44a539..54e2a431bfe 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22064.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22064.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22064", "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-05-14T14:56:40.160", - "lastModified": "2025-01-27T18:36:59.497", + "lastModified": "2025-01-28T16:12:31.863", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -83,7 +83,6 @@ ], "configurations": [ { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -91,20 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:zte:zxun-epdg_firmware:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:zte:zxun-epdg:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.20.20", - "matchCriteriaId": "A5DD1547-50E5-46B1-9E6F-CFE9EBCE6B39" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:zte:zxun-epdg:-:*:*:*:*:*:*:*", - "matchCriteriaId": "2A0BFF58-BA88-4BE2-9E7A-ACD6A28F8E1C" + "matchCriteriaId": "428020C1-365E-4AD1-AFF7-51D3916201BE" } ] } diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35299.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35299.json index 8d171654491..e0630634958 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35299.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35299.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35299", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-05-16T11:15:47.460", - "lastModified": "2024-11-21T09:20:06.297", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T16:35:03.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-295" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.1.29548", + "matchCriteriaId": "8ED92D3B-43B1-4E9F-AA5F-DBC03DD04687" + } + ] + } + ] } ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3892.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3892.json index 8520d3cb5c1..3efca813d93 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3892.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3892.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3892", "sourceIdentifier": "security@progress.com", "published": "2024-05-15T17:15:14.470", - "lastModified": "2024-11-21T09:30:38.637", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T16:39:55.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.6, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:telerik:ui_for_winforms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2021.1.122", + "versionEndExcluding": "2024.2.514", + "matchCriteriaId": "790A5E6E-F407-4B25-AEE3-F5D117253432" + } + ] + } + ] } ], "references": [ { "url": "https://docs.telerik.com/devtools/winforms/knowledge-base/local-code-execution-vulnerability-cve-2024-3892", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://docs.telerik.com/devtools/winforms/knowledge-base/local-code-execution-vulnerability-cve-2024-3892", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4288.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4288.json index d7df832ba43..eef1e28c183 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4288.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4288.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4288", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T11:15:48.373", - "lastModified": "2024-11-21T09:42:32.860", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T16:28:47.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nsquared:simply_schedule_appointments:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.6.7.18", + "matchCriteriaId": "90EF0E37-46E7-4E71-8D6F-BEBB7EAF8F70" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/simply-schedule-appointments/trunk/includes/class-shortcodes.php#L677", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3087297/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/84262b4a-a662-4aaf-9eae-f5cca8f6cd06?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/simply-schedule-appointments/trunk/includes/class-shortcodes.php#L677", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3087297/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/84262b4a-a662-4aaf-9eae-f5cca8f6cd06?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45336.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45336.json index 28008f101eb..7baec480355 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45336.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45336.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45336", "sourceIdentifier": "security@golang.org", "published": "2025-01-28T02:15:28.807", - "lastModified": "2025-01-28T02:15:28.807", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:38.220", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://go.dev/cl/643100", diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45339.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45339.json index a23934f45e5..9262a30076d 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45339.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45339.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45339", "sourceIdentifier": "security@golang.org", "published": "2025-01-28T02:15:28.927", - "lastModified": "2025-01-28T02:15:28.927", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:38.367", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://github.com/golang/glog/pull/74", diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45340.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45340.json index ce9427d98f5..408ad18e2f6 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45340.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45340.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45340", "sourceIdentifier": "security@golang.org", "published": "2025-01-28T02:15:29.050", - "lastModified": "2025-01-28T02:15:29.050", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:38.517", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "Credentials provided via the new GOAUTH feature were not being properly segmented by domain, allowing a malicious server to request credentials they should not have access to. By default, unless otherwise set, this only affected credentials stored in the users .netrc file." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://go.dev/cl/643097", diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45341.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45341.json index 5ee3d5be628..24e835b764c 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45341.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45341.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45341", "sourceIdentifier": "security@golang.org", "published": "2025-01-28T02:15:29.147", - "lastModified": "2025-01-28T02:15:29.147", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:38.650", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://go.dev/cl/643099", diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50665.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50665.json index e35cbed16dd..51a0b8fb7fd 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50665.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50665.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50665", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T22:15:13.790", - "lastModified": "2025-01-23T22:15:13.790", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:38.797", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,11 +15,50 @@ "value": "gpac 2.4 contiene un SEGV en src/isomedia/drm_sample.c:1562:96 en isom_cenc_get_sai_by_saiz_saio en MP4Box." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://github.com/gpac/gpac/issues/2987", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/gpac/gpac/issues/2987", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54475.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54475.json index 388503db9ad..c07b95c3932 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54475.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54475.json @@ -2,16 +2,43 @@ "id": "CVE-2024-54475", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:12.283", - "lastModified": "2025-01-27T22:15:12.283", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:39.167", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An app may be able to determine a user\u2019s current location." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados en las entradas de registro. Este problema se solucion\u00f3 en macOS Sonoma 14.7.2, macOS Sequoia 15.2 y macOS Ventura 13.7.2. Es posible que una aplicaci\u00f3n pueda determinar la ubicaci\u00f3n actual de un usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/121839", diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54499.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54499.json index 2fd7ec38fbb..8b100d77466 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54499.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54499.json @@ -2,16 +2,55 @@ "id": "CVE-2024-54499", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:12.680", - "lastModified": "2025-01-27T22:15:12.680", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:39.303", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sequoia 15.2. Processing a maliciously crafted image may lead to arbitrary code execution." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de use-after-free con una mejor gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 y iPadOS 18.2, macOS Sequoia 15.2. El procesamiento de una imagen manipulado maliciosa puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/121837", diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54530.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54530.json index 7cb469f8a46..3e436d47dc8 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54530.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54530.json @@ -2,16 +2,55 @@ "id": "CVE-2024-54530", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:13.753", - "lastModified": "2025-01-27T22:15:13.753", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:39.450", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.2, watchOS 11.2, visionOS 2.2, iOS 18.2 and iPadOS 18.2. Password autofill may fill in passwords after failing authentication." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Sequoia 15.2, watchOS 11.2, visionOS 2.2, iOS 18.2 y iPadOS 18.2. La funci\u00f3n de autocompletar contrase\u00f1as puede completar las contrase\u00f1as despu\u00e9s de una autenticaci\u00f3n fallida." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/121837", diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54547.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54547.json index 543807d6703..c43d4e6099a 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54547.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54547.json @@ -2,16 +2,55 @@ "id": "CVE-2024-54547", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:14.400", - "lastModified": "2025-01-27T22:15:14.400", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:39.603", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An app may be able to access protected user data." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7.2, macOS Sequoia 15.2 y macOS Ventura 13.7.2. Es posible que una aplicaci\u00f3n pueda acceder a datos de usuario protegidos." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/121839", diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json index ce2679ed0cd..88f99050e34 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json @@ -2,16 +2,55 @@ "id": "CVE-2024-54550", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:14.580", - "lastModified": "2025-01-27T22:15:14.580", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:39.773", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2. An app may be able to view autocompleted contact information from Messages and Mail in system logs." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Sequoia 15.2, iOS 18.2 y iPadOS 18.2. Es posible que una aplicaci\u00f3n pueda ver la informaci\u00f3n de contacto completada autom\u00e1ticamente de Mensajes y Correo en los registros de sistema." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/121837", diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55194.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55194.json index df645935458..0634cc7ed2a 100644 --- a/CVE-2024/CVE-2024-551xx/CVE-2024-55194.json +++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55194.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55194", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T22:15:14.560", - "lastModified": "2025-01-23T22:15:14.560", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:39.927", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,11 +15,50 @@ "value": "Se descubri\u00f3 que OpenImageIO v3.1.0.0dev contiene un desbordamiento de mont\u00f3n a trav\u00e9s del componente /OpenImageIO/fmath.h." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0432.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0432.json new file mode 100644 index 00000000000..48f54104616 --- /dev/null +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0432.json @@ -0,0 +1,112 @@ +{ + "id": "CVE-2025-0432", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-01-28T16:15:40.183", + "lastModified": "2025-01-28T16:15:40.183", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "EWON Flexy 202 transmits user credentials in clear text with no encryption when a user is added, or user credentials are changed via its webpage." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/ewon/manuals-and-guides---installation-guides/best-practices-for-a-secure-usage-of-the-ewon-solution-en.pdf?sfvrsn=37160847_4", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://support.hms-networks.com/hc/en-us/articles/19393244940818-How-to-block-all-the-unused-Ewon-Flexy-Cosy131-services-on-the-LAN-WAN-and-or-VPN-interface", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-023-06", + "source": "ics-cert@hq.dhs.gov" + }, + { + "url": "https://www.hms-networks.com/cyber-security", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0659.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0659.json new file mode 100644 index 00000000000..a9f805428df --- /dev/null +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0659.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-0659", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-01-28T16:15:40.360", + "lastModified": "2025-01-28T16:15:40.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A path\ntraversal vulnerability exists in the Rockwell Automation DataEdge Platform DataMosaix Private Cloud. By specifying the character\nsequence in the body of the vulnerable endpoint, it is possible to overwrite\nfiles outside of the intended directory. A threat actor with admin privileges could\nleverage this vulnerability to overwrite reports including user projects." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1715.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22865.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22865.json index 82fb6fa178f..8a71fef315e 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22865.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22865.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22865", "sourceIdentifier": "security@golang.org", "published": "2025-01-28T02:15:29.243", - "lastModified": "2025-01-28T02:15:29.243", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:40.540", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://go.dev/cl/643098", diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23045.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23045.json new file mode 100644 index 00000000000..653d0dfc459 --- /dev/null +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23045.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-23045", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-28T16:15:40.690", + "lastModified": "2025-01-28T16:15:40.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. An attacker with an account on an affected CVAT instance is able to run arbitrary code in the context of the Nuclio function container. This vulnerability affects CVAT deployments that run any of the serverless functions of type tracker from the CVAT Git repository, namely TransT and SiamMask. Deployments with custom functions of type tracker may also be affected, depending on how they handle state serialization. If a function uses an unsafe serialization library such as pickle or jsonpickle, it's likely to be vulnerable. Upgrade to CVAT 2.26.0 or later. If you are unable to upgrade, shut down any instances of the TransT or SiamMask functions you're running." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cvat-ai/cvat/commit/563e1dfde64b15fa042b23f9d09cd854b35f0366", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cvat-ai/cvat/security/advisories/GHSA-wq36-mxf8-hv62", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23084.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23084.json index 92747be4363..dbe85d0263b 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23084.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23084.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23084", "sourceIdentifier": "support@hackerone.com", "published": "2025-01-28T05:15:11.267", - "lastModified": "2025-01-28T05:15:11.267", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:40.827", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://nodejs.org/en/blog/vulnerability/january-2025-security-releases", diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23211.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23211.json new file mode 100644 index 00000000000..0e82f64c19f --- /dev/null +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23211.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-23211", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-28T16:15:40.937", + "lastModified": "2025-01-28T16:15:40.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. A Jinja2 SSTI vulnerability allows any user to execute commands on the server. In the case of the provided Docker Compose file as root. This vulnerability is fixed in 1.5.24." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1336" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/TandoorRecipes/recipes/blob/4f9bff20c858180d0f7376de443a9fe4c123a50c/cookbook/helper/template_helper.py#L95", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/TandoorRecipes/recipes/commit/e6087d5129cc9d0c24278948872377e66c2a2c20", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-r6rj-h75w-vj8v", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23212.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23212.json new file mode 100644 index 00000000000..ff17a4df2b0 --- /dev/null +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23212.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-23212", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-28T16:15:41.080", + "lastModified": "2025-01-28T16:15:41.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. The external storage feature allows any user to enumerate the name and content of files on the server. This vulnerability is fixed in 1.5.28." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/TandoorRecipes/recipes/commit/36e83a9d0108ac56b9538b45ead57efc8b97c5ff", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-jrgj-35jx-2qq7", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23213.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23213.json new file mode 100644 index 00000000000..4a36c06050c --- /dev/null +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23213.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-23213", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-28T16:15:41.217", + "lastModified": "2025-01-28T16:15:41.217", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. The file upload feature allows to upload arbitrary files, including html and svg. Both can contain malicious content (XSS Payloads). This vulnerability is fixed in 1.5.28." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/TandoorRecipes/recipes/commit/3e37d11c6a3841a00eb27670d1d003f1a713e1cf", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-56jp-j3x5-hh2w", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23385.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23385.json new file mode 100644 index 00000000000..719f6c7c96c --- /dev/null +++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23385.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23385", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2025-01-28T16:15:41.377", + "lastModified": "2025-01-28T16:15:41.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains ReSharper before 2024.3.4, 2024.2.8, and 2024.1.7, Rider before 2024.3.4, 2024.2.8, and 2024.1.7, dotTrace before 2024.3.4, 2024.2.8, and 2024.1.7, ETW Host Service before 16.43, Local Privilege Escalation via the ETW Host Service was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-114" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24085.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24085.json index 426c57197f7..4661d982c39 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24085.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24085.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24085", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:14.990", - "lastModified": "2025-01-27T22:15:14.990", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:41.540", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use after free issue was addressed with improved memory management. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de use after free con una mejor gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. Una aplicaci\u00f3n maliciosa podr\u00eda elevar privilegios. Apple tiene conocimiento de un informe que indica que este problema puede haberse explotado activamente contra versiones de iOS anteriores a iOS 17.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122066", diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json index 4cb21baa82d..f57e7a2d3a6 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24092.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24092", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:15.267", - "lastModified": "2025-01-27T22:15:15.267", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:41.697", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved data protection. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to read sensitive location information." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con una protecci\u00f3n de datos mejorada. Este problema se solucion\u00f3 en macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial sobre la ubicaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24093.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24093.json index 1894f92dcb7..f391ef751a1 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24093.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24093.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24093", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:15.350", - "lastModified": "2025-01-27T22:15:15.350", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:41.847", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sonoma 14.7.3. An app may be able to access removable volumes without user consent." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.7.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda acceder a vol\u00famenes extra\u00edbles sin el consentimiento del usuario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122069", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24103.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24103.json index cf88051b067..c6177ca25d6 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24103.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24103.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24103", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:15.900", - "lastModified": "2025-01-27T22:15:15.900", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:41.990", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to access protected user data." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con una validaci\u00f3n mejorada de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda acceder a datos de usuario protegidos." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24115.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24115.json index 3387eadded4..4da29aa1d39 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24115.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24115.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24115", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:16.713", - "lastModified": "2025-01-27T22:15:16.713", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:42.150", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to read files outside of its sandbox." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de gesti\u00f3n de rutas con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda leer archivos fuera de su sandbox." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24118.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24118.json index 5fa40940b76..3fcdcdec864 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24118.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24118.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24118", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:17.033", - "lastModified": "2025-01-27T22:15:17.033", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:42.293", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to cause unexpected system termination or write kernel memory." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con una gesti\u00f3n mejorada de la memoria. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda provocar una terminaci\u00f3n inesperada de sistema o escribir en la memoria del n\u00facleo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122067", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24122.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24122.json index 6f84bd45d2e..ca0b5a26b31 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24122.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24122.json @@ -2,16 +2,43 @@ "id": "CVE-2025-24122", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:17.323", - "lastModified": "2025-01-27T22:15:17.323", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:42.447", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to modify protected parts of the file system." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de degradaci\u00f3n que afectaba a las computadoras Mac basadas en Intel con restricciones adicionales de firma de c\u00f3digo. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del archivo sistema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json index 5019e49064e..37fcff1dad5 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24123.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24123", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:17.413", - "lastModified": "2025-01-27T22:15:17.413", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:42.590", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El an\u00e1lisis de un archivo puede provocar el cierre inesperado de una aplicaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122066", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24134.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24134.json index 7ada5fa448d..7b130e80c1a 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24134.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24134.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24134", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:18.153", - "lastModified": "2025-01-27T22:15:18.153", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:42.780", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information disclosure issue was addressed with improved privacy controls. This issue is fixed in macOS Sequoia 15.3. An app may be able to access user-sensitive data." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de divulgaci\u00f3n de informaci\u00f3n con controles de privacidad mejorados. Este problema se solucion\u00f3 en macOS Sequoia 15.3. Una aplicaci\u00f3n puede tener acceso a datos confidenciales del usuario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24135.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24135.json index 2f502c0ccc7..5aafa0663fa 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24135.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24135.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24135", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:18.247", - "lastModified": "2025-01-27T22:15:18.247", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:42.930", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved message validation. This issue is fixed in macOS Sequoia 15.3. An app may be able to gain elevated privileges." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con una validaci\u00f3n de mensajes mejorada. Este problema se solucion\u00f3 en macOS Sequoia 15.3. Es posible que una aplicaci\u00f3n pueda obtener privilegios elevados." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24138.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24138.json index d4257f98680..586f111ea32 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24138.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24138.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24138", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:18.530", - "lastModified": "2025-01-27T22:15:18.530", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:43.077", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. A malicious application may be able to leak sensitive user information." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mediante con una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Una aplicaci\u00f3n malintencionada podr\u00eda filtrar informaci\u00f3n confidencial del usuario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24139.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24139.json index 60a957b76e7..07e1698d678 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24139.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24139.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24139", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:18.627", - "lastModified": "2025-01-27T22:15:18.627", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:43.230", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Parsing a maliciously crafted file may lead to an unexpected app termination." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Analizar un archivo manipulado malintencionado puede provocar la finalizaci\u00f3n inesperada de una aplicaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24149.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24149.json index 2ac65a34aec..d6885f73e87 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24149.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24149.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24149", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:19.173", - "lastModified": "2025-01-27T22:15:19.173", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:43.387", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to disclosure of user information." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de lectura fuera de los l\u00edmites con una comprobaci\u00f3n de l\u00edmites mejorada. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El an\u00e1lisis de un archivo puede provocar la divulgaci\u00f3n de informaci\u00f3n del usuario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122066", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24154.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24154.json index 9e965dfa7b3..adde35a0c60 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24154.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24154.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24154", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:19.620", - "lastModified": "2025-01-27T22:15:19.620", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:43.533", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3. An attacker may be able to cause unexpected system termination or corrupt kernel memory." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de escritura fuera de los l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3. Un atacante podr\u00eda provocar una terminaci\u00f3n inesperada de sistema o da\u00f1ar la memoria del kernel." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122066", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24158.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24158.json index 4cde2c104e2..e527fe9c887 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24158.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24158.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24158", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:19.800", - "lastModified": "2025-01-27T22:15:19.800", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:43.693", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing web content may lead to a denial-of-service." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en visionOS 2.3, Safari 18.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El procesamiento de contenido web puede provocar una denegaci\u00f3n de servicio." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122066", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24159.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24159.json index 7352344ca58..5a04dbba91f 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24159.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24159.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24159", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:19.897", - "lastModified": "2025-01-27T22:15:19.897", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:43.843", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A validation issue was addressed with improved logic. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An app may be able to execute arbitrary code with kernel privileges." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de validaci\u00f3n con una l\u00f3gica mejorada. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. Es posible que una aplicaci\u00f3n pueda ejecutar c\u00f3digo arbitrario con privilegios de kernel." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122066", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24160.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24160.json index 4cfed7d89f3..ff1419f2dae 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24160.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24160.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24160", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:19.987", - "lastModified": "2025-01-27T22:15:19.987", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:44.003", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El an\u00e1lisis de un archivo puede provocar el cierre inesperado de la aplicaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122066", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24162.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24162.json index f6d635cd714..78018ddd872 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24162.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24162.json @@ -2,16 +2,43 @@ "id": "CVE-2025-24162", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:20.167", - "lastModified": "2025-01-27T22:15:20.167", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:44.187", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed through improved state management. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing maliciously crafted web content may lead to an unexpected process crash." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mediante con una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en visionOS 2.3, Safari 18.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El procesamiento malintencionado de contenido web manipulado puede provocar un bloqueo inesperado del proceso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/122066", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24163.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24163.json index ad1b71a3999..482cd177f0b 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24163.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24163.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24163", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:20.267", - "lastModified": "2025-01-27T22:15:20.267", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:44.330", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El an\u00e1lisis de un archivo puede provocar el cierre inesperado de la aplicaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122066", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24174.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24174.json index 92fdcaec979..0f34940dc6e 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24174.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24174.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24174", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:20.547", - "lastModified": "2025-01-27T22:15:20.547", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:44.490", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to bypass Privacy preferences." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda omitir las preferencias de privacidad." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24176.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24176.json index 1d258dd2ce2..ccd5a98668c 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24176.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24176.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24176", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:20.643", - "lastModified": "2025-01-27T22:15:20.643", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:44.630", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. A local attacker may be able to elevate their privileges." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos mejorando la validaci\u00f3n. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Un atacante local podr\u00eda elevar sus privilegios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24783.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24783.json index 1145ebe1cad..5bcb0902453 100644 --- a/CVE-2025/CVE-2025-247xx/CVE-2025-24783.json +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24783.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24783", "sourceIdentifier": "security@apache.org", "published": "2025-01-27T15:15:17.610", - "lastModified": "2025-01-27T19:15:29.637", - "vulnStatus": "Received", + "lastModified": "2025-01-28T16:15:44.880", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "security@apache.org", @@ -16,9 +16,36 @@ { "lang": "en", "value": "** UNSUPPORTED WHEN ASSIGNED ** Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) vulnerability in Apache Cocoon.\n\nThis issue affects Apache Cocoon: all versions.\n\nWhen a continuation is created, it gets a random identifier. Because the random number generator used to generate these identifiers was seeded with the startup time, it may not have been sufficiently unpredictable, and an attacker could use this to guess continuation ids and look up continuations they should not have had access to.\n\nAs a mitigation, you may enable the \"session-bound-continuations\" option to make sure continuations are not shared across sessions.\n\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Vulnerabilidad de uso incorrecto de las semillas en el generador de n\u00fameros pseudoaleatorios (PRNG) en Apache Cocoon. Este problema afecta a Apache Cocoon: todas las versiones. Cuando se crea una continuaci\u00f3n, obtiene un identificador aleatorio. Debido a que el generador de n\u00fameros aleatorios utilizado para generar estos identificadores se sembr\u00f3 con la hora de inicio, es posible que no haya sido lo suficientemente impredecible y un atacante podr\u00eda usar esto para adivinar los identificadores de continuaci\u00f3n y buscar continuaciones a las que no deber\u00eda haber tenido acceso. Como mitigaci\u00f3n, puede habilitar la opci\u00f3n \"continuaciones vinculadas a la sesi\u00f3n\" para asegurarse de que las continuaciones no se compartan entre sesiones. Como este proyecto est\u00e1 retirado, no planeamos lanzar una versi\u00f3n que solucione este problema. Se recomienda a los usuarios que busquen una alternativa o restrinjan el acceso a la instancia a usuarios de confianza. NOTA: Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24800.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24800.json new file mode 100644 index 00000000000..ca7fb349293 --- /dev/null +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24800.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-24800", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-28T16:15:45.063", + "lastModified": "2025-01-28T16:15:45.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Hyperbridge is a hyper-scalable coprocessor for verifiable, cross-chain interoperability. A critical vulnerability was discovered in the ismp-grandpa crate, that allowed a malicious prover easily convince the verifier of the finality of arbitrary headers. This could be used to steal funds or compromise other kinds of cross-chain applications. This vulnerability is fixed in 15.0.1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + }, + { + "lang": "en", + "value": "CWE-670" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/polytope-labs/hyperbridge/pull/372/commits/f0e85db718f5165b06585a49b14a66f8ad643aea", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/polytope-labs/hyperbridge/security/advisories/GHSA-wwx5-gpgr-vxr7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/polytope-labs/ismp-substrate/pull/64/commits/5ca3351a19151f1a439c30d5cbdbfdc72a11f1a8#diff-3835cc24fb2011b3e8246036059acd8c2c2a9a869eedf7a210d18edb6543318dL262", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index f9c2a9896c8..de58c90bce3 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-28T16:05:42.333138+00:00 +2025-01-28T17:00:25.078234+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-28T15:36:03.663000+00:00 +2025-01-28T16:39:55.417000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -279285 +279293 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `8` -- [CVE-2024-11954](CVE-2024/CVE-2024-119xx/CVE-2024-11954.json) (`2025-01-28T14:15:29.070`) -- [CVE-2024-11956](CVE-2024/CVE-2024-119xx/CVE-2024-11956.json) (`2025-01-28T14:15:29.803`) -- [CVE-2024-6351](CVE-2024/CVE-2024-63xx/CVE-2024-6351.json) (`2025-01-28T14:15:30.007`) -- [CVE-2024-7881](CVE-2024/CVE-2024-78xx/CVE-2024-7881.json) (`2025-01-28T15:15:12.847`) +- [CVE-2025-0432](CVE-2025/CVE-2025-04xx/CVE-2025-0432.json) (`2025-01-28T16:15:40.183`) +- [CVE-2025-0659](CVE-2025/CVE-2025-06xx/CVE-2025-0659.json) (`2025-01-28T16:15:40.360`) +- [CVE-2025-23045](CVE-2025/CVE-2025-230xx/CVE-2025-23045.json) (`2025-01-28T16:15:40.690`) +- [CVE-2025-23211](CVE-2025/CVE-2025-232xx/CVE-2025-23211.json) (`2025-01-28T16:15:40.937`) +- [CVE-2025-23212](CVE-2025/CVE-2025-232xx/CVE-2025-23212.json) (`2025-01-28T16:15:41.080`) +- [CVE-2025-23213](CVE-2025/CVE-2025-232xx/CVE-2025-23213.json) (`2025-01-28T16:15:41.217`) +- [CVE-2025-23385](CVE-2025/CVE-2025-233xx/CVE-2025-23385.json) (`2025-01-28T16:15:41.377`) +- [CVE-2025-24800](CVE-2025/CVE-2025-248xx/CVE-2025-24800.json) (`2025-01-28T16:15:45.063`) ### CVEs modified in the last Commit -Recently modified CVEs: `44` +Recently modified CVEs: `71` -- [CVE-2023-27510](CVE-2023/CVE-2023-275xx/CVE-2023-27510.json) (`2025-01-28T15:15:10.787`) -- [CVE-2023-27527](CVE-2023/CVE-2023-275xx/CVE-2023-27527.json) (`2025-01-28T15:15:10.947`) -- [CVE-2023-41776](CVE-2023/CVE-2023-417xx/CVE-2023-41776.json) (`2025-01-28T15:36:03.663`) -- [CVE-2023-41779](CVE-2023/CVE-2023-417xx/CVE-2023-41779.json) (`2025-01-28T15:36:03.663`) -- [CVE-2023-41780](CVE-2023/CVE-2023-417xx/CVE-2023-41780.json) (`2025-01-28T15:36:03.663`) -- [CVE-2023-41782](CVE-2023/CVE-2023-417xx/CVE-2023-41782.json) (`2025-01-28T15:36:03.663`) -- [CVE-2023-41783](CVE-2023/CVE-2023-417xx/CVE-2023-41783.json) (`2025-01-28T15:36:03.663`) -- [CVE-2024-22062](CVE-2024/CVE-2024-220xx/CVE-2024-22062.json) (`2025-01-28T15:29:07.970`) -- [CVE-2024-23591](CVE-2024/CVE-2024-235xx/CVE-2024-23591.json) (`2025-01-28T14:28:25.570`) -- [CVE-2024-23953](CVE-2024/CVE-2024-239xx/CVE-2024-23953.json) (`2025-01-28T15:15:11.330`) -- [CVE-2024-54478](CVE-2024/CVE-2024-544xx/CVE-2024-54478.json) (`2025-01-28T15:15:11.520`) -- [CVE-2024-54507](CVE-2024/CVE-2024-545xx/CVE-2024-54507.json) (`2025-01-28T15:15:11.723`) -- [CVE-2024-54518](CVE-2024/CVE-2024-545xx/CVE-2024-54518.json) (`2025-01-28T15:15:11.900`) -- [CVE-2024-54519](CVE-2024/CVE-2024-545xx/CVE-2024-54519.json) (`2025-01-28T15:15:12.050`) -- [CVE-2024-54523](CVE-2024/CVE-2024-545xx/CVE-2024-54523.json) (`2025-01-28T15:15:12.190`) -- [CVE-2024-54539](CVE-2024/CVE-2024-545xx/CVE-2024-54539.json) (`2025-01-28T15:15:12.340`) -- [CVE-2024-54542](CVE-2024/CVE-2024-545xx/CVE-2024-54542.json) (`2025-01-28T15:15:12.477`) -- [CVE-2024-55195](CVE-2024/CVE-2024-551xx/CVE-2024-55195.json) (`2025-01-28T15:15:12.647`) -- [CVE-2025-24102](CVE-2025/CVE-2025-241xx/CVE-2025-24102.json) (`2025-01-28T15:15:13.303`) -- [CVE-2025-24106](CVE-2025/CVE-2025-241xx/CVE-2025-24106.json) (`2025-01-28T15:15:13.450`) -- [CVE-2025-24121](CVE-2025/CVE-2025-241xx/CVE-2025-24121.json) (`2025-01-28T15:15:13.600`) -- [CVE-2025-24126](CVE-2025/CVE-2025-241xx/CVE-2025-24126.json) (`2025-01-28T15:15:13.743`) -- [CVE-2025-24130](CVE-2025/CVE-2025-241xx/CVE-2025-24130.json) (`2025-01-28T15:15:13.890`) -- [CVE-2025-24146](CVE-2025/CVE-2025-241xx/CVE-2025-24146.json) (`2025-01-28T15:15:14.013`) -- [CVE-2025-24151](CVE-2025/CVE-2025-241xx/CVE-2025-24151.json) (`2025-01-28T15:15:14.150`) +- [CVE-2024-55194](CVE-2024/CVE-2024-551xx/CVE-2024-55194.json) (`2025-01-28T16:15:39.927`) +- [CVE-2025-22865](CVE-2025/CVE-2025-228xx/CVE-2025-22865.json) (`2025-01-28T16:15:40.540`) +- [CVE-2025-23084](CVE-2025/CVE-2025-230xx/CVE-2025-23084.json) (`2025-01-28T16:15:40.827`) +- [CVE-2025-24085](CVE-2025/CVE-2025-240xx/CVE-2025-24085.json) (`2025-01-28T16:15:41.540`) +- [CVE-2025-24092](CVE-2025/CVE-2025-240xx/CVE-2025-24092.json) (`2025-01-28T16:15:41.697`) +- [CVE-2025-24093](CVE-2025/CVE-2025-240xx/CVE-2025-24093.json) (`2025-01-28T16:15:41.847`) +- [CVE-2025-24103](CVE-2025/CVE-2025-241xx/CVE-2025-24103.json) (`2025-01-28T16:15:41.990`) +- [CVE-2025-24115](CVE-2025/CVE-2025-241xx/CVE-2025-24115.json) (`2025-01-28T16:15:42.150`) +- [CVE-2025-24118](CVE-2025/CVE-2025-241xx/CVE-2025-24118.json) (`2025-01-28T16:15:42.293`) +- [CVE-2025-24122](CVE-2025/CVE-2025-241xx/CVE-2025-24122.json) (`2025-01-28T16:15:42.447`) +- [CVE-2025-24123](CVE-2025/CVE-2025-241xx/CVE-2025-24123.json) (`2025-01-28T16:15:42.590`) +- [CVE-2025-24134](CVE-2025/CVE-2025-241xx/CVE-2025-24134.json) (`2025-01-28T16:15:42.780`) +- [CVE-2025-24135](CVE-2025/CVE-2025-241xx/CVE-2025-24135.json) (`2025-01-28T16:15:42.930`) +- [CVE-2025-24138](CVE-2025/CVE-2025-241xx/CVE-2025-24138.json) (`2025-01-28T16:15:43.077`) +- [CVE-2025-24139](CVE-2025/CVE-2025-241xx/CVE-2025-24139.json) (`2025-01-28T16:15:43.230`) +- [CVE-2025-24149](CVE-2025/CVE-2025-241xx/CVE-2025-24149.json) (`2025-01-28T16:15:43.387`) +- [CVE-2025-24154](CVE-2025/CVE-2025-241xx/CVE-2025-24154.json) (`2025-01-28T16:15:43.533`) +- [CVE-2025-24158](CVE-2025/CVE-2025-241xx/CVE-2025-24158.json) (`2025-01-28T16:15:43.693`) +- [CVE-2025-24159](CVE-2025/CVE-2025-241xx/CVE-2025-24159.json) (`2025-01-28T16:15:43.843`) +- [CVE-2025-24160](CVE-2025/CVE-2025-241xx/CVE-2025-24160.json) (`2025-01-28T16:15:44.003`) +- [CVE-2025-24162](CVE-2025/CVE-2025-241xx/CVE-2025-24162.json) (`2025-01-28T16:15:44.187`) +- [CVE-2025-24163](CVE-2025/CVE-2025-241xx/CVE-2025-24163.json) (`2025-01-28T16:15:44.330`) +- [CVE-2025-24174](CVE-2025/CVE-2025-241xx/CVE-2025-24174.json) (`2025-01-28T16:15:44.490`) +- [CVE-2025-24176](CVE-2025/CVE-2025-241xx/CVE-2025-24176.json) (`2025-01-28T16:15:44.630`) +- [CVE-2025-24783](CVE-2025/CVE-2025-247xx/CVE-2025-24783.json) (`2025-01-28T16:15:44.880`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 236fb4f8423..8bc49bc0dc6 100644 --- a/_state.csv +++ b/_state.csv @@ -94429,7 +94429,7 @@ CVE-2017-10268,0,0,2fd5a1eba64da42734fa123762b9bdbc48dafe91212c8b13796188a23db53 CVE-2017-10269,0,0,99a602881bab7d0a9c272d62e9be296209d4d681131d96516b1eec020fb0a691,2024-11-21T03:05:47.420000 CVE-2017-1027,0,0,a722572dd9e4e8a2c22d0d11f87337325cef2446e18a9c5891b511e41dd44047,2023-11-07T02:42:06.330000 CVE-2017-10270,0,0,314dbf27c930f7b4944cd4faf568f51090481b6e725424179383d35be21c1e30,2024-11-21T03:05:47.560000 -CVE-2017-10271,0,1,c2d4b2b186e17f9651b878fc1780de25faa245106177d0fdaa914468faba8a52,2025-01-28T15:28:27.123000 +CVE-2017-10271,0,0,c2d4b2b186e17f9651b878fc1780de25faa245106177d0fdaa914468faba8a52,2025-01-28T15:28:27.123000 CVE-2017-10272,0,0,a8ae74e9650948ede1f5ebe3ddebb7fd281d93476bc1061c2a2e80feb18d65ca,2024-11-21T03:05:47.970000 CVE-2017-10273,0,0,3125f38a9aaff799139d27e2e5503e4ec327e522e3537b85981648fd4e32ca16,2024-11-21T03:05:48.103000 CVE-2017-10274,0,0,79cd866f1671fcd1359498782f0a43047229bb288cc35d6385182e3e883df299,2024-11-21T03:05:48.267000 @@ -95945,7 +95945,7 @@ CVE-2017-12144,0,0,c5b9588793956a2147e0ffe6a0a8ea4044bdbc460981fa91a393837b5667a CVE-2017-12145,0,0,f6a628c2da158e01f2bd77047cabe907d22b412b56697c26a6a70ed3add26eac,2024-11-21T03:08:55.653000 CVE-2017-12146,0,0,64a79706ee2c8f72ac2fa403a3a37e2a64b996372ffde19ee16afea92b1f5425,2024-11-21T03:08:55.787000 CVE-2017-12148,0,0,1a1262ec79e3b069ae03d2b5af93248fb69a31a3840409bd1f8c8fdfea443f3b,2024-11-21T03:08:55.947000 -CVE-2017-12149,0,1,504c9ebe5af230b35911f826077b55642dff9025c82b1f3968dccfaf1d8493ed,2025-01-28T15:28:21.047000 +CVE-2017-12149,0,0,504c9ebe5af230b35911f826077b55642dff9025c82b1f3968dccfaf1d8493ed,2025-01-28T15:28:21.047000 CVE-2017-12150,0,0,6ebd77c4fb4f62bdfba4689b6d5d24e668fd3f79a1f423844567f9af316b16d5,2024-11-21T03:08:56.200000 CVE-2017-12151,0,0,e7ec109e39d5943758f1e76f429b6a87e21f784ab8b7a2059b50534825d3cbb1,2024-11-21T03:08:56.363000 CVE-2017-12152,0,0,b30a644384c1e46a7ccab8059ee04d0b040f8f2170f5b86f797bdf0545b0b474,2023-11-07T02:38:22.517000 @@ -102558,7 +102558,7 @@ CVE-2017-20192,0,0,62ca05a0a6895e670da34ea053fd80d19f2fb06d6c55730f577c1845fb514 CVE-2017-20193,0,0,78f33a28785b6834207e6952bd57c135d5a9420af5c916cc0c38f6d255c4ca38,2024-10-30T20:46:34.060000 CVE-2017-20194,0,0,2ef68f420c7767e9da26d58c0322a3b0184d3e0f958f630f006b5a75255314e6,2024-10-30T21:00:25.973000 CVE-2017-20195,0,0,038824b0765b4962b51714c1d9dd9e3ad2eebba7a76824674181910d889a0075,2024-10-29T14:34:04.427000 -CVE-2017-20196,0,1,dd8c4d642ecaa4043a036480f99edf77027b1358976e3ddf38724f7850320fd2,2025-01-28T15:15:08.267000 +CVE-2017-20196,0,0,dd8c4d642ecaa4043a036480f99edf77027b1358976e3ddf38724f7850320fd2,2025-01-28T15:15:08.267000 CVE-2017-2020,0,0,0176f89e76e77d17aff44beb265bbd6290607491912cdad54f562216e17fef40,2023-11-07T02:43:30.943000 CVE-2017-2021,0,0,76f10f5cd36e75a57c68367deb797f3f6432a879d0c98ef2f911f8615c163241,2023-11-07T02:43:31.170000 CVE-2017-2022,0,0,9f249157715bb01a33c6885e22f286efa78b6a3306959a78f30cb9dd84a9f46c,2023-11-07T02:43:31.413000 @@ -105455,7 +105455,7 @@ CVE-2017-5066,0,0,9f5c2db614b32a678fdd9232bf96577d4474ace1459543d090a572f1f93f7c CVE-2017-5067,0,0,2ad162add6cbb32a510fab0bef6721d8082bbf537ce0c72472a58068a607f20d,2024-11-21T03:26:58.730000 CVE-2017-5068,0,0,9d3ca8511d9e49adbc729771915a5711f48fc24f691507c7e4ce24512d6e6220,2024-11-21T03:26:58.850000 CVE-2017-5069,0,0,4c6f0e28aa3e2ae29a418ffac89a0640856c7571f8819fd880192061f88a95e7,2024-11-21T03:26:58.977000 -CVE-2017-5070,0,1,56f466c1ebccca8af0585c2ba3ac042f7c4082528934ada9fbcfb8e0e5fa8971,2025-01-28T15:28:33.153000 +CVE-2017-5070,0,0,56f466c1ebccca8af0585c2ba3ac042f7c4082528934ada9fbcfb8e0e5fa8971,2025-01-28T15:28:33.153000 CVE-2017-5071,0,0,f5410941818e677c4e6d6a02b68726701eff5212f53fd7443f7b0b365d607e7b,2024-11-21T03:26:59.240000 CVE-2017-5072,0,0,35f02b5f2a282cbaf303df9a2725e772dc9c96fe8c0511537b449848ccae02cc,2024-11-21T03:26:59.377000 CVE-2017-5073,0,0,398bd66ebf7a3e98cb53bb4d3120ac66281a7438a4ab776997a78de490a8b102,2024-11-21T03:26:59.497000 @@ -106503,7 +106503,7 @@ CVE-2017-6323,0,0,adf010d4a39e345b824cee6fcca9c2195697b5d7a97b0a9c5082468040c4f8 CVE-2017-6324,0,0,77722cfc809cdfadcd278c7b890ec0d070a04bba29126e6eb8a3655dc3f57a0d,2024-11-21T03:29:33.847000 CVE-2017-6325,0,0,7a6ccf0f51e269d2f444f7b191f021e32f282c2136c57deb80e01f1e8d699d30,2024-11-21T03:29:33.960000 CVE-2017-6326,0,0,1cb4eafe71d9ead884f6be63876fd968575791113118974a1f5830ebff169d54,2024-11-21T03:29:34.073000 -CVE-2017-6327,0,1,f5137ddd3b7008bd5a7e5566450db5cc4e7889845027f4452902295d920f7b6d,2025-01-28T15:28:15.097000 +CVE-2017-6327,0,0,f5137ddd3b7008bd5a7e5566450db5cc4e7889845027f4452902295d920f7b6d,2025-01-28T15:28:15.097000 CVE-2017-6328,0,0,ed8b8081c67d23f8eecca6e7147a999aa9cca89e11d27e3aee197caa7faaefd0,2024-11-21T03:29:34.303000 CVE-2017-6329,0,0,11dea170ad86b94cced8f348027330ceaae6c40482cdb228f11d6206d2a1c7e0,2024-11-21T03:29:34.407000 CVE-2017-6330,0,0,9daec3b7d68726ab69bb0475e153ee0c9e277dd5f36b71e86c17e73a8d02c9da,2024-11-21T03:29:34.507000 @@ -109621,7 +109621,7 @@ CVE-2017-9818,0,0,b6c4054d5b5049e3521fc8b75f1a35037c7f3f9f724c80ca337865cdf69237 CVE-2017-9819,0,0,faf21bdf8f0e34aafaa891fba94824a6473cfa61d27c736db383bbcbdce2c17f,2024-11-21T03:36:55.533000 CVE-2017-9820,0,0,7862875c350e3e138d964ecc42041d08185dd8f2fdb5177d7874767918fc30b8,2024-11-21T03:36:55.683000 CVE-2017-9821,0,0,9edcdf1513f9cfdea6252be124b0f5583c44c4f42d815730ab21a392e103550a,2024-11-21T03:36:55.827000 -CVE-2017-9822,0,1,78900d0d72f4530c8717e337b284a335707d071f2a59b2d5e48136064130e800,2025-01-28T15:06:15.417000 +CVE-2017-9822,0,0,78900d0d72f4530c8717e337b284a335707d071f2a59b2d5e48136064130e800,2025-01-28T15:06:15.417000 CVE-2017-9828,0,0,2b1e28db4b016e8fb7bdd2cc6f79600538f2b592068c76006835c1fac2325341,2024-11-21T03:36:56.083000 CVE-2017-9829,0,0,372ab7e7648f5f60d61ef574d04b751584127dfa75a5ad90d9128c1af879828f,2024-11-21T03:36:56.230000 CVE-2017-9830,0,0,4cd364c25f0ee5800e54fd20ae0a246ea31115fac47546d43b7d7cf16b0f7f67,2024-11-21T03:36:56.373000 @@ -121219,7 +121219,7 @@ CVE-2018-2376,0,0,e771b541c65e6806171bcc422e600aca172b087deb9dd5f5e737a93cf9d9f7 CVE-2018-2377,0,0,b04a53dcd2a7c4e3bde1bc95de37f89b624fe76c7f42e976e59ba78d02042064,2024-11-21T04:03:42.500000 CVE-2018-2378,0,0,6e7cb99020826e5b0b1ca2ba05f327e149ae716b95c81e67b5888d29cee56ae2,2024-11-21T04:03:42.600000 CVE-2018-2379,0,0,545016da27a917d202ae506081b74d70ca17d37d883617818c076a919dd65dae,2024-11-21T04:03:42.710000 -CVE-2018-2380,0,1,89f20a5568655a4427b158f57cdef08e1e8571f92507f2ba7d1cd40d931aff9a,2025-01-28T15:28:44.097000 +CVE-2018-2380,0,0,89f20a5568655a4427b158f57cdef08e1e8571f92507f2ba7d1cd40d931aff9a,2025-01-28T15:28:44.097000 CVE-2018-2381,0,0,e7d64f84b1c5ec6d295ffea64bca75c347b5b6b30638db6a64bacaaf2df5bb36,2024-11-21T04:03:42.943000 CVE-2018-2382,0,0,823133cb343551eea73f306ff47ae4e9c9885b62bd380bcca1bfd86b89ce21f8,2024-11-21T04:03:43.057000 CVE-2018-2383,0,0,869e1b7bb73e140ec24fd821163219e771a40a1bb114253bba8f85f4ce182998,2024-11-21T04:03:43.170000 @@ -168266,7 +168266,7 @@ CVE-2021-21728,0,0,abfcfb35e980ce0ce123fceadeabb11de2a6565aa607cfe8decaede24d231 CVE-2021-21729,0,0,5c8c6ff8ced38561b4fb5213780ae73d6d2e4ee4d4bd3497a9224cefdbf3446b,2024-11-21T05:48:53.660000 CVE-2021-2173,0,0,cbad9191d79c8dacc7e443e9fe440f30f6648d01ca2a701c6c89364b5fa6a3f8,2024-11-21T06:02:32.263000 CVE-2021-21730,0,0,805546dac7c11db2476efc02242c7c7b94ea7d54741ed53fcc38f5426004b5fa,2024-11-21T05:48:53.793000 -CVE-2021-21731,0,1,fc1fb4be750c2eb9506732466b41ca60b0e17c2259773af292cd02fbe48da9a7,2025-01-28T15:36:03.663000 +CVE-2021-21731,0,0,fc1fb4be750c2eb9506732466b41ca60b0e17c2259773af292cd02fbe48da9a7,2025-01-28T15:36:03.663000 CVE-2021-21732,0,0,4a59c0d26af0a341d194bb0bfae954d2dc535569840fc62c58a3f0cafa422cb6,2024-11-21T05:48:54.023000 CVE-2021-21733,0,0,d39f86fdb8abfb7f331c613fcef01ccdb1e34d1f0405dbae49159b55f7cc1469,2024-11-21T05:48:54.137000 CVE-2021-21734,0,0,e560ea57bd7301969ff07503d3a9d383ce9ebb441e347c6ec57d4f8a75176222,2024-11-21T05:48:54.243000 @@ -172075,9 +172075,9 @@ CVE-2021-26350,0,0,b151ad9bd32b15d8044112deaab36f3ca0dfbf6a51b55074bb0eb62eb9057 CVE-2021-26351,0,0,b8008fc01be4e89c841cd24f5f0ee416865f95d380d4137dc30bd91a2162a326,2024-11-21T05:56:11.180000 CVE-2021-26352,0,0,ab39ee46f163eb98638260277895d33940ff06b51f3a31b944ba81d8a2b208ff,2024-11-21T05:56:11.357000 CVE-2021-26353,0,0,5637ff632a3b498c1f457036db6ba13123bdc71cbb024531a1453dd05a5008fa,2024-11-21T05:56:11.500000 -CVE-2021-26354,0,0,afb8359f2de1c4d48f01a85c07a563279acd701d85e7c1aee8d6f6efb6cebd69,2024-11-21T05:56:11.643000 +CVE-2021-26354,0,1,8defe52f712feed4770923218c01e547e2a7b510f8687131f9bfdf0c81cfe76d,2025-01-28T16:15:27.930000 CVE-2021-26355,0,0,87df23e23ac09f5c1a75cd9b9c83e1c4aa08d97e75ae820ea97e75361dd52264,2024-11-21T05:56:11.930000 -CVE-2021-26356,0,0,58621feb0cff62a95114948249e4d83d288008e7dab272ab9d6732e68cd4dec7,2024-11-21T05:56:12.070000 +CVE-2021-26356,0,1,e35484f3c7337754e71cdbc8e66ee5023536dcb177d34004d6c7d898d055e27d,2025-01-28T16:15:29.150000 CVE-2021-26357,0,0,824898f84032844f9aada457906e54efe49cf0b9fb16b50003a3ed0f7a34e4ce,2023-11-07T03:31:42.733000 CVE-2021-26358,0,0,2724aa6f895ca1611bf2dfa538bc4a735862bda0b10a7d6c42c75a0f3b2ca01c,2023-11-07T03:31:42.987000 CVE-2021-26360,0,0,03debf36c182b14d8d880fd25fe30df87283f6ad4feece11e09b5096431f844f,2024-11-21T05:56:12.317000 @@ -172085,20 +172085,20 @@ CVE-2021-26361,0,0,405e2906167824484f5942849cd1c0fde45dd76f483d7bdbba724366a08cc CVE-2021-26362,0,0,68be2902fdd2e33ff49b401bf6ef06ded4fe40564b6acfdf02c1e1eb43e68ea9,2024-11-21T05:56:12.600000 CVE-2021-26363,0,0,ea5e78d5bebbd15d102f943caa10ef6b8eedc44de2844a9aaf4353dcfddd2a14,2024-11-21T05:56:12.753000 CVE-2021-26364,0,0,e6fb3d205bcba6682a325d197bf3cc47348cccd3f505ce727e85b932316ecc7b,2024-11-21T05:56:12.927000 -CVE-2021-26365,0,0,8a85639532ca6e6383707321f5586a4a4a5eefa41f498dd369508ebfb022d242,2024-11-21T05:56:13.093000 +CVE-2021-26365,0,1,ee6ed4aad5f83e86c7cd6b0341d548715206bf9efed575bad63574af617f278c,2025-01-28T16:15:29.400000 CVE-2021-26366,0,0,94380087ac9d954f4c158efcb4c520cbd04379e9f39e66f07b4c695a34dc95f7,2024-11-21T05:56:13.280000 CVE-2021-26367,0,0,1ea318f22602730ccaa98e9a4e306701942cebc2b7fecbfd5e7b425f47955556,2024-12-12T20:41:56.120000 CVE-2021-26368,0,0,0d92ceeb9332920af33d5588a2638b208816ad8116e7123a808b6bf68ebde242,2024-11-21T05:56:13.520000 CVE-2021-26369,0,0,0b7851746bb6e9137d08d662cf27537fc49d451d615477bba77e441e22c15d6c,2024-11-21T05:56:13.677000 CVE-2021-26370,0,0,a7ed84704755abb7ce3d2ac66c14a88f2c33f9c1d390f73183d197d43e3bf895,2024-11-21T05:56:13.870000 -CVE-2021-26371,0,0,336371304272808256f3bc0b82032d60538cd1d28905555ded72788cb019624a,2024-11-21T05:56:14.083000 +CVE-2021-26371,0,1,4cfd02c74b5d276e911343440a0862338b92f9b49e07cd16becd5033c6d7ad42,2025-01-28T16:15:29.637000 CVE-2021-26372,0,0,be25e17ea00fc5d2ece1089a9c4bcc97dad067ecabc99b0acf185145d799d0e2,2024-11-21T05:56:14.363000 CVE-2021-26373,0,0,fb1e96954a94661dd628ced3050aadff79600f9e8135e1d18cc7703807538a0b,2024-11-21T05:56:14.543000 CVE-2021-26374,0,0,7042fb5a11054196a852163da9c3118baaf16804c5e3aa6433d40ef9c13c9a60,2023-11-07T03:31:43.320000 CVE-2021-26375,0,0,be65532e486936f60fa4bdb31dafadc80cd5d305be54619995480b13ca546777,2024-11-21T05:56:14.807000 CVE-2021-26376,0,0,695b3db039da8392cb105b41c23fb8d0eedf963bd0284f2842802098d6efd2f0,2024-11-21T05:56:15.030000 CVE-2021-26378,0,0,62247824806125562c0c0616f0cc3265c78b0f622e1042a4b96eae9d6d22abd4,2024-11-21T05:56:15.240000 -CVE-2021-26379,0,0,b8313800f6e160ca2113381039ec1000d6ed25301c3bf452c5714e710db23fec,2024-11-21T05:56:15.457000 +CVE-2021-26379,0,1,bfc1178be85f1381c1cbfc86368460dd4dc108703bb6b969745f154c2dd7f431,2025-01-28T16:15:29.910000 CVE-2021-26382,0,0,2d2da654b3124491842fef9f56ae115f90a0c137138c8cde0a8d0aed70409ace,2024-11-21T05:56:15.607000 CVE-2021-26384,0,0,1f20237d6382a09fa5f1dc37ef01834f52ccbe3593ec61b252043c1c927b7a92,2024-11-21T05:56:15.767000 CVE-2021-26385,0,0,f2c8b7d9db601ac08dd018e8b3647ecdeba07aaa7932dabdf667e78be8806825,2023-11-07T03:31:43.570000 @@ -172110,7 +172110,7 @@ CVE-2021-26391,0,0,42611c87ccff4bbf6f45ee1fc6b299e79cdb60a1dd36495526b6538fcfeaa CVE-2021-26392,0,0,f4506415ef34d2c668f45e5c31297fbf0939bd3be9844eeb1012259e45a2c151,2024-11-21T05:56:16.773000 CVE-2021-26393,0,0,2e2311da7e5fd6009b7462ed3e62a0b988ac096a66499352cb820075b16a39f9,2024-11-21T05:56:17.503000 CVE-2021-26396,0,0,bedc812248f4c58139b304e8b93ad2ea7faff37786b9b742fb65461bc3b55d21,2024-11-21T05:56:17.673000 -CVE-2021-26397,0,0,aa409e22c666ccbe7111c5c539e6ace6debc6aa68e7f285d6355042c0f012724,2024-11-21T05:56:17.807000 +CVE-2021-26397,0,1,c4fa4107a5037ab9a9f0469d5f2cc262599cc1bc6851c1b7054ebbe5ae6609f1,2025-01-28T16:15:30.127000 CVE-2021-26398,0,0,76da1b07d0263b029647edf390d6ca48e3701a1bdaa11182a148b5b4e1b14b28,2024-11-21T05:56:17.933000 CVE-2021-26399,0,0,5e5f9f405bf7acc561d0d20a58a3ac59dca0a4ba58359540a6486db890806823,2023-11-07T03:31:44.043000 CVE-2021-26400,0,0,4a32102cb86498ca7e455a6e4a03c3ad50cc1a1969378fb12c48bc088142b733,2024-11-21T05:56:18.113000 @@ -172119,7 +172119,7 @@ CVE-2021-26402,0,0,2815299b7c37e3943d6674d88c5f7a0e64195ac95b53cbadbae4d15e80b10 CVE-2021-26403,0,0,f056e101d01257d133211e984177d40ff4e1e335edaa983de3e10d8f6fe36335,2024-11-21T05:56:18.587000 CVE-2021-26404,0,0,62c3a5e41312ab345a394c48f30833b633f037431cc53aeef373f8eaf65fc30a,2024-11-21T05:56:18.740000 CVE-2021-26405,0,0,e7997b4a9a2fabe8cb89ed58df54fe10de0d03f70cec1d0355c449fadafe46c8,2023-11-07T03:31:44.613000 -CVE-2021-26406,0,0,b9242914004b5fffb11919435bdb0a58e8e4edc75a253d6a6f3126e1e08e109c,2024-11-21T05:56:18.897000 +CVE-2021-26406,0,1,feaa91344c371f6ddb186789655602e39d41bb880480e39b01b32a784fb63b56,2025-01-28T16:15:30.307000 CVE-2021-26407,0,0,6d75501eb6986fe4542234f0e8fb50ec5ae2f34b68eb947d449a5d913abd2465,2024-11-21T05:56:19.060000 CVE-2021-26408,0,0,29ee115f3d7798592d41ee828ddef7f56abb664c496866bc3b6d3facbde27817,2024-11-21T05:56:19.170000 CVE-2021-26409,0,0,ddbeb3098844be2c4d5fea7769f72dee25eebfb5ec0c63449ab40c828c027a55,2024-11-21T05:56:19.327000 @@ -186027,7 +186027,7 @@ CVE-2021-45340,0,0,67b7dfa40c57558c2fe56d97dcd3db9f8cfae2cee1fbe6330e358e988588b CVE-2021-45341,0,0,2de15a0973665331edb58aa09fa4c2f373a1b56f1573b63f69548334253f0a02,2024-11-21T06:32:06.990000 CVE-2021-45342,0,0,daa3728d340863ce70880dcff74d3db88ab11e53a2c0edc1b0c48fd1d544d49d,2024-11-21T06:32:07.137000 CVE-2021-45343,0,0,a1c6b5bbd7ef7c2a32d363510aefaa452e19383180fa960874728799e54542f5,2024-11-21T06:32:07.283000 -CVE-2021-45345,0,0,c60446c74c9cee22f504ff06527bf2ca130835c5bcc6fe83a93093463db9ca7f,2024-11-21T06:32:07.427000 +CVE-2021-45345,0,1,6d83a3a1345bc5132448524f4f553d66cdfb5bf7a4a6d9082e5b3f05590d7195,2025-01-28T16:15:30.527000 CVE-2021-45346,0,0,e1e5e34e79d9e570e6d559539c99b66153e5bbfc574466f3cb7eb9e4b00595f5,2024-11-21T06:32:07.577000 CVE-2021-45347,0,0,7d1cad60b0431bd525e33329b06c6759acff05492a9829708c7462d3c3aee380,2024-11-21T06:32:07.737000 CVE-2021-45348,0,0,0d60039cf58404f1e2404fef9958e244f4299eecff3837c067c2249a785f996e,2024-11-21T06:32:07.877000 @@ -187017,29 +187017,29 @@ CVE-2021-46743,0,0,fa2103decfba18c169775b329c4df44f3980df4487f48f67188fa24658174 CVE-2021-46744,0,0,966d79f5dd773839de773aacc3c163e0400034d18a4971b39e19ee38b20768c0,2024-11-21T06:34:37.347000 CVE-2021-46746,0,0,1853c7548e8b1fa53bf6723c123487c64fa2064f9a9d8f58b03b516ad6db460d,2024-10-31T14:35:00.797000 CVE-2021-46748,0,0,e58198977e83f84004306b15f2073e45f9840ae24e082c85dbe60aa2b9bea3d3,2024-11-21T06:34:37.687000 -CVE-2021-46749,0,0,0a913d97adace2572982f3d04ea00e4a6dcdd1c0f91351bd00e31805326f9b8b,2024-11-21T06:34:37.847000 -CVE-2021-46753,0,0,5d66659434e1c645fc7525f776880b9ebfdcf627e101f9036cbd25f31d0fdac5,2024-11-21T06:34:38.127000 +CVE-2021-46749,0,1,d4f1d2736184a5a310e2336499e738df8d7c4b9e48c387fe911ae62aad62d7c2,2025-01-28T16:15:30.747000 +CVE-2021-46753,0,1,5aad8c8682702c543998f0a57823d36079ee78cc662f1ee4983b8d9141178575,2025-01-28T16:15:31.070000 CVE-2021-46754,0,0,c4c7622192121c483a6dd65cb3e199e74a112c267e112e931d7ec81def35a161,2024-11-21T06:34:38.400000 -CVE-2021-46755,0,0,c544c754b4881728b6daf09ae7628d8e4cda68f2b744f9d3351feca6d015137b,2024-11-21T06:34:38.670000 -CVE-2021-46756,0,0,4b62f6001d47f3e1b3afa4b8d344c7f30b91163fcb6dcc2223a8dcd3e10c8988,2024-11-21T06:34:38.833000 +CVE-2021-46755,0,1,e73a4a154a1c9901b9a47e2089e50ad52b479a71a7a8890c41b5d6108c7369f2,2025-01-28T16:15:31.403000 +CVE-2021-46756,0,1,348edd97a5618ca4219a5eb39fe589ed996e990d11b5940259c1c9a597d071d1,2025-01-28T16:15:31.723000 CVE-2021-46757,0,0,9bb395cfc6c2cc867004a009f9eeae811c297f927d63893e956b0fe116fa2946,2024-11-21T06:34:39.013000 CVE-2021-46758,0,0,61a2c8261647305cf0c168e689ef2547a9e118bcd79bbe37e35d6250fbc1a5ad,2024-11-21T06:34:39.233000 CVE-2021-46759,0,0,ee41477de6aec6d8765a770d4587c30e8d34746d178e40b5c618fc67772ca7cb,2025-01-27T18:15:28.957000 CVE-2021-46760,0,0,2a5c5d4614a8f99d6c513f4ec337736cb9c89dbc6c65e6108bb5f09456b91415,2025-01-27T18:15:29.347000 CVE-2021-46761,0,0,673565b132841f4e40fa9ef86a4bec9a270e19da8772bf1d5a2324269de3a1a0,2023-11-07T03:40:03.307000 CVE-2021-46762,0,0,a04b8facc1f877f06c93e09fdc65010cfefddf9144e2e823bf5ac7fdfff01198,2024-11-21T06:34:39.943000 -CVE-2021-46763,0,0,b3a4154b5d3dda9491a8280f0f3a10f0f913a8350d28a8bbc092421ff8c661d5,2024-11-21T06:34:40.117000 -CVE-2021-46764,0,0,137705b0985a360ec3fc7919a2b15c5294e6b50e2ed47e5fbefdae6ccb67aa23,2024-11-21T06:34:40.283000 +CVE-2021-46763,0,1,479096be352a86e0db261253285064059aa17860a5878ca2bd973b8e4911394d,2025-01-28T16:15:32.050000 +CVE-2021-46764,0,1,97cc2002a793b3449c0141fddd218879f6c2d56385c1033c7a5b04ab5f2c8f73,2025-01-28T16:15:32.250000 CVE-2021-46765,0,0,fe1e34ba3941eb547a595865103b1e703bc3945612d81406f9f99d9b9bfebcfa,2025-01-27T18:15:29.550000 CVE-2021-46766,0,0,bccf8c60bb6c6f348913cb8600a7bf05fbe599718b959086f4540fa76b250f22,2024-11-21T06:34:40.617000 CVE-2021-46767,0,0,ed28b18ceedfc909daa60b057d370b54ffe9be04b0322bfef58c76b097fce08b,2024-11-21T06:34:40.793000 CVE-2021-46768,0,0,3efc93a3218052c35679d8d9e65810db17d49b4d3976f82dd366c1c9a2d70b43,2024-11-21T06:34:40.917000 -CVE-2021-46769,0,0,7a1a9c4358d4da6d3a5a5a503a47c0f64da5787516222ecdeb21a57558167224,2024-11-21T06:34:41.030000 +CVE-2021-46769,0,1,33b93ec5c624f04f870525cd2b9f0bb35757ee6cbba0aae077c8e45000d07d36,2025-01-28T16:15:32.440000 CVE-2021-46771,0,0,2db0ae4ec8923430ef43208646e80340249366137d0e8e055b8389009ce50327,2024-11-21T06:34:41.190000 CVE-2021-46772,0,0,f253f96b9b076f0e52e80ce930cbafabed8fd2e43589a011145649e2defea26e,2024-11-05T22:35:01.630000 -CVE-2021-46773,0,0,2dcda26d05567ea3f98d4cd0b0d3d7d247835dc078892aafff10f254d729eb88,2024-11-21T06:34:41.453000 +CVE-2021-46773,0,1,63513a81b05f40282335c1ad5fdb9049a5934240e17fcc698f866e1ae35bf4ac,2025-01-28T16:15:32.647000 CVE-2021-46774,0,0,ef64e0c599d426c07397dde560d8723094891ec90f1c70c2db374dee78a11c95,2024-11-21T06:34:41.667000 -CVE-2021-46775,0,0,3af1d3c0cc4de808de2e5eedd171b4efcbbb911df46c6aaf8953ab56b926d6e3,2024-11-21T06:34:41.953000 +CVE-2021-46775,0,1,4ec5da084476062caf48bd8dc8a9e49fc4f350302044cc7b382c4f33babcd08b,2025-01-28T16:15:32.910000 CVE-2021-46778,0,0,6be3a3c577cea903827adaa59850a57d29dd763234a27e93fc22fea72c5301a9,2024-11-21T06:34:42.120000 CVE-2021-46779,0,0,6e414a9d1953f67179d4647211e0d91f5ee590ddd6e2b5413ba639c86c44d749,2024-11-21T06:34:42.400000 CVE-2021-46780,0,0,5cd689ffb43f9985a355d5b276e32b9b23083b973e5faff72d29a0c4e217261f,2024-11-21T06:34:42.517000 @@ -187053,9 +187053,9 @@ CVE-2021-46788,0,0,32e89ce10b2a5a6977e6ba307ec05c390d77e5524ada8597a176045dbb24d CVE-2021-46789,0,0,3ac1770c8993487da9af7040eb1c2919779dce70f3686c5c80e66317975d391b,2024-11-21T06:34:43.503000 CVE-2021-46790,0,0,7e330ae8c3f4d1c058580fe6c8a9bdbcbc9daeafea6603075154115df9816bd7,2024-11-21T06:34:43.620000 CVE-2021-46791,0,0,26ea3d4deeb4ec718e57ac570254f4718a9a548779641a26074761ff235973a2,2024-11-21T06:34:43.797000 -CVE-2021-46792,0,0,91ad78ec6757239e7ba562d67d03e899159ac0ad101ed1f7429a398de1dbedd6,2024-11-21T06:34:43.910000 +CVE-2021-46792,0,1,c5b9352751c00f82141d975ab6c0b5a7450e38b6f2f972d7d7e39acf69c2e3d3,2025-01-28T16:15:33.137000 CVE-2021-46793,0,0,e31da4ac5f6a9fc6c82e49990ef734ebc97a722e9d7f320aacc22fbf42c60b81,2023-11-07T03:40:04.037000 -CVE-2021-46794,0,0,e9398965d6397530d85ca3f201382c88ccdd2f4eb376fa26abe2c70120b53cf3,2024-11-21T06:34:44.127000 +CVE-2021-46794,0,1,069e0c9bf5ce399233af0e9e1124f538751b0b62e35288de0a0b8b70ed817523,2025-01-28T16:15:33.417000 CVE-2021-46795,0,0,4cecf02bd2414d0376c91c7b6849803dfb1df0cbf00ab89ca4098ecd3bbecd7f,2024-11-21T06:34:44.410000 CVE-2021-46796,0,0,61c2e0baace0a2922ea57f96ad4127821a5952b70ab20bb119c777cccd3dab86,2023-11-07T03:40:04.300000 CVE-2021-46799,0,0,69658fdcb21bb92bdd7a40098b5b3f97e640d3443f4cc75a23167e0a1f89d8c0,2023-11-07T03:40:04.533000 @@ -193354,7 +193354,7 @@ CVE-2022-23814,0,0,f221c5fed4ea708846f64cdec0979e1d7c60492ed369edb82988b96c17bda CVE-2022-23815,0,0,32f2b2413eb325d507269c9820e0d2bfd57ac1be30f822aa13e6954e84ddb889,2025-01-03T18:04:08.963000 CVE-2022-23816,0,0,b3e8a185ce7f00305c2d16541dec1c202970fddb180fd72b9358d6be7b074a1f,2023-11-07T03:44:19.220000 CVE-2022-23817,0,0,3b71e6ec45f6acd0944fe7938d40f55066aaaf507fdda7d54104f1b4d447e14b,2024-08-16T21:35:00.430000 -CVE-2022-23818,0,0,3856155fdefaac51ecc607bd8de135bb8597bd18819ab757f9565a89af093b21,2024-11-21T06:49:18.543000 +CVE-2022-23818,0,1,dfb8ea6bafd615661a9e37e388ca178e1dc41ef80c949ed979fd828a3c041590,2025-01-28T16:15:33.747000 CVE-2022-2382,0,0,a9d43a93a32c7abc4fff5c15bd4f62f758d289c1554be08676b4ec85e8c88f6d,2024-11-21T07:00:52.790000 CVE-2022-23820,0,0,89f9b7d2e354e64d01dcc7dd790fdd76a02c40f5ef6e3c92758a9c06a8b3001f,2024-11-21T06:49:18.690000 CVE-2022-23821,0,0,3cd80f7c80135f029aa98cf0408d6bb892e9d6156659ee6944f2c1a7c7fd94fc,2024-11-21T06:49:18.963000 @@ -201371,7 +201371,7 @@ CVE-2022-33646,0,0,a925c07ce65ac2d0e9d211e2b2398ad1e57da525d523e15541a83f12df881 CVE-2022-33647,0,0,5feaf3e010cc5e97535d4d65fbae2bcc87803779c2e96b8fade981b7b9313e94,2024-11-21T07:08:14.783000 CVE-2022-33648,0,0,bae79337c5e892df17da958d9ae52fb1686becdac8f975642c755225e29a4d86,2024-11-21T07:08:14.930000 CVE-2022-33649,0,0,591f61d96d2d65dbce03b14161fcac0fbabc7445443fe2e93a52054518a13ee0,2024-11-21T07:08:15.037000 -CVE-2022-3365,0,0,e21e3d9a50e1a8f3411fc09e903ea37e9ab2e3dbe6644212bc7fcd6140ebe0ff,2025-01-28T01:15:08.277000 +CVE-2022-3365,0,1,58ac0ea17e907ec681d70aa00994d0452cd8d41ea4da0c2336898fda59f06e51,2025-01-28T16:15:34.643000 CVE-2022-33650,0,0,8ce80787b8df19552561bb21e3ad24057869ada7a0f0f982878d44e02b7ceac8,2024-11-21T07:08:15.140000 CVE-2022-33651,0,0,9a318cb6a42b4e621fd1d5fee25d959d8bc2f3e44dc0a50b3ab6016651bb5f61,2024-11-21T07:08:15.250000 CVE-2022-33652,0,0,f5146da1cfd413adcad997798a0d1b636c0788d5c4cd20b5dffba13a0f13cee1,2024-11-21T07:08:15.363000 @@ -204955,7 +204955,7 @@ CVE-2022-38087,0,0,3abd9f1efeb6184561ade4ca91955afc6a42c4485df9d83f9557afd1b4a29 CVE-2022-38088,0,0,ca06efd770cad06ce74aa550e159e1a37d8432f883844dfb1879ee2073417ea5,2024-11-21T07:15:46.093000 CVE-2022-38089,0,0,fbebd59a44614d844bdd1281aa173d01ac7fba6affa8a38247007f4774ddafe1,2024-11-21T07:15:46.230000 CVE-2022-3809,0,0,ff70c64279d205ec14140d3115cd9cddf693be8d216ea456e4f6ba13b68b3b59,2024-11-21T07:20:16.623000 -CVE-2022-38090,0,0,1b46d51929e4cbf3b96883577926f4f84ab2add0cfc292756e5ff1ffe94d04de,2024-11-21T07:15:46.340000 +CVE-2022-38090,0,1,69e39827219e628e62c50ece37bdecfc105f724fbcd1208bdcedc8d1e475483e,2025-01-28T16:15:34.100000 CVE-2022-38093,0,0,8b19a88b2225b156c4fa828402c7d106334aa2d5dce74ac85ec91283a9763098,2024-11-21T07:15:46.680000 CVE-2022-38094,0,0,1596fd8416a957c74e2779d3056ef236ac7255f4d9105be9b3e22e18e10d14ab,2024-11-21T07:15:46.820000 CVE-2022-38095,0,0,935eee8e648def7e11b80f97b75aa432008f2a9150fc79762d7a375cd170d267,2024-11-21T07:15:46.947000 @@ -206362,7 +206362,7 @@ CVE-2022-40073,0,0,e70cb5d8371fd7f2d3adb545818d1342b3d91ca78a490d67a70ba3cef3b61 CVE-2022-40074,0,0,e6681222f196869647c103fb04c2071fb9eb5b2878fc4661c5940517bffb4565,2024-11-21T07:20:48.497000 CVE-2022-40075,0,0,528238a21c223c94fd7e677a83885dfb032391305d3ea4dd2958f5640e7c5ad2,2024-11-21T07:20:48.647000 CVE-2022-40076,0,0,c046b91313e33d852e787506d4c9c3b2814c879e207d5c27f199fbb28002715c,2024-11-21T07:20:48.800000 -CVE-2022-4008,0,1,28c0600c4c80574bd433740004937a0bb4ed140166e2773d99506a9fae24173e,2025-01-28T15:15:09.060000 +CVE-2022-4008,0,0,28c0600c4c80574bd433740004937a0bb4ed140166e2773d99506a9fae24173e,2025-01-28T15:15:09.060000 CVE-2022-40080,0,0,0b19a6ef973056f75152ce2a1f048e7f1573677c516306567b89503bb7ee2bef,2024-11-21T07:20:48.960000 CVE-2022-40082,0,0,56e76875663e98850cea47c91ae372970f7a80cab7e0f217ec87951590fd2597,2024-11-21T07:20:49.127000 CVE-2022-40083,0,0,00c52ecc769d6134409ef73ebc9833bdb81527bec230aa202b259398d890e40a,2024-11-21T07:20:49.287000 @@ -215392,11 +215392,11 @@ CVE-2023-20513,0,0,7776ff01f91e5878655445e9bf7052bf6adde2a07843f41e59f135f097f32 CVE-2023-20518,0,0,ec4070e10bb6753c589b73fc8777b131da82d0da8c8e27a0d18ea12dd1178ce6,2024-11-05T17:35:02.627000 CVE-2023-20519,0,0,334e6205bc50dbe0dda46e080b5512b64b8b838d7dcef69d9c0e3875cd92a55e,2024-11-21T07:41:04.023000 CVE-2023-2052,0,0,1e4161388b9b7a198878f66cab1655514d5646eef4374ad14c045ae17d5ec328,2024-11-21T07:57:50.540000 -CVE-2023-20520,0,0,63343e4ec485c0f35dd1069c649168e45984a37c50b1106499e6e21fca01f082,2024-11-21T07:41:04.147000 +CVE-2023-20520,0,1,8b30bccd7dd50b04b95a81ed05805a037cf85a960461a992bc08e26e7898f311,2025-01-28T16:15:34.843000 CVE-2023-20521,0,0,fd93d0eb15c7822b1e307405ea23c5525a309ac03121fd6ca1496347bc964642,2024-11-21T07:41:04.330000 CVE-2023-20522,0,0,45ab4766b0c799ec350aaab1c9149b610d74aaf2902c726aa2f87b62daabd46c,2024-11-21T07:41:04.570000 CVE-2023-20523,0,0,faf481ef2dec80ed2f9cf8bf737a8a589661c03510549746aae65d6cddb4ed95,2024-11-21T07:41:04.690000 -CVE-2023-20524,0,0,a223612a0119bdb75bc5994e7c8ec19fd9f2a965e0f4af6801d42111c901442b,2024-11-21T07:41:04.847000 +CVE-2023-20524,0,1,8dd904eba1fe12b22384e0421fdd5d9210eb70700d452ad2d82329ad316a8e56,2025-01-28T16:15:35.090000 CVE-2023-20525,0,0,86c19920bc8621b58e18b962b69881982e158b4b8e0eb076ac7dcabc76932145,2024-11-21T07:41:04.990000 CVE-2023-20526,0,0,065150ad67194ab22fd8f2de5ccab3cb453cca06282056be34e89b36bbac36ec,2024-11-21T07:41:05.137000 CVE-2023-20527,0,0,f5f779927233cf2a2b45f2d1f1cc4bd6bab52ac6416c9a4f508b379c9ece5690,2024-11-21T07:41:05.310000 @@ -217169,7 +217169,7 @@ CVE-2023-22358,0,0,09ff79227052928b381e631d0f489785ad692293414de7e2e8eb67f1f3794 CVE-2023-22359,0,0,58d1dc33c81d8bd629482ca7b7450932882d318efd86a7b0c1d4e5d00f2e46e8,2024-11-21T07:44:37.807000 CVE-2023-2236,0,0,7a218227d81da1e3f369ef4b8f9cd06e52cc34b359f143c1afab0c2fd8539745,2024-11-21T07:58:12.760000 CVE-2023-22360,0,0,fd39a65648711ab8fca8410196aa194e55218a4b817fbfbb522e25878ac6b54a,2024-11-21T07:44:37.927000 -CVE-2023-22361,0,1,0cdc99c29ecc300ec4b2048c09068ad6ac529e2fbb208ea9fd4e2f017283aaa6,2025-01-28T15:15:09.247000 +CVE-2023-22361,0,0,0cdc99c29ecc300ec4b2048c09068ad6ac529e2fbb208ea9fd4e2f017283aaa6,2025-01-28T15:15:09.247000 CVE-2023-22362,0,0,c3ba0f65014999f63dd9643dd347ae876cd94a8ac19156266e3221f4ca257c83,2024-11-21T07:44:38.150000 CVE-2023-22363,0,0,de07bb4b036cf6ff79a6504913d43191e2b7c104a9b17e7f2fa43e052f16ac60,2024-11-21T07:44:38.263000 CVE-2023-22365,0,0,202bbd9474e90d2a6515b0632953e7d0a7b156128ee3449a1dac18492385178c,2024-11-21T07:44:38.383000 @@ -217247,7 +217247,7 @@ CVE-2023-22438,0,0,5703d0c4eb5aa393e07fb85a45fb079e2501bb28ea84b28790691f2382e31 CVE-2023-22439,0,0,ca68d33d01cfaf8fae9ea4cc43a47b0f92b3a227512f3203fc183a193b04683b,2024-11-21T07:44:48.323000 CVE-2023-2244,0,0,9025fdc5a6a759ed98b80fd24d007a79e81c2dab5fc8cbc2e2ac71984ae522d5,2024-11-21T07:58:13.680000 CVE-2023-22440,0,0,c5ec718ecf01186f250ace3719ba2ad09a9b09feb1366a6ca10e80d692ebffb0,2024-11-21T07:44:48.453000 -CVE-2023-22441,0,1,2898bedf7d84a75fbffb3257a0b64b59beb510464dcd708b8ad2644e6820cf10,2025-01-28T15:15:09.467000 +CVE-2023-22441,0,0,2898bedf7d84a75fbffb3257a0b64b59beb510464dcd708b8ad2644e6820cf10,2025-01-28T15:15:09.467000 CVE-2023-22442,0,0,29a9cdca2e21aa6d398bb690de439ba4d4d2ddb0ea81a01806255dac3a21ff10,2024-11-21T07:44:48.687000 CVE-2023-22443,0,0,9fddab8612d3067f0d4cebc1a90128c8533756620471b9c208288be6aa2f41d8,2024-11-21T07:44:48.817000 CVE-2023-22444,0,0,20b223dec4ff7bd0b8efd2978a9b7375e7a68fedd8b267f92dd20c6f584cb0c1,2024-11-21T07:44:48.947000 @@ -218407,7 +218407,7 @@ CVE-2023-23898,0,0,9ecfb01461ecd6312b4518b202f3038ac3a534c6446a51be6a481ac412fca CVE-2023-23899,0,0,83c684d5a0c0153ca536e41b4b1ec7ab525d48af8abf9c727f10c646f36b7714,2024-11-21T07:47:03.583000 CVE-2023-2390,0,0,0b3933c68aac4c6dd381bee40c06fb4fbff5d2442ca411a48ccacdd9579faa67,2024-11-21T07:58:31.300000 CVE-2023-23900,0,0,bcb049b1d07fa99f1c9c7b07a1a1e31428f3d9389488a84b2a6b57255ec7a77d,2024-11-21T07:47:03.723000 -CVE-2023-23901,0,1,344c9b14eaafed66deb1aaa0c65d5ef4cdc05f637a8487121a44a1e9ce5838cb,2025-01-28T15:15:09.657000 +CVE-2023-23901,0,0,344c9b14eaafed66deb1aaa0c65d5ef4cdc05f637a8487121a44a1e9ce5838cb,2025-01-28T15:15:09.657000 CVE-2023-23902,0,0,a31c827d3e2fa5446e634865420275a55f7452fd17cd9c80d50dac6f7835b71f,2024-11-21T07:47:03.990000 CVE-2023-23903,0,0,9fe01002f68287d61dec7d5aff1f25809735a4f8bd044b98cd8aba89a80c2007,2024-11-21T07:47:04.113000 CVE-2023-23904,0,0,ad6cc32bebdd6972b54f01035b888089f4021c96fb0041b93db1421a564e8dfc,2024-09-16T18:03:16.707000 @@ -218968,7 +218968,7 @@ CVE-2023-24582,0,0,30a0c61419bb9a4c1447518f5b7252c86e2ba4d52a1c7be132bdc03f3b5d4 CVE-2023-24583,0,0,9752b96da8d4a11b508b6d3d3fc4f5f2ca2ddc50efdd58c21b0e2586505f1055,2024-11-21T07:48:10.653000 CVE-2023-24584,0,0,450b8fe4752031bc85f08e6e3249bd441ebacea296c3154e9791a18ef187d89e,2024-11-21T07:48:10.787000 CVE-2023-24585,0,0,8daffcf761a5e332fbb31dd00952f08646614a1fe870f4d740df8552f3a0ab79,2024-11-21T07:48:10.920000 -CVE-2023-24586,0,1,7819b9ab11bc0dc6646cb03a5b6c7b5bf8382c6c54bb827784c56d7737b42e15,2025-01-28T15:15:09.850000 +CVE-2023-24586,0,0,7819b9ab11bc0dc6646cb03a5b6c7b5bf8382c6c54bb827784c56d7737b42e15,2025-01-28T15:15:09.850000 CVE-2023-24587,0,0,292e05491f18fcd1c7e0ecb44788f9081cc8b8543f871a74f452e2948d572e7f,2024-11-21T07:48:11.237000 CVE-2023-24588,0,0,4a357365b75707750f9002dd1d54b5c251abd9b6ecad45bb39848b8c6c0c240a,2024-11-21T07:48:11.380000 CVE-2023-24589,0,0,098dfca42c558b814e364ffb8a37e58cbd9b62cb01477fa4e47746b32480f74b,2024-11-21T07:48:11.503000 @@ -219354,9 +219354,9 @@ CVE-2023-25066,0,0,9fd4d21f9f87bb444e665efd0d48ba86eb99e37aac7673be5a79a3a7a2b57 CVE-2023-25067,0,0,6ee55e97fa7054de1cfb0e958d38df776cb2a1824dea0f5315ab298b89f915e2,2024-12-09T13:15:23.200000 CVE-2023-25069,0,0,249c3b4a3b20cdd1631995386e688e0dd272bcb83da1502d4142c0969f6a631b,2024-11-21T07:49:02.610000 CVE-2023-2507,0,0,fd94d1512aa25b7f0c85d521ddea312fc16ff137a967f9987d743b0f1911256a,2024-11-21T07:58:44.577000 -CVE-2023-25070,0,1,eda19d3bd60740d2fc3d85ab0b297e1fad1499cea44c1a0e54f65d4c3fee91ad,2025-01-28T15:15:10.043000 +CVE-2023-25070,0,0,eda19d3bd60740d2fc3d85ab0b297e1fad1499cea44c1a0e54f65d4c3fee91ad,2025-01-28T15:15:10.043000 CVE-2023-25071,0,0,e4fa2c8e71ed3ebf0e69731ddfba75b34ec50abf37f9a0a35ca7af0e752253ae,2024-11-21T07:49:02.867000 -CVE-2023-25072,0,1,65be3cfcbffd1de6f50e4b6397d4663f216d73e863f76f20966dd1d1d128e0e5,2025-01-28T15:15:10.233000 +CVE-2023-25072,0,0,65be3cfcbffd1de6f50e4b6397d4663f216d73e863f76f20966dd1d1d128e0e5,2025-01-28T15:15:10.233000 CVE-2023-25073,0,0,faa56cf615949f57edd90ef85627d225940d3db6a28bd01dd46fbace2f38bd3f,2024-11-21T07:49:03.120000 CVE-2023-25074,0,0,f9fc176b6b7e8915167411663c245628ea6a10ef6d26394f4ea82c7839d24074,2024-11-21T07:49:03.247000 CVE-2023-25075,0,0,25335c7983447de1bb2c448769548c7ebd749f93baae0786465db7e2ad0a1e95,2024-11-21T07:49:03.390000 @@ -219475,7 +219475,7 @@ CVE-2023-25180,0,0,9c594a57ef3362d5c7f529a93ac159a56bac306f4849dec68b36e434e1827 CVE-2023-25181,0,0,29d437748b5b0b1191ee76bfc7f9056117c6702ccb85aae9719438ec4611f4c4,2024-11-21T07:49:15.940000 CVE-2023-25182,0,0,a11de1df0cacaf51b756500b43ba70b812535157065deee5df3b307e1abe5a62,2024-11-21T07:49:16.057000 CVE-2023-25183,0,0,9dc08ea2e0bd8f00745279ad28938358f2df63ccf7df8fba93b0e55bb61f5733,2024-11-21T07:49:16.180000 -CVE-2023-25184,0,1,b86df3e4429fd235ecb52ecf8a74161f42790ef6b3333074a019f5a834aa8fdf,2025-01-28T15:15:10.423000 +CVE-2023-25184,0,0,b86df3e4429fd235ecb52ecf8a74161f42790ef6b3333074a019f5a834aa8fdf,2025-01-28T15:15:10.423000 CVE-2023-25185,0,0,654ebd21078f1c5996fb55f66ebecc642265579f6eb0f98fcb3a07307e5d9a80,2024-12-12T22:15:06.247000 CVE-2023-25186,0,0,ec4420d7c1ea5324e6f0bd6478cba82abfdf0c84215571aee85ba5a2b42cb753,2024-11-21T07:49:16.570000 CVE-2023-25187,0,0,d19d0068cef419b7b1f2d261c4666d21e822db83b39c37d7957fec0cce6817a9,2024-12-12T21:15:06.680000 @@ -219795,12 +219795,12 @@ CVE-2023-25642,0,0,e8ced01f0b7a93d97b1fccad86986e0a1030c461d9fee8295cbc0d3751ced CVE-2023-25643,0,0,18dde583afda8da6447b7fc5d9bab3401cd028b66fb92fef8944c7d4aaf81dd4,2024-11-21T07:49:51.263000 CVE-2023-25644,0,0,a4f88a37d35e605b1f0492a6c2ec708d7d2332f5e5b6f5e49f56d8f443aac60e,2024-11-21T07:49:51.387000 CVE-2023-25645,0,0,5971b455e899b1d3192f6c06dac11e92f37ed6c39bbac621845ec9b5e49aaa99,2024-12-12T18:15:22.180000 -CVE-2023-25646,0,0,f3df344e7fecbac85039741e3b8fe1dc255e21c01fc6669b5be4a9d0a0785cff,2024-11-21T07:49:51.623000 +CVE-2023-25646,0,1,6b070d65d4a80d6a727ef95f1c7a9714916cf56c439f39d80e49bfad0caef4a1,2025-01-28T16:29:58.553000 CVE-2023-25647,0,0,7b1c868f46c5f32ee966cfc709fda46069aaf7aa60b29dede6ea0844dfbe373b,2024-11-21T07:49:51.750000 -CVE-2023-25648,0,1,f10fe255946e532f5b570bfa2fc45f2451a9786afd3807f2088418b485069318,2025-01-28T15:36:03.663000 +CVE-2023-25648,0,0,f10fe255946e532f5b570bfa2fc45f2451a9786afd3807f2088418b485069318,2025-01-28T15:36:03.663000 CVE-2023-25649,0,0,170bd5ee89e1922adae21ce884129bf85fa5f80f537155aaf71b34f9ea1c8369,2024-11-21T07:49:52.010000 CVE-2023-2565,0,0,b533c314e7bdbee51b7919f7d466927cc9624d83669f7284a3c70d8e5a7890eb,2024-11-21T07:58:50.483000 -CVE-2023-25650,0,1,e8f38c397ada3ca711e54603048fe607f886ae391508ec5d62648729c3fd904d,2025-01-28T15:36:03.663000 +CVE-2023-25650,0,0,e8f38c397ada3ca711e54603048fe607f886ae391508ec5d62648729c3fd904d,2025-01-28T15:36:03.663000 CVE-2023-25651,0,0,8041ab7732534a3f15abe3d8b3c1a9f1432cc679b3c9dabd96eb7471cf125d9a,2024-11-21T07:49:52.290000 CVE-2023-25652,0,0,9a2af3222703b12c596f16fed6f83ee7a9f2704131e4c9d1c16f143419251b78,2024-11-21T07:49:52.417000 CVE-2023-25653,0,0,c79c2b8a5628263bd2bb95a4a5d5f1d09456b445a09ad3bb8cd4d64fe5f77c3b,2024-11-21T07:49:52.583000 @@ -221155,7 +221155,7 @@ CVE-2023-27380,0,0,67014c4fe3f5d5e70301815925d527e1ceaf695a18f615266d79465043d9d CVE-2023-27382,0,0,3af1284ca3cc9a9ef6f32f436a11e87b1e2c39e9aa793f75ed35fd294e60c763,2024-11-21T07:52:47.700000 CVE-2023-27383,0,0,ff72c34031f2d18b8438601938a0c6cd6898ab303a6a45cd5796a58c389b624a,2024-11-21T07:52:47.817000 CVE-2023-27384,0,0,4d39f2e607eae5191b52976973be66e2202d9c4d33b95ac5e065f7ecb16e0a5d,2025-01-17T18:15:20.547000 -CVE-2023-27385,0,1,782eda715fd8756591f56a3d1143e02211cf2741fde6e76c4ae3af490fba67bc,2025-01-28T15:15:10.607000 +CVE-2023-27385,0,0,782eda715fd8756591f56a3d1143e02211cf2741fde6e76c4ae3af490fba67bc,2025-01-28T15:15:10.607000 CVE-2023-27386,0,0,04cd58b2a7b3b5431e9205e8c5b5282f85ecb0f9bb508ed9a544058afccfa782,2024-11-21T07:52:48.180000 CVE-2023-27387,0,0,bf6b4d9d64ff88918b16bb6ff92e30a6f67f5bfd7030fde047df0bee3ad6f8ff,2024-11-21T07:52:48.300000 CVE-2023-27388,0,0,babade5ee72b4a62433a15e67cf1834c920450228e834f6e3e9898e20dbeffa8,2024-11-21T07:52:48.430000 @@ -221284,7 +221284,7 @@ CVE-2023-27506,0,0,c67ffbc0a2ef6d9e4c781ab5d0b1f865bcbb541bfbbb1a3e6167bba2babb0 CVE-2023-27507,0,0,d212027721cbcd9742fad26a49808d345c2144b49a36319d4ac08fd0d29b7cb7,2024-11-21T07:53:02.993000 CVE-2023-27509,0,0,cfa719798081e3abb1671501052e27fd46f2e54b1f87245801600aadd7df048d,2024-11-21T07:53:03.743000 CVE-2023-2751,0,0,935ca6acf60fe5a752c3b3927a722efa9fc1ec980f0bd7b1b523331ca22160b9,2024-12-12T01:20:40.913000 -CVE-2023-27510,0,1,6447bc81c67c0bb1a3c220b67c1e58b2d0e0f7a420a3644b79fce9919fca1fff,2025-01-28T15:15:10.787000 +CVE-2023-27510,0,0,6447bc81c67c0bb1a3c220b67c1e58b2d0e0f7a420a3644b79fce9919fca1fff,2025-01-28T15:15:10.787000 CVE-2023-27512,0,0,25209505182de0dc1de45b47cf57db0abc13b19730e87c50fc22c314cf5305d6,2024-11-21T07:53:04.003000 CVE-2023-27513,0,0,c9fbd584e51c51b70e2e0cc07b756cefd3914b4ced409ad8d42a8da7c34f791c,2024-11-21T07:53:04.147000 CVE-2023-27514,0,0,fa8070be4b10f5741aae673be622be3e7d98ffcb2a84bdd30ae540dbca14459c,2025-01-16T20:15:31.333000 @@ -221301,7 +221301,7 @@ CVE-2023-27523,0,0,48d65b1b60e72b6b957e4e81bdb57c693b01fe4c633feb2b71dd230365829 CVE-2023-27524,0,0,a7c3b99f330b1fc001dbf1dd41768a9c621861c1561254a2a58d79c83db6710d,2024-11-21T07:53:05.773000 CVE-2023-27525,0,0,83fe0dbadcffe7d39f05a9dfbd4c3a59f2d9caa44fe722f2a22cf318d60bfff2,2024-11-21T07:53:05.913000 CVE-2023-27526,0,0,d7a1d434e76959c028190d433010fe08e597ff596a3d2824503093c4d017a38e,2024-11-21T07:53:06.033000 -CVE-2023-27527,0,1,4018cf151ca143ca301506e976fdddc86a504d7a900cffded0ee7f8ce9e2b807,2025-01-28T15:15:10.947000 +CVE-2023-27527,0,0,4018cf151ca143ca301506e976fdddc86a504d7a900cffded0ee7f8ce9e2b807,2025-01-28T15:15:10.947000 CVE-2023-27529,0,0,688313a7c2d2ac3cbccb9b02f0a2482a012371b810941312b8acbfdb379df9c2,2025-01-16T16:15:28.460000 CVE-2023-2753,0,0,07c6e809a42ad3b510370047ca6a9af0cbf43d74dbab18486dd49105dce46294,2024-11-21T07:59:13.583000 CVE-2023-27530,0,0,b38d60292378b01f02071b1a709b01b4844b4ce61f4f988722b92fc121e4966a,2024-11-21T07:53:06.430000 @@ -224583,7 +224583,7 @@ CVE-2023-31677,0,0,bcf3c7e10e2a63db542637c44b6af1d38b0f7b06834e48fd76d2c43aaf0c4 CVE-2023-31678,0,0,f38078099aa2cae4702ad7ad25370979047193087a4a1644b1f1a43716d2c986,2025-01-23T17:15:12.187000 CVE-2023-31679,0,0,cd77c7d833b81e176fd505de111957b2b2546fa3a06e3b2d516e61678dbdf298,2025-01-23T17:15:12.350000 CVE-2023-3168,0,0,1bd92a1174d3d25efb01791dc24e9721f58f20da4ecaaad50c6cc157e99ec726,2024-11-21T08:16:36.643000 -CVE-2023-31689,0,0,e1a0688f6f537b7c1fa56c9ec182be01ee7169349e51aec1bda32ba01c926cc0,2024-11-21T08:02:09.323000 +CVE-2023-31689,0,1,ba8ce1ec50f7bc59bc1742bfc8237c05e6e92e1170aca920f92d2135a234a4cc,2025-01-28T16:15:35.497000 CVE-2023-3169,0,0,c91442e162ed6b40e2ae0d4cb311993a8a2c9d900971320a57eb9faf25b7a47c,2024-11-21T08:16:36.763000 CVE-2023-31698,0,0,8c41f620a0b0851f781e3f3c6cb4ecc9f44b43d68037b88e96fa4ec01608a58d,2024-11-21T08:02:09.457000 CVE-2023-31699,0,0,53129eaf3a83785c0fc3132ffe189c5da80a64b39e9211df74592a9f2bf7e5c6,2025-01-22T18:15:17.453000 @@ -224614,7 +224614,7 @@ CVE-2023-31729,0,0,fb850d7e9530696277b89467d42b2446bbca42462c9d5510c48ec451f9e2b CVE-2023-3173,0,0,022677952ebd42989b06e1597f2563b8948d7c0602e4beeb60f1c2aa27971ff0,2024-11-21T08:16:37.493000 CVE-2023-31740,0,0,80e7b9a45904c8543256467b80a91316d59d9a1749284741343b92ae51a51232,2025-01-21T19:15:10.353000 CVE-2023-31741,0,0,b89581e0d2046fed9493237ea7dce65f515c3b7ec5a3eb03b769c3cda9c77a61,2025-01-21T19:15:10.547000 -CVE-2023-31742,0,0,4c39e5d01348f84c495d575eca9ea50662e51a5fe50b47b11a8aff9ab90a53ef,2024-11-21T08:02:13.737000 +CVE-2023-31742,0,1,79ae55d4c3ed67071ad7042d27cdc3c91046849382fbcf8c726d2f9ec10108ab,2025-01-28T16:15:35.723000 CVE-2023-31746,0,0,3a8aaaa50147d3d114e7254fa8029831eb539b8eeed897297373531d4ecfdb61,2025-01-06T17:15:13.100000 CVE-2023-31747,0,0,b8b56959c6373967e26817aac4b6c53e61c1c72f4122342a10fe51993e0cd879,2025-01-21T19:15:10.737000 CVE-2023-31748,0,0,0f540337304e36e00c3f95780de455af527831695e1251ae1c5fbb139d2d59fc,2024-11-21T08:02:14.240000 @@ -225339,9 +225339,9 @@ CVE-2023-32564,0,0,0110939bbbb296f8a1f1c00eaf9f1d011e42a76f4d099cf6325379b063f2f CVE-2023-32565,0,0,c758dc41ed02cd23af8831add347bf021d7a6870c2092336f155e1024b96d95c,2024-11-21T08:03:36.767000 CVE-2023-32566,0,0,5b005c26bbcaa68d97a8a9cddb900380525a4257f5c8b9c6d97371f57050c466,2024-11-21T08:03:36.887000 CVE-2023-32567,0,0,e0546d57e233b6a00a0c74841e953885d4a8160cbd2f9b3978b168ecf27ba260,2024-11-21T08:03:37.007000 -CVE-2023-32568,0,0,4ec2577b59d133a1c8bbbb0b243257f68ebc439eba98303245c7e96d39392477,2024-11-21T08:03:37.133000 -CVE-2023-32569,0,0,d6b9bae9b3c4eb94354882bc9fa141696546622ccd5e7ff303745011c179701c,2024-11-21T08:03:37.287000 -CVE-2023-32570,0,0,1a1ee02218f84d3f8f62a376ce6c3dcf84497e7066d7437194a67436cd308025,2024-11-21T08:03:37.430000 +CVE-2023-32568,0,1,ce2d5346fe68a1f1977bffced979f73ebcfd87233aa06bbd0e8906139a442807,2025-01-28T16:15:35.987000 +CVE-2023-32569,0,1,858a8b493283d46c6983789bd883cdbd6b0dc7af409eb35c4de645aba27f5c05,2025-01-28T16:15:36.150000 +CVE-2023-32570,0,1,99af3003c5e35828644727ab1f19d14a509d00b4a9a41710ed0f84a197c03ee2,2025-01-28T16:15:36.333000 CVE-2023-32571,0,0,1014efdf87437be49397d72af75e29ed93957fc73be6bc4c6eaf7c7e362bb8ee,2024-11-21T08:03:37.590000 CVE-2023-32572,0,0,9a61e2958a4814e7739c5bca06ec91ce656d578c176075880f69c1b3ad5a82b6,2024-11-21T08:03:37.737000 CVE-2023-32573,0,0,a1532dcaac2f177cf96f0e0d15e4ce0b45ae7dbe247505f8db1e4bc642cf5590,2025-01-27T21:15:11.243000 @@ -232490,13 +232490,13 @@ CVE-2023-41772,0,0,1ddb563420388cdf4028fe5f7f0902afcd0308e525b54d79870aa60f416e6 CVE-2023-41773,0,0,faee020eb5f5b671b82678a516460fcff37a133fe28b8d985829a1b43b710d3a,2024-11-21T08:21:39.633000 CVE-2023-41774,0,0,24bcac0406809b3faea5bf1336407f0ed9b2369176dc7415fba33b9cfd1354f3,2024-11-21T08:21:39.780000 CVE-2023-41775,0,0,9f89db4df785067cdd4e9d4b7c2e7a6cfedbba830667dfee19afb2a96c9cd0ea,2024-11-21T08:21:39.923000 -CVE-2023-41776,0,1,c2cbfc3029356604701bef39201980d5e5b4ed30cbcc1c96050f192b69cb693f,2025-01-28T15:36:03.663000 -CVE-2023-41779,0,1,50af9c5ec1d8b932ef3bf9f6600b347c56933eec6652e3c842f3b5be91ca5f34,2025-01-28T15:36:03.663000 +CVE-2023-41776,0,0,c2cbfc3029356604701bef39201980d5e5b4ed30cbcc1c96050f192b69cb693f,2025-01-28T15:36:03.663000 +CVE-2023-41779,0,0,50af9c5ec1d8b932ef3bf9f6600b347c56933eec6652e3c842f3b5be91ca5f34,2025-01-28T15:36:03.663000 CVE-2023-4178,0,0,1141fd40ba18bee37e1c42fae821d1b64549ca6cc2a33d2a55286ccb58509271,2024-11-21T08:34:33.433000 -CVE-2023-41780,0,1,b2d1e58ef9b92e2b8a79f05b4c46292e67bad1424381e27274ccfbe1c8ca9295,2025-01-28T15:36:03.663000 +CVE-2023-41780,0,0,b2d1e58ef9b92e2b8a79f05b4c46292e67bad1424381e27274ccfbe1c8ca9295,2025-01-28T15:36:03.663000 CVE-2023-41781,0,0,19fc06020fc9ee508abcb1f4254ac105cd846b8768551d2051e133fcf7cc9f16,2024-11-21T08:21:40.457000 -CVE-2023-41782,0,1,9213ce0f1e1156eb8620254e92d1f6f23ad123040208313cc83088fa5dba8c12,2025-01-28T15:36:03.663000 -CVE-2023-41783,0,1,e64420ede5771bbddb2d10af4ebf3cc64b5f3921d5f636daf560a43299a0e39a,2025-01-28T15:36:03.663000 +CVE-2023-41782,0,0,9213ce0f1e1156eb8620254e92d1f6f23ad123040208313cc83088fa5dba8c12,2025-01-28T15:36:03.663000 +CVE-2023-41783,0,0,e64420ede5771bbddb2d10af4ebf3cc64b5f3921d5f636daf560a43299a0e39a,2025-01-28T15:36:03.663000 CVE-2023-41784,0,0,a8ebf61f8b77dfe47b65c2a49d655477006d0f22c6688955b05553cef45f4c1c,2024-11-21T08:21:40.887000 CVE-2023-41786,0,0,679e1ab2a11d5095960d26f95e0bea184bf9a762765b891d0eb540ee9417bb2c,2024-11-21T08:21:41.023000 CVE-2023-41787,0,0,538197acdb53a2536c302129254e1b8e381ed654db4bfe21b17f47a8b5eaa3d2,2024-11-21T08:21:41.150000 @@ -245073,8 +245073,8 @@ CVE-2024-11949,0,0,8c8ca0b9d255f5a6445ed2a115142b5d13432f7081db7ee9affe350ed098a CVE-2024-1195,0,0,3368bf518c27a729a23598a4bc9bc8456794ebbc8ed421e1b9fb54311a27af0c,2024-11-21T08:50:00.723000 CVE-2024-11950,0,0,df36014500ed7b6f7946ef04cfd4a777d6bd62d2ab461c18fe6d382ea2d08354,2024-12-12T01:40:21.820000 CVE-2024-11952,0,0,8be0c69e3107fa6f3273f59b11ff511450df70a157d0236a300dd71a0356b941,2024-12-04T09:15:04.637000 -CVE-2024-11954,1,1,491378d6502c9e7b20e26b0eb2e0effc34131c0308f3b0fd5de5e67d17d5c192,2025-01-28T15:15:11.130000 -CVE-2024-11956,1,1,499c811bd3c73bd649be29d9bd1c57db501dd4891d184a0d9122af3b8e2f459c,2025-01-28T14:15:29.803000 +CVE-2024-11954,0,0,491378d6502c9e7b20e26b0eb2e0effc34131c0308f3b0fd5de5e67d17d5c192,2025-01-28T15:15:11.130000 +CVE-2024-11956,0,0,499c811bd3c73bd649be29d9bd1c57db501dd4891d184a0d9122af3b8e2f459c,2025-01-28T14:15:29.803000 CVE-2024-11959,0,0,8e4c044a79a34553dacc3bbf68fddd2b6e5f24a72d4b7a0c2b06bf8643853e87,2024-12-04T16:52:55.150000 CVE-2024-1196,0,0,4b0eccfc085f9fcf5d1d563f67df6edef95e40ef1d03548e58cd26db6bec54a2,2024-11-21T08:50:00.883000 CVE-2024-11960,0,0,bd9138e92373cf0f2d64cabaf1c792eb3475a5676b172a9be24a4ae943f1b162,2024-12-04T16:52:34.413000 @@ -245680,7 +245680,7 @@ CVE-2024-12717,0,0,6474accd48577f4efdbde77f72937b508282b403c332108a28e333766275a CVE-2024-12719,0,0,6e113e19479495992fd0f698aec2463ab1e0a34cf6f80cb6f4fc67b14c63b540,2025-01-07T10:15:07.323000 CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000 CVE-2024-12721,0,0,602b63fd821f3e12d745be832faac963714770e5a5cf419d7f91dc50f0276cf3,2024-12-21T07:15:09.793000 -CVE-2024-12723,0,0,cf512e4db24e5978657de7d385acad4042bd6d708f13d756e3aac43342c38eb6,2025-01-28T06:15:31.370000 +CVE-2024-12723,0,1,5f12518e7f9f0df8a91b8296f6f86b0b561b4474759814a3fb8c7b64943255ad,2025-01-28T16:15:37.430000 CVE-2024-12727,0,0,b783145694badccf248249bee0c82f1aff0f923b8a3e56851318776364e6e057,2024-12-19T21:15:07.740000 CVE-2024-12728,0,0,917e9cd9de621c11266a9c64ec7f57ccf5bdf0122fd22a40a0ec7d20acff7a35,2024-12-19T21:15:07.863000 CVE-2024-12729,0,0,48b3a23ce4e01eb74edff0cd115d9897f3f81428607bbc5ad97846c1af686c7b,2024-12-19T22:15:05.087000 @@ -245728,7 +245728,7 @@ CVE-2024-12802,0,0,8f19e7a7cb329c26f5998e730d7f453cd46482968ebb674eef2b4e7f0f5bf CVE-2024-12803,0,0,fa686f442d34c33906cbd5c392b50db73035372cd413cc4367e49ae08edbe6b6,2025-01-17T03:15:06.973000 CVE-2024-12805,0,0,e53ccf7e5ed7d4029905e02b94c08493035711f3a6fbf1927b3a1f3594c5dd3c,2025-01-17T03:15:07.167000 CVE-2024-12806,0,0,d3ad8b949669d01946d03cf78ae2e87493233ba523f3d23e253ed03518cfb676,2025-01-17T03:15:07.337000 -CVE-2024-12807,0,0,fa880fedc4c863866634d2a0780beaa56e686b63fa7ec5a788046683be0dcc3c,2025-01-28T06:15:31.680000 +CVE-2024-12807,0,1,ddbe1339bdc0147fc12b37b5f5fb8455c3f845277526b2584620ced7a2147952,2025-01-28T16:15:37.633000 CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000 CVE-2024-12816,0,0,79eb2dd90c9c17b3c2a7f3ee70302afe651f99aae7099dfbb75f3ebb64366af3,2025-01-25T08:15:08.137000 CVE-2024-12817,0,0,32f9e7e0f8e1095319b7a827501ce7d109efcd2bf6309a60da88244f6164d371,2025-01-25T08:15:08.300000 @@ -248689,9 +248689,9 @@ CVE-2024-22059,0,0,5dd2797f8651084c7003283486cf668dfd7e91a1374f395778195e44226a6 CVE-2024-2206,0,0,5cd23aee739a1ecf37ee5d3e204017ea16f7e42bf349d33e84a18d1c29954640,2024-11-21T09:09:15.203000 CVE-2024-22060,0,0,ed9ba15c4f298a42f28462f758b92465c987f6953d9ba6f5dbcd801f1adca5dc,2024-11-21T08:55:28.887000 CVE-2024-22061,0,0,4e49e7ee2ac0573d3a15781d9f6f6ecd7315900601a66368e5ff6a2c6b1140a1,2024-11-21T08:55:29.030000 -CVE-2024-22062,0,1,da1c4f953be52e42b827ad2ec6c6d58ba39e293c190ae3c2d554c8747cf109b8,2025-01-28T15:29:07.970000 +CVE-2024-22062,0,0,da1c4f953be52e42b827ad2ec6c6d58ba39e293c190ae3c2d554c8747cf109b8,2025-01-28T15:29:07.970000 CVE-2024-22063,0,0,7d585c54d344b35c25b14dd6e4b594e16f46eff3d63d49f66743e986349f5ec9,2024-12-30T10:15:05.867000 -CVE-2024-22064,0,0,2be78486e8e3524e7e8b54bc8f0a5b3a271a4cb62525cfad97a606fa124e9d55,2025-01-27T18:36:59.497000 +CVE-2024-22064,0,1,8d540dd94bb5f229f66fba83ffdffbac152147b35ab3dd7610555afda1d84b7b,2025-01-28T16:12:31.863000 CVE-2024-22065,0,0,8a400892fb4ac3179312529b18e607bbeae86e4a03e4887764863d7ef61cbee4,2024-10-29T14:34:04.427000 CVE-2024-22066,0,0,70d4e3985898c8aa9a39f7f36b8d64c8bac198bd9861f8715ebb57132067fd4b,2024-11-08T14:31:32.933000 CVE-2024-22067,0,0,add51247fb7aba56da0e38fb655dd5fa3255e9b0defa9f5c297e2ca7bc9d5649,2024-11-20T16:24:47.843000 @@ -249793,7 +249793,7 @@ CVE-2024-23586,0,0,c502bc9b7c2b6af5f29de7b2d6d88cf75e4aed9d064587993c85e2b92f277 CVE-2024-23588,0,0,c896bd9b8289657f23ce61f2b7bc0d6a9b21890ffc09a248ae27bab09f369a62,2024-11-21T08:57:57.760000 CVE-2024-2359,0,0,f8a16aff6b690ef0a387e0bd83c3d967a7f54dab13e1526a35b1308feb8246a0,2024-11-21T09:09:35.413000 CVE-2024-23590,0,0,aa2d0bee53a4e6db1324113f2976ef5c3ac355214ede701fea4ecfdbf40994ad,2024-11-21T08:57:57.913000 -CVE-2024-23591,0,1,73e5c8e9559de251c033aa091f318ad51a29efd0bdc50ce9f12daf1770233266,2025-01-28T14:28:25.570000 +CVE-2024-23591,0,0,73e5c8e9559de251c033aa091f318ad51a29efd0bdc50ce9f12daf1770233266,2025-01-28T14:28:25.570000 CVE-2024-23592,0,0,ef014cbf8808263f731f61b0bea284cf199deacfcf795438ec07cedc3d97e15d,2024-11-21T08:57:58.270000 CVE-2024-23593,0,0,1669104ef0f6d536595a3f0242aea2e399af734f766398709f067343dd11f88d,2024-11-21T08:57:58.400000 CVE-2024-23594,0,0,1f0e1d4dfefab44adcf5b5a1aea994e7319979d868c10f29cf8eb184905dd76b,2024-11-21T08:57:58.520000 @@ -250131,7 +250131,7 @@ CVE-2024-2395,0,0,af5ee44ed4e5a55dc7cee72e73dd87c7eca19f4fdfa76a380a7f63de620cfa CVE-2024-23950,0,0,fc22aca121744540088f0a682a9a12e51b13e88920d5f4c103703a8401d15b2a,2024-11-21T08:58:44.840000 CVE-2024-23951,0,0,90949de6749d1342df813fafd173be208f7c748b51ad2522c41738d2f7a7174f,2024-11-21T08:58:44.960000 CVE-2024-23952,0,0,d956573f944b52b54178c073558282ca45131f0d187b6cc2538746038d148592,2024-11-21T08:58:45.077000 -CVE-2024-23953,0,1,5e84b7924123d14a264b393eb4da6361d93a72e1da6196c1079ab89dc3d46162,2025-01-28T15:15:11.330000 +CVE-2024-23953,0,0,5e84b7924123d14a264b393eb4da6361d93a72e1da6196c1079ab89dc3d46162,2025-01-28T15:15:11.330000 CVE-2024-23957,0,0,ccb57b4ba0507fbac13ac2445d2cac9760854f91ae7da4707e72f394ea98e263,2024-10-03T17:37:47.743000 CVE-2024-23958,0,0,6fe18b86fa35472f01534c3eeba14711dd9e2cdb206262a323b3a33e5af27e3a,2024-10-03T17:42:05.553000 CVE-2024-23959,0,0,55515de9820dc00037a0b8188d9aae2673ee68b5d649634b981bc6ce6024af1f,2024-10-03T17:42:03.650000 @@ -258575,7 +258575,7 @@ CVE-2024-35294,0,0,1c6f1605fc3c9904bc421a18ad31d4464fc1e4554d4917d8dd1c25b7a0d02 CVE-2024-35296,0,0,40769f470665a8f5701939f0eb28f8f5b53e116a5eb768803583af8eaa677464,2024-11-21T09:20:05.773000 CVE-2024-35297,0,0,23e69c7fa8758d2839ba0f21232e1c70c9a4debd79526bb77618b215f0e86ca8,2024-11-21T09:20:05.907000 CVE-2024-35298,0,0,fa7788bf317a71a84bf8146795eafa26bcb4ed57f180f49f693caedd58415924,2024-11-21T09:20:06.100000 -CVE-2024-35299,0,0,66ebbab2b0a692e2b1d921e2a31108ce541366992eb29d6d2df1746eef7b2b2c,2024-11-21T09:20:06.297000 +CVE-2024-35299,0,1,0ce5ddda10cf58c6e1ac79722bb6069b8f6eded11917b404a1cd1e7eb3548184,2025-01-28T16:35:03.737000 CVE-2024-3530,0,0,19a26ee56ded29d2e11b10a192b107effee98b98e60c5d0c5a925841596c5055,2024-11-21T09:29:47.480000 CVE-2024-35300,0,0,8476854df88ded7ab4fe4db1007017684a43223b3513105c5d461b5e9e5fe242,2024-12-16T15:48:36.930000 CVE-2024-35301,0,0,3aa290a2314ba6b70fc37ae1db563a8252a1099fb3aea3ee731b4ca2cd8d2137,2024-12-16T15:51:28.007000 @@ -261570,7 +261570,7 @@ CVE-2024-38903,0,0,5ac36a5d0829f2d9338553ce3926f23b23b26a430d990d436d81e63cebcf3 CVE-2024-38909,0,0,b15b2d0b578ec22ef9b768dfad1ac7e18a3e7777eb1f844ceb5682377b647733,2024-11-21T09:26:59.560000 CVE-2024-3891,0,0,4d72bc4ea7906c74fa96e7962b045759b217e44e525621a88b5a5a6135790d8b,2025-01-07T18:11:13.230000 CVE-2024-38910,0,0,d2dff3af8a966f6c22ba1ee4e9572a11e68c5f4930901faf724b461844929ff4,2024-12-06T20:15:26.337000 -CVE-2024-3892,0,0,168f6aff52bfffda49f624381b72994cf29f64be38888e2b464dc312a00a3830,2024-11-21T09:30:38.637000 +CVE-2024-3892,0,1,d29e438e1d0c06b67fbb683ee1ad1805f7ecf63a0185dbf87e1e3c4e7505b0f6,2025-01-28T16:39:55.417000 CVE-2024-38920,0,0,b3f18b36d081bdf4f139117e79ad8be02343cb455f4901876d3fc1cdb41ab339,2024-12-06T19:15:11.923000 CVE-2024-38921,0,0,e5a7581e9bd5abc0fb31d345eb112f5a09c1a2670be9a4d75822f554e0cba56c,2024-12-17T20:29:13.017000 CVE-2024-38922,0,0,1cb7de42e969a5471961ae5661769bd0d87aee5b0c1bc49312ac353ff58554e4,2024-12-17T20:29:01.117000 @@ -264305,7 +264305,7 @@ CVE-2024-42852,0,0,b81891c57cec62244510e3d84ae796ccaf7c41b7c9858039dc7f4522044e0 CVE-2024-4286,0,0,fc10432f74acfd23bc16db5ad2ae8d1fb5ffa13fb0db5216eff98611dc6693fd,2024-11-21T09:42:32.600000 CVE-2024-42861,0,0,c171ccea5ad776c157b3e5743fbc5040713688f83926001b0f23825a30a4e8b5,2024-09-30T17:35:11.653000 CVE-2024-4287,0,0,b8a2cf136b3083f6bb500806e5afada31dbc16efa97357879361c58428559568,2024-11-21T09:42:32.727000 -CVE-2024-4288,0,0,a90edbd9d891b348809fde369462e544cf47349997cd076b1f05ba954e1b5203,2024-11-21T09:42:32.860000 +CVE-2024-4288,0,1,c3337da044993bbbc180fcf8a19f1690cecb1ffe7d7876ad254d73c7461b14d3,2025-01-28T16:28:47.287000 CVE-2024-42885,0,0,ee56590959e67a72b05a6cda20f46f0a9d3647870a63123321ef2d7e471b6b35,2024-09-05T18:35:07.060000 CVE-2024-4289,0,0,aeefeb9696ba85f6773564fa5c4f7cdcbdf5edbf7d32a7520045491e7a4d015f,2024-11-21T09:42:32.977000 CVE-2024-42898,0,0,f0a404c15dfbdd17bf8fc2fff1d0150e98b26ac04c520196b856ef45cfd1089a,2025-01-10T18:15:21.670000 @@ -266179,13 +266179,13 @@ CVE-2024-45330,0,0,e9c0a42cafd75c39cc2fb6322b0e3eb6100b15258e5462b4bef0ad15a3b44 CVE-2024-45331,0,0,c56952b03945794d6d222cd231aa39b12787f4f65a05b3428aec3822b3d506d6,2025-01-16T09:15:06.500000 CVE-2024-45334,0,0,c1a95be34d5696913864dee9719b7ad805fe7ff8dee6bbd29645a138cdd2805b,2024-10-25T14:41:43.473000 CVE-2024-45335,0,0,df1b52d83b5212b89c08532eb4b3f1fce61dd8609884645d9cc9fbfcae22125a,2024-10-25T14:37:39.387000 -CVE-2024-45336,0,0,3e7ae3add87fdedc39007439173db0ef558280c47154def679c01839605d6db3,2025-01-28T02:15:28.807000 +CVE-2024-45336,0,1,58e68f7c35a3e0d7bbc9bde00e471a0d85b4ad129fcd4b117e8ad183ef45a26b,2025-01-28T16:15:38.220000 CVE-2024-45337,0,0,0204a585b71dc2eafeae0a7aa43ff297085c36ff7e1720071b48d72e387539af,2024-12-12T21:15:08.500000 CVE-2024-45338,0,0,4b2d696f8670e697ae1161a5584acef0120067536ac2182d79f6e6c35006631f,2024-12-31T20:16:06.603000 -CVE-2024-45339,0,0,1278bba7c73d64a4463ca6a2d25240e7cccf0db0f2382bb80d4dc77aec2a5b1b,2025-01-28T02:15:28.927000 +CVE-2024-45339,0,1,2657449aeecf358a747d3833a8bad48d5c5984d5d31941c928f3a6165aa77854,2025-01-28T16:15:38.367000 CVE-2024-4534,0,0,05ec1ad9bbf04373d4c888e50c4da6ee25a8849a5c55f74fc5c0d8923189992d,2024-11-21T09:43:03.287000 -CVE-2024-45340,0,0,2c4623ca46a98e086eee38c98fc33ffd94922e7be2544c8d0cbd2745609b8d3d,2025-01-28T02:15:29.050000 -CVE-2024-45341,0,0,0809e593d93d0e45831640bffac5034f296f07d3c2d59a6a5ba0ce3172378a9c,2025-01-28T02:15:29.147000 +CVE-2024-45340,0,1,b5aab4b2896907244da5a423def985944e88d20aed34eecfddef8969458a8ed7,2025-01-28T16:15:38.517000 +CVE-2024-45341,0,1,9c3af9974b32c4ca5b0cd4e0c752d66cd7aeaea007c41b684aa86af58604ba05,2025-01-28T16:15:38.650000 CVE-2024-45342,0,0,a4a31e9769756ae24649b74b18bd2d95ae5ebb0482440ad62570ce13c5ec4304,2025-01-08T20:15:27.583000 CVE-2024-45343,0,0,318ff9ada4e764bd6c635c00720e7b9030062bb890baf82a7e3f16a4a83b72fb,2025-01-08T20:15:27.690000 CVE-2024-45344,0,0,af604bd20c17ff15fecd0779ea006a02560ba533390f654e0b99f1b752eeb5b0,2025-01-08T20:15:27.753000 @@ -269988,7 +269988,7 @@ CVE-2024-50659,0,0,070d9cee09db7fd442130a440bc492ee33550ec72e00250b2d953adb8bd85 CVE-2024-5066,0,0,0791653545be3944782f3bdc7c1ab3604d2c7f0fab82f79e00981952033549de,2024-11-21T09:46:53.670000 CVE-2024-50660,0,0,f71f8e7c2fcb36b53cf871d625509d1de985a324b433af36346565606f116252,2025-01-08T16:15:34.817000 CVE-2024-50664,0,0,1fdbd6c57bb31afbb483101d6ed8dc43655bb3434beb0c6c63777e5dea4eb589,2025-01-23T22:15:13.667000 -CVE-2024-50665,0,0,9bff4b7cd271941bca588d7fef13aaa9a06c4a4cba1b66a32d4c74182b27ff2e,2025-01-23T22:15:13.790000 +CVE-2024-50665,0,1,e23cfc84806902554f96be5a4f6053908a31047113bc4150b656a3b0c69a6b9b,2025-01-28T16:15:38.797000 CVE-2024-50667,0,0,2acba17bb6b4eea051169d8d69b68e53449d255d2507f74a89d880a87e24dc78,2024-11-12T17:35:12.270000 CVE-2024-5067,0,0,1b5c70fd6aa8a713385c4f1e29f8c71eeaa98648b5736e6e39376f75e3abb922,2024-11-21T09:46:53.810000 CVE-2024-50671,0,0,99782c17088a8d91d172d01f5a082085329526fd6f7189288ae0f91a8aaa1a9a,2024-12-04T17:15:14.860000 @@ -272473,10 +272473,10 @@ CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5 CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000 CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000 CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000 -CVE-2024-54475,0,0,87d26c3b3268a9dac1bad7ca875893ab9f7febfa8af0d89b64297a67a12caf98,2025-01-27T22:15:12.283000 +CVE-2024-54475,0,1,775ec2ccbbbc7d76f505a322b572f9baa34329391d668720ed36223c584406df,2025-01-28T16:15:39.167000 CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000 CVE-2024-54477,0,0,214101ca192690cd0de3dcf911bea71815c143b3087e79543d2b05745eb4fbe2,2024-12-13T19:15:09.067000 -CVE-2024-54478,0,1,26ecc10f75c75719e02f1d36ae16e317df04c0225bcfe9e5f27f374de9f166e2,2025-01-28T15:15:11.520000 +CVE-2024-54478,0,0,26ecc10f75c75719e02f1d36ae16e317df04c0225bcfe9e5f27f374de9f166e2,2025-01-28T15:15:11.520000 CVE-2024-54479,0,0,bcd74f535cd6ff4dd05141776c66e2cae8469ec75af86bbc030e3e4a250fca63,2024-12-20T19:15:07.707000 CVE-2024-5448,0,0,fb51af8aa43452e6336e86308a3b6b8f94eaece6d7d51fb1e15ce1d675c555ee,2024-11-21T09:47:42.227000 CVE-2024-54484,0,0,6d8d44a97a2da2b3786c6a98b981454364bb44396885bb6b7514efbff5689d25,2024-12-13T19:15:09.227000 @@ -272493,7 +272493,7 @@ CVE-2024-54494,0,0,ad0ca4adae0115148142da0f4fc562e3313919e91e70297d0cc4e22d05623 CVE-2024-54495,0,0,9de7394a007243c21eef47355e938cc3b90c9ebb24baa238e9871a1b4406c45c,2024-12-18T18:40:21.133000 CVE-2024-54497,0,0,6c931e88af4ef1b6e785f08151bbc21af8defbb5ea02edf8fcb1c5cf3270c15d,2025-01-27T22:15:12.583000 CVE-2024-54498,0,0,fc98c473c1335953bb96a6e6cd9754f341ebec98c3d5942a318f55432f437ef8,2024-12-16T19:15:08.943000 -CVE-2024-54499,0,0,1587a813e75a49803d367936d691c19e3eeb984364f69f6aabb295d83310b09d,2025-01-27T22:15:12.680000 +CVE-2024-54499,0,1,c133d3f15988c5ac34c810762fe5ec20ea83eda4ebf16dbab8404963c417b3f8,2025-01-28T16:15:39.303000 CVE-2024-5450,0,0,24d03210219d9f2f3eeb200aadfbbd2297fa2c6b8d7ee9efe09cbafc9256a693,2024-11-21T09:47:42.517000 CVE-2024-54500,0,0,1e87cc2025246725b4af3b87a7de7fc4a4a59dd0b835eebc8b8a5f44f93c0dd3,2024-12-20T19:15:08.270000 CVE-2024-54501,0,0,2763466f88af5e8a583411004d269472e9944da5266e2034307684e680693876,2024-12-19T15:37:07.973000 @@ -272502,7 +272502,7 @@ CVE-2024-54503,0,0,e82e1cc53ce4edc412c3815492fda2911d5e300ada63831244d44df64c1df CVE-2024-54504,0,0,bb03ec612268af63063ae51e589216e30653413b6baaf8d7e8860c5e5b629ab1,2024-12-16T18:15:11.317000 CVE-2024-54505,0,0,a90c7f848a0c4214637edeae9c3a0316f06e116644b32639b5ba817d96b2ce78,2024-12-13T18:43:13.217000 CVE-2024-54506,0,0,a8ea16e075a3a1901ca752b63878f0142a1c9eb2961c986c53a0691601fc1217,2024-12-20T19:15:08.467000 -CVE-2024-54507,0,1,45091b6ed1a10c4f376d77f50c9de6cff4c36ecf5e025eecbb841eeb28a3dfdd,2025-01-28T15:15:11.723000 +CVE-2024-54507,0,0,45091b6ed1a10c4f376d77f50c9de6cff4c36ecf5e025eecbb841eeb28a3dfdd,2025-01-28T15:15:11.723000 CVE-2024-54508,0,0,d56b4a8254b12af7295bad2aeed77ff208b735dc12ecbae90c5116eeac15d339,2024-12-16T19:15:09.160000 CVE-2024-54509,0,0,53736b1dd1fd5989dac72c9603bb5aabbd31f93601860e643cc7c49c6a2e80bd,2025-01-27T22:15:12.867000 CVE-2024-5451,0,0,20c45f860616b7f2fb649e3fe37f7d2b12e76160bf7131f2da5e11d5d4dbf253,2024-11-21T09:47:42.677000 @@ -272513,34 +272513,34 @@ CVE-2024-54514,0,0,6d1b7501f54b581c9fad4ccbc7c7ec7f90e2e83a8a1d8bac1a1733a97e309 CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0eac,2024-12-13T18:15:31.650000 CVE-2024-54516,0,0,a6e4b7cc9da6564b2d221f96642b3d272c58385dca5951ae300025c74bdcff7a,2025-01-27T22:15:13.063000 CVE-2024-54517,0,0,93b0960a5cca6ca652546e4259a2a5ab8d449f09280201dc7b78cc63ff2d6611,2025-01-27T22:15:13.160000 -CVE-2024-54518,0,1,7a38e22038aeb7be612ecab9809efec16de7547dea2675297852eea4d4788df5,2025-01-28T15:15:11.900000 -CVE-2024-54519,0,1,a2d7e4325c7cc6e4b1f41b5f5dbd8b804a1888ca49f38f1232adb57ece7ff9bb,2025-01-28T15:15:12.050000 +CVE-2024-54518,0,0,7a38e22038aeb7be612ecab9809efec16de7547dea2675297852eea4d4788df5,2025-01-28T15:15:11.900000 +CVE-2024-54519,0,0,a2d7e4325c7cc6e4b1f41b5f5dbd8b804a1888ca49f38f1232adb57ece7ff9bb,2025-01-28T15:15:12.050000 CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000 CVE-2024-54520,0,0,63feb3f520db2ab5f2572ad556f5d2c96deac43a09e959db1ba221929f955f49,2025-01-27T22:15:13.473000 CVE-2024-54522,0,0,254203780d93309fd4a94a766ceeefc3a15f47ac705858173a230c9721b02371,2025-01-27T22:15:13.560000 -CVE-2024-54523,0,1,0155da17dd45eb46f59a34af33d3d9dca19539b7cc1d7ed919dc688ff4a61f33,2025-01-28T15:15:12.190000 +CVE-2024-54523,0,0,0155da17dd45eb46f59a34af33d3d9dca19539b7cc1d7ed919dc688ff4a61f33,2025-01-28T15:15:12.190000 CVE-2024-54524,0,0,f1841b79a984dc339395e420615a7246f02aaa993793861427c269ef59ff9324,2024-12-18T13:59:47.450000 CVE-2024-54526,0,0,aefe7086f2d764fc872d00eaa2f2173838af254c5b93971d556108953f443875,2024-12-16T22:15:07.320000 CVE-2024-54527,0,0,0bdb505436860de3001c9f8bc7d8b06aed949a47878b0053a48f86090c332969,2024-12-16T19:15:09.313000 CVE-2024-54528,0,0,907ebed6815f9bd0b298566a5f1bfb05901aa5e62ed532357217cb276556f398,2024-12-16T19:15:09.480000 CVE-2024-54529,0,0,be90cc5d5d809d1a3746b39c45f75d946f866e9a1f3852b3648566e8b40f1a6d,2024-12-20T14:47:44.153000 CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000 -CVE-2024-54530,0,0,da8332735200c0a6f862416fece7f7fc7e57b57e342ec63f5a3515be83c84585,2025-01-27T22:15:13.753000 +CVE-2024-54530,0,1,b2115a5253c8f295f8da3ec0a11eca80d9250abe9135d8d48e4eae4b7c3c1fb7,2025-01-28T16:15:39.450000 CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000 CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000 CVE-2024-54535,0,0,93cfc2e3f7ef6acbc5dbb1cc184a51f7781d104271fc6b2624d565551722e790,2025-01-23T22:15:14.160000 CVE-2024-54536,0,0,1573e356a10b2569b40afaa0fca34596b260ce05149e5dfaa014069d5147d348,2025-01-27T22:15:13.853000 CVE-2024-54537,0,0,8f560140598572c49e6bc041c8bffbe9a4fc5b7e227b44f85619d31b6126d2c5,2025-01-27T22:15:13.940000 CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000 -CVE-2024-54539,0,1,d443ac2c79222e082d02f106d93c7bfeec685245a030b828bd36881aee762e21,2025-01-28T15:15:12.340000 +CVE-2024-54539,0,0,d443ac2c79222e082d02f106d93c7bfeec685245a030b828bd36881aee762e21,2025-01-28T15:15:12.340000 CVE-2024-54540,0,0,9f4df0a7b4384df86d380577ed349e05a61099c20d2e88a431caab43d2fcb14b,2025-01-16T15:15:13.697000 CVE-2024-54541,0,0,cea7a1749fc1912ec1f5d208cc41a0f81501fd375b3ac0841bb9f851a0901c92,2025-01-27T22:15:14.117000 -CVE-2024-54542,0,1,5ad130ce9e277d22fc91c3233fe937da0da4adfd421c85dcbe10a8d46f3e6746,2025-01-28T15:15:12.477000 +CVE-2024-54542,0,0,5ad130ce9e277d22fc91c3233fe937da0da4adfd421c85dcbe10a8d46f3e6746,2025-01-28T15:15:12.477000 CVE-2024-54543,0,0,9ccb05eacf536094f44f6f2cff506029e79de4d0eb5995625e0c2e89e1f5b3b9,2025-01-27T22:15:14.307000 -CVE-2024-54547,0,0,961d3254116d82f56a842bdcaeaaf3316f1fed06dfdfc1f9db79add594d84b93,2025-01-27T22:15:14.400000 +CVE-2024-54547,0,1,2ce7ebd8dc7ed2fc58eb2f77522780dacbba66c07b08536995b0bed9a41a2ed7,2025-01-28T16:15:39.603000 CVE-2024-54549,0,0,f9da7f3379bec36f69e8c241addd0f7e6ea5db00b71e9a2e90d5b4adeefc241b,2025-01-27T22:15:14.490000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 -CVE-2024-54550,0,0,e813c3b2e30fbc9af78a93fcf3f62083567d452d1e62ce7ff0c3c5068da641a6,2025-01-27T22:15:14.580000 +CVE-2024-54550,0,1,cf2419cf86ce3280d8018811b8a0a12cf59a849c3ad266419d3ac3c972049bc4,2025-01-28T16:15:39.773000 CVE-2024-54557,0,0,0497db03b589d583d836efddd0e32b6368ca6e56450d80e21c65082431a6c35b,2025-01-27T22:15:14.670000 CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000 CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000 @@ -272703,8 +272703,8 @@ CVE-2024-55186,0,0,80cbe31f0c6c827f9fe1ea965ee9f035483ef81bd6d62228d42baa84cd806 CVE-2024-5519,0,0,8f24512a902c7b13458f945742cb7fe1d59be3b3655c7a61619611df90263eb7,2024-11-21T09:47:51.393000 CVE-2024-55192,0,0,578bf5cd95b055e6f8fe1927d392f06ecc291e7aec5d564d1ff85089ed561a72,2025-01-23T22:15:14.333000 CVE-2024-55193,0,0,90629f8274796f894b01b17f5a7ef0934dbb53d009417deff7ad371f489b7b38,2025-01-24T22:15:33.730000 -CVE-2024-55194,0,0,804005f6f22f8eb7b3daff5cc3dacd38f1b9547678c0f9c5fac19784b314cc6e,2025-01-23T22:15:14.560000 -CVE-2024-55195,0,1,3d6a6b502efecaed9d3ad6b8e5977b4cdb9be52138440fb5894e677fa50c7906,2025-01-28T15:15:12.647000 +CVE-2024-55194,0,1,c38cb72c8f81c8ae4f496dafee53f7ca664e363ce35004199c8c73fda469a1f8,2025-01-28T16:15:39.927000 +CVE-2024-55195,0,0,3d6a6b502efecaed9d3ad6b8e5977b4cdb9be52138440fb5894e677fa50c7906,2025-01-28T15:15:12.647000 CVE-2024-55196,0,0,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000 CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1ac4,2024-11-21T09:47:51.540000 CVE-2024-5521,0,0,2b6f458ccb1380159b254eccc510c8e2cee9041e86f89c2477b6805e666cde62,2024-11-21T09:47:51.653000 @@ -274536,7 +274536,7 @@ CVE-2024-6347,0,0,ead9b349654f8c1b56b42b60b3e21504af84ff862f187d8c4f01052391405f CVE-2024-6348,0,0,f8ec53a55d7061e6e616a9d49e72c1cd9f0282aa80090fa0b8e8fbc34eed5872,2024-08-20T16:17:03.810000 CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000 CVE-2024-6350,0,0,1fc124e07d9714607d8d4610b064f72d1361319398d6b6baa75420c813d318c6,2025-01-08T18:15:19.880000 -CVE-2024-6351,1,1,4552732c0a95d33ac703c064d41085611d7d4029415fd3a3520d40b500d64e37,2025-01-28T14:15:30.007000 +CVE-2024-6351,0,0,4552732c0a95d33ac703c064d41085611d7d4029415fd3a3520d40b500d64e37,2025-01-28T14:15:30.007000 CVE-2024-6352,0,0,a7bafbc1d8328d5f15d5a5137955133b68580e90db03290cb1e5de9d8211b944,2025-01-13T18:15:19.887000 CVE-2024-6353,0,0,d4c4115348071ea0df993e53207fed00124ba29370e36d0bee2aef495fa28299,2024-11-21T09:49:28.547000 CVE-2024-6354,0,0,b2dccb6ff0cf7d4d778c16d437a8f334569c687ad872e701936b9155052ef539,2024-11-21T09:49:28.670000 @@ -275878,7 +275878,7 @@ CVE-2024-7876,0,0,3fa210c454e1479da57bd044cc92245618d1df797eb59430f1d236834861ac CVE-2024-7877,0,0,6229d0686b2135c115931a8adb7bb599ba3c9fa39dd41de2235cac4eac25c2bc,2024-11-06T15:42:19.343000 CVE-2024-7878,0,0,f3aacb78819bf5257796dd52707f03191f35499ea76d867711e5a5bb4db2045a,2024-10-02T17:41:44.133000 CVE-2024-7879,0,0,e70a28f428035ac900263e3578341f19769c09bd9b5a6d26a2fa46e14daf4866,2024-11-06T18:17:17.287000 -CVE-2024-7881,1,1,e855308bed8d8b58731de8d725356e9a8d59124b2b66933a9bfb459cc6da30a8,2025-01-28T15:15:12.847000 +CVE-2024-7881,0,0,e855308bed8d8b58731de8d725356e9a8d59124b2b66933a9bfb459cc6da30a8,2025-01-28T15:15:12.847000 CVE-2024-7882,0,0,b5c42de5e52c278ea04660fcca138342ebdc5cf6a193722d2d8e37faac1f4a56,2024-11-26T13:15:16.430000 CVE-2024-7883,0,0,0fe05f5c235184a9378943a8ba395bb993464cf40f0c149f508c0664d21adb87,2024-11-01T12:57:03.417000 CVE-2024-7884,0,0,b7fc6693cf34d63278a8b8aeec24a1860c381de4a1b67124c745f170d4444fd2,2024-09-12T20:47:13.387000 @@ -277777,6 +277777,7 @@ CVE-2025-0412,0,0,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb6 CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6db,2025-01-24T20:56:49.767000 CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000 CVE-2025-0430,0,0,a8200addb62401843f5be6a163be32dcec6bbc5c81068c809f1c7b05c4147e88,2025-01-17T18:15:30.920000 +CVE-2025-0432,1,1,9f823e7859a9303a996b3c64743c4232542833d3a53d421588a9d745c50d603e,2025-01-28T16:15:40.183000 CVE-2025-0434,0,0,9423e4a9647036afb879cbc64af4784af28d91fab549e68c542c16a9ee7ea8f9,2025-01-15T15:15:14.273000 CVE-2025-0435,0,0,6d6e40a41cd469c8312087bc239581bfd90670921823d0c0e139702d7eee198e,2025-01-15T15:15:14.430000 CVE-2025-0436,0,0,1941a6cad10f95e483c28366f53c7ac5f049d3cbdae2452e2d07517bee4202b8,2025-01-15T15:15:14.620000 @@ -277880,6 +277881,7 @@ CVE-2025-0638,0,0,a6e4b77b7413b2b4aa2934053a70dffa8b1ba9dca4ba939faec1f3b554888d CVE-2025-0648,0,0,7c07f8a9922bc43bc4487ab208bcf7a7d7e60788bb09a129a0ee4eabefb874ff,2025-01-23T11:15:11.030000 CVE-2025-0650,0,0,663c6fb0447de5acea936c032379a880e4e49090359ea8a19f79bd3aea4faf70,2025-01-23T18:15:33.110000 CVE-2025-0651,0,0,98e32274420f8a5656f4a2c8f7df94f72b4c741ddf88cf485a3c74564694db6e,2025-01-22T18:15:20.363000 +CVE-2025-0659,1,1,a3f0ecf6d7f28b7588d33ff468ced196ec3e2b7300202b748557cb9cf9f876c2,2025-01-28T16:15:40.360000 CVE-2025-0682,0,0,92fd5473746c4976c6352d82859f2d6dd42876faa3743bd2fa1f5cfd951d9a04,2025-01-25T06:15:28.740000 CVE-2025-0693,0,0,14192c50df5b152461c9d8412a1ed956f9746262f631bd7707b7658d21e54a87,2025-01-23T22:15:15.397000 CVE-2025-0695,0,0,70836bbbf6325136c9e0a957ced44b18d2c2228a6b15d655a939dfb6142b3b68,2025-01-27T11:15:11.087000 @@ -278577,7 +278579,7 @@ CVE-2025-22825,0,0,c21ca5713a1aa3bda508edf6d7ba0513358e0245a32198c391997dcabc4fd CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000 CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000 CVE-2025-22828,0,0,327d4fbb4775debb7974f74b72faad2a6d9350ed385605b18892cfc7691fc3c9,2025-01-13T19:15:11.373000 -CVE-2025-22865,0,0,a230429544aa2c6786a3863896558bf7a7afe958cdc9d412012c493e8058a98b,2025-01-28T02:15:29.243000 +CVE-2025-22865,0,1,cf415926e77c21e99a39a9cfe2c641fe13fa0618d5fb446a10a390fe83b03728,2025-01-28T16:15:40.540000 CVE-2025-22904,0,0,3807d1b49b562c393e5518dc0bf4d49fb4416192083246d9de79c75349f8fe79,2025-01-17T18:15:31.870000 CVE-2025-22905,0,0,382cf7f3f8f5eadd5df6d2c876d6a159bbdf9a76601b3d1844a11a83da840be1,2025-01-16T15:15:15.180000 CVE-2025-22906,0,0,84179e13ef31a8a27c56f765914741b8d10c6e2d6fee9b4fe45e261f98203a95,2025-01-16T15:15:15.357000 @@ -278622,6 +278624,7 @@ CVE-2025-23040,0,0,d4de7a8421c067a3dee1e4828d031dbc8cced140cb9649eae08cdfa2830d8 CVE-2025-23041,0,0,ffbaafde38ecaf1d57db26f1ec7a4a20e702b6709b42f775e18048cdcef4b867,2025-01-14T19:15:44.713000 CVE-2025-23042,0,0,92005faa00456aa5afa950bd4ab8b8a8c4ca330b482d221fa1133fac47b2b1ec,2025-01-14T19:15:44.863000 CVE-2025-23044,0,0,5e238ef98168b46c67064d92777a89529d22a98b8fc7a39f7eca89a7360adfa3,2025-01-20T16:15:28.170000 +CVE-2025-23045,1,1,f178d85d6e2e1bc41349bb3607f9a44cd436178af8a68c7f7ca82142f5b04422,2025-01-28T16:15:40.690000 CVE-2025-23047,0,0,6fdba3566238181d8ca3c91ca160e254b213eed36441cd5f9334903c854d1fd2,2025-01-22T18:15:21.893000 CVE-2025-23051,0,0,2aefe97c0e4795e43708ca4aacb91936a81f90520498dd80e4c2079564f0d911,2025-01-23T22:15:16 CVE-2025-23052,0,0,9a4a619a1e7b14d6f53e5a9e3dd4b37f5c5ae0529b77755b68f828f3fee5c530,2025-01-23T22:15:16.133000 @@ -278635,7 +278638,7 @@ CVE-2025-23080,0,0,165d07f7f3ac467de5017c0ed6cba0e28a556747a1eb136b531ca8b1a8ca9 CVE-2025-23081,0,0,8e8adb61025ad816e7ca7d3f543c46c43aae9a6ff6f38d8ecfef81ad769cb146,2025-01-16T16:15:36.090000 CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9a7c,2025-01-14T16:15:36.200000 CVE-2025-23083,0,0,8381bb96d9de4f3a833b9505098a4089bf36e1c1fc3d25063d3a10cff18f7c26,2025-01-22T02:15:33.930000 -CVE-2025-23084,0,0,3eb9b1b6f9bb179ab9a29b725c978bec728033a30bf279f15395efb6094f00e4,2025-01-28T05:15:11.267000 +CVE-2025-23084,0,1,5f743e4152aa1396e90a03cddd28c1d417d67f631ccbc3bbb7bfb90db72a87f6,2025-01-28T16:15:40.827000 CVE-2025-23086,0,0,8c64985aeb33aba8982533ad038d52f283116181730bf252db15e74dc52799fa,2025-01-21T15:15:14.833000 CVE-2025-23087,0,0,ff3ef66bbdfadd92f4bceb83f017cee238f01afd217540d38de3c3bc4241e457,2025-01-23T22:15:16.260000 CVE-2025-23088,0,0,351c4fc9ce77a4e8c7f582485a4c81d867817a4e67e2a7d92df2d5afd4de1eba,2025-01-23T22:15:16.370000 @@ -278666,6 +278669,9 @@ CVE-2025-23206,0,0,7dc609075e2d325da43818b49c297d2a05018960dae87cf88a1c771faf87f CVE-2025-23207,0,0,a61af6f2707ecd45627a7e7ca479f8fbbb333f7f551bc284878a54328b3225b8,2025-01-17T22:15:29.523000 CVE-2025-23208,0,0,bbf05788b0a0727b64438f71dac7780433656c51584efb22baeb9514bc090286,2025-01-17T23:15:13.107000 CVE-2025-23209,0,0,a2ae850acf3d242275b1a23f48b16552263d960a288c8911fdea38e62d87c1f8,2025-01-18T01:15:07.633000 +CVE-2025-23211,1,1,006f5a7ce38277883e5ec8e22df55c9d550b638bdc53265d7e1846c3d7038b43,2025-01-28T16:15:40.937000 +CVE-2025-23212,1,1,bd594dbd158738f9322e80e1196e25d70ccf44f6ed0dfe2452c4e50dfc5a5d02,2025-01-28T16:15:41.080000 +CVE-2025-23213,1,1,7d98e0a72de95b4de425a92931a16b0e202255e768c13a8e6a1a984e46d039ec,2025-01-28T16:15:41.217000 CVE-2025-23214,0,0,c6114b08fe21248133ade50d2d6a2ac869f323455d1c9d1cedbe7eb7fbc50600,2025-01-20T18:15:14.127000 CVE-2025-23218,0,0,b3958878a7e50b75603e021f29b22e3f870c93039e9cd62b904ad60b93ab16c6,2025-01-21T15:15:15.053000 CVE-2025-23219,0,0,eeb1dd5028561d867342a9c6fb76f8efd39aecc175cf3f46b428158d47aff93a,2025-01-21T15:15:15.247000 @@ -278676,6 +278682,7 @@ CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000 CVE-2025-23366,0,0,3312897ce94f2285a7d2a9ec8c23b065acb503e3b2f9a747e3e7ca809adbfbea,2025-01-14T18:16:06.290000 CVE-2025-23369,0,0,66187faf123cd1b620a69cca574fbe971b43952983c5e4f566d4fb3bc1049429,2025-01-21T19:15:12.147000 +CVE-2025-23385,1,1,1cca13617e43c9bbbebf0fb602e4964d98053328c9c544d2017c39482fdeda55,2025-01-28T16:15:41.377000 CVE-2025-23422,0,0,0bfcbffa99a5b85a71c8ee37755dbd0aca82e1025173efce8505c4ff37c6deb2,2025-01-24T11:15:09.987000 CVE-2025-23423,0,0,9f2a3a8c7b19b98ddcb037c2f429da3cdced4a5dd5f2091389a187de7a6bb398,2025-01-16T20:15:33.573000 CVE-2025-23424,0,0,1257350394b4c232bb2fdb6b8eb342a15971b1159fa19176ca3462575142791d,2025-01-16T20:15:33.723000 @@ -279047,68 +279054,68 @@ CVE-2025-24027,0,0,f65ac7308f5c3c6cd8129d80f7855beb382ff6483816ea5d90d7daafc13bd CVE-2025-24030,0,0,5733e61c16a6bce864062ac2236910f12c910592f3dec3b8474553af8903d5b1,2025-01-23T04:15:07.100000 CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000 CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000 -CVE-2025-24085,0,0,c14028dc84daee9d90020a98a98eab2b31ec934ec9b6933876856177a5f6f4b0,2025-01-27T22:15:14.990000 +CVE-2025-24085,0,1,cd6eaca5b429f80fb0a35bc2d721227de78643291355f6b6fe912a9dcce479cf,2025-01-28T16:15:41.540000 CVE-2025-24086,0,0,7c5dca39e6ccd2231eef6bf1dd5f599552abe1ede3ec1541e3a2ac0474eb97aa,2025-01-27T22:15:15.080000 CVE-2025-24087,0,0,835732cf3eefe74b8ac13f2a4025988b418c0a20b7f315efff16a3050e6ed224,2025-01-27T22:15:15.180000 -CVE-2025-24092,0,0,d9a8d44da95886fec6e8ccce9614e643a214860b6ea08f6de6640d3577ec027b,2025-01-27T22:15:15.267000 -CVE-2025-24093,0,0,95657131e09c206793fd530c0fc80d357c2b135e7c8257f69d778887a02ee6c8,2025-01-27T22:15:15.350000 +CVE-2025-24092,0,1,9182d2bd14456360ddd97d7de31dcf6654228ea7b89126369b3c5c054d65cbb0,2025-01-28T16:15:41.697000 +CVE-2025-24093,0,1,3f6f51243a5ac658564583998d5988ce49d27677fb4c413db03a4c9b2dd0ea15,2025-01-28T16:15:41.847000 CVE-2025-24094,0,0,59a24348762f08a7a6a9a7ba14204943732471e195893ec6923019d312e46b2e,2025-01-27T22:15:15.450000 CVE-2025-24096,0,0,ff0eb39ec972c347a3c0a0787305a6334b5bff1171b3b7d4772bf4aea79562d8,2025-01-27T22:15:15.533000 CVE-2025-24100,0,0,75e73635599b4509a17f731a139b9a6c3a7cc7a39585e7d21d191c67ba12039b,2025-01-27T22:15:15.627000 CVE-2025-24101,0,0,01cfec662abdf104dc23ad0fede873bdb9ee4880d82c270176d0683e43902459,2025-01-27T22:15:15.717000 -CVE-2025-24102,0,1,27709925e34384324bf4c5617df8dd3339c2c366be8f6454a622120cea48a67f,2025-01-28T15:15:13.303000 -CVE-2025-24103,0,0,4aa7645d51e5d9def580dce1be4240d94c119b9da01c277b75cd01d6cb9a37a7,2025-01-27T22:15:15.900000 +CVE-2025-24102,0,0,27709925e34384324bf4c5617df8dd3339c2c366be8f6454a622120cea48a67f,2025-01-28T15:15:13.303000 +CVE-2025-24103,0,1,b855906b195c4dc587795824d73768dd8eb50f59e5ebd39c191f21e7d50f830d,2025-01-28T16:15:41.990000 CVE-2025-24104,0,0,351dd0767ea1e0a62d16f31e3ae17dcdaea5e43456ae60a0663e0c3eddd31608,2025-01-27T22:15:15.983000 -CVE-2025-24106,0,1,7c93b388567b51d6f143e70f744f5ae7544ea89bf54f3268ef6794b4a77e5c65,2025-01-28T15:15:13.450000 +CVE-2025-24106,0,0,7c93b388567b51d6f143e70f744f5ae7544ea89bf54f3268ef6794b4a77e5c65,2025-01-28T15:15:13.450000 CVE-2025-24107,0,0,7ca3d7f81320182c649b00d895907fc6b5250f4fb4b53d6d1fb700021d5bcabb,2025-01-27T22:15:16.170000 CVE-2025-24108,0,0,4d95f39fa858f2c81a21a53e2387c549b356e3f1b0570eb20318f4d1399f17f9,2025-01-27T22:15:16.263000 CVE-2025-24109,0,0,d6d09305ae07e87ffe22f22ff6fa1a7e3f2ad80ac74c1bb092007933af9ec661,2025-01-27T22:15:16.347000 CVE-2025-24112,0,0,1d2969d6d80d7a4b29f11c091a804966e89ceb608d695ab0187a156e13995338,2025-01-27T22:15:16.433000 CVE-2025-24113,0,0,e3165632c8b4ddab1258ba856efb494e13b0ebef36ddf947b35aaf4ec3db0771,2025-01-27T22:15:16.530000 CVE-2025-24114,0,0,41dfbc3389d2f3872b919168ecf2d8e3d41ab841e34b753245c022d9f84c5e21,2025-01-27T22:15:16.620000 -CVE-2025-24115,0,0,c95e3395453557e5b431aefc85034f76f0c8b1b69d0a1fcb1a61c73ba0c35f9c,2025-01-27T22:15:16.713000 +CVE-2025-24115,0,1,4ee06b5245630f5df72b1f842156b340b5aa79d371e3d93606b60490bb5625de,2025-01-28T16:15:42.150000 CVE-2025-24116,0,0,e6ceba0096997558b2d5ca595ab37f9878cfa1b3b2e9029c7e5b0c8682e2229a,2025-01-27T22:15:16.803000 CVE-2025-24117,0,0,970922565486aa8d6f1ca36f8bfb0c00c07d7bafdfc77a93ffb2741563c567fd,2025-01-27T22:15:16.900000 -CVE-2025-24118,0,0,496adb4c35900b6c60ef061d9f11ab773cf8a6d42636a3263344a147cc68ebdb,2025-01-27T22:15:17.033000 +CVE-2025-24118,0,1,c4c7cf0ccae327f1e2910a4df7950a5f148425468f8ed5cf85ce2f00e56e9e3f,2025-01-28T16:15:42.293000 CVE-2025-24120,0,0,0c85d32bdccf1fd825ec3f359d7dab1218c89687e6fb7a4f438397ca0e75a18a,2025-01-27T22:15:17.140000 -CVE-2025-24121,0,1,727d0b449e1735b73e6c0fd4e75eac265ea0d2ba3dd19ef8c37af20d3260a32c,2025-01-28T15:15:13.600000 -CVE-2025-24122,0,0,7c74782607fd5946bbbbf0d83e056c4f6d8cb8dd900ff270a520bdd3b617f9b0,2025-01-27T22:15:17.323000 -CVE-2025-24123,0,0,359ed2a80e856083fd50ad4ac70d2b2e8d9c1d2b80e4fa4236ccd98c4fa4cf69,2025-01-27T22:15:17.413000 +CVE-2025-24121,0,0,727d0b449e1735b73e6c0fd4e75eac265ea0d2ba3dd19ef8c37af20d3260a32c,2025-01-28T15:15:13.600000 +CVE-2025-24122,0,1,6ed5b273993a7b3b4299bccb505e9bef2efda8af378ad8c8de2092e788d49a9a,2025-01-28T16:15:42.447000 +CVE-2025-24123,0,1,e83298a045ddc8c277bf247a5ae4429adb4e3443f8590ed105db055f85a1fa12,2025-01-28T16:15:42.590000 CVE-2025-24124,0,0,676fbfbd6cac8498e5293747177b08c97e3bc6c776453e8797e5d62d4cd47e81,2025-01-27T22:15:17.510000 -CVE-2025-24126,0,1,c32206f3165722bc91a067de07475d8db8a95d2b871ddebbac4703ed5b0f16fb,2025-01-28T15:15:13.743000 +CVE-2025-24126,0,0,c32206f3165722bc91a067de07475d8db8a95d2b871ddebbac4703ed5b0f16fb,2025-01-28T15:15:13.743000 CVE-2025-24127,0,0,2e78204f6778e94438e7603b1c02f2ad3cd90e7bc92de33e7103f746be3bb5f1,2025-01-27T22:15:17.703000 CVE-2025-24128,0,0,9892e31db1a83578f6a40523b367dee079507189438bf865d0722923a9d81a77,2025-01-27T22:15:17.793000 CVE-2025-24129,0,0,9cf0643200e175163fd642215edb594dcf88af74d04f4493db604482a3ba40e9,2025-01-27T22:15:17.887000 -CVE-2025-24130,0,1,2353be8fa558560d4d339540a6553b90072d4dd0bb9db553de46ea9799aed0a6,2025-01-28T15:15:13.890000 +CVE-2025-24130,0,0,2353be8fa558560d4d339540a6553b90072d4dd0bb9db553de46ea9799aed0a6,2025-01-28T15:15:13.890000 CVE-2025-24131,0,0,492b4d07fecf4242d99445d22ec2b604c4752abdb9655e15b1f5b48aa5d3c65a,2025-01-27T22:15:18.070000 -CVE-2025-24134,0,0,fd70407a6072da3e322135cb4de894a34b4d2618db8771b24277f2c27ead3cdb,2025-01-27T22:15:18.153000 -CVE-2025-24135,0,0,1cc538384de6ba43cf36ae671a49458676cb9887e03121351ea33c8aba51a643,2025-01-27T22:15:18.247000 +CVE-2025-24134,0,1,27238626902f107163f836767722de11324242b7de9766f8bb0b3cd4757025b5,2025-01-28T16:15:42.780000 +CVE-2025-24135,0,1,37ac14929adcc1c58b3cc68046a7e240d0be8c2e4cf8312f9a3c0faefe0605bc,2025-01-28T16:15:42.930000 CVE-2025-24136,0,0,d26fe55217fd6ef5dc1f9572dae6512c03ac3218ad54517efe699f2e84ee27cc,2025-01-27T22:15:18.340000 CVE-2025-24137,0,0,5b657031fc0d48278d9bcd3c281388e4962e50effbbb855d3f7f9bc7f3ab725c,2025-01-27T22:15:18.433000 -CVE-2025-24138,0,0,71fd490bb69478196eafb3b55c96daeb767ba26484dc123dd17ce73d9d828684,2025-01-27T22:15:18.530000 -CVE-2025-24139,0,0,699ab002de103a9fc6370545e2866b9dc1d733dd6b9058c60c5b4f122324b8d4,2025-01-27T22:15:18.627000 +CVE-2025-24138,0,1,8ba7e2a460f500f479f243de8e5f463ca2f4161b2ff8b847e539449f56fe2683,2025-01-28T16:15:43.077000 +CVE-2025-24139,0,1,d6c7fd3e2db2143c5e7584244c4444900037ff452b8e30271343396f1c3cbd36,2025-01-28T16:15:43.230000 CVE-2025-24140,0,0,64cd79c453bd015139aff243e9bda4d70b37899b275a2f0befe19b92cbbc635d,2025-01-27T22:15:18.710000 CVE-2025-24141,0,0,0a8778b6a61a091021b1c4aa6cbe2f55d5b1eb88fc8a5dbe6948da45514a06f4,2025-01-27T22:15:18.800000 CVE-2025-24143,0,0,a7b1790daee6715fcfb4a8ec265c15396394f8873f98cb9665892aeb6ddb757f,2025-01-27T22:15:18.893000 CVE-2025-24145,0,0,acb97008672a0c755df834a4caa987c97f98272938ea803364a6f78ebf10517d,2025-01-27T22:15:18.990000 -CVE-2025-24146,0,1,dd8207ffc2b4fe69547e7d8344749ffd8d34e24e17e6fd990a937da22c8b9841,2025-01-28T15:15:14.013000 -CVE-2025-24149,0,0,386112f84b4bdbacd34eff2005b711b1ae0681beaada9e7800758db3a9f13a75,2025-01-27T22:15:19.173000 +CVE-2025-24146,0,0,dd8207ffc2b4fe69547e7d8344749ffd8d34e24e17e6fd990a937da22c8b9841,2025-01-28T15:15:14.013000 +CVE-2025-24149,0,1,aa29ef9b810d73b06e462f0857765899c7d31a5944821a5da36d073befeecc11,2025-01-28T16:15:43.387000 CVE-2025-24150,0,0,09acba2826b7df3f8ebfa0d368cb24a977e4e05b23689ba04ae5892d23b40c54,2025-01-27T22:15:19.270000 -CVE-2025-24151,0,1,3b90ee302fbacfd0127254bdfe696d59abb92aacf4dcc8e99b49cae621366e49,2025-01-28T15:15:14.150000 +CVE-2025-24151,0,0,3b90ee302fbacfd0127254bdfe696d59abb92aacf4dcc8e99b49cae621366e49,2025-01-28T15:15:14.150000 CVE-2025-24152,0,0,9875511f91869e98c63cef2f35db10cd0155ee0f27be472f10837aa54dc5c773,2025-01-27T22:15:19.443000 CVE-2025-24153,0,0,59d669342a492b9d2d8a609c8e00e457983b611fbf4a79373f564b00b215da7e,2025-01-27T22:15:19.537000 -CVE-2025-24154,0,0,a58a5ec201b5af92f8447d88c6e4477c33fc5c5effd09619793664e2cf9c8968,2025-01-27T22:15:19.620000 +CVE-2025-24154,0,1,c4623b888872e9bd806d6476f60723aca6e3e8ef47fe953b172a0b16a1c68fd1,2025-01-28T16:15:43.533000 CVE-2025-24156,0,0,b31e860ae0f287a4e55d80ce5295e8b216141d9744778e55fcbf70961f9196e0,2025-01-27T22:15:19.710000 -CVE-2025-24158,0,0,958ab24a351c08ae2d37d82aa9a58131653fdda58ef39d0038d1a6bcd29d13cb,2025-01-27T22:15:19.800000 -CVE-2025-24159,0,0,1b9aba57afa1c7268c6f0a356b044e00ee89cb5b596c74f23398ec84262146ee,2025-01-27T22:15:19.897000 -CVE-2025-24160,0,0,1b6ff2d4bc9c9beb4ec9901d4c44f5db885014d9dffe1fb867c9b5f4c3925fc6,2025-01-27T22:15:19.987000 +CVE-2025-24158,0,1,b480328077e53e4161097a766fad1482b065ad3b58ae4ae456fb1fa65cdfa65c,2025-01-28T16:15:43.693000 +CVE-2025-24159,0,1,e25599ac271888e49238b528ab28908bfa9393a8f6137edf8a25905c7d6c7a77,2025-01-28T16:15:43.843000 +CVE-2025-24160,0,1,5cd3c10ec42e427ac539d98658330a74a29433ef6efe7d191efaf4206f615f9a,2025-01-28T16:15:44.003000 CVE-2025-24161,0,0,7f65dc99e7781432bd49455eaa73c8925a5877a6d13c71b03a8ba16d090afb3d,2025-01-27T22:15:20.083000 -CVE-2025-24162,0,0,9463e44df647b566fdc6d77ad9aa2961be851ffbe1b612e2da53bb5785b9c7b6,2025-01-27T22:15:20.167000 -CVE-2025-24163,0,0,91fc2f170654ac01d435f8f1dbaf7034d0eee62c47dae1f32a2cb5960eca0c04,2025-01-27T22:15:20.267000 +CVE-2025-24162,0,1,9cf81295cd6bd2a6dc3874c53712e03c0cb8ec582d8e812473c8041f4e6d5f29,2025-01-28T16:15:44.187000 +CVE-2025-24163,0,1,ff21254150a2ff67a849e5cdc971468f1fbd7feadfbd74e9ad8839fc3fbc5d7f,2025-01-28T16:15:44.330000 CVE-2025-24166,0,0,9ca035738a2e0b4c88133f181378b4ebabcfdd0e45c248150891735b95780aa9,2025-01-27T22:15:20.357000 CVE-2025-24169,0,0,fbfdd654253f3994c874b40dfb221a6e1355c2dbace515b15a5c93f393bd01e2,2025-01-27T22:15:20.460000 -CVE-2025-24174,0,0,c4428cb0ae7d4247d293b4a79c4936682809d79d5f83a3777284666b7ed6f45f,2025-01-27T22:15:20.547000 -CVE-2025-24176,0,0,093d4bc1cead3fb3eb26eee3735d4f5a8e3bd4316b3fc0d2d6afa3b52cddf359,2025-01-27T22:15:20.643000 +CVE-2025-24174,0,1,be06ee7f489987d682aeeea47e1dd78afc2054cd3b573d5b857e79bdfbd28045,2025-01-28T16:15:44.490000 +CVE-2025-24176,0,1,0a13e167281064295cb7d6ac3b662de69e357179cbe1fefabb03dbb784e50b69,2025-01-28T16:15:44.630000 CVE-2025-24177,0,0,1ccc86e1d31c0e801dcfc4672cc5ab974be3b9ba670a0e19fad101e541886467,2025-01-27T22:15:20.750000 CVE-2025-24337,0,0,909a943b00c8b637d3fed5ce70273699981b2448e37e3c32ed1614924942542d,2025-01-20T14:15:27.130000 CVE-2025-24353,0,0,73a00e82e652255c53e1c9aa441604ca19c4f6e89dc8a22b2403655764d58be1,2025-01-23T18:15:33.990000 @@ -279280,7 +279287,8 @@ CVE-2025-24754,0,0,446b7c60cd96b0e32a7f09e92e7701d3aab0c6425e9989f98bb0ca587651f CVE-2025-24755,0,0,0e39e774c30955a9f13b754dc33d0bc563de45fb71998c25f43b8191a534aac2,2025-01-24T18:15:49.160000 CVE-2025-24756,0,0,ff4539720b20166980f34d623a65288c03d097bfc09671d9931f9e736be019cf,2025-01-24T18:15:49.307000 CVE-2025-24782,0,0,b4fa6a41696f91f5ce0608f417a81cf845f9bd6ff8126bfed5e4c1648799b13f,2025-01-27T15:15:17.450000 -CVE-2025-24783,0,0,3767ef322fc0c20fd082201a2ac0c7b57ed64f90c79baef6c1c88b7b021b0a09,2025-01-27T19:15:29.637000 +CVE-2025-24783,0,1,16acaefd8445952b553e27b44c44e73c798d385c295acd08deef74497b7f723b,2025-01-28T16:15:44.880000 +CVE-2025-24800,1,1,92ce9341d9d5dcab9ec4de59a19d838c194a1a5ea345070b5216d35b2e3823ef,2025-01-28T16:15:45.063000 CVE-2025-24810,0,0,9aadcf7445dd03539c4634635be857a9e6e77ee72d1b60352718480c3867482c,2025-01-28T05:15:11.413000 CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000 CVE-2025-24858,0,0,d12649c9d5260ddeed993adcd8689bf34bfabe29dfc43567bb27e34f71ab98dd,2025-01-26T07:15:09.237000