diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0135.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0135.json new file mode 100644 index 00000000000..500540f6470 --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0135.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-0135", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2025-01-28T03:15:07.283", + "lastModified": "2025-01-28T03:15:07.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA Container Toolkit contains an improper isolation vulnerability where a specially crafted container image could lead to modification of a host binary. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-653" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5599", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0136.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0136.json new file mode 100644 index 00000000000..d8aca7284cb --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0136.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-0136", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2025-01-28T03:15:07.433", + "lastModified": "2025-01-28T03:15:07.433", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA Container Toolkit contains an improper isolation vulnerability where a specially crafted container image could lead to untrusted code obtaining read and write access to host devices. This vulnerability is present only when the NVIDIA Container Toolkit is configured in a nondefault way. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-653" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5599", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0137.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0137.json new file mode 100644 index 00000000000..73b10665df4 --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0137.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-0137", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2025-01-28T03:15:07.567", + "lastModified": "2025-01-28T03:15:07.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA Container Toolkit contains an improper isolation vulnerability where a specially crafted container image could lead to untrusted code running in the host\u2019s network namespace. This vulnerability is present only when the NVIDIA Container Toolkit is configured in a nondefault way. A successful exploit of this vulnerability may lead to denial of service and escalation of privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-653" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5599", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0140.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0140.json new file mode 100644 index 00000000000..d7b7dc02d8c --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0140.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-0140", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2025-01-28T04:15:08.730", + "lastModified": "2025-01-28T04:15:08.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA RAPIDS contains a vulnerability in cuDF and cuML, where a user could cause a deserialization of untrusted data issue. A successful exploit of this vulnerability might lead to code execution, data tampering, denial of service, and information disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5597", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0146.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0146.json new file mode 100644 index 00000000000..15dcf2ffda8 --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0146.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-0146", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2025-01-28T04:15:09.447", + "lastModified": "2025-01-28T04:15:09.447", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause memory corruption. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, or data tampering." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5614", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0147.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0147.json new file mode 100644 index 00000000000..dad9d40fe07 --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0147.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-0147", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2025-01-28T04:15:09.590", + "lastModified": "2025-01-28T04:15:09.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA GPU display driver for Windows and Linux contains a vulnerability where referencing memory after it has been freed can lead to denial of service or data tampering." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5614", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0149.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0149.json new file mode 100644 index 00000000000..e4bedb9415e --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0149.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-0149", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2025-01-28T04:15:09.733", + "lastModified": "2025-01-28T04:15:09.733", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA GPU Display Driver for Linux contains a vulnerability which could allow an attacker unauthorized access to files. A successful exploit of this vulnerability might lead to limited information disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5614", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0150.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0150.json new file mode 100644 index 00000000000..454f42cae9e --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0150.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-0150", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2025-01-28T04:15:09.877", + "lastModified": "2025-01-28T04:15:09.877", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA GPU display driver for Windows and Linux contains a vulnerability where data is written past the end or before the beginning of a buffer. A successful exploit of this vulnerability might lead to information disclosure, denial of service, or data tampering." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5614", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29889.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29889.json index 1d370d1a944..364d955f7c3 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29889.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29889.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29889", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-07T14:15:10.330", - "lastModified": "2024-11-21T09:08:33.337", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T03:40:57.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,24 +69,65 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.10", + "versionEndExcluding": "10.0.15", + "matchCriteriaId": "6F7555F2-59A8-46EF-AEAF-2414AA65CCAC" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/glpi-project/glpi/commit/0a6b28be4c0f848106c60b554c703ec2e178d6c7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-8xvf-v6vv-r75g", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/glpi-project/glpi/commit/0a6b28be4c0f848106c60b554c703ec2e178d6c7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-8xvf-v6vv-r75g", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2923.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2923.json index 5077da914bd..4878b2d9008 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2923.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2923.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2923", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:21:26.650", - "lastModified": "2024-11-21T09:10:50.997", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T03:20:18.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpthemespace:magical_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.38", + "matchCriteriaId": "D7AE45DA-1A43-42F4-8796-82583FCCCFF5" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3078558%40magical-addons-for-elementor&new=3078558%40magical-addons-for-elementor&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/733f5ded-e8cb-4895-b938-889cea32f027?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3078558%40magical-addons-for-elementor&new=3078558%40magical-addons-for-elementor&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/733f5ded-e8cb-4895-b938-889cea32f027?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34547.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34547.json index 9075030ca44..0872e64137c 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34547.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34547.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34547", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-08T12:15:08.370", - "lastModified": "2024-11-21T09:18:54.557", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T03:28:09.797", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpthemespace:magical_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.35", + "matchCriteriaId": "F582EF08-D176-4659-89C9-A94E5E59264B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/magical-addons-for-elementor/wordpress-magical-addons-for-elementor-header-footer-builder-free-elementor-widgets-elementor-templates-library-plugin-1-1-34-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/magical-addons-for-elementor/wordpress-magical-addons-for-elementor-header-footer-builder-free-elementor-widgets-elementor-templates-library-plugin-1-1-34-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3680.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3680.json index 83b98b674a8..a1df300ae16 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3680.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3680.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3680", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:42:02.270", - "lastModified": "2024-11-21T09:30:10.053", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T03:17:35.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themelooks:enter_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.6", + "matchCriteriaId": "F7C71B5F-9AD1-46C1-8A68-48155FF70724" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/enteraddons/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/29cc82cb-f3fd-4de5-9731-7ceb1212b0f9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wordpress.org/plugins/enteraddons/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/29cc82cb-f3fd-4de5-9731-7ceb1212b0f9?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3831.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3831.json index ae10efb5a93..83ab933866b 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3831.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3831.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3831", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:42:24.540", - "lastModified": "2024-11-21T09:30:29.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T03:13:30.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themelooks:enter_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.6", + "matchCriteriaId": "F7C71B5F-9AD1-46C1-8A68-48155FF70724" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/enteraddons/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/62a4dd6a-f970-483e-b1a8-d57f604b7b66?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wordpress.org/plugins/enteraddons/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/62a4dd6a-f970-483e-b1a8-d57f604b7b66?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3989.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3989.json index 672dff32bb8..e87cd2fba7a 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3989.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3989.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3989", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:42:39.873", - "lastModified": "2024-11-21T09:30:50.250", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T03:05:16.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.5.1", + "matchCriteriaId": "4A112023-A359-490A-BBC3-36BD55B0F376" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3074490%40ht-mega-for-elementor&new=3074490%40ht-mega-for-elementor&sfp_email=&sfph_mail=#file3", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/03fba6bb-ff30-42bb-936b-93c009a7e3f7?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3074490%40ht-mega-for-elementor&new=3074490%40ht-mega-for-elementor&sfp_email=&sfph_mail=#file3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/03fba6bb-ff30-42bb-936b-93c009a7e3f7?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4158.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4158.json index f3fe0253a1c..1a6c573d98a 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4158.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4158.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4158", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:43:00.273", - "lastModified": "2024-11-21T09:42:18.030", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T03:03:08.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:creativethemes:blocksy:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.43", + "matchCriteriaId": "65E8AD12-61AD-4742-BCB1-CBAB4E24BF97" + } + ] + } + ] + } + ], "references": [ { "url": "https://themes.trac.wordpress.org/changeset/226440/blocksy", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22d1ccf3-ac1a-4dfc-81c3-b8eb88795bc1?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://themes.trac.wordpress.org/changeset/226440/blocksy", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22d1ccf3-ac1a-4dfc-81c3-b8eb88795bc1?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53869.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53869.json new file mode 100644 index 00000000000..9be301dc19a --- /dev/null +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53869.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-53869", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2025-01-28T04:15:10.023", + "lastModified": "2025-01-28T04:15:10.023", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA Unified Memory driver for Linux contains a vulnerability where an attacker could leak uninitialized memory. A successful exploit of this vulnerability might lead to information disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-459" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5614", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53881.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53881.json new file mode 100644 index 00000000000..9a19a5036f3 --- /dev/null +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53881.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-53881", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2025-01-28T04:15:10.170", + "lastModified": "2025-01-28T04:15:10.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA vGPU software contains a vulnerability in the host driver, where it can allow a guest to cause an interrupt storm on the host, which may lead to denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-459" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5614", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 9825e594ae9..21870af744b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-28T03:00:25.361514+00:00 +2025-01-28T05:00:25.839758+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-28T02:58:09.330000+00:00 +2025-01-28T04:15:10.170000+00:00 ``` ### Last Data Feed Release @@ -33,40 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -279254 +279264 ``` ### CVEs added in the last Commit -Recently added CVEs: `12` +Recently added CVEs: `10` -- [CVE-2022-3365](CVE-2022/CVE-2022-33xx/CVE-2022-3365.json) (`2025-01-28T01:15:08.277`) -- [CVE-2023-50316](CVE-2023/CVE-2023-503xx/CVE-2023-50316.json) (`2025-01-28T01:15:08.410`) -- [CVE-2024-12647](CVE-2024/CVE-2024-126xx/CVE-2024-12647.json) (`2025-01-28T01:15:08.560`) -- [CVE-2024-12648](CVE-2024/CVE-2024-126xx/CVE-2024-12648.json) (`2025-01-28T01:15:08.700`) -- [CVE-2024-12649](CVE-2024/CVE-2024-126xx/CVE-2024-12649.json) (`2025-01-28T01:15:08.823`) -- [CVE-2024-22315](CVE-2024/CVE-2024-223xx/CVE-2024-22315.json) (`2025-01-28T02:15:28.603`) -- [CVE-2024-27263](CVE-2024/CVE-2024-272xx/CVE-2024-27263.json) (`2025-01-28T01:15:08.950`) -- [CVE-2024-45336](CVE-2024/CVE-2024-453xx/CVE-2024-45336.json) (`2025-01-28T02:15:28.807`) -- [CVE-2024-45339](CVE-2024/CVE-2024-453xx/CVE-2024-45339.json) (`2025-01-28T02:15:28.927`) -- [CVE-2024-45340](CVE-2024/CVE-2024-453xx/CVE-2024-45340.json) (`2025-01-28T02:15:29.050`) -- [CVE-2024-45341](CVE-2024/CVE-2024-453xx/CVE-2024-45341.json) (`2025-01-28T02:15:29.147`) -- [CVE-2025-22865](CVE-2025/CVE-2025-228xx/CVE-2025-22865.json) (`2025-01-28T02:15:29.243`) +- [CVE-2024-0135](CVE-2024/CVE-2024-01xx/CVE-2024-0135.json) (`2025-01-28T03:15:07.283`) +- [CVE-2024-0136](CVE-2024/CVE-2024-01xx/CVE-2024-0136.json) (`2025-01-28T03:15:07.433`) +- [CVE-2024-0137](CVE-2024/CVE-2024-01xx/CVE-2024-0137.json) (`2025-01-28T03:15:07.567`) +- [CVE-2024-0140](CVE-2024/CVE-2024-01xx/CVE-2024-0140.json) (`2025-01-28T04:15:08.730`) +- [CVE-2024-0146](CVE-2024/CVE-2024-01xx/CVE-2024-0146.json) (`2025-01-28T04:15:09.447`) +- [CVE-2024-0147](CVE-2024/CVE-2024-01xx/CVE-2024-0147.json) (`2025-01-28T04:15:09.590`) +- [CVE-2024-0149](CVE-2024/CVE-2024-01xx/CVE-2024-0149.json) (`2025-01-28T04:15:09.733`) +- [CVE-2024-0150](CVE-2024/CVE-2024-01xx/CVE-2024-0150.json) (`2025-01-28T04:15:09.877`) +- [CVE-2024-53869](CVE-2024/CVE-2024-538xx/CVE-2024-53869.json) (`2025-01-28T04:15:10.023`) +- [CVE-2024-53881](CVE-2024/CVE-2024-538xx/CVE-2024-53881.json) (`2025-01-28T04:15:10.170`) ### CVEs modified in the last Commit -Recently modified CVEs: `9` +Recently modified CVEs: `7` -- [CVE-2010-2965](CVE-2010/CVE-2010-29xx/CVE-2010-2965.json) (`2025-01-28T02:15:27.843`) -- [CVE-2023-42496](CVE-2023/CVE-2023-424xx/CVE-2023-42496.json) (`2025-01-28T02:54:33.753`) -- [CVE-2023-42498](CVE-2023/CVE-2023-424xx/CVE-2023-42498.json) (`2025-01-28T02:47:39.277`) -- [CVE-2024-1108](CVE-2024/CVE-2024-11xx/CVE-2024-1108.json) (`2025-01-28T02:43:57.227`) -- [CVE-2024-25151](CVE-2024/CVE-2024-251xx/CVE-2024-25151.json) (`2025-01-28T02:28:11.500`) -- [CVE-2024-25603](CVE-2024/CVE-2024-256xx/CVE-2024-25603.json) (`2025-01-28T02:39:55.360`) -- [CVE-2024-26266](CVE-2024/CVE-2024-262xx/CVE-2024-26266.json) (`2025-01-28T02:33:22.940`) -- [CVE-2024-26269](CVE-2024/CVE-2024-262xx/CVE-2024-26269.json) (`2025-01-28T02:31:06.663`) -- [CVE-2024-4487](CVE-2024/CVE-2024-44xx/CVE-2024-4487.json) (`2025-01-28T02:58:09.330`) +- [CVE-2024-2923](CVE-2024/CVE-2024-29xx/CVE-2024-2923.json) (`2025-01-28T03:20:18.100`) +- [CVE-2024-29889](CVE-2024/CVE-2024-298xx/CVE-2024-29889.json) (`2025-01-28T03:40:57.580`) +- [CVE-2024-34547](CVE-2024/CVE-2024-345xx/CVE-2024-34547.json) (`2025-01-28T03:28:09.797`) +- [CVE-2024-3680](CVE-2024/CVE-2024-36xx/CVE-2024-3680.json) (`2025-01-28T03:17:35.417`) +- [CVE-2024-3831](CVE-2024/CVE-2024-38xx/CVE-2024-3831.json) (`2025-01-28T03:13:30.017`) +- [CVE-2024-3989](CVE-2024/CVE-2024-39xx/CVE-2024-3989.json) (`2025-01-28T03:05:16.193`) +- [CVE-2024-4158](CVE-2024/CVE-2024-41xx/CVE-2024-4158.json) (`2025-01-28T03:03:08.447`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 20cd2a912f1..6c4dcc23042 100644 --- a/_state.csv +++ b/_state.csv @@ -44641,7 +44641,7 @@ CVE-2010-2960,0,0,414006aab252847dd223c6091f9dc4919b515ed593cea3616fca685d987087 CVE-2010-2961,0,0,deca856c2740a1b89ab39352b9283896de02f56fefbdc70c63fef0e053e81905,2024-11-21T01:17:44.453000 CVE-2010-2962,0,0,99c1479889bb6e7b86f8c5dd52976cf406bfd32fa4ac07e13adaa26fab44ca0e,2024-11-21T01:17:44.560000 CVE-2010-2963,0,0,f0045639439051b62be58c4d592565b86938cf617f57d8df7ce4d8ce6f139876,2024-11-21T01:17:44.690000 -CVE-2010-2965,0,1,047d198b664dd5e48154f0b3d1206d446541a452d165aedac549e3ebb2fb0eb0,2025-01-28T02:15:27.843000 +CVE-2010-2965,0,0,047d198b664dd5e48154f0b3d1206d446541a452d165aedac549e3ebb2fb0eb0,2025-01-28T02:15:27.843000 CVE-2010-2966,0,0,790b446ca947cbdf0d9e244b402c442ead5f82bcbfc69c8ce14ece0a51a81bbe,2024-11-21T01:17:44.957000 CVE-2010-2967,0,0,05862007ba3c6d2570fccf634f1d0df8b52b778185577c5b9733ba0e0f5d134e,2024-11-21T01:17:45.090000 CVE-2010-2968,0,0,9a6b60eef8ee8c1ea5db9395fcaaa213152a7021cea9fb18a2f551ec4b14726c,2024-11-21T01:17:45.230000 @@ -201371,7 +201371,7 @@ CVE-2022-33646,0,0,a925c07ce65ac2d0e9d211e2b2398ad1e57da525d523e15541a83f12df881 CVE-2022-33647,0,0,5feaf3e010cc5e97535d4d65fbae2bcc87803779c2e96b8fade981b7b9313e94,2024-11-21T07:08:14.783000 CVE-2022-33648,0,0,bae79337c5e892df17da958d9ae52fb1686becdac8f975642c755225e29a4d86,2024-11-21T07:08:14.930000 CVE-2022-33649,0,0,591f61d96d2d65dbce03b14161fcac0fbabc7445443fe2e93a52054518a13ee0,2024-11-21T07:08:15.037000 -CVE-2022-3365,1,1,e21e3d9a50e1a8f3411fc09e903ea37e9ab2e3dbe6644212bc7fcd6140ebe0ff,2025-01-28T01:15:08.277000 +CVE-2022-3365,0,0,e21e3d9a50e1a8f3411fc09e903ea37e9ab2e3dbe6644212bc7fcd6140ebe0ff,2025-01-28T01:15:08.277000 CVE-2022-33650,0,0,8ce80787b8df19552561bb21e3ad24057869ada7a0f0f982878d44e02b7ceac8,2024-11-21T07:08:15.140000 CVE-2022-33651,0,0,9a318cb6a42b4e621fd1d5fee25d959d8bc2f3e44dc0a50b3ab6016651bb5f61,2024-11-21T07:08:15.250000 CVE-2022-33652,0,0,f5146da1cfd413adcad997798a0d1b636c0788d5c4cd20b5dffba13a0f13cee1,2024-11-21T07:08:15.363000 @@ -233032,9 +233032,9 @@ CVE-2023-42492,0,0,cb0961c57d4352afe7e9f59946f9909f55cc563751ad158e408a731c279ea CVE-2023-42493,0,0,0729da8456a19ef75dbd82070ce48a31f21bde776c93387c4b31471a3fcb969f,2024-11-21T08:22:39.923000 CVE-2023-42494,0,0,6a581cb6635bd370c1a9a09c8877567d65739d6085383b5f7023efe48d3d2c60,2024-11-21T08:22:40.063000 CVE-2023-42495,0,0,b09174b071b30516a7c16beab2ca64bc37838bd4408b03dbd646b624f8a2bba4,2024-11-21T08:22:40.203000 -CVE-2023-42496,0,1,4667d350937c138cde9a8dfc55d778f15b296d82114bd8824d09dc142db34f79,2025-01-28T02:54:33.753000 +CVE-2023-42496,0,0,4667d350937c138cde9a8dfc55d778f15b296d82114bd8824d09dc142db34f79,2025-01-28T02:54:33.753000 CVE-2023-42497,0,0,e18082fc8cd1a253371ce28334fdbda3ad5a5caf538cb65950881b5c58e6815d,2024-11-21T08:22:40.480000 -CVE-2023-42498,0,1,2e50f2e43b567e4838db4c0ab8caecc69149ee3d1b72055ee8785f9a82d86d44,2025-01-28T02:47:39.277000 +CVE-2023-42498,0,0,2e50f2e43b567e4838db4c0ab8caecc69149ee3d1b72055ee8785f9a82d86d44,2025-01-28T02:47:39.277000 CVE-2023-4250,0,0,238ccd1009b917e25b00eac01516f3d64684ecf1529c987d2aa3d9ee7c7d4e1f,2024-11-21T08:34:43.670000 CVE-2023-42501,0,0,22df4796fdcaa0eecba36b207fbeeeaacaebcc7614b9d93e32b9bb93a43360f8,2024-11-21T08:22:40.780000 CVE-2023-42502,0,0,edfc0542ee05c76e8f5265429ccee32c1dcefde7e137bbcc6d3a9889e825088a,2024-11-21T08:22:40.920000 @@ -238654,7 +238654,7 @@ CVE-2023-50312,0,0,027067cd6f90ddc1edb0fd700b8d6cc6de4744104a57dbc20cf5afab30933 CVE-2023-50313,0,0,a83e416401577e94df6dfe4b1b998ddd0a8952164aaa6f5ea90e36bebd23e193,2024-11-21T08:36:50.540000 CVE-2023-50314,0,0,ce35340ffb0568ccdcb723e50bf9507ce76dc59cc4416bfa4739778b544bd02c,2024-08-23T19:20:22.473000 CVE-2023-50315,0,0,625341a76fda8905bc70b73219527e00e0b32c20581d112bacaee69e8b51c52a,2024-09-11T13:38:26.370000 -CVE-2023-50316,1,1,4875d2ec4085bc75d2f2d6da27962d23629213c63ae5bafd21bb6434b9398553,2025-01-28T01:15:08.410000 +CVE-2023-50316,0,0,4875d2ec4085bc75d2f2d6da27962d23629213c63ae5bafd21bb6434b9398553,2025-01-28T01:15:08.410000 CVE-2023-5032,0,0,4ede5b17693a04ef49d59f95a825f1eb5b57b0f4b8cfa1778c1a2dc8be2d09df,2024-11-21T08:40:55.963000 CVE-2023-50324,0,0,84c304a9372a8e75be5d198cae7f7ae2a97817d8b1988122a8c74fb5aa4274df,2024-11-21T08:36:50.840000 CVE-2023-50326,0,0,bd3bc6fce1ffc5491df4da766864b97e8ced1cbb50bba99d705adb05a7f7ceb3,2024-11-21T08:36:50.950000 @@ -242550,8 +242550,16 @@ CVE-2024-0130,0,0,1bb3ebc52daa22417b62e4cd06907ca0fbf5703f4876a2bc780dc907332462 CVE-2024-0132,0,0,269e36dd3628203b2f4c1e72b7d26b4686e7f68124f229042d4dc4262fc4b092,2024-10-02T14:45:36.160000 CVE-2024-0133,0,0,0e62d1b7b69b6e3365776135d0b46af3dab18f39e199e319f8806519428dbc28,2024-10-02T14:43:22.433000 CVE-2024-0134,0,0,baeccce6f2453a7316dc6d3ba12371081b93c9fee57f0209d586abecb7c12cbd,2024-11-08T15:53:40.200000 +CVE-2024-0135,1,1,a6e199f00d8975193ef97c9f6141b8ea1b0270b7381f015cbebdc3d4a1292fd6,2025-01-28T03:15:07.283000 +CVE-2024-0136,1,1,20130eabbc8e656b93cb560c6241500b8d3b76be35d4b0cc7b95fb9f0cf6c4f3,2025-01-28T03:15:07.433000 +CVE-2024-0137,1,1,7b6e63a8b2297b1586dbb0e3297bdf9916bad2c57e0e556af7ff4a29923b8f92,2025-01-28T03:15:07.567000 CVE-2024-0138,0,0,46b8bd281343bee2ec8e5c4452aa2b9e0b3ce4964c0c71b43db0559960702d7e,2024-11-23T00:15:04.367000 CVE-2024-0139,0,0,97175888b963c6f6c4d9af1853169dc46a253002be2bfcb37fc1cbdc17d01939,2024-12-06T20:15:23.763000 +CVE-2024-0140,1,1,2cd0b6c414d5ed2eff822db870c00f0d05356102683cc46979f0967875bb7e53,2025-01-28T04:15:08.730000 +CVE-2024-0146,1,1,080d4ad9710a31e17ce2fa6ec8bced43b39792528baacb535c489f4bd9b4cab2,2025-01-28T04:15:09.447000 +CVE-2024-0147,1,1,b1c6122c5bdcbe9fe14aead4efb610bc363531896457fcf8c4d1939a81431996,2025-01-28T04:15:09.590000 +CVE-2024-0149,1,1,d2111c3e924314cdc0662c3b5ee94c5502075775d19d5a429331dd33ebd555b8,2025-01-28T04:15:09.733000 +CVE-2024-0150,1,1,951bbf729028d736ae413c906393e9c4f4cb516f450a279041b1f57297be4589,2025-01-28T04:15:09.877000 CVE-2024-0151,0,0,47427b70774487ec12e517511137a7ffbbb3bc25062c399b4c4cdc16ab998934,2024-11-21T08:45:56.783000 CVE-2024-0153,0,0,2f1922546283e50fb4f599a1bb8201eb4f407a909d4d9a7f06b4c53b0f16bcbd,2024-11-21T08:45:56.967000 CVE-2024-0154,0,0,50d65cab2fea7671d9c93f55bfc13460058493d72212a7ea026374e757c22187,2024-11-21T08:45:57.163000 @@ -244263,7 +244271,7 @@ CVE-2024-11076,0,0,82524b74886a82ba09f33edf13fd9a8f5f86e092e9bbf909a4e53028c9785 CVE-2024-11077,0,0,a548949903d5d799c3512cf90a23f879ee8299884e96a824994982a4f1a0ff5f,2024-11-14T18:57:17.743000 CVE-2024-11078,0,0,0bd64d79edb4bca6b6662894de14196529e42eaf34f19ad82faa60601adf2c0a,2024-11-23T01:26:39.680000 CVE-2024-11079,0,0,4429678b1338007ef95bc9554c7c9cf15512d4d01927364e7ca6363e4b71338b,2024-12-18T04:15:06.310000 -CVE-2024-1108,0,1,41de46f3dcaf9533283bc7e75a781616c5054e3d3c6e5f547b16c496a7c97db1,2025-01-28T02:43:57.227000 +CVE-2024-1108,0,0,41de46f3dcaf9533283bc7e75a781616c5054e3d3c6e5f547b16c496a7c97db1,2025-01-28T02:43:57.227000 CVE-2024-11081,0,0,868ddada0bf262c198b91d0f6dc5cc082627c1fafb1bc6c0669f2cc02fb00c28,2024-11-20T18:15:22.340000 CVE-2024-11082,0,0,2068f4ddbc0d21e33db6ba3989176bd5aedcb5da6f30a07d96e2944d8ba88bcb,2024-11-28T10:15:05.973000 CVE-2024-11083,0,0,8060d1be07c2085add29a68ce088e46bf1b117fbd5e8fe231b842cd4d2355c1d,2024-11-27T06:15:17.707000 @@ -245614,9 +245622,9 @@ CVE-2024-12643,0,0,ed305334bbf60789ab2538f774854a9ea19b1270a55ec551f1fb62a7aab0d CVE-2024-12644,0,0,98f60d2ac6cf96fd1c058f9e4fd7e5dd6e3f04ebd81e16af506d2527adbc60ab,2024-12-16T07:15:06.387000 CVE-2024-12645,0,0,6f4305be104babb38ce946ac6c823b095fc314e56d7b4c6b9c9c68d56ec29917,2024-12-16T07:15:06.560000 CVE-2024-12646,0,0,d27cf88b1ce52593f68445427dad867a22f0982fed0c4544c17a7ec27fc88603,2024-12-16T07:15:06.737000 -CVE-2024-12647,1,1,434ac6ab8459bd2b983c65a3731d508ec09fffe8df7ec4a255a381ca786bb236,2025-01-28T01:15:08.560000 -CVE-2024-12648,1,1,cb9af38bb403789ff03f3b9b7ca98042069072f0b2a7dcd79eb76bafd6132f12,2025-01-28T01:15:08.700000 -CVE-2024-12649,1,1,87e8b6499a033ec5557471427dd77d363662dd09442f06cec8b46042ff7c3b0f,2025-01-28T01:15:08.823000 +CVE-2024-12647,0,0,434ac6ab8459bd2b983c65a3731d508ec09fffe8df7ec4a255a381ca786bb236,2025-01-28T01:15:08.560000 +CVE-2024-12648,0,0,cb9af38bb403789ff03f3b9b7ca98042069072f0b2a7dcd79eb76bafd6132f12,2025-01-28T01:15:08.700000 +CVE-2024-12649,0,0,87e8b6499a033ec5557471427dd77d363662dd09442f06cec8b46042ff7c3b0f,2025-01-28T01:15:08.823000 CVE-2024-1265,0,0,b39c324e3936d2b2eba136bb9fb37e8f905e9dd3fbb95d7d724d951e7512509f,2024-11-21T08:50:11.610000 CVE-2024-12652,0,0,0d1e92fea470a9db4557cc44ce3f569d23b7c6a4d3928402e8c2b0a018031c7f,2024-12-26T04:15:05.660000 CVE-2024-12653,0,0,0bdff4965d01bd6aa73fcbedd02b053581ebdedd8d7404b8f9233029d8912bb7,2024-12-18T13:53:28.700000 @@ -248919,7 +248927,7 @@ CVE-2024-22310,0,0,dd859d6b306e0c9874ff3f33a829690f44f8dffe8aedd8ff6cd5b1b571687 CVE-2024-22311,0,0,3a63d6bee662ba0a6f15b807c0947fe7a1e5a2631da80da5e7333d664c69e682,2024-11-21T08:56:02.480000 CVE-2024-22312,0,0,2d6d3b890becb8a03981f799e8b5044e1f347c4412e0821c61a022cf4e163ae7,2024-11-21T08:56:02.603000 CVE-2024-22313,0,0,ddd1d33bfc1b5af1520350c2c7005426db2b2a5d727ff982649017ed5b9c287c,2024-11-21T08:56:02.770000 -CVE-2024-22315,1,1,3b94178ac6d497e9c289b87d20fe5653eb9097534192892cc31cea3225ba8727,2025-01-28T02:15:28.603000 +CVE-2024-22315,0,0,3b94178ac6d497e9c289b87d20fe5653eb9097534192892cc31cea3225ba8727,2025-01-28T02:15:28.603000 CVE-2024-22316,0,0,dc085e3ed5915890c6053d11530b220073d391856575fdc4da02f3d18c8018a9,2025-01-27T16:15:30.637000 CVE-2024-22317,0,0,b3b9afe087a314d2d9a2da4cfb50d8e65a45b5deac79991b6f88cbee779b8b65,2024-11-21T08:56:02.910000 CVE-2024-22318,0,0,aa4fd17a016da578c4e40f8bf867f49d73509a0efd564d0d9ff3a305b818b22d,2024-11-21T08:56:03.063000 @@ -250879,7 +250887,7 @@ CVE-2024-25148,0,0,baaba4bd1038fed5c1e9c1ed403cafba105c20610c41c31a35b866b1248f5 CVE-2024-25149,0,0,c3bee153938ba2820767f603be3339e9a49705623e20e7321fe693091302456b,2024-12-10T23:03:54.853000 CVE-2024-2515,0,0,44f3fa018c3519699334cca505032d6c5d3c8e2affb7c2ada212e4ff428377b2,2024-11-21T09:09:55.143000 CVE-2024-25150,0,0,9beb971424f34e419f2e67ec3339fe7f8ab91aa6b6e1cf1fb61046498d7f4901,2024-12-10T23:01:58.647000 -CVE-2024-25151,0,1,a4c322b80a85824537c1b7eed9b06ce1ba65938efaec3cdae6e0b58e6d2e2b54,2025-01-28T02:28:11.500000 +CVE-2024-25151,0,0,a4c322b80a85824537c1b7eed9b06ce1ba65938efaec3cdae6e0b58e6d2e2b54,2025-01-28T02:28:11.500000 CVE-2024-25152,0,0,c4883d942930ec99a7ece74f3181fc32c370260063ba88e828c32188ee6d7978,2024-11-21T09:00:21.653000 CVE-2024-25153,0,0,276d0e0eba2a7e7a97360fe02601b40f3b2fc90b401ae9d757e916966de425b7,2025-01-21T19:01:46.487000 CVE-2024-25154,0,0,7cd5ee3b427e3989a02b3c82e36ec257d930c9c6f4bec557cf5ca75dd266afaa,2025-01-21T19:01:35.060000 @@ -251150,7 +251158,7 @@ CVE-2024-2560,0,0,43271ba3d968c1299b607dfd85a0caad1fabd1eefbce835e71c67cfc67678a CVE-2024-25600,0,0,28903babf8e9ad9ce0e5926e98fade9a295a4e34c50bc53f7183dac7a35971aa,2024-11-21T09:01:03.307000 CVE-2024-25601,0,0,592b72e8287af6c7a3150c0f52361c80173956d1cbaa844c63524e684c186930,2024-11-21T09:01:03.450000 CVE-2024-25602,0,0,43c5fd7be09141d81d52c491e8514b96cba0daa24c348da2dd7a06a5b7ef9400,2024-11-21T09:01:03.573000 -CVE-2024-25603,0,1,15f1fd16bbca3ca772392fafebd6de61b94b9d00ebb590bee59f736ad8e46d17,2025-01-28T02:39:55.360000 +CVE-2024-25603,0,0,15f1fd16bbca3ca772392fafebd6de61b94b9d00ebb590bee59f736ad8e46d17,2025-01-28T02:39:55.360000 CVE-2024-25604,0,0,adb2744e99dce2faa265e66e541e673623a62dc0725d7f7a02f3571eed752f2b,2024-12-10T22:59:32.727000 CVE-2024-25605,0,0,cd3f213631c053f1b608e3b480951743b40dfcd47cd39c4fbb6227f798899db1,2024-12-10T22:20:47.737000 CVE-2024-25606,0,0,cac38eab3443645d7904eb9442ba71c62f7d0310cd49ec6e2c6f23596207af9e,2024-12-11T14:27:37.600000 @@ -251727,10 +251735,10 @@ CVE-2024-26262,0,0,48faa9c8f82f43f5ddddebde7ddd39c5965df5b4841017d5e3ca24c98bf5e CVE-2024-26263,0,0,4c3c27be9e44229482fc65de58d9a75964fbda93b4efc1faa1c759d7bce5f40b,2025-01-23T17:39:42.940000 CVE-2024-26264,0,0,d26073945f8a1750ab8b84a6521d62808e0396382449651549814e669069a437,2025-01-23T17:41:02.890000 CVE-2024-26265,0,0,29c43167899c1dbc950269c2d0f3c390b0b24b82f080d0d6380d8b30693e17dd,2024-11-21T09:02:15.967000 -CVE-2024-26266,0,1,6441f76a5c0293aff30c9711cf06837859fa32e97b1c912fef10fba3f8a63f36,2025-01-28T02:33:22.940000 +CVE-2024-26266,0,0,6441f76a5c0293aff30c9711cf06837859fa32e97b1c912fef10fba3f8a63f36,2025-01-28T02:33:22.940000 CVE-2024-26267,0,0,708039bd80e9dcc410cd16bc4a3c22a0a5e08bf17b8e0a60d4b29c40faed4512,2024-11-21T09:02:16.190000 CVE-2024-26268,0,0,23e044f877833d2fc9c6cb2791fea7f1b133aec4b8fae18bf04051ac445c250f,2024-11-21T09:02:16.310000 -CVE-2024-26269,0,1,a3d6634e74869fe215cf28a9b4d8b2fe7550a983642c2bb7e9b5a42a34d3b05b,2025-01-28T02:31:06.663000 +CVE-2024-26269,0,0,a3d6634e74869fe215cf28a9b4d8b2fe7550a983642c2bb7e9b5a42a34d3b05b,2025-01-28T02:31:06.663000 CVE-2024-2627,0,0,de67bfac37d74088e8645fc2f654e4a2f29dfe354b1fc4a8ac77cbde5ca7bfda,2024-11-21T09:10:09.897000 CVE-2024-26270,0,0,49db57e31c30404ffb3f7bccb6cb6e19533f6fa5e6e33873d874c52de8711e91,2024-11-21T09:02:16.553000 CVE-2024-26271,0,0,f5e20f3e7ade7688c430ad4b5e84f0ca9756226805976c19d5b4529200159d1e,2024-12-10T21:07:04.467000 @@ -252589,7 +252597,7 @@ CVE-2024-27257,0,0,691c5dc8e8ee6dc8cf4d467dc5d3cecba3bf33df4b5a8f7cf103f192a777d CVE-2024-2726,0,0,7bf287b1ed61a27957754b43bb3eb83ce224f5526d7a8605b12bacbec8912e82,2024-11-21T09:10:23 CVE-2024-27260,0,0,d8abf1871a989c63042ef17773af437c6f9012fbd4c3caf016f954fa2e26ad04,2024-11-21T09:04:12.017000 CVE-2024-27261,0,0,8a152afe0508e226578f25c9f52deacd0f59dd2457ec4bc2f42635e62029058d,2024-11-21T09:04:12.160000 -CVE-2024-27263,1,1,ffc9e4a10f5f5800e531508442cc29a1a4bc55c92320558e4e7a5792db1fec42,2025-01-28T01:15:08.950000 +CVE-2024-27263,0,0,ffc9e4a10f5f5800e531508442cc29a1a4bc55c92320558e4e7a5792db1fec42,2025-01-28T01:15:08.950000 CVE-2024-27264,0,0,f19cd12d9cfd08306f329c4a07156366819b05a23c905069a90f1109f1306031,2024-11-21T09:04:12.307000 CVE-2024-27265,0,0,503786b57301ba8f6178e18f9e45624064bd29cf748a0b95c345d7c29dce0e4f,2024-11-21T09:04:12.433000 CVE-2024-27266,0,0,8354de79cabd73f9a0b21f06f2a9cfd665437e90c03c063357f6339e60cc24a3,2024-11-21T09:04:12.583000 @@ -254059,7 +254067,7 @@ CVE-2024-29225,0,0,987e1bbdbd14475e79c4662d58c64e48774254cfe2bcd4f86e976712c6a38 CVE-2024-29227,0,0,31b77c1c8f454c07924ac023a7c3d78c956f56b867623e641096ede40d6734c2,2025-01-14T20:13:16.757000 CVE-2024-29228,0,0,3b580fe4ed3975bece5cecf0d73465bf833dded335ef01a35a31be5691de45bc,2025-01-14T20:11:42.487000 CVE-2024-29229,0,0,370bd376a796952f0c859af4695e396a574d237e936964fdda48e26d771c3177,2025-01-14T20:12:23.290000 -CVE-2024-2923,0,0,f64aecc37e05baf33b1968ba1999b7399fc4bcf35565cf4ec007b4149f9f2df6,2024-11-21T09:10:50.997000 +CVE-2024-2923,0,1,3fc6d63c99f018ca9e9e64f43ce8a0b510f60da69d763d6e459cc13d81bec3cb,2025-01-28T03:20:18.100000 CVE-2024-29230,0,0,39acf6baded62a480b413d670858674fb1be2c7c28ee69190b8290212aac21ad,2025-01-14T21:21:46.197000 CVE-2024-29231,0,0,e2078ceba6e9843a4679d425ca1deea23eaba22f093d14c264daede5cf8e5c15,2025-01-14T21:23:00.793000 CVE-2024-29232,0,0,bfe907c1e420a6c11333ae32d4033f9d9976c98ab12a75aeb99cd79c31736af3,2025-01-14T20:22:05.363000 @@ -254392,7 +254400,7 @@ CVE-2024-29885,0,0,f434c7bb4ba2cb5e34058e92e1ef6910870c04b53b28249a72c7431fd95c2 CVE-2024-29886,0,0,1e27b0e1fb21cb76614aaf9d76070b33de06aa173cb9126cae7c8b7c947950c8,2024-11-21T09:08:32.927000 CVE-2024-29887,0,0,ae70c9deb24337a9ae37eb7873c09069de07d5834069395db1200264a28e73e5,2024-11-21T09:08:33.057000 CVE-2024-29888,0,0,e28fc9e19b75542310a12faddf511cff2dc9442370e83a7e680b4cee42dc5043,2024-11-21T09:08:33.193000 -CVE-2024-29889,0,0,b08cfc6c99ac16a03c9d67ee12715b7adf65f152924721c4a7e5babce434443e,2024-11-21T09:08:33.337000 +CVE-2024-29889,0,1,f3008673cfd26aa6e62e39360ee898c67858a20dff98f028a6efa8fffd3ddd4c,2025-01-28T03:40:57.580000 CVE-2024-2989,0,0,4ca321ba4db9757bd68c059bcc905174cac5d26be6bdb0780c51fc9cca4f6dc2,2025-01-15T18:20:54.593000 CVE-2024-29890,0,0,d7aeef7b1a852d07093e767dae05e03ec8f713df2d306c8f69aabec8a291c766,2024-11-21T09:08:33.470000 CVE-2024-29891,0,0,c0d9dab934686f17f30a346e9b9705d4d5114c8534d422583c3a21338cc873ff,2025-01-08T18:16:59.630000 @@ -257991,7 +257999,7 @@ CVE-2024-34543,0,0,b18c85106a744269ca9e1f0c3a3f847e2b6877b614888d11614b6e4ba5458 CVE-2024-34544,0,0,7e7c9aeb83b9494021ef13335012c0050648225274ca095f75ff3beb3e4e3be4,2025-01-14T16:15:29.140000 CVE-2024-34545,0,0,5c279474cf289d0d87cee0453870a2820d04eaf84cb229bd6613a7c051630bf6,2024-09-23T14:13:07.883000 CVE-2024-34546,0,0,48f856dfffe054d925e60c2e336606e9498c6c8f848b7fb3d3812f76c2d4654e,2024-11-21T09:18:54.437000 -CVE-2024-34547,0,0,6cbaa9fdd622f7802dc941b02e1b5c79774f9df5ba6501a23d06ea5069aec8be,2024-11-21T09:18:54.557000 +CVE-2024-34547,0,1,93e2ccc1622ede7ee25138d3b3fa96714bd1551ebd0584b33d1136f5b07bcbbc,2025-01-28T03:28:09.797000 CVE-2024-34548,0,0,9a35e9437aa3276a85f46a37d35fd7eaf76d05a55813ac1fcecf53e1133d39a2,2024-11-21T09:18:54.677000 CVE-2024-34549,0,0,943167e86f4e05cf6d7853a49a690e00ed27b411b7f4dd67496f3d7d68f1a420,2024-11-21T09:18:54.810000 CVE-2024-3455,0,0,a82e8d4286276c9f31d3e4d90611a16388ee39ca8b9578f168190cec83428460,2024-11-21T09:29:38.063000 @@ -259712,7 +259720,7 @@ CVE-2024-3679,0,0,17f7accfd05c37a9c39eeaee6c20020b086be594960ed0494648fad57827cd CVE-2024-36790,0,0,8e267937856e18f51593774b5e211710ee3211388a2914f74e77687973c04a97,2024-11-21T09:22:38.807000 CVE-2024-36792,0,0,6e85dbf151e6660a38bdb4a5da30a0fa2d7e3dcaabb4b011faa5ce9d43c10e16,2024-11-21T09:22:39.037000 CVE-2024-36795,0,0,ce6e2c77b4c62dc71005dd1abe465797033ff80b45e5a8d1a889b0533e8c44f6,2024-11-21T09:22:39.263000 -CVE-2024-3680,0,0,c3ade2ef1008cb1963b748b5db1d1fd37992a472ff27cb05ff0996cb0e7f6c24,2024-11-21T09:30:10.053000 +CVE-2024-3680,0,1,ee887c82ddda676af42e19bcb6db06b826de48a7a337b9ddd31cfa4b78d68b79,2025-01-28T03:17:35.417000 CVE-2024-36800,0,0,7eea18e8dc8c6fa25b1c411b8691d8d491ea0dc7d5e8b833170ee3a4e4031d47,2024-11-21T09:22:39.493000 CVE-2024-36801,0,0,88a1a6f07948f9b728e5a5e67e31c8a7d2ea0682244e945421a9412a77d07724,2024-11-21T09:22:39.710000 CVE-2024-36802,0,0,d90679a1557e63ced02c20ce3a95d6abd566ddbe5bfb37eb5db0c573c610d3f6,2024-06-26T06:15:15.200000 @@ -261003,7 +261011,7 @@ CVE-2024-38305,0,0,b50204d0d2adbfeee4304f94e93a151274edb07a1881b5e4d7cf38bf07c62 CVE-2024-38306,0,0,923ef8f5750ef5dc8b1aa0f80ec3ec7f20d2a05cc416d49512377e1d2196c5c7,2024-11-21T09:25:20.867000 CVE-2024-38308,0,0,aa0e1dcb340f88b60a097b1f78e4419b606f07980132596118f63e0ca049be13,2024-10-07T15:24:34.517000 CVE-2024-38309,0,0,c1db647894461fb62d3b4308d8d05a2e39c8d0f31c7a0d9ba995ad235729362c,2024-11-29T21:15:05.287000 -CVE-2024-3831,0,0,defdf00435a317add8d8e6260abcd324b70dd72e47e315592bdf550579785773,2024-11-21T09:30:29.240000 +CVE-2024-3831,0,1,5e708a1e6973c6b70cfbb375324ac255e6a5b9f7cfb486bea916fa269c4f84cf,2025-01-28T03:13:30.017000 CVE-2024-38312,0,0,71e3649445240de28e850a435dc82d1d3d363c5ab712373016bf34e6f709156c,2024-11-21T09:25:21.193000 CVE-2024-38313,0,0,b4fccf4bc32a428a2ed3da857e5610d03364deeda806c6ba074978d77fa6902f,2024-11-21T09:25:21.687000 CVE-2024-38314,0,0,7f72becf752c493d63d9011af9e40e717b070fb953c18b5df93807710a713461,2024-10-25T12:56:07.750000 @@ -262288,7 +262296,7 @@ CVE-2024-39884,0,0,a8c11e345d1fbd775d38d954a44a812dbd632279c09d19cd356a28a8c8486 CVE-2024-39886,0,0,f16474fb9a37fdc5dcbc1b8fd41083484266b56f74034c8aeaaf9928c508ddf7,2024-11-21T09:28:30.193000 CVE-2024-39887,0,0,8ee03603ace192c884ceda52f2aacab6ea4c099a303b374fdd80802d5de2ea5a,2024-11-21T09:28:30.407000 CVE-2024-39888,0,0,81c1a1a3b559fb766c964d813b74871c335741225eeead7406d8629b71ea8739,2024-11-21T09:28:30.540000 -CVE-2024-3989,0,0,48723129a4b51bc5c048254eec57cfd9d6ea8e1500c9b70f7b66aeee54f6d669,2024-11-21T09:30:50.250000 +CVE-2024-3989,0,1,4e0ed4326e22d9572902d45c81dcb2d034c23410ef4b1443c653ed29d6a90cbd,2025-01-28T03:05:16.193000 CVE-2024-39890,0,0,c8343a9ea929857fa8808b228cecd63b1ba5d3a8800dd45f74ea582669324b81,2024-12-03T16:15:22.483000 CVE-2024-39891,0,0,d58f87038cb3ffd0fb4168b343d5f8ee4baff33beca8f6f9422d319e2027df29,2024-12-20T16:15:33.687000 CVE-2024-39894,0,0,4d15c700ed33a6fff9b64954d229a1be2b3454cc61179df7b4861cbf0d66eb8c,2024-11-21T09:28:30.867000 @@ -263241,7 +263249,7 @@ CVE-2024-41570,0,0,bc7c6440b2a67efc5463bb4c39b989d97eed435dea63e8e6c437acf558913 CVE-2024-41572,0,0,a9f0d828cc4e2bc36792fc456a6a868ace184f72abe54a0c002137b56b623f16,2024-09-11T14:15:13.380000 CVE-2024-41577,0,0,b1f882437231c85f732c91780240de4516b5d2682e39952346ec72953d56207b,2024-11-05T22:35:07.160000 CVE-2024-41579,0,0,00401f5a27bbe5068511cb2e589592e7d13e313ad7b023bdea7b8a4482f81c9a,2024-12-11T17:15:15.517000 -CVE-2024-4158,0,0,2c2f42bd1f9a6659e153a95bcc02f51689a9d796af69575dfe628166d7078e69,2024-11-21T09:42:18.030000 +CVE-2024-4158,0,1,6f5142212b7f11f746d09765245fdc596c1170b29be5ee204d7e191cb8d2cab0,2025-01-28T03:03:08.447000 CVE-2024-41583,0,0,1a2cf944ac0faaad65d0fa8a08d6745d58f6ed5d5ab422f4a8a1c3b961675df9,2024-10-04T13:50:43.727000 CVE-2024-41584,0,0,a756336a17820148688412fc36dbdf4cf1430daae27f7ae91b5ca9d658835775,2024-10-04T13:50:43.727000 CVE-2024-41585,0,0,5c7959b63fb8c6f9f663defb96a0fee4ade3ece14e0b9bc7262ce5ca4b357f56,2024-10-07T19:37:13.900000 @@ -265757,7 +265765,7 @@ CVE-2024-44859,0,0,1ff4ad5ad4cddcdb1302209b9b28986e26870e16476fd6e01c9d6790959f1 CVE-2024-4486,0,0,d95d6336818009c9b70dd65fb3d4752504bdb5c2630eed2945b4771d79bd5905,2024-11-21T09:42:55.490000 CVE-2024-44860,0,0,b57c8bd2bd66e030d28d8223c6a00765fe3018482e70feea4ac82ddd9af0ff85,2024-09-30T12:46:20.237000 CVE-2024-44867,0,0,f5d45d88391395d71e76aa49c459541c9963ac5c266a28059f210ceda5eda773,2024-09-10T15:50:57.713000 -CVE-2024-4487,0,1,9e7d3d9cfce25ad3009d26e2ff9fe758616dee3c6fa7b79983ceb94fefc683d9,2025-01-28T02:58:09.330000 +CVE-2024-4487,0,0,9e7d3d9cfce25ad3009d26e2ff9fe758616dee3c6fa7b79983ceb94fefc683d9,2025-01-28T02:58:09.330000 CVE-2024-44871,0,0,f7450cb7162fbb80e972f4166a2fd50d83297a4b352d52f86453cd2036c9456f,2024-09-13T15:28:21.260000 CVE-2024-44872,0,0,7588381461e255104d9eefa3d14be5ff20e0267bdbce5f45c3b54d1355561690,2024-09-13T15:26:12.067000 CVE-2024-4488,0,0,17450bde03ef9fa371c434cb3204a20350532a41707439bd9f994992db8327a3,2024-11-21T09:42:55.710000 @@ -266161,13 +266169,13 @@ CVE-2024-45330,0,0,e9c0a42cafd75c39cc2fb6322b0e3eb6100b15258e5462b4bef0ad15a3b44 CVE-2024-45331,0,0,c56952b03945794d6d222cd231aa39b12787f4f65a05b3428aec3822b3d506d6,2025-01-16T09:15:06.500000 CVE-2024-45334,0,0,c1a95be34d5696913864dee9719b7ad805fe7ff8dee6bbd29645a138cdd2805b,2024-10-25T14:41:43.473000 CVE-2024-45335,0,0,df1b52d83b5212b89c08532eb4b3f1fce61dd8609884645d9cc9fbfcae22125a,2024-10-25T14:37:39.387000 -CVE-2024-45336,1,1,3e7ae3add87fdedc39007439173db0ef558280c47154def679c01839605d6db3,2025-01-28T02:15:28.807000 +CVE-2024-45336,0,0,3e7ae3add87fdedc39007439173db0ef558280c47154def679c01839605d6db3,2025-01-28T02:15:28.807000 CVE-2024-45337,0,0,0204a585b71dc2eafeae0a7aa43ff297085c36ff7e1720071b48d72e387539af,2024-12-12T21:15:08.500000 CVE-2024-45338,0,0,4b2d696f8670e697ae1161a5584acef0120067536ac2182d79f6e6c35006631f,2024-12-31T20:16:06.603000 -CVE-2024-45339,1,1,1278bba7c73d64a4463ca6a2d25240e7cccf0db0f2382bb80d4dc77aec2a5b1b,2025-01-28T02:15:28.927000 +CVE-2024-45339,0,0,1278bba7c73d64a4463ca6a2d25240e7cccf0db0f2382bb80d4dc77aec2a5b1b,2025-01-28T02:15:28.927000 CVE-2024-4534,0,0,05ec1ad9bbf04373d4c888e50c4da6ee25a8849a5c55f74fc5c0d8923189992d,2024-11-21T09:43:03.287000 -CVE-2024-45340,1,1,2c4623ca46a98e086eee38c98fc33ffd94922e7be2544c8d0cbd2745609b8d3d,2025-01-28T02:15:29.050000 -CVE-2024-45341,1,1,0809e593d93d0e45831640bffac5034f296f07d3c2d59a6a5ba0ce3172378a9c,2025-01-28T02:15:29.147000 +CVE-2024-45340,0,0,2c4623ca46a98e086eee38c98fc33ffd94922e7be2544c8d0cbd2745609b8d3d,2025-01-28T02:15:29.050000 +CVE-2024-45341,0,0,0809e593d93d0e45831640bffac5034f296f07d3c2d59a6a5ba0ce3172378a9c,2025-01-28T02:15:29.147000 CVE-2024-45342,0,0,a4a31e9769756ae24649b74b18bd2d95ae5ebb0482440ad62570ce13c5ec4304,2025-01-08T20:15:27.583000 CVE-2024-45343,0,0,318ff9ada4e764bd6c635c00720e7b9030062bb890baf82a7e3f16a4a83b72fb,2025-01-08T20:15:27.690000 CVE-2024-45344,0,0,af604bd20c17ff15fecd0779ea006a02560ba533390f654e0b99f1b752eeb5b0,2025-01-08T20:15:27.753000 @@ -271980,8 +271988,10 @@ CVE-2024-53864,0,0,93dcb103bdfd7f3176c3adfa9bde86dfce274a6a3983c6f0896b1b7fde97b CVE-2024-53865,0,0,a18046e71c3fb51aa2c81b35eb6a164fa64a64b921f1fbdce471657bafca3131,2024-11-29T19:15:09.710000 CVE-2024-53866,0,0,79f529954badc8df591b8798fa8006372da3962e53aa6006016cf0dbfdb6fd1e,2024-12-10T18:15:42.160000 CVE-2024-53867,0,0,72e506c917a884d4217cf064e51169da2e7b7e498f38ccd1a1ee0446ccb5b2b1,2024-12-03T17:15:12.787000 +CVE-2024-53869,1,1,bf820c7acbd7bfd3e008e4fe32480a3e74fa276950b51c48e98863e0819ffffa,2025-01-28T04:15:10.023000 CVE-2024-5387,0,0,d7455745fd4e2043656d894120ace9fd562ab2b459405f5c80fb87774616ea6e,2024-06-03T19:15:09.500000 CVE-2024-5388,0,0,88068f2d18329bc2e1ad4660154ccfa55826fed94a4e1660b5757c6715c273a8,2024-06-03T19:15:09.557000 +CVE-2024-53881,1,1,ed75efd60346eb3efd9973000bd3c37027fd6be69b4c571f97bc5dc691f0520a,2025-01-28T04:15:10.170000 CVE-2024-5389,0,0,7b62c041501e93209780667aacd1d527276730dd1c9ab622b7a27b2efa3d1409,2024-11-21T09:47:33.420000 CVE-2024-53899,0,0,ca94e39391001349829a2f872ca5d1d0c6ef0f2f07a2a901a4f8c2f87ada266a,2024-11-26T18:23:09.517000 CVE-2024-5390,0,0,08f90cbe103247574c9186c9db8e0df1698f7568324022ee05c2f66185b8fb3e,2024-11-21T09:47:33.563000 @@ -278548,7 +278558,7 @@ CVE-2025-22825,0,0,c21ca5713a1aa3bda508edf6d7ba0513358e0245a32198c391997dcabc4fd CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000 CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000 CVE-2025-22828,0,0,327d4fbb4775debb7974f74b72faad2a6d9350ed385605b18892cfc7691fc3c9,2025-01-13T19:15:11.373000 -CVE-2025-22865,1,1,a230429544aa2c6786a3863896558bf7a7afe958cdc9d412012c493e8058a98b,2025-01-28T02:15:29.243000 +CVE-2025-22865,0,0,a230429544aa2c6786a3863896558bf7a7afe958cdc9d412012c493e8058a98b,2025-01-28T02:15:29.243000 CVE-2025-22904,0,0,3807d1b49b562c393e5518dc0bf4d49fb4416192083246d9de79c75349f8fe79,2025-01-17T18:15:31.870000 CVE-2025-22905,0,0,382cf7f3f8f5eadd5df6d2c876d6a159bbdf9a76601b3d1844a11a83da840be1,2025-01-16T15:15:15.180000 CVE-2025-22906,0,0,84179e13ef31a8a27c56f765914741b8d10c6e2d6fee9b4fe45e261f98203a95,2025-01-16T15:15:15.357000