From 9761f6d0ed9ecd37791c545f5d0516b3926de25f Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 28 Jan 2025 23:03:47 +0000 Subject: [PATCH] Auto-Update: 2025-01-28T23:00:20.419672+00:00 --- CVE-2019/CVE-2019-87xx/CVE-2019-8720.json | 34 +- CVE-2022/CVE-2022-10xx/CVE-2022-1096.json | 32 +- CVE-2022/CVE-2022-226xx/CVE-2022-22675.json | 32 +- CVE-2022/CVE-2022-264xx/CVE-2022-26485.json | 32 +- CVE-2022/CVE-2022-264xx/CVE-2022-26486.json | 32 +- CVE-2022/CVE-2022-32xx/CVE-2022-3236.json | 32 +- CVE-2022/CVE-2022-354xx/CVE-2022-35405.json | 32 +- CVE-2022/CVE-2022-391xx/CVE-2022-39197.json | 32 +- CVE-2022/CVE-2022-407xx/CVE-2022-40765.json | 32 +- CVE-2022/CVE-2022-412xx/CVE-2022-41223.json | 32 +- CVE-2022/CVE-2022-428xx/CVE-2022-42827.json | 32 +- CVE-2022/CVE-2022-428xx/CVE-2022-42856.json | 32 +- CVE-2022/CVE-2022-429xx/CVE-2022-42948.json | 32 +- CVE-2022/CVE-2022-42xx/CVE-2022-4262.json | 32 +- CVE-2022/CVE-2022-474xx/CVE-2022-47469.json | 32 +- CVE-2022/CVE-2022-474xx/CVE-2022-47470.json | 32 +- CVE-2022/CVE-2022-474xx/CVE-2022-47486.json | 32 +- CVE-2022/CVE-2022-474xx/CVE-2022-47487.json | 32 +- CVE-2022/CVE-2022-474xx/CVE-2022-47488.json | 22 +- CVE-2022/CVE-2022-474xx/CVE-2022-47489.json | 32 +- CVE-2022/CVE-2022-474xx/CVE-2022-47490.json | 32 +- CVE-2022/CVE-2022-474xx/CVE-2022-47491.json | 32 +- CVE-2022/CVE-2022-474xx/CVE-2022-47492.json | 32 +- CVE-2022/CVE-2022-474xx/CVE-2022-47493.json | 32 +- CVE-2022/CVE-2022-474xx/CVE-2022-47494.json | 32 +- CVE-2022/CVE-2022-474xx/CVE-2022-47495.json | 32 +- CVE-2022/CVE-2022-474xx/CVE-2022-47496.json | 32 +- CVE-2022/CVE-2022-474xx/CVE-2022-47497.json | 32 +- CVE-2022/CVE-2022-474xx/CVE-2022-47498.json | 32 +- CVE-2022/CVE-2022-474xx/CVE-2022-47499.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48231.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48232.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48233.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48234.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48235.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48236.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48237.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48238.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48243.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48244.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48245.json | 32 +- CVE-2023/CVE-2023-02xx/CVE-2023-0268.json | 22 +- CVE-2023/CVE-2023-16xx/CVE-2023-1671.json | 12 +- CVE-2023/CVE-2023-209xx/CVE-2023-20963.json | 32 +- CVE-2023/CVE-2023-227xx/CVE-2023-22788.json | 12 +- CVE-2023/CVE-2023-235xx/CVE-2023-23529.json | 32 +- CVE-2023/CVE-2023-25xx/CVE-2023-2582.json | 32 +- CVE-2023/CVE-2023-270xx/CVE-2023-27068.json | 32 +- CVE-2023/CVE-2023-275xx/CVE-2023-27532.json | 22 +- CVE-2023/CVE-2023-281xx/CVE-2023-28127.json | 22 +- CVE-2023/CVE-2023-281xx/CVE-2023-28128.json | 26 +- CVE-2023/CVE-2023-282xx/CVE-2023-28205.json | 32 +- CVE-2023/CVE-2023-283xx/CVE-2023-28316.json | 22 +- CVE-2023/CVE-2023-283xx/CVE-2023-28317.json | 32 +- CVE-2023/CVE-2023-283xx/CVE-2023-28318.json | 32 +- CVE-2023/CVE-2023-295xx/CVE-2023-29552.json | 22 +- CVE-2023/CVE-2023-297xx/CVE-2023-29791.json | 32 +- CVE-2023/CVE-2023-370xx/CVE-2023-37002.json | 41 +- CVE-2023/CVE-2023-370xx/CVE-2023-37003.json | 41 +- CVE-2023/CVE-2023-370xx/CVE-2023-37004.json | 41 +- CVE-2023/CVE-2023-370xx/CVE-2023-37005.json | 41 +- CVE-2023/CVE-2023-370xx/CVE-2023-37006.json | 41 +- CVE-2023/CVE-2023-370xx/CVE-2023-37007.json | 41 +- CVE-2023/CVE-2023-370xx/CVE-2023-37008.json | 41 +- CVE-2023/CVE-2023-379xx/CVE-2023-37940.json | 660 +++++++++++++++++++- CVE-2023/CVE-2023-401xx/CVE-2023-40191.json | 348 ++++++++++- CVE-2023/CVE-2023-443xx/CVE-2023-44308.json | 551 +++++++++++++++- CVE-2023/CVE-2023-477xx/CVE-2023-47795.json | 478 +++++++++++++- CVE-2023/CVE-2023-51xx/CVE-2023-5190.json | 333 +++++++++- CVE-2024/CVE-2024-10xx/CVE-2024-1042.json | 74 ++- CVE-2024/CVE-2024-119xx/CVE-2024-11993.json | 262 +++++++- CVE-2024/CVE-2024-122xx/CVE-2024-12280.json | 49 +- CVE-2024/CVE-2024-130xx/CVE-2024-13095.json | 37 +- CVE-2024/CVE-2024-244xx/CVE-2024-24432.json | 41 +- CVE-2024/CVE-2024-251xx/CVE-2024-25147.json | 198 +++++- CVE-2024/CVE-2024-251xx/CVE-2024-25152.json | 208 +++++- CVE-2024/CVE-2024-256xx/CVE-2024-25601.json | 208 +++++- CVE-2024/CVE-2024-256xx/CVE-2024-25602.json | 208 +++++- CVE-2024/CVE-2024-262xx/CVE-2024-26265.json | 315 +++++++++- CVE-2024/CVE-2024-262xx/CVE-2024-26267.json | 370 ++++++++++- CVE-2024/CVE-2024-262xx/CVE-2024-26268.json | 400 +++++++++++- CVE-2024/CVE-2024-262xx/CVE-2024-26270.json | 183 +++++- CVE-2024/CVE-2024-279xx/CVE-2024-27985.json | 52 +- CVE-2024/CVE-2024-298xx/CVE-2024-29869.json | 45 ++ CVE-2024/CVE-2024-318xx/CVE-2024-31871.json | 65 +- CVE-2024/CVE-2024-318xx/CVE-2024-31872.json | 65 +- CVE-2024/CVE-2024-318xx/CVE-2024-31873.json | 65 +- CVE-2024/CVE-2024-32xx/CVE-2024-3214.json | 74 ++- CVE-2024/CVE-2024-347xx/CVE-2024-34732.json | 39 +- CVE-2024/CVE-2024-347xx/CVE-2024-34733.json | 39 +- CVE-2024/CVE-2024-347xx/CVE-2024-34748.json | 39 +- CVE-2024/CVE-2024-36xx/CVE-2024-3617.json | 89 ++- CVE-2024/CVE-2024-36xx/CVE-2024-3618.json | 88 ++- CVE-2024/CVE-2024-36xx/CVE-2024-3619.json | 87 ++- CVE-2024/CVE-2024-36xx/CVE-2024-3620.json | 87 ++- CVE-2024/CVE-2024-406xx/CVE-2024-40649.json | 39 +- CVE-2024/CVE-2024-406xx/CVE-2024-40651.json | 39 +- CVE-2024/CVE-2024-406xx/CVE-2024-40669.json | 39 +- CVE-2024/CVE-2024-406xx/CVE-2024-40670.json | 39 +- CVE-2024/CVE-2024-406xx/CVE-2024-40672.json | 39 +- CVE-2024/CVE-2024-406xx/CVE-2024-40677.json | 39 +- CVE-2024/CVE-2024-559xx/CVE-2024-55968.json | 25 + CVE-2024/CVE-2024-573xx/CVE-2024-57369.json | 39 +- CVE-2024/CVE-2024-573xx/CVE-2024-57376.json | 21 + CVE-2024/CVE-2024-575xx/CVE-2024-57514.json | 21 + CVE-2024/CVE-2024-79xx/CVE-2024-7993.json | 6 +- CVE-2025/CVE-2025-07xx/CVE-2025-0785.json | 141 +++++ CVE-2025/CVE-2025-07xx/CVE-2025-0786.json | 141 +++++ CVE-2025/CVE-2025-07xx/CVE-2025-0787.json | 141 +++++ CVE-2025/CVE-2025-229xx/CVE-2025-22917.json | 21 + CVE-2025/CVE-2025-229xx/CVE-2025-22980.json | 39 +- CVE-2025/CVE-2025-241xx/CVE-2025-24156.json | 45 +- CVE-2025/CVE-2025-241xx/CVE-2025-24166.json | 41 +- CVE-2025/CVE-2025-244xx/CVE-2025-24481.json | 78 +++ CVE-2025/CVE-2025-244xx/CVE-2025-24482.json | 78 +++ CVE-2025/CVE-2025-248xx/CVE-2025-24826.json | 56 ++ README.md | 91 ++- _state.csv | 423 +++++++------ 118 files changed, 8868 insertions(+), 537 deletions(-) create mode 100644 CVE-2024/CVE-2024-298xx/CVE-2024-29869.json create mode 100644 CVE-2024/CVE-2024-559xx/CVE-2024-55968.json create mode 100644 CVE-2024/CVE-2024-573xx/CVE-2024-57376.json create mode 100644 CVE-2024/CVE-2024-575xx/CVE-2024-57514.json create mode 100644 CVE-2025/CVE-2025-07xx/CVE-2025-0785.json create mode 100644 CVE-2025/CVE-2025-07xx/CVE-2025-0786.json create mode 100644 CVE-2025/CVE-2025-07xx/CVE-2025-0787.json create mode 100644 CVE-2025/CVE-2025-229xx/CVE-2025-22917.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24481.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24482.json create mode 100644 CVE-2025/CVE-2025-248xx/CVE-2025-24826.json diff --git a/CVE-2019/CVE-2019-87xx/CVE-2019-8720.json b/CVE-2019/CVE-2019-87xx/CVE-2019-8720.json index 15d487efc66..e3e3615753e 100644 --- a/CVE-2019/CVE-2019-87xx/CVE-2019-8720.json +++ b/CVE-2019/CVE-2019-87xx/CVE-2019-8720.json @@ -2,7 +2,7 @@ "id": "CVE-2019-8720", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-06T23:15:10.287", - "lastModified": "2024-11-21T04:50:21.350", + "lastModified": "2025-01-28T22:15:07.963", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -42,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -52,6 +72,16 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "description": [ { diff --git a/CVE-2022/CVE-2022-10xx/CVE-2022-1096.json b/CVE-2022/CVE-2022-10xx/CVE-2022-1096.json index ff662dff416..b60d35931b0 100644 --- a/CVE-2022/CVE-2022-10xx/CVE-2022-1096.json +++ b/CVE-2022/CVE-2022-10xx/CVE-2022-1096.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1096", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-07-23T00:15:08.333", - "lastModified": "2024-11-21T06:40:01.510", + "lastModified": "2025-01-28T22:15:09.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-226xx/CVE-2022-22675.json b/CVE-2022/CVE-2022-226xx/CVE-2022-22675.json index 160fdb21eea..3234abea8ad 100644 --- a/CVE-2022/CVE-2022-226xx/CVE-2022-22675.json +++ b/CVE-2022/CVE-2022-226xx/CVE-2022-22675.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22675", "sourceIdentifier": "product-security@apple.com", "published": "2022-05-26T18:15:09.153", - "lastModified": "2024-11-21T06:47:15.030", + "lastModified": "2025-01-28T22:15:09.390", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-264xx/CVE-2022-26485.json b/CVE-2022/CVE-2022-264xx/CVE-2022-26485.json index 73be2cdac9a..6328bdbe21e 100644 --- a/CVE-2022/CVE-2022-264xx/CVE-2022-26485.json +++ b/CVE-2022/CVE-2022-264xx/CVE-2022-26485.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26485", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:22.563", - "lastModified": "2024-11-21T06:54:02.350", + "lastModified": "2025-01-28T22:15:09.727", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-264xx/CVE-2022-26486.json b/CVE-2022/CVE-2022-264xx/CVE-2022-26486.json index 0cbe797521a..68a622ac34d 100644 --- a/CVE-2022/CVE-2022-264xx/CVE-2022-26486.json +++ b/CVE-2022/CVE-2022-264xx/CVE-2022-26486.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26486", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:22.797", - "lastModified": "2024-11-21T06:54:02.457", + "lastModified": "2025-01-28T22:15:09.987", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-32xx/CVE-2022-3236.json b/CVE-2022/CVE-2022-32xx/CVE-2022-3236.json index d73f2dfc409..8653ed21aa4 100644 --- a/CVE-2022/CVE-2022-32xx/CVE-2022-3236.json +++ b/CVE-2022/CVE-2022-32xx/CVE-2022-3236.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3236", "sourceIdentifier": "security-alert@sophos.com", "published": "2022-09-23T13:15:10.327", - "lastModified": "2024-11-21T07:19:06.813", + "lastModified": "2025-01-28T22:15:10.673", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,6 +56,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -73,6 +93,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-354xx/CVE-2022-35405.json b/CVE-2022/CVE-2022-354xx/CVE-2022-35405.json index f7b05de9b3c..37ee51a193f 100644 --- a/CVE-2022/CVE-2022-354xx/CVE-2022-35405.json +++ b/CVE-2022/CVE-2022-354xx/CVE-2022-35405.json @@ -2,7 +2,7 @@ "id": "CVE-2022-35405", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-19T15:15:08.680", - "lastModified": "2024-11-21T07:11:06.590", + "lastModified": "2025-01-28T22:15:10.200", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-391xx/CVE-2022-39197.json b/CVE-2022/CVE-2022-391xx/CVE-2022-39197.json index cd4663af9ad..89c561c75fc 100644 --- a/CVE-2022/CVE-2022-391xx/CVE-2022-39197.json +++ b/CVE-2022/CVE-2022-391xx/CVE-2022-39197.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39197", "sourceIdentifier": "cve@mitre.org", "published": "2022-09-22T01:15:11.963", - "lastModified": "2024-11-21T07:17:45.977", + "lastModified": "2025-01-28T22:15:10.450", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-407xx/CVE-2022-40765.json b/CVE-2022/CVE-2022-407xx/CVE-2022-40765.json index 0df054fdeda..c8271846016 100644 --- a/CVE-2022/CVE-2022-407xx/CVE-2022-40765.json +++ b/CVE-2022/CVE-2022-407xx/CVE-2022-40765.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40765", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-22T01:15:31.847", - "lastModified": "2024-11-21T07:22:01.013", + "lastModified": "2025-01-28T22:15:10.877", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41223.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41223.json index 57487479cee..e99a69d5910 100644 --- a/CVE-2022/CVE-2022-412xx/CVE-2022-41223.json +++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41223.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41223", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-22T01:15:32.897", - "lastModified": "2024-11-21T07:22:51.913", + "lastModified": "2025-01-28T22:15:11.147", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42827.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42827.json index a28740e2010..d7af4a60df8 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42827.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42827.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42827", "sourceIdentifier": "product-security@apple.com", "published": "2022-11-01T20:15:24.333", - "lastModified": "2024-11-21T07:25:25.627", + "lastModified": "2025-01-28T22:15:11.367", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42856.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42856.json index 684e34db50a..a86aae4b743 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42856.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42856.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42856", "sourceIdentifier": "product-security@apple.com", "published": "2022-12-15T19:15:25.123", - "lastModified": "2024-11-21T07:25:29.330", + "lastModified": "2025-01-28T22:15:11.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-429xx/CVE-2022-42948.json b/CVE-2022/CVE-2022-429xx/CVE-2022-42948.json index 55a574b34a2..3a4cc31fb10 100644 --- a/CVE-2022/CVE-2022-429xx/CVE-2022-42948.json +++ b/CVE-2022/CVE-2022-429xx/CVE-2022-42948.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42948", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-24T14:15:09.927", - "lastModified": "2024-11-21T07:25:39.463", + "lastModified": "2025-01-28T22:15:11.827", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-116" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4262.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4262.json index 804b1d604b4..f31aae3e237 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4262.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4262.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4262", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-12-02T21:15:12.247", - "lastModified": "2024-11-21T07:34:53.933", + "lastModified": "2025-01-28T22:15:13.580", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47469.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47469.json index 8a1d4d98d09..fd3f79af415 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47469.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47469.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47469", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:09.333", - "lastModified": "2024-11-21T07:32:01.610", + "lastModified": "2025-01-28T21:15:09.720", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47470.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47470.json index 8eb9d3c2b0a..555151d9985 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47470.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47470.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47470", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:09.383", - "lastModified": "2024-11-21T07:32:01.730", + "lastModified": "2025-01-28T21:15:10.603", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47486.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47486.json index 8d4feeac24b..c940f13ff39 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47486.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47486.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47486", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:09.480", - "lastModified": "2024-11-21T07:32:03.727", + "lastModified": "2025-01-28T21:15:10.753", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47487.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47487.json index 8b3c736c44d..ec490d0efdf 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47487.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47487.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47487", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:09.527", - "lastModified": "2024-11-21T07:32:03.840", + "lastModified": "2025-01-28T22:15:12.087", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47488.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47488.json index cd7613b7c7f..2bd169b990d 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47488.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47488.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47488", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:09.567", - "lastModified": "2024-11-21T07:32:03.953", + "lastModified": "2025-01-28T22:15:12.250", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47489.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47489.json index 6e63c8332ab..f27f3611dbd 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47489.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47489.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47489", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:09.613", - "lastModified": "2024-11-21T07:32:04.070", + "lastModified": "2025-01-28T22:15:12.410", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47490.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47490.json index 79a27084ee8..8e76a056429 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47490.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47490.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47490", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:09.660", - "lastModified": "2024-11-21T07:32:04.190", + "lastModified": "2025-01-28T22:15:12.580", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47491.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47491.json index 54a6b197c0c..fb65c9c1e38 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47491.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47491.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47491", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:09.707", - "lastModified": "2024-11-21T07:32:04.317", + "lastModified": "2025-01-28T21:15:10.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47492.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47492.json index be293eb5ea8..69dcd3144e8 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47492.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47492.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47492", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:09.753", - "lastModified": "2024-11-21T07:32:04.417", + "lastModified": "2025-01-28T22:15:12.743", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47493.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47493.json index ea462ea87af..729672161d9 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47493.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47493.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47493", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:09.797", - "lastModified": "2024-11-21T07:32:04.530", + "lastModified": "2025-01-28T22:15:12.917", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47494.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47494.json index 5215ae820d6..e5803f9e32b 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47494.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47494.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47494", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:09.843", - "lastModified": "2024-11-21T07:32:04.657", + "lastModified": "2025-01-28T21:15:11.077", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47495.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47495.json index 7e1876ed46d..605b5f08c8a 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47495.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47495.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47495", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:09.890", - "lastModified": "2024-11-21T07:32:04.793", + "lastModified": "2025-01-28T21:15:11.247", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47496.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47496.json index b0c9557db5b..067cb89dfc4 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47496.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47496.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47496", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:09.943", - "lastModified": "2024-11-21T07:32:04.910", + "lastModified": "2025-01-28T21:15:11.407", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47497.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47497.json index 4727177bfa9..4adaa8fb40c 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47497.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47497.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47497", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:09.987", - "lastModified": "2024-11-21T07:32:05.030", + "lastModified": "2025-01-28T21:15:11.560", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47498.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47498.json index 26ef53a4a13..ef5f661d3a6 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47498.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47498.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47498", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.033", - "lastModified": "2024-11-21T07:32:05.150", + "lastModified": "2025-01-28T21:15:11.707", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47499.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47499.json index c6f5dee3c0d..84540223305 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47499.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47499.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47499", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.083", - "lastModified": "2024-11-21T07:32:05.277", + "lastModified": "2025-01-28T21:15:11.863", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48231.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48231.json index f490450d546..7d49241b268 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48231.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48231.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48231", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.133", - "lastModified": "2024-11-21T07:33:00.540", + "lastModified": "2025-01-28T22:15:13.080", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48232.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48232.json index 91f22a1599c..f77fd82378a 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48232.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48232.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48232", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.187", - "lastModified": "2024-11-21T07:33:00.653", + "lastModified": "2025-01-28T22:15:13.257", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48233.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48233.json index 482a65edc37..1e02a57319c 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48233.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48233.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48233", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.233", - "lastModified": "2024-11-21T07:33:00.770", + "lastModified": "2025-01-28T22:15:13.413", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48234.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48234.json index 6c80e59075d..93644bac549 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48234.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48234.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48234", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.277", - "lastModified": "2024-11-21T07:33:00.920", + "lastModified": "2025-01-28T21:15:12.020", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48235.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48235.json index a725f575cb5..31ec582ab42 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48235.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48235.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48235", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.317", - "lastModified": "2024-11-21T07:33:01.057", + "lastModified": "2025-01-28T21:15:12.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48236.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48236.json index 3eb59c5bfb5..ddd9bf07555 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48236.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48236.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48236", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.360", - "lastModified": "2024-11-21T07:33:01.180", + "lastModified": "2025-01-28T21:15:12.350", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48237.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48237.json index 1521365371d..12f2f5c68b5 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48237.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48237.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48237", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.403", - "lastModified": "2024-11-21T07:33:01.293", + "lastModified": "2025-01-28T21:15:12.503", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48238.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48238.json index 2e9fb4601df..2832f0ff40d 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48238.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48238.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48238", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.447", - "lastModified": "2024-11-21T07:33:01.407", + "lastModified": "2025-01-28T21:15:12.663", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48243.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48243.json index 60737fe09d3..0c5cd9f87a8 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48243.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48243.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48243", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.677", - "lastModified": "2024-11-21T07:33:01.990", + "lastModified": "2025-01-28T21:15:12.827", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48244.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48244.json index 1b37fa3674d..c6946713946 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48244.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48244.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48244", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.727", - "lastModified": "2024-11-21T07:33:02.110", + "lastModified": "2025-01-28T21:15:12.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48245.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48245.json index f291b049d15..82539951802 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48245.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48245.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48245", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.770", - "lastModified": "2024-11-21T07:33:02.230", + "lastModified": "2025-01-28T21:15:13.127", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0268.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0268.json index f65011082d8..a08a834680e 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0268.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0268.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0268", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-08T14:15:11.057", - "lastModified": "2024-11-21T07:36:51.983", + "lastModified": "2025-01-28T21:15:13.337", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1671.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1671.json index 3553d85aa00..23c0c242bdd 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1671.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1671.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1671", "sourceIdentifier": "security-alert@sophos.com", "published": "2023-04-04T10:15:07.197", - "lastModified": "2024-11-21T07:39:39.697", + "lastModified": "2025-01-28T22:15:13.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-209xx/CVE-2023-20963.json b/CVE-2023/CVE-2023-209xx/CVE-2023-20963.json index 0f9ae221451..86a7dc9d37b 100644 --- a/CVE-2023/CVE-2023-209xx/CVE-2023-20963.json +++ b/CVE-2023/CVE-2023-209xx/CVE-2023-20963.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20963", "sourceIdentifier": "security@android.com", "published": "2023-03-24T20:15:10.010", - "lastModified": "2024-11-21T07:41:54.667", + "lastModified": "2025-01-28T22:15:13.970", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-295" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22788.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22788.json index c565eb7f753..6e92c87218c 100644 --- a/CVE-2023/CVE-2023-227xx/CVE-2023-22788.json +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22788.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22788", "sourceIdentifier": "security-alert@hpe.com", "published": "2023-05-08T15:15:10.440", - "lastModified": "2024-11-21T07:45:25.737", + "lastModified": "2025-01-28T21:15:13.493", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23529.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23529.json index 56a89a88fde..3c46a4eaac7 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23529.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23529.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23529", "sourceIdentifier": "product-security@apple.com", "published": "2023-02-27T20:15:14.710", - "lastModified": "2024-11-21T07:46:21.710", + "lastModified": "2025-01-28T22:15:14.157", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2582.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2582.json index aa0e9e4caff..597c91b71a5 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2582.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2582.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2582", "sourceIdentifier": "vulnreport@tenable.com", "published": "2023-05-08T21:15:11.150", - "lastModified": "2024-11-21T07:58:52.350", + "lastModified": "2025-01-28T21:15:14.863", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-1321" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27068.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27068.json index 06792200fa8..a4bec5d3b67 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27068.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27068.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27068", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T01:15:09.773", - "lastModified": "2024-11-21T07:52:15.797", + "lastModified": "2025-01-28T21:15:13.647", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27532.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27532.json index 87ee871a17a..967071a126b 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27532.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27532.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27532", "sourceIdentifier": "support@hackerone.com", "published": "2023-03-10T22:15:10.557", - "lastModified": "2024-11-21T07:53:06.657", + "lastModified": "2025-01-28T22:15:14.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28127.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28127.json index 9a46af84f68..af09319b509 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28127.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28127.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28127", "sourceIdentifier": "support@hackerone.com", "published": "2023-05-09T22:15:09.870", - "lastModified": "2024-11-21T07:54:27.537", + "lastModified": "2025-01-28T21:15:13.850", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28128.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28128.json index bb18d5b911f..c41a558038c 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28128.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28128.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28128", "sourceIdentifier": "support@hackerone.com", "published": "2023-05-09T22:15:09.920", - "lastModified": "2024-11-21T07:54:27.650", + "lastModified": "2025-01-28T21:15:14.003", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -97,6 +117,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://packetstorm.news/files/id/172398", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28205.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28205.json index 06a5cfb7645..32a22a1d573 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28205.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28205.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28205", "sourceIdentifier": "product-security@apple.com", "published": "2023-04-10T19:15:07.237", - "lastModified": "2024-11-21T07:54:35.903", + "lastModified": "2025-01-28T22:15:14.637", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28316.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28316.json index 3e30b7d8140..98444a16c5e 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28316.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28316.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28316", "sourceIdentifier": "support@hackerone.com", "published": "2023-05-09T22:15:09.980", - "lastModified": "2024-11-21T07:54:49.460", + "lastModified": "2025-01-28T21:15:14.163", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28317.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28317.json index d63a8f9d5a3..ab52a0faa01 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28317.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28317.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28317", "sourceIdentifier": "support@hackerone.com", "published": "2023-05-09T22:15:10.027", - "lastModified": "2024-11-21T07:54:49.590", + "lastModified": "2025-01-28T21:15:14.333", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -55,6 +75,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28318.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28318.json index fc27e894496..58298c1b823 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28318.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28318.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28318", "sourceIdentifier": "support@hackerone.com", "published": "2023-05-09T22:15:10.083", - "lastModified": "2024-11-21T07:54:49.720", + "lastModified": "2025-01-28T21:15:14.500", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -55,6 +75,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29552.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29552.json index 9810a9d8fd3..fd0ab78836c 100644 --- a/CVE-2023/CVE-2023-295xx/CVE-2023-29552.json +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29552.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29552", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-25T16:15:09.537", - "lastModified": "2024-11-21T07:57:17.017", + "lastModified": "2025-01-28T22:15:14.983", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29791.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29791.json index 1bb7f561276..f082c7da3de 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29791.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29791.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29791", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T21:15:09.807", - "lastModified": "2024-11-21T07:57:31.123", + "lastModified": "2025-01-28T21:15:14.663", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37002.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37002.json index 3380bf6c3e4..c338ddd5dd1 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37002.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37002.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37002", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:09.757", - "lastModified": "2025-01-22T15:15:09.757", - "vulnStatus": "Received", + "lastModified": "2025-01-28T21:15:15.130", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Indicaci\u00f3n de modificaci\u00f3n de E-RAB\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37003.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37003.json index e2d68eb30a2..887035a122d 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37003.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37003.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37003", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:09.867", - "lastModified": "2025-01-22T15:15:09.867", - "vulnStatus": "Received", + "lastModified": "2025-01-28T21:15:15.313", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Respuesta de configuraci\u00f3n de E-RAB\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37004.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37004.json index c7e20cbd8d2..1f0c00deba5 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37004.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37004.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37004", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:09.970", - "lastModified": "2025-01-22T15:15:09.970", - "vulnStatus": "Received", + "lastModified": "2025-01-28T21:15:15.520", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Respuesta de configuraci\u00f3n de contexto inicial\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37005.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37005.json index dd850cb458b..89cbb3bad44 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37005.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37005.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37005", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:10.067", - "lastModified": "2025-01-22T15:15:10.067", - "vulnStatus": "Received", + "lastModified": "2025-01-28T21:15:15.700", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Error de configuraci\u00f3n de contexto inicial\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37006.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37006.json index 53775592c24..514dd3bb029 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37006.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37006.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37006", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:10.170", - "lastModified": "2025-01-22T15:15:10.170", - "vulnStatus": "Received", + "lastModified": "2025-01-28T21:15:15.873", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Handover Request Ack\" (confirmaci\u00f3n de solicitud de entrega) sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37007.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37007.json index 6a4de66249b..614c3bbacce 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37007.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37007.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37007", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:10.270", - "lastModified": "2025-01-22T15:15:10.270", - "vulnStatus": "Received", + "lastModified": "2025-01-28T22:15:15.220", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Cancelaci\u00f3n de entrega\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37008.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37008.json index efadd0b21da..0fe06b3b6b8 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37008.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37008.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37008", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:10.373", - "lastModified": "2025-01-22T15:15:10.373", - "vulnStatus": "Received", + "lastModified": "2025-01-28T22:15:15.390", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen un desbordamiento de b\u00fafer en la funci\u00f3n de deserializaci\u00f3n ASN.1 del controlador S1AP. Este desbordamiento de b\u00fafer provoca confusi\u00f3n de tipos en los campos decodificados, lo que genera un an\u00e1lisis no v\u00e1lido y la liberaci\u00f3n de memoria. Un atacante puede utilizar esto para bloquear un MME o potencialmente ejecutar c\u00f3digo en determinadas circunstancias." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37940.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37940.json index cf3da6be6f3..fa19129e3a7 100644 --- a/CVE-2023/CVE-2023-379xx/CVE-2023-37940.json +++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37940.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37940", "sourceIdentifier": "security@liferay.com", "published": "2024-12-17T22:15:05.080", - "lastModified": "2024-12-17T22:15:05.080", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:18:48.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -51,10 +71,644 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.4.3.88", + "matchCriteriaId": "BB292A92-C12B-486D-B4EE-421BFFD636AF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0", + "versionEndExcluding": "7.3", + "matchCriteriaId": "7F20477F-7F50-40D8-8DB2-251B4BC74207" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*", + "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update10:*:*:*:*:*:*", + "matchCriteriaId": "AA984F92-4C6C-4049-A731-96F587B51E75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update11:*:*:*:*:*:*", + "matchCriteriaId": "CADDF499-DDC4-4CEE-B512-404EA2024FCB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update12:*:*:*:*:*:*", + "matchCriteriaId": "9EC64246-1039-4009-B9BD-7828FA0FA1C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update13:*:*:*:*:*:*", + "matchCriteriaId": "D9F352AE-AE22-4A84-94B6-6621D7E0BC59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update14:*:*:*:*:*:*", + "matchCriteriaId": "3E84D881-6D47-48FD-B743-9D531F5F7D5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update15:*:*:*:*:*:*", + "matchCriteriaId": "1F8A9DEC-2C27-4EBB-B684-8EBDB374CFCC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update16:*:*:*:*:*:*", + "matchCriteriaId": "C3E7B777-8026-4C8F-9353-B5504873E0F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update17:*:*:*:*:*:*", + "matchCriteriaId": "2207FEE5-2537-4C6E-AC9C-EC53DBF3C57E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update18:*:*:*:*:*:*", + "matchCriteriaId": "087A2B43-07CE-4B3D-B879-449631DDA8D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update19:*:*:*:*:*:*", + "matchCriteriaId": "019CED83-6277-434C-839C-6C4E0C45FB1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update20:*:*:*:*:*:*", + "matchCriteriaId": "6C533124-74E6-4312-9AF7-6496DE2A5152" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update21:*:*:*:*:*:*", + "matchCriteriaId": "8DDA248D-5F00-4FC1-B857-A7942BAA1F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update22:*:*:*:*:*:*", + "matchCriteriaId": "6C6BA174-69D4-43FC-9395-1B6306A44CDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update23:*:*:*:*:*:*", + "matchCriteriaId": "A465C229-D3FB-43E9-87BE-119BEE9110F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update24:*:*:*:*:*:*", + "matchCriteriaId": "32E98546-CE96-4BB8-A11C-F7E850C155F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update25:*:*:*:*:*:*", + "matchCriteriaId": "DD43C626-F2F2-43BA-85AA-6ADAE8A6D11F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update26:*:*:*:*:*:*", + "matchCriteriaId": "5C72C0E0-7D0B-4E8F-A109-7BB5DCA1C8D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update27:*:*:*:*:*:*", + "matchCriteriaId": "7E796B04-FF54-4C02-979C-87E137A76F63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update28:*:*:*:*:*:*", + "matchCriteriaId": "07C3D771-5E1B-46C4-AAF8-F425377582D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update29:*:*:*:*:*:*", + "matchCriteriaId": "B08F95DC-BE49-4717-B959-2BE8BD131953" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*", + "matchCriteriaId": "AD408C73-7D78-4EB1-AA2C-F4A6D4DC980B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update5:*:*:*:*:*:*", + "matchCriteriaId": "513F3229-7C31-44EB-88F6-E564BE725853" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update6:*:*:*:*:*:*", + "matchCriteriaId": "76B9CD05-A10E-439C-9FDE-EA88EC3AF2C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update7:*:*:*:*:*:*", + "matchCriteriaId": "A7D2D415-36AA-41B2-8FD9-21A98CDFE1EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update8:*:*:*:*:*:*", + "matchCriteriaId": "124F2D2E-F8E7-4EDE-A98B-DD72FB43DF20" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update9:*:*:*:*:*:*", + "matchCriteriaId": "0DEE5985-289E-4138-B7C0-1E471BA7A1FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*", + "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*", + "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*", + "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*", + "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*", + "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*", + "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*", + "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*", + "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*", + "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*", + "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*", + "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*", + "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*", + "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*", + "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*", + "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*", + "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*", + "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*", + "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*", + "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*", + "matchCriteriaId": "331FC246-D3E9-4711-B305-BE51BF743CF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update27:*:*:*:*:*:*", + "matchCriteriaId": "A5823BC0-8C11-4C31-9E99-3C9D82918E2A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update28:*:*:*:*:*:*", + "matchCriteriaId": "E2E6CB66-1AE1-4626-8070-64C250ED8363" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update29:*:*:*:*:*:*", + "matchCriteriaId": "B63449AA-6831-4290-B1FA-0BB806820402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*", + "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update30:*:*:*:*:*:*", + "matchCriteriaId": "B3B169F6-B8B8-4612-AD7D-F75CC6A9297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update31:*:*:*:*:*:*", + "matchCriteriaId": "12D46756-D26D-4877-ACE8-1C2721908428" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update32:*:*:*:*:*:*", + "matchCriteriaId": "5403DCEF-20C2-4568-8DF1-30804F522915" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update33:*:*:*:*:*:*", + "matchCriteriaId": "90E39742-90BE-4DEB-AB78-F9B8F7333F9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*", + "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update35:*:*:*:*:*:*", + "matchCriteriaId": "341D1157-8118-4BD3-A902-36E90E066706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*", + "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update37:*:*:*:*:*:*", + "matchCriteriaId": "9446B3A5-6647-416C-92AF-7B6E0E929765" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update38:*:*:*:*:*:*", + "matchCriteriaId": "06386C7A-CAA1-4FC4-9182-5A66342FB903" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update39:*:*:*:*:*:*", + "matchCriteriaId": "8C84B701-B9A1-43D0-AF0C-30EDBD24CF90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*", + "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update40:*:*:*:*:*:*", + "matchCriteriaId": "BA9AF651-D118-4437-B400-531B26BF6801" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*", + "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update42:*:*:*:*:*:*", + "matchCriteriaId": "119B54BD-75F4-46A4-A57D-16CFF4E12CEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update43:*:*:*:*:*:*", + "matchCriteriaId": "A3382E2D-A414-40A1-A330-619859756A36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update44:*:*:*:*:*:*", + "matchCriteriaId": "2E07B750-55B6-4DB6-B02B-216C2F5505A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*", + "matchCriteriaId": "B921E670-480F-4793-A636-3855A1654908" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*", + "matchCriteriaId": "62AE52FE-FB7F-4339-BDDE-E5AD235BBC58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*", + "matchCriteriaId": "C99508DB-19E9-4832-AB38-57C61C7D68BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*", + "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*", + "matchCriteriaId": "131E4E65-D997-47F1-8CB8-15CE6A60AB1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*", + "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*", + "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*", + "matchCriteriaId": "94AC684E-3C5F-4859-B6EB-42C478F9DD11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*", + "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*", + "matchCriteriaId": "9855E3CB-925E-4623-A776-59422AB2FC6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*", + "matchCriteriaId": "01C3B7BE-1F9B-4EDA-990C-A4022CB85612" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*", + "matchCriteriaId": "65CF766C-626D-4F8C-BDBF-F0C5404DD545" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*", + "matchCriteriaId": "720EF24C-9A36-405B-A380-6114C150B376" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*", + "matchCriteriaId": "44479EF5-40BD-43A2-AD0F-CE1660222AB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*", + "matchCriteriaId": "B8E0BD92-0F77-481E-8167-F81755E00703" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*", + "matchCriteriaId": "2BDB885E-814A-4CA8-A81C-1DB35989089B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*", + "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*", + "matchCriteriaId": "B73DA1AE-C62F-4E62-AA98-5697656825F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*", + "matchCriteriaId": "D49DEE85-4DDB-4EF4-9F4D-11E7C1364055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*", + "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*", + "matchCriteriaId": "5FDAD47C-C2DA-4533-AA58-DD6EC09A580A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*", + "matchCriteriaId": "5F81F36F-B20F-48B3-A1F2-3D319A34176B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*", + "matchCriteriaId": "754329CD-30B7-4410-A371-56A7C261B61B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*", + "matchCriteriaId": "C9445405-6B94-4DD1-BA94-B600AA316BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*", + "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*", + "matchCriteriaId": "D2B77C89-7F33-47A0-B6BF-473366033BEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*", + "matchCriteriaId": "8183B9D5-1C4D-4D30-BD85-13850FF34CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*", + "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*", + "matchCriteriaId": "1675366A-2388-4F7E-B423-D39BC7D3D38D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*", + "matchCriteriaId": "B93C3CF2-4F45-4F6C-AB6D-F9ABDA7C4DA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*", + "matchCriteriaId": "34A6A6A0-9307-4F5D-9605-1F786D1CD62A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*", + "matchCriteriaId": "6B994132-7103-4132-9D90-11CA264FEDE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*", + "matchCriteriaId": "A1958E04-AB8A-4B0E-AB45-B810CAED2EEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*", + "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*", + "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*", + "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*", + "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*", + "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*", + "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*", + "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*", + "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*", + "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*", + "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*", + "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*", + "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*", + "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*", + "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*", + "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2023-37940", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40191.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40191.json index d9173815de5..3f8823a85ac 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40191.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40191.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40191", "sourceIdentifier": "security@liferay.com", "published": "2024-02-21T03:15:07.870", - "lastModified": "2024-11-21T08:18:58.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:18:13.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,16 +69,336 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.3.44", + "versionEndExcluding": "7.4.3.98", + "matchCriteriaId": "9F975792-5DD1-4202-A0E8-EEC7CB49C656" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update44:*:*:*:*:*:*", + "matchCriteriaId": "2E07B750-55B6-4DB6-B02B-216C2F5505A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*", + "matchCriteriaId": "B921E670-480F-4793-A636-3855A1654908" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*", + "matchCriteriaId": "62AE52FE-FB7F-4339-BDDE-E5AD235BBC58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*", + "matchCriteriaId": "C99508DB-19E9-4832-AB38-57C61C7D68BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*", + "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*", + "matchCriteriaId": "131E4E65-D997-47F1-8CB8-15CE6A60AB1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*", + "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*", + "matchCriteriaId": "94AC684E-3C5F-4859-B6EB-42C478F9DD11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*", + "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*", + "matchCriteriaId": "9855E3CB-925E-4623-A776-59422AB2FC6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*", + "matchCriteriaId": "01C3B7BE-1F9B-4EDA-990C-A4022CB85612" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*", + "matchCriteriaId": "65CF766C-626D-4F8C-BDBF-F0C5404DD545" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*", + "matchCriteriaId": "720EF24C-9A36-405B-A380-6114C150B376" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*", + "matchCriteriaId": "44479EF5-40BD-43A2-AD0F-CE1660222AB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*", + "matchCriteriaId": "B8E0BD92-0F77-481E-8167-F81755E00703" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*", + "matchCriteriaId": "2BDB885E-814A-4CA8-A81C-1DB35989089B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*", + "matchCriteriaId": "B73DA1AE-C62F-4E62-AA98-5697656825F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*", + "matchCriteriaId": "D49DEE85-4DDB-4EF4-9F4D-11E7C1364055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*", + "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*", + "matchCriteriaId": "5FDAD47C-C2DA-4533-AA58-DD6EC09A580A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*", + "matchCriteriaId": "5F81F36F-B20F-48B3-A1F2-3D319A34176B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*", + "matchCriteriaId": "754329CD-30B7-4410-A371-56A7C261B61B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*", + "matchCriteriaId": "C9445405-6B94-4DD1-BA94-B600AA316BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*", + "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*", + "matchCriteriaId": "D2B77C89-7F33-47A0-B6BF-473366033BEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*", + "matchCriteriaId": "8183B9D5-1C4D-4D30-BD85-13850FF34CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*", + "matchCriteriaId": "1675366A-2388-4F7E-B423-D39BC7D3D38D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*", + "matchCriteriaId": "B93C3CF2-4F45-4F6C-AB6D-F9ABDA7C4DA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*", + "matchCriteriaId": "34A6A6A0-9307-4F5D-9605-1F786D1CD62A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*", + "matchCriteriaId": "6B994132-7103-4132-9D90-11CA264FEDE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*", + "matchCriteriaId": "A1958E04-AB8A-4B0E-AB45-B810CAED2EEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*", + "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*", + "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*", + "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*", + "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*", + "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*", + "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*", + "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*", + "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*", + "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*", + "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*", + "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*", + "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*", + "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*", + "matchCriteriaId": "7C754823-899C-4EEF-ACB7-E1551FA88B25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*", + "matchCriteriaId": "493D4C18-DEE2-4040-9C13-3A9AB2CE47BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*", + "matchCriteriaId": "8F17DD75-E63B-4E4C-B136-D43F17B389EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*", + "matchCriteriaId": "62EE759A-78AD-40D6-8C5B-10403A8A4A89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*", + "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B7B3A5E2-23CE-45A8-BD01-77024EB9F9A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1EF6451A-2A5D-4222-A1C6-113AA4B8D4E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "9D6CE430-3C95-4855-BA44-E2E136D1FEB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "44FEB149-C792-493D-B055-568FFC96298A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "B050DD73-71B6-46CD-A35B-7ACB53BE6C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "62432289-E1DC-4013-85C7-6B77299A910F" + } + ] + } + ] } ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-40191", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-40191", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44308.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44308.json index d64115216bd..b2347e6d0c3 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44308.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44308.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44308", "sourceIdentifier": "security@liferay.com", "published": "2024-02-20T07:15:08.033", - "lastModified": "2024-11-21T08:25:38.240", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:34:39.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,16 +69,539 @@ "value": "CWE-601" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*", + "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*", + "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*", + "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*", + "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*", + "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*", + "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*", + "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*", + "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*", + "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*", + "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*", + "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*", + "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*", + "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*", + "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*", + "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*", + "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*", + "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*", + "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*", + "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*", + "matchCriteriaId": "331FC246-D3E9-4711-B305-BE51BF743CF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update27:*:*:*:*:*:*", + "matchCriteriaId": "A5823BC0-8C11-4C31-9E99-3C9D82918E2A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update28:*:*:*:*:*:*", + "matchCriteriaId": "E2E6CB66-1AE1-4626-8070-64C250ED8363" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update29:*:*:*:*:*:*", + "matchCriteriaId": "B63449AA-6831-4290-B1FA-0BB806820402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*", + "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update30:*:*:*:*:*:*", + "matchCriteriaId": "B3B169F6-B8B8-4612-AD7D-F75CC6A9297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update31:*:*:*:*:*:*", + "matchCriteriaId": "12D46756-D26D-4877-ACE8-1C2721908428" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update32:*:*:*:*:*:*", + "matchCriteriaId": "5403DCEF-20C2-4568-8DF1-30804F522915" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update33:*:*:*:*:*:*", + "matchCriteriaId": "90E39742-90BE-4DEB-AB78-F9B8F7333F9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*", + "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update35:*:*:*:*:*:*", + "matchCriteriaId": "341D1157-8118-4BD3-A902-36E90E066706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*", + "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update37:*:*:*:*:*:*", + "matchCriteriaId": "9446B3A5-6647-416C-92AF-7B6E0E929765" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update38:*:*:*:*:*:*", + "matchCriteriaId": "06386C7A-CAA1-4FC4-9182-5A66342FB903" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update39:*:*:*:*:*:*", + "matchCriteriaId": "8C84B701-B9A1-43D0-AF0C-30EDBD24CF90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*", + "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update40:*:*:*:*:*:*", + "matchCriteriaId": "BA9AF651-D118-4437-B400-531B26BF6801" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*", + "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update42:*:*:*:*:*:*", + "matchCriteriaId": "119B54BD-75F4-46A4-A57D-16CFF4E12CEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update43:*:*:*:*:*:*", + "matchCriteriaId": "A3382E2D-A414-40A1-A330-619859756A36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update44:*:*:*:*:*:*", + "matchCriteriaId": "2E07B750-55B6-4DB6-B02B-216C2F5505A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*", + "matchCriteriaId": "B921E670-480F-4793-A636-3855A1654908" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*", + "matchCriteriaId": "62AE52FE-FB7F-4339-BDDE-E5AD235BBC58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*", + "matchCriteriaId": "C99508DB-19E9-4832-AB38-57C61C7D68BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*", + "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*", + "matchCriteriaId": "131E4E65-D997-47F1-8CB8-15CE6A60AB1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*", + "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*", + "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*", + "matchCriteriaId": "94AC684E-3C5F-4859-B6EB-42C478F9DD11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*", + "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*", + "matchCriteriaId": "9855E3CB-925E-4623-A776-59422AB2FC6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*", + "matchCriteriaId": "01C3B7BE-1F9B-4EDA-990C-A4022CB85612" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*", + "matchCriteriaId": "65CF766C-626D-4F8C-BDBF-F0C5404DD545" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*", + "matchCriteriaId": "720EF24C-9A36-405B-A380-6114C150B376" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*", + "matchCriteriaId": "44479EF5-40BD-43A2-AD0F-CE1660222AB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*", + "matchCriteriaId": "B8E0BD92-0F77-481E-8167-F81755E00703" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*", + "matchCriteriaId": "2BDB885E-814A-4CA8-A81C-1DB35989089B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*", + "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*", + "matchCriteriaId": "B73DA1AE-C62F-4E62-AA98-5697656825F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*", + "matchCriteriaId": "D49DEE85-4DDB-4EF4-9F4D-11E7C1364055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*", + "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*", + "matchCriteriaId": "5FDAD47C-C2DA-4533-AA58-DD6EC09A580A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*", + "matchCriteriaId": "5F81F36F-B20F-48B3-A1F2-3D319A34176B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*", + "matchCriteriaId": "754329CD-30B7-4410-A371-56A7C261B61B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*", + "matchCriteriaId": "C9445405-6B94-4DD1-BA94-B600AA316BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*", + "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*", + "matchCriteriaId": "D2B77C89-7F33-47A0-B6BF-473366033BEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*", + "matchCriteriaId": "8183B9D5-1C4D-4D30-BD85-13850FF34CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*", + "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*", + "matchCriteriaId": "1675366A-2388-4F7E-B423-D39BC7D3D38D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*", + "matchCriteriaId": "B93C3CF2-4F45-4F6C-AB6D-F9ABDA7C4DA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*", + "matchCriteriaId": "34A6A6A0-9307-4F5D-9605-1F786D1CD62A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*", + "matchCriteriaId": "6B994132-7103-4132-9D90-11CA264FEDE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*", + "matchCriteriaId": "A1958E04-AB8A-4B0E-AB45-B810CAED2EEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*", + "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*", + "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*", + "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*", + "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*", + "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*", + "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*", + "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*", + "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*", + "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*", + "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*", + "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*", + "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*", + "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*", + "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*", + "matchCriteriaId": "7C754823-899C-4EEF-ACB7-E1551FA88B25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*", + "matchCriteriaId": "493D4C18-DEE2-4040-9C13-3A9AB2CE47BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*", + "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*", + "matchCriteriaId": "8F17DD75-E63B-4E4C-B136-D43F17B389EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*", + "matchCriteriaId": "62EE759A-78AD-40D6-8C5B-10403A8A4A89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*", + "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B7B3A5E2-23CE-45A8-BD01-77024EB9F9A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1EF6451A-2A5D-4222-A1C6-113AA4B8D4E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "9D6CE430-3C95-4855-BA44-E2E136D1FEB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "44FEB149-C792-493D-B055-568FFC96298A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "B050DD73-71B6-46CD-A35B-7ACB53BE6C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "62432289-E1DC-4013-85C7-6B77299A910F" + } + ] + } + ] } ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44308", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44308", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47795.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47795.json index f69b25649a9..3f54bc9033e 100644 --- a/CVE-2023/CVE-2023-477xx/CVE-2023-47795.json +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47795.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47795", "sourceIdentifier": "security@liferay.com", "published": "2024-02-21T14:15:45.677", - "lastModified": "2024-11-21T08:30:49.357", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:17:39.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,16 +69,466 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.3.18", + "versionEndExcluding": "7.4.3.102", + "matchCriteriaId": "9937F532-8A20-4311-A90A-A341DE318518" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*", + "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*", + "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*", + "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*", + "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*", + "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*", + "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*", + "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*", + "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*", + "matchCriteriaId": "331FC246-D3E9-4711-B305-BE51BF743CF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update27:*:*:*:*:*:*", + "matchCriteriaId": "A5823BC0-8C11-4C31-9E99-3C9D82918E2A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update28:*:*:*:*:*:*", + "matchCriteriaId": "E2E6CB66-1AE1-4626-8070-64C250ED8363" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update29:*:*:*:*:*:*", + "matchCriteriaId": "B63449AA-6831-4290-B1FA-0BB806820402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update30:*:*:*:*:*:*", + "matchCriteriaId": "B3B169F6-B8B8-4612-AD7D-F75CC6A9297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update31:*:*:*:*:*:*", + "matchCriteriaId": "12D46756-D26D-4877-ACE8-1C2721908428" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update32:*:*:*:*:*:*", + "matchCriteriaId": "5403DCEF-20C2-4568-8DF1-30804F522915" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update33:*:*:*:*:*:*", + "matchCriteriaId": "90E39742-90BE-4DEB-AB78-F9B8F7333F9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*", + "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update35:*:*:*:*:*:*", + "matchCriteriaId": "341D1157-8118-4BD3-A902-36E90E066706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*", + "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update37:*:*:*:*:*:*", + "matchCriteriaId": "9446B3A5-6647-416C-92AF-7B6E0E929765" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update38:*:*:*:*:*:*", + "matchCriteriaId": "06386C7A-CAA1-4FC4-9182-5A66342FB903" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update39:*:*:*:*:*:*", + "matchCriteriaId": "8C84B701-B9A1-43D0-AF0C-30EDBD24CF90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update40:*:*:*:*:*:*", + "matchCriteriaId": "BA9AF651-D118-4437-B400-531B26BF6801" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*", + "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update42:*:*:*:*:*:*", + "matchCriteriaId": "119B54BD-75F4-46A4-A57D-16CFF4E12CEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update43:*:*:*:*:*:*", + "matchCriteriaId": "A3382E2D-A414-40A1-A330-619859756A36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update44:*:*:*:*:*:*", + "matchCriteriaId": "2E07B750-55B6-4DB6-B02B-216C2F5505A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*", + "matchCriteriaId": "B921E670-480F-4793-A636-3855A1654908" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*", + "matchCriteriaId": "62AE52FE-FB7F-4339-BDDE-E5AD235BBC58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*", + "matchCriteriaId": "C99508DB-19E9-4832-AB38-57C61C7D68BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*", + "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*", + "matchCriteriaId": "131E4E65-D997-47F1-8CB8-15CE6A60AB1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*", + "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*", + "matchCriteriaId": "94AC684E-3C5F-4859-B6EB-42C478F9DD11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*", + "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*", + "matchCriteriaId": "9855E3CB-925E-4623-A776-59422AB2FC6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*", + "matchCriteriaId": "01C3B7BE-1F9B-4EDA-990C-A4022CB85612" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*", + "matchCriteriaId": "65CF766C-626D-4F8C-BDBF-F0C5404DD545" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*", + "matchCriteriaId": "720EF24C-9A36-405B-A380-6114C150B376" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*", + "matchCriteriaId": "44479EF5-40BD-43A2-AD0F-CE1660222AB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*", + "matchCriteriaId": "B8E0BD92-0F77-481E-8167-F81755E00703" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*", + "matchCriteriaId": "2BDB885E-814A-4CA8-A81C-1DB35989089B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*", + "matchCriteriaId": "B73DA1AE-C62F-4E62-AA98-5697656825F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*", + "matchCriteriaId": "D49DEE85-4DDB-4EF4-9F4D-11E7C1364055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*", + "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*", + "matchCriteriaId": "5FDAD47C-C2DA-4533-AA58-DD6EC09A580A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*", + "matchCriteriaId": "5F81F36F-B20F-48B3-A1F2-3D319A34176B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*", + "matchCriteriaId": "754329CD-30B7-4410-A371-56A7C261B61B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*", + "matchCriteriaId": "C9445405-6B94-4DD1-BA94-B600AA316BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*", + "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*", + "matchCriteriaId": "D2B77C89-7F33-47A0-B6BF-473366033BEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*", + "matchCriteriaId": "8183B9D5-1C4D-4D30-BD85-13850FF34CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*", + "matchCriteriaId": "1675366A-2388-4F7E-B423-D39BC7D3D38D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*", + "matchCriteriaId": "B93C3CF2-4F45-4F6C-AB6D-F9ABDA7C4DA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*", + "matchCriteriaId": "34A6A6A0-9307-4F5D-9605-1F786D1CD62A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*", + "matchCriteriaId": "6B994132-7103-4132-9D90-11CA264FEDE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*", + "matchCriteriaId": "A1958E04-AB8A-4B0E-AB45-B810CAED2EEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*", + "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*", + "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*", + "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*", + "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*", + "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*", + "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*", + "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*", + "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*", + "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*", + "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*", + "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*", + "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*", + "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*", + "matchCriteriaId": "7C754823-899C-4EEF-ACB7-E1551FA88B25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*", + "matchCriteriaId": "493D4C18-DEE2-4040-9C13-3A9AB2CE47BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*", + "matchCriteriaId": "8F17DD75-E63B-4E4C-B136-D43F17B389EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*", + "matchCriteriaId": "62EE759A-78AD-40D6-8C5B-10403A8A4A89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*", + "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B7B3A5E2-23CE-45A8-BD01-77024EB9F9A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1EF6451A-2A5D-4222-A1C6-113AA4B8D4E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "9D6CE430-3C95-4855-BA44-E2E136D1FEB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "44FEB149-C792-493D-B055-568FFC96298A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "B050DD73-71B6-46CD-A35B-7ACB53BE6C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "62432289-E1DC-4013-85C7-6B77299A910F" + } + ] + } + ] } ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-47795", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-47795", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5190.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5190.json index e4547509d8c..35c9e221bc2 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5190.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5190.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5190", "sourceIdentifier": "security@liferay.com", "published": "2024-02-20T06:15:07.680", - "lastModified": "2024-11-21T08:41:16.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:34:19.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,16 +69,321 @@ "value": "CWE-601" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*", + "matchCriteriaId": "B921E670-480F-4793-A636-3855A1654908" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*", + "matchCriteriaId": "62AE52FE-FB7F-4339-BDDE-E5AD235BBC58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*", + "matchCriteriaId": "C99508DB-19E9-4832-AB38-57C61C7D68BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*", + "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*", + "matchCriteriaId": "131E4E65-D997-47F1-8CB8-15CE6A60AB1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*", + "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*", + "matchCriteriaId": "94AC684E-3C5F-4859-B6EB-42C478F9DD11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*", + "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*", + "matchCriteriaId": "9855E3CB-925E-4623-A776-59422AB2FC6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*", + "matchCriteriaId": "01C3B7BE-1F9B-4EDA-990C-A4022CB85612" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*", + "matchCriteriaId": "65CF766C-626D-4F8C-BDBF-F0C5404DD545" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*", + "matchCriteriaId": "720EF24C-9A36-405B-A380-6114C150B376" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*", + "matchCriteriaId": "44479EF5-40BD-43A2-AD0F-CE1660222AB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*", + "matchCriteriaId": "B8E0BD92-0F77-481E-8167-F81755E00703" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*", + "matchCriteriaId": "2BDB885E-814A-4CA8-A81C-1DB35989089B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*", + "matchCriteriaId": "B73DA1AE-C62F-4E62-AA98-5697656825F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*", + "matchCriteriaId": "D49DEE85-4DDB-4EF4-9F4D-11E7C1364055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*", + "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*", + "matchCriteriaId": "5FDAD47C-C2DA-4533-AA58-DD6EC09A580A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*", + "matchCriteriaId": "5F81F36F-B20F-48B3-A1F2-3D319A34176B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*", + "matchCriteriaId": "754329CD-30B7-4410-A371-56A7C261B61B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*", + "matchCriteriaId": "C9445405-6B94-4DD1-BA94-B600AA316BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*", + "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*", + "matchCriteriaId": "D2B77C89-7F33-47A0-B6BF-473366033BEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*", + "matchCriteriaId": "8183B9D5-1C4D-4D30-BD85-13850FF34CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*", + "matchCriteriaId": "1675366A-2388-4F7E-B423-D39BC7D3D38D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*", + "matchCriteriaId": "B93C3CF2-4F45-4F6C-AB6D-F9ABDA7C4DA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*", + "matchCriteriaId": "34A6A6A0-9307-4F5D-9605-1F786D1CD62A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*", + "matchCriteriaId": "6B994132-7103-4132-9D90-11CA264FEDE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*", + "matchCriteriaId": "A1958E04-AB8A-4B0E-AB45-B810CAED2EEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*", + "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*", + "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*", + "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*", + "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*", + "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*", + "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*", + "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*", + "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*", + "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*", + "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*", + "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*", + "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*", + "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*", + "matchCriteriaId": "7C754823-899C-4EEF-ACB7-E1551FA88B25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*", + "matchCriteriaId": "493D4C18-DEE2-4040-9C13-3A9AB2CE47BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*", + "matchCriteriaId": "8F17DD75-E63B-4E4C-B136-D43F17B389EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*", + "matchCriteriaId": "62EE759A-78AD-40D6-8C5B-10403A8A4A89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*", + "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B7B3A5E2-23CE-45A8-BD01-77024EB9F9A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1EF6451A-2A5D-4222-A1C6-113AA4B8D4E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "9D6CE430-3C95-4855-BA44-E2E136D1FEB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "44FEB149-C792-493D-B055-568FFC96298A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "B050DD73-71B6-46CD-A35B-7ACB53BE6C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "62432289-E1DC-4013-85C7-6B77299A910F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.3.45", + "versionEndExcluding": "7.4.3.102", + "matchCriteriaId": "5C96C4DE-61AD-4E88-81BF-8A4F50F06AA5" + } + ] + } + ] } ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-5190", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-5190", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1042.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1042.json index 6ff7ac450fc..bd64ebe5db2 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1042.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1042.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1042", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-10T05:15:48.070", - "lastModified": "2024-11-21T08:49:40.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:05:07.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmilitary:wp_radio:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.1.9", + "matchCriteriaId": "A538A29B-1BD9-4E0E-B50A-75385A6EB30F" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/wp-radio/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b46e9771-37ff-4825-9af9-02ecde424653?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wordpress.org/plugins/wp-radio/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b46e9771-37ff-4825-9af9-02ecde424653?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11993.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11993.json index c5f666b711c..7f1a3446843 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11993.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11993.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11993", "sourceIdentifier": "security@liferay.com", "published": "2024-12-17T21:15:07.013", - "lastModified": "2024-12-17T21:15:07.013", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:18:09.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -73,10 +95,244 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1.0", + "versionEndExcluding": "7.4.3.39", + "matchCriteriaId": "DA343855-76B8-47E3-BBB3-31374B1CD8BA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1", + "versionEndExcluding": "7.4", + "matchCriteriaId": "9DDBD8B4-51C6-4D66-8B59-E61BEDF90D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*", + "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*", + "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*", + "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*", + "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*", + "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*", + "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*", + "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*", + "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*", + "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*", + "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*", + "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*", + "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*", + "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*", + "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*", + "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*", + "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*", + "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*", + "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*", + "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*", + "matchCriteriaId": "331FC246-D3E9-4711-B305-BE51BF743CF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update27:*:*:*:*:*:*", + "matchCriteriaId": "A5823BC0-8C11-4C31-9E99-3C9D82918E2A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update28:*:*:*:*:*:*", + "matchCriteriaId": "E2E6CB66-1AE1-4626-8070-64C250ED8363" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update29:*:*:*:*:*:*", + "matchCriteriaId": "B63449AA-6831-4290-B1FA-0BB806820402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*", + "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update30:*:*:*:*:*:*", + "matchCriteriaId": "B3B169F6-B8B8-4612-AD7D-F75CC6A9297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update31:*:*:*:*:*:*", + "matchCriteriaId": "12D46756-D26D-4877-ACE8-1C2721908428" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update32:*:*:*:*:*:*", + "matchCriteriaId": "5403DCEF-20C2-4568-8DF1-30804F522915" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update33:*:*:*:*:*:*", + "matchCriteriaId": "90E39742-90BE-4DEB-AB78-F9B8F7333F9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*", + "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update35:*:*:*:*:*:*", + "matchCriteriaId": "341D1157-8118-4BD3-A902-36E90E066706" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*", + "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update37:*:*:*:*:*:*", + "matchCriteriaId": "9446B3A5-6647-416C-92AF-7B6E0E929765" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update38:*:*:*:*:*:*", + "matchCriteriaId": "06386C7A-CAA1-4FC4-9182-5A66342FB903" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*", + "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*", + "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*", + "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*", + "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*", + "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*", + "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-11993", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12280.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12280.json index 70d6b8b0aa9..cce8ea10bca 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12280.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12280.json @@ -2,20 +2,63 @@ "id": "CVE-2024-12280", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-27T06:15:21.207", - "lastModified": "2025-01-27T06:15:21.207", - "vulnStatus": "Received", + "lastModified": "2025-01-28T21:15:16.317", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Customer Area WordPress plugin through 8.2.4 does not have CSRF check in place when deleting its logs, which could allow attackers to make a logged in to delete them via a CSRF attack" + }, + { + "lang": "es", + "value": "El complemento WP Customer Area de WordPress hasta la versi\u00f3n 8.2.4 no tiene una verificaci\u00f3n CSRF activada al eliminar sus registros, lo que podr\u00eda permitir a los atacantes iniciar sesi\u00f3n para eliminarlos a trav\u00e9s de un ataque CSRF." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://wpscan.com/vulnerability/2b32c0b8-28bb-4220-800b-4c369bca91c5/", "source": "contact@wpscan.com" + }, + { + "url": "https://wpscan.com/vulnerability/2b32c0b8-28bb-4220-800b-4c369bca91c5/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13095.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13095.json index 77944b3a9c3..be38fca80fb 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13095.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13095.json @@ -2,20 +2,51 @@ "id": "CVE-2024-13095", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-27T06:15:23.440", - "lastModified": "2025-01-27T06:15:23.440", - "vulnStatus": "Received", + "lastModified": "2025-01-28T21:15:16.453", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Triggers Lite WordPress plugin through 2.5.3 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks" + }, + { + "lang": "es", + "value": "El complemento WP Triggers Lite para WordPress hasta la versi\u00f3n 2.5.3 no desinfecta ni escapa un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL, lo que permite a los administradores realizar ataques de inyecci\u00f3n SQL. " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/74e95fb5-025b-4d4d-a279-844b6ee3e57d/", "source": "contact@wpscan.com" + }, + { + "url": "https://wpscan.com/vulnerability/74e95fb5-025b-4d4d-a279-844b6ee3e57d/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24432.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24432.json index b53d88197aa..de9c4b80fa4 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24432.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24432.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24432", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:12.793", - "lastModified": "2025-01-22T15:15:12.793", - "vulnStatus": "Received", + "lastModified": "2025-01-28T22:15:15.557", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Una afirmaci\u00f3n alcanzable en la funci\u00f3n ogs_kdf_hash_mme de Open5GS <= 2.6.4 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete NAS manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25147.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25147.json index fc23f3dd487..2c59f92975a 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25147.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25147.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25147", "sourceIdentifier": "security@liferay.com", "published": "2024-02-21T02:15:29.750", - "lastModified": "2024-11-21T09:00:21.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:25:53.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,16 +69,186 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.4.2", + "matchCriteriaId": "69440C19-B9E7-41F3-B731-B5C7E37C718A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2", + "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*", + "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*", + "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*", + "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*", + "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*", + "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*", + "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*", + "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*", + "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*", + "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86" + } + ] + } + ] } ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25147", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25147", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25152.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25152.json index b11ce3d5703..9246fa0de7f 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25152.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25152.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25152", "sourceIdentifier": "security@liferay.com", "published": "2024-02-21T02:15:29.933", - "lastModified": "2024-11-21T09:00:21.653", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:26:06.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,16 +69,196 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.4.3.4", + "matchCriteriaId": "831BFAEF-E7B6-4E84-9142-79B93FBA0E8A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2", + "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*", + "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*", + "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*", + "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*", + "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*", + "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*", + "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*", + "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*", + "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*", + "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*", + "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*", + "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86" + } + ] + } + ] } ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25152", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25152", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25601.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25601.json index befd2517601..8114d943ce4 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25601.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25601.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25601", "sourceIdentifier": "security@liferay.com", "published": "2024-02-21T02:15:30.100", - "lastModified": "2024-11-21T09:01:03.450", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:26:17.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,16 +69,196 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.4.3.4", + "matchCriteriaId": "831BFAEF-E7B6-4E84-9142-79B93FBA0E8A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2", + "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*", + "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*", + "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*", + "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*", + "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*", + "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*", + "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*", + "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*", + "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*", + "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*", + "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*", + "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86" + } + ] + } + ] } ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25601", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25601", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25602.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25602.json index e46d081496c..44780c358d3 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25602.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25602.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25602", "sourceIdentifier": "security@liferay.com", "published": "2024-02-21T02:15:30.267", - "lastModified": "2024-11-21T09:01:03.573", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:26:27.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,16 +69,196 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.4.3.4", + "matchCriteriaId": "831BFAEF-E7B6-4E84-9142-79B93FBA0E8A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2", + "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*", + "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*", + "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*", + "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*", + "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*", + "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*", + "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*", + "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*", + "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*", + "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*", + "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*", + "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86" + } + ] + } + ] } ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25602", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25602", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26265.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26265.json index 19246d627b2..90ffa08b2b2 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26265.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26265.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26265", "sourceIdentifier": "security@liferay.com", "published": "2024-02-20T13:15:08.673", - "lastModified": "2024-11-21T09:02:15.967", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:35:11.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,303 @@ "value": "CWE-770" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionEndIncluding": "7.3.7", + "matchCriteriaId": "DB1BD676-9B8D-44B0-9EAA-777EC43859DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndExcluding": "7.4.3.16", + "matchCriteriaId": "07B40276-6D4F-49A5-AB91-D3BD7B8000C9" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2", + "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*", + "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*", + "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*", + "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*", + "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*", + "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*", + "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*", + "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*", + "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*", + "matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*", + "matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*", + "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*", + "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*", + "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*", + "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*", + "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*", + "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*", + "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*", + "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*", + "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*", + "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*", + "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*", + "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*", + "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*", + "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*", + "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*", + "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*", + "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*", + "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*", + "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3" + } + ] + } + ] } ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26265", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26265", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26267.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26267.json index 8c187907ff5..2833f8e2fd0 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26267.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26267.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26267", "sourceIdentifier": "security@liferay.com", "published": "2024-02-20T13:15:08.843", - "lastModified": "2024-11-21T09:02:16.190", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:36:47.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,16 +69,358 @@ "value": "CWE-1188" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionEndIncluding": "7.3.7", + "matchCriteriaId": "DB1BD676-9B8D-44B0-9EAA-777EC43859DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndExcluding": "7.4.3.26", + "matchCriteriaId": "DC7C6A95-F6F4-40F0-AEB7-66A575A949EE" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2", + "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*", + "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*", + "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*", + "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*", + "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*", + "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*", + "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*", + "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*", + "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*", + "matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*", + "matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*", + "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*", + "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*", + "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*", + "matchCriteriaId": "AD408C73-7D78-4EB1-AA2C-F4A6D4DC980B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*", + "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*", + "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*", + "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*", + "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*", + "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*", + "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*", + "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*", + "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*", + "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*", + "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*", + "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*", + "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*", + "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*", + "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*", + "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*", + "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*", + "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*", + "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*", + "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*", + "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*", + "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*", + "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*", + "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*", + "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*", + "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*", + "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3" + } + ] + } + ] } ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26267", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26267", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26268.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26268.json index f660fa0a5eb..4fedf0aa52e 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26268.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26268.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26268", "sourceIdentifier": "security@liferay.com", "published": "2024-02-20T14:15:09.350", - "lastModified": "2024-11-21T09:02:16.310", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:37:57.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,16 +69,388 @@ "value": "CWE-203" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionEndIncluding": "7.3.7", + "matchCriteriaId": "DB1BD676-9B8D-44B0-9EAA-777EC43859DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndExcluding": "7.4.3.27", + "matchCriteriaId": "DE5E4603-8FA6-4041-8C76-46374C479191" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2", + "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*", + "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*", + "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*", + "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*", + "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*", + "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*", + "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*", + "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*", + "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*", + "matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*", + "matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_19:*:*:*:*:*:*", + "matchCriteriaId": "6A773FC6-429D-483D-9736-25323B55A71F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*", + "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*", + "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "B6AAAAF1-994E-409D-8FC7-DE2A2CF60AD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*", + "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*", + "matchCriteriaId": "AD408C73-7D78-4EB1-AA2C-F4A6D4DC980B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update5:*:*:*:*:*:*", + "matchCriteriaId": "513F3229-7C31-44EB-88F6-E564BE725853" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update6:*:*:*:*:*:*", + "matchCriteriaId": "76B9CD05-A10E-439C-9FDE-EA88EC3AF2C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update7:*:*:*:*:*:*", + "matchCriteriaId": "A7D2D415-36AA-41B2-8FD9-21A98CDFE1EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*", + "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*", + "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*", + "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*", + "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*", + "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*", + "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*", + "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*", + "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*", + "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*", + "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*", + "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*", + "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*", + "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*", + "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*", + "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*", + "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*", + "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*", + "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*", + "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*", + "matchCriteriaId": "331FC246-D3E9-4711-B305-BE51BF743CF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*", + "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*", + "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*", + "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*", + "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*", + "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*", + "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*", + "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3" + } + ] + } + ] } ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26268", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26268", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26270.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26270.json index 0204651a19c..fadd5835125 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26270.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26270.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26270", "sourceIdentifier": "security@liferay.com", "published": "2024-02-20T14:15:09.530", - "lastModified": "2024-11-21T09:02:16.553", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:25:41.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 } ] }, @@ -49,16 +69,171 @@ "value": "CWE-201" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.3.76", + "versionEndExcluding": "7.4.3.100", + "matchCriteriaId": "2DB383E5-7A0E-46A2-AB91-E4536889A6DB" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*", + "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*", + "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*", + "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*", + "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*", + "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*", + "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*", + "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*", + "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*", + "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*", + "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*", + "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*", + "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*", + "matchCriteriaId": "7C754823-899C-4EEF-ACB7-E1551FA88B25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*", + "matchCriteriaId": "493D4C18-DEE2-4040-9C13-3A9AB2CE47BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*", + "matchCriteriaId": "8F17DD75-E63B-4E4C-B136-D43F17B389EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*", + "matchCriteriaId": "62EE759A-78AD-40D6-8C5B-10403A8A4A89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*", + "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B7B3A5E2-23CE-45A8-BD01-77024EB9F9A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1EF6451A-2A5D-4222-A1C6-113AA4B8D4E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "9D6CE430-3C95-4855-BA44-E2E136D1FEB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "44FEB149-C792-493D-B055-568FFC96298A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "B050DD73-71B6-46CD-A35B-7ACB53BE6C6A" + } + ] + } + ] } ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26270", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26270", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27985.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27985.json index 25072523e0b..596de176637 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27985.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27985.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27985", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-11T01:25:07.037", - "lastModified": "2024-11-21T09:05:33.917", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:17:20.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wp-property-hive:propertyhive:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.10", + "matchCriteriaId": "0F6A2BA2-977D-4212-A415-A7F35EC8D574" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/propertyhive/wordpress-propertyhive-plugin-2-0-9-php-object-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/propertyhive/wordpress-propertyhive-plugin-2-0-9-php-object-injection-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29869.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29869.json new file mode 100644 index 00000000000..714d884ef36 --- /dev/null +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29869.json @@ -0,0 +1,45 @@ +{ + "id": "CVE-2024-29869", + "sourceIdentifier": "security@apache.org", + "published": "2025-01-28T22:15:15.727", + "lastModified": "2025-01-28T22:15:15.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Hive creates a credentials file to a temporary directory in the file system with permissions 644 by default when the file permissions are not set explicitly. Any unauthorized user having access to the directory can read the sensitive information written into this file.\u00a0Users are recommended to upgrade to version 4.0.1, which fixes this issue." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/apache/hive", + "source": "security@apache.org" + }, + { + "url": "https://github.com/apache/hive/commit/20106e254527f7d71b2e34455c4322e14950c620", + "source": "security@apache.org" + }, + { + "url": "https://issues.apache.org/jira/browse/HIVE-28134", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/h27ohpyrqf9w1m3c0tqr7x8jg59rcrv6", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31871.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31871.json index 7ca666b0a76..c814d871f0f 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31871.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31871.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31871", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-04-10T16:15:15.183", - "lastModified": "2024-11-21T09:14:03.970", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:08:28.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ] }, @@ -51,22 +71,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_verify_access:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndIncluding": "10.0.7", + "matchCriteriaId": "59753637-31E8-4A8A-8C65-6F0D7746F217" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287306", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7147932", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287306", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7147932", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31872.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31872.json index a587895f41c..2dc818b352e 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31872.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31872.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31872", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-04-10T16:15:15.413", - "lastModified": "2024-11-21T09:14:04.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:11:32.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ] }, @@ -51,22 +71,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_verify_access:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndIncluding": "10.0.7", + "matchCriteriaId": "59753637-31E8-4A8A-8C65-6F0D7746F217" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287316", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7147932", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287316", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7147932", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31873.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31873.json index 4394f9068bf..592aa2a9989 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31873.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31873.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31873", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-04-10T16:15:15.670", - "lastModified": "2024-11-21T09:14:04.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:13:10.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,22 +71,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_verify_access:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndIncluding": "10.0.7", + "matchCriteriaId": "59753637-31E8-4A8A-8C65-6F0D7746F217" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287317", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7147932", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287317", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7147932", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3214.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3214.json index 592dd01b508..a4f5f4b6b50 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3214.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3214.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3214", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:40.377", - "lastModified": "2024-11-21T09:29:09.770", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:03:01.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1236" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:relevanssi:relevanssi:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.22.2", + "matchCriteriaId": "020024C1-3199-477A-A3EF-FD9BFBE20547" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3064304/relevanssi/tags/4.22.2/lib/log.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9960bae9-6f19-49eb-8f24-fdde4933671e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3064304/relevanssi/tags/4.22.2/lib/log.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9960bae9-6f19-49eb-8f24-fdde4933671e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34732.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34732.json index b15da23ce68..76ecd41cd07 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34732.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34732.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34732", "sourceIdentifier": "security@android.com", "published": "2025-01-28T20:15:30.790", - "lastModified": "2025-01-28T20:15:30.790", + "lastModified": "2025-01-28T21:15:16.583", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In RGXMMUCacheInvalidate of rgxmem.c, there is a possible arbitrary code execution due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-10-01", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34733.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34733.json index cf81fbbd364..c8414550cdc 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34733.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34733.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34733", "sourceIdentifier": "security@android.com", "published": "2025-01-28T20:15:30.893", - "lastModified": "2025-01-28T20:15:30.893", + "lastModified": "2025-01-28T21:15:16.713", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In DevmemXIntMapPages of devicemem_server.c, there is a possible arbitrary code execution due to an integer overflow. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-10-01", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34748.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34748.json index 96bd597d4eb..ab03acce246 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34748.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34748.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34748", "sourceIdentifier": "security@android.com", "published": "2025-01-28T20:15:30.993", - "lastModified": "2025-01-28T20:15:30.993", + "lastModified": "2025-01-28T21:15:16.840", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In _DevmemXReservationPageAddress of devicemem_server.c, there is a possible use-after-free due to improper casting. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-10-01", diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3617.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3617.json index 6f2dc2f1b2d..eaf88eaf981 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3617.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3617.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3617", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-11T02:15:47.547", - "lastModified": "2024-11-21T09:29:59.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:22:14.473", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:advocate_office_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D969EB85-DD8C-48DD-9D1F-58755EB5343A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/zyairelai/CVE-submissions/blob/main/kortex-deactivate_case-sqli.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260273", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260273", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312804", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/zyairelai/CVE-submissions/blob/main/kortex-deactivate_case-sqli.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260273", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260273", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312804", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3618.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3618.json index a7d7790263b..1398291c347 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3618.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3618.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3618", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-11T03:15:09.883", - "lastModified": "2024-11-21T09:30:00.147", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:25:45.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,86 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:advocate_office_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D969EB85-DD8C-48DD-9D1F-58755EB5343A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/zyairelai/CVE-submissions/blob/main/kortex-activate_case-sqli.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260274", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260274", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312807", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://github.com/zyairelai/CVE-submissions/blob/main/kortex-activate_case-sqli.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260274", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260274", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312807", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3619.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3619.json index 810d529ca07..dd54bb41cdb 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3619.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3619.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3619", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-11T03:15:10.237", - "lastModified": "2024-11-21T09:30:00.287", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:28:57.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:advocate_office_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D969EB85-DD8C-48DD-9D1F-58755EB5343A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/zyairelai/CVE-submissions/blob/main/kortex-addcase_stage-sqli.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260275", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260275", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312813", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://github.com/zyairelai/CVE-submissions/blob/main/kortex-addcase_stage-sqli.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260275", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260275", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312813", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3620.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3620.json index 65101bf6f8a..982a07b4f97 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3620.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3620.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3620", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-11T03:15:10.577", - "lastModified": "2024-11-21T09:30:00.430", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T21:47:39.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:advocate_office_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D969EB85-DD8C-48DD-9D1F-58755EB5343A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/zyairelai/CVE-submissions/blob/main/kortex-adds-sqli.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260276", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260276", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312815", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://github.com/zyairelai/CVE-submissions/blob/main/kortex-adds-sqli.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260276", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260276", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312815", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40649.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40649.json index bba37a644d6..4968b6985b0 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40649.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40649.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40649", "sourceIdentifier": "security@android.com", "published": "2025-01-28T20:15:49.063", - "lastModified": "2025-01-28T20:15:49.063", + "lastModified": "2025-01-28T21:15:17.117", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In TBD of TBD, there is a possible use-after-free due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-10-01", diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40651.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40651.json index 3b0dae472a6..9534b0d8fb4 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40651.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40651.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40651", "sourceIdentifier": "security@android.com", "published": "2025-01-28T20:15:49.160", - "lastModified": "2025-01-28T20:15:49.160", + "lastModified": "2025-01-28T21:15:17.253", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In TBD of TBD, there is a possible use-after-free due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-10-01", diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40669.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40669.json index 98c2bba7678..52b0aac9507 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40669.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40669.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40669", "sourceIdentifier": "security@android.com", "published": "2025-01-28T20:15:49.250", - "lastModified": "2025-01-28T20:15:49.250", + "lastModified": "2025-01-28T21:15:17.387", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In TBD of TBD, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-10-01", diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40670.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40670.json index 5d8f69e118f..f5f697e20c3 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40670.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40670.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40670", "sourceIdentifier": "security@android.com", "published": "2025-01-28T20:15:49.343", - "lastModified": "2025-01-28T20:15:49.343", + "lastModified": "2025-01-28T21:15:17.527", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In TBD of TBD, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-10-01", diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40672.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40672.json index a37054cef7d..4b4cc9ec607 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40672.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40672.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40672", "sourceIdentifier": "security@android.com", "published": "2025-01-28T20:15:49.433", - "lastModified": "2025-01-28T20:15:49.433", + "lastModified": "2025-01-28T21:15:17.657", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In onCreate of ChooserActivity.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/modules/IntentResolver/+/ccd29124d0d2276a3071c0418c14dec188cd3727", diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40677.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40677.json index 5eba98101da..4cc91789cc2 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40677.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40677.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40677", "sourceIdentifier": "security@android.com", "published": "2025-01-28T20:15:49.890", - "lastModified": "2025-01-28T20:15:49.890", + "lastModified": "2025-01-28T21:15:17.797", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In shouldSkipForInitialSUW of AdvancedPowerUsageDetail.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/db26138f07db830e3fb78283d37de3c0296d93cb", diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55968.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55968.json new file mode 100644 index 00000000000..a37159d93db --- /dev/null +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55968.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-55968", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-28T22:15:15.860", + "lastModified": "2025-01-28T22:15:15.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in DTEX DEC-M (DTEX Forwarder) 6.1.1. The com.dtexsystems.helper service, responsible for handling privileged operations within the macOS DTEX Event Forwarder agent, fails to implement critical client validation during XPC interprocess communication (IPC). Specifically, the service does not verify the code requirements, entitlements, security flags, or version of any client attempting to establish a connection. This lack of proper logic validation allows malicious actors to exploit the service's methods via unauthorized client connections, and escalate privileges to root by abusing the DTConnectionHelperProtocol protocol's submitQuery method over an unauthorized XPC connection." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Wi1DN00B/CVE-2024-55968", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/null-event/CVE-2024-55968", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-573xx/CVE-2024-57369.json b/CVE-2024/CVE-2024-573xx/CVE-2024-57369.json index bbbc0e25172..90097f3179f 100644 --- a/CVE-2024/CVE-2024-573xx/CVE-2024-57369.json +++ b/CVE-2024/CVE-2024-573xx/CVE-2024-57369.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57369", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-17T20:15:29.140", - "lastModified": "2025-01-17T20:15:29.140", + "lastModified": "2025-01-28T21:15:17.933", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de clickjacking en typecho v1.2.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + } + ], "references": [ { "url": "https://github.com/typecho/typecho", diff --git a/CVE-2024/CVE-2024-573xx/CVE-2024-57376.json b/CVE-2024/CVE-2024-573xx/CVE-2024-57376.json new file mode 100644 index 00000000000..ac7e903c513 --- /dev/null +++ b/CVE-2024/CVE-2024-573xx/CVE-2024-57376.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-57376", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-28T22:15:15.990", + "lastModified": "2025-01-28T22:15:15.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability in D-Link DSR-150, DSR-150N, DSR-250, DSR-250N, DSR-500N, DSR-1000N from 3.13 to 3.17B901C allows unauthenticated users to execute remote code execution." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57514.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57514.json new file mode 100644 index 00000000000..94d50adbed8 --- /dev/null +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57514.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-57514", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-28T22:15:16.103", + "lastModified": "2025-01-28T22:15:16.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The TP-Link Archer A20 v3 router is vulnerable to Cross-site Scripting (XSS) due to improper handling of directory listing paths in the web interface. When a specially crafted URL is visited, the router's web page renders the directory listing and executes arbitrary JavaScript embedded in the URL. This allows the attacker to inject malicious code into the page, executing JavaScript on the victim's browser, which could then be used for further malicious actions. The vulnerability was identified in the 1.0.6 Build 20231011 rel.85717(5553) version." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.zyenra.com/blog/xss-in-tplink-archer-a20.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7993.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7993.json index db349c29360..ea60aae04b9 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7993.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7993.json @@ -2,13 +2,13 @@ "id": "CVE-2024-7993", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-16T22:15:03.133", - "lastModified": "2024-10-21T18:27:01.950", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-28T21:15:18.117", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A maliciously crafted PDF file, when parsed through Autodesk Revit, can force an Out-of-Bounds Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + "value": "A maliciously crafted PDF file, when parsed through Autodesk Revit, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0785.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0785.json new file mode 100644 index 00000000000..ebadd8c9207 --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0785.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-0785", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-28T22:15:16.227", + "lastModified": "2025-01-28T22:15:16.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in ESAFENET CDG V5 and classified as problematic. This issue affects some unknown processing of the file /SysConfig.jsp. The manipulation of the argument help leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Rain1er/report/blob/main/CDG/SysConfig.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293909", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293909", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.483338", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0786.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0786.json new file mode 100644 index 00000000000..d4d17195289 --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0786.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-0786", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-28T22:15:16.423", + "lastModified": "2025-01-28T22:15:16.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in ESAFENET CDG V5. It has been classified as critical. Affected is an unknown function of the file /appDetail.jsp. The manipulation of the argument flowId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Rain1er/report/blob/main/CDG/appDetail.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293910", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293910", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.483339", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0787.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0787.json new file mode 100644 index 00000000000..ea65360a6c4 --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0787.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-0787", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-28T22:15:16.600", + "lastModified": "2025-01-28T22:15:16.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in ESAFENET CDG V5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /appDetail.jsp. The manipulation of the argument curpage leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Rain1er/report/blob/main/CDG/appDetail_1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293911", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293911", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.483340", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22917.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22917.json new file mode 100644 index 00000000000..1f10182afd6 --- /dev/null +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22917.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-22917", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-28T22:15:16.770", + "lastModified": "2025-01-28T22:15:16.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A reflected cross-site scripting (XSS) vulnerability in Audemium ERP <=0.9.0 allows remote attackers to execute an arbitrary JavaScript payload in the web browser of a user by including a malicious payload into the 'type' parameter of list.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/timosarkar/vulnerabilities/blob/main/CVE-2025-22917/README.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22980.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22980.json index 7242efdc579..51c823c25f4 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22980.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22980.json @@ -2,7 +2,7 @@ "id": "CVE-2025-22980", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:15.130", - "lastModified": "2025-01-27T18:15:40.933", + "lastModified": "2025-01-28T22:15:16.890", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en Senayan Library Management System SLiMS 9 Bulian 9.6.1 a trav\u00e9s del par\u00e1metro tempLoanID en el formulario de pr\u00e9stamo en /admin/modules/circulation/loan.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/slims/slims9_bulian/issues/270", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24156.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24156.json index 5690695c7eb..37600e51836 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24156.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24156.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24156", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:19.710", - "lastModified": "2025-01-27T22:15:19.710", - "vulnStatus": "Received", + "lastModified": "2025-01-28T21:15:18.340", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer overflow was addressed through improved input validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to elevate privileges." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un desbordamiento de n\u00fameros enteros mediante una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda elevar privilegios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24166.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24166.json index 5f18526f5d8..eedb5e78c1f 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24166.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24166.json @@ -2,48 +2,15 @@ "id": "CVE-2025-24166", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:20.357", - "lastModified": "2025-01-27T22:15:20.357", - "vulnStatus": "Received", + "lastModified": "2025-01-28T22:15:17.080", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "This issue was addressed through improved state management. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing maliciously crafted web content may lead to an unexpected process crash." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://support.apple.com/en-us/122066", - "source": "product-security@apple.com" - }, - { - "url": "https://support.apple.com/en-us/122067", - "source": "product-security@apple.com" - }, - { - "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" - }, - { - "url": "https://support.apple.com/en-us/122069", - "source": "product-security@apple.com" - }, - { - "url": "https://support.apple.com/en-us/122070", - "source": "product-security@apple.com" - }, - { - "url": "https://support.apple.com/en-us/122071", - "source": "product-security@apple.com" - }, - { - "url": "https://support.apple.com/en-us/122072", - "source": "product-security@apple.com" - }, - { - "url": "https://support.apple.com/en-us/122073", - "source": "product-security@apple.com" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24481.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24481.json new file mode 100644 index 00000000000..395396b1821 --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24481.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-24481", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-01-28T21:15:18.520", + "lastModified": "2025-01-28T21:15:18.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Incorrect Permission Assignment Vulnerability exists in the product and version listed above. The vulnerability is due to incorrect permissions being assigned to the remote debugger port and can allow for unauthenticated access to the system configuration." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1720.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24482.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24482.json new file mode 100644 index 00000000000..460be7d9841 --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24482.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-24482", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-01-28T21:15:18.687", + "lastModified": "2025-01-28T21:15:18.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Local Code Injection Vulnerability exists in the product and version listed above. The vulnerability is due to incorrect default permissions and allows for DLLs to be executed with higher level permissions." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1720.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24826.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24826.json new file mode 100644 index 00000000000..879920156e2 --- /dev/null +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24826.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24826", + "sourceIdentifier": "security@acronis.com", + "published": "2025-01-28T21:15:18.817", + "lastModified": "2025-01-28T21:15:18.817", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Snap Deploy (Windows) before build 4625." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@acronis.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@acronis.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://security-advisory.acronis.com/advisories/SEC-6436", + "source": "security@acronis.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 967d368c810..60273c32a99 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-28T21:00:21.071918+00:00 +2025-01-28T23:00:20.419672+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-28T20:39:34.613000+00:00 +2025-01-28T22:15:17.080000+00:00 ``` ### Last Data Feed Release @@ -33,64 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -279325 +279336 ``` ### CVEs added in the last Commit -Recently added CVEs: `20` +Recently added CVEs: `11` -- [CVE-2024-34732](CVE-2024/CVE-2024-347xx/CVE-2024-34732.json) (`2025-01-28T20:15:30.790`) -- [CVE-2024-34733](CVE-2024/CVE-2024-347xx/CVE-2024-34733.json) (`2025-01-28T20:15:30.893`) -- [CVE-2024-34748](CVE-2024/CVE-2024-347xx/CVE-2024-34748.json) (`2025-01-28T20:15:30.993`) -- [CVE-2024-40649](CVE-2024/CVE-2024-406xx/CVE-2024-40649.json) (`2025-01-28T20:15:49.063`) -- [CVE-2024-40651](CVE-2024/CVE-2024-406xx/CVE-2024-40651.json) (`2025-01-28T20:15:49.160`) -- [CVE-2024-40669](CVE-2024/CVE-2024-406xx/CVE-2024-40669.json) (`2025-01-28T20:15:49.250`) -- [CVE-2024-40670](CVE-2024/CVE-2024-406xx/CVE-2024-40670.json) (`2025-01-28T20:15:49.343`) -- [CVE-2024-40672](CVE-2024/CVE-2024-406xx/CVE-2024-40672.json) (`2025-01-28T20:15:49.433`) -- [CVE-2024-40673](CVE-2024/CVE-2024-406xx/CVE-2024-40673.json) (`2025-01-28T20:15:49.530`) -- [CVE-2024-40674](CVE-2024/CVE-2024-406xx/CVE-2024-40674.json) (`2025-01-28T20:15:49.620`) -- [CVE-2024-40675](CVE-2024/CVE-2024-406xx/CVE-2024-40675.json) (`2025-01-28T20:15:49.710`) -- [CVE-2024-40676](CVE-2024/CVE-2024-406xx/CVE-2024-40676.json) (`2025-01-28T20:15:49.800`) -- [CVE-2024-40677](CVE-2024/CVE-2024-406xx/CVE-2024-40677.json) (`2025-01-28T20:15:49.890`) -- [CVE-2025-0631](CVE-2025/CVE-2025-06xx/CVE-2025-0631.json) (`2025-01-28T19:15:14.270`) -- [CVE-2025-0783](CVE-2025/CVE-2025-07xx/CVE-2025-0783.json) (`2025-01-28T19:15:14.410`) -- [CVE-2025-0784](CVE-2025/CVE-2025-07xx/CVE-2025-0784.json) (`2025-01-28T20:15:56.230`) -- [CVE-2025-22217](CVE-2025/CVE-2025-222xx/CVE-2025-22217.json) (`2025-01-28T19:15:14.640`) -- [CVE-2025-24478](CVE-2025/CVE-2025-244xx/CVE-2025-24478.json) (`2025-01-28T19:15:14.777`) -- [CVE-2025-24479](CVE-2025/CVE-2025-244xx/CVE-2025-24479.json) (`2025-01-28T19:15:14.910`) -- [CVE-2025-24480](CVE-2025/CVE-2025-244xx/CVE-2025-24480.json) (`2025-01-28T19:15:15.033`) +- [CVE-2024-29869](CVE-2024/CVE-2024-298xx/CVE-2024-29869.json) (`2025-01-28T22:15:15.727`) +- [CVE-2024-55968](CVE-2024/CVE-2024-559xx/CVE-2024-55968.json) (`2025-01-28T22:15:15.860`) +- [CVE-2024-57376](CVE-2024/CVE-2024-573xx/CVE-2024-57376.json) (`2025-01-28T22:15:15.990`) +- [CVE-2024-57514](CVE-2024/CVE-2024-575xx/CVE-2024-57514.json) (`2025-01-28T22:15:16.103`) +- [CVE-2025-0785](CVE-2025/CVE-2025-07xx/CVE-2025-0785.json) (`2025-01-28T22:15:16.227`) +- [CVE-2025-0786](CVE-2025/CVE-2025-07xx/CVE-2025-0786.json) (`2025-01-28T22:15:16.423`) +- [CVE-2025-0787](CVE-2025/CVE-2025-07xx/CVE-2025-0787.json) (`2025-01-28T22:15:16.600`) +- [CVE-2025-22917](CVE-2025/CVE-2025-229xx/CVE-2025-22917.json) (`2025-01-28T22:15:16.770`) +- [CVE-2025-24481](CVE-2025/CVE-2025-244xx/CVE-2025-24481.json) (`2025-01-28T21:15:18.520`) +- [CVE-2025-24482](CVE-2025/CVE-2025-244xx/CVE-2025-24482.json) (`2025-01-28T21:15:18.687`) +- [CVE-2025-24826](CVE-2025/CVE-2025-248xx/CVE-2025-24826.json) (`2025-01-28T21:15:18.817`) ### CVEs modified in the last Commit -Recently modified CVEs: `90` +Recently modified CVEs: `105` -- [CVE-2024-56953](CVE-2024/CVE-2024-569xx/CVE-2024-56953.json) (`2025-01-28T20:15:52.390`) -- [CVE-2024-56954](CVE-2024/CVE-2024-569xx/CVE-2024-56954.json) (`2025-01-28T20:15:52.540`) -- [CVE-2024-56955](CVE-2024/CVE-2024-569xx/CVE-2024-56955.json) (`2025-01-28T20:15:52.693`) -- [CVE-2024-56957](CVE-2024/CVE-2024-569xx/CVE-2024-56957.json) (`2025-01-28T20:15:52.837`) -- [CVE-2024-56959](CVE-2024/CVE-2024-569xx/CVE-2024-56959.json) (`2025-01-28T20:15:52.987`) -- [CVE-2024-56960](CVE-2024/CVE-2024-569xx/CVE-2024-56960.json) (`2025-01-28T20:15:53.127`) -- [CVE-2024-56962](CVE-2024/CVE-2024-569xx/CVE-2024-56962.json) (`2025-01-28T20:15:53.273`) -- [CVE-2024-56963](CVE-2024/CVE-2024-569xx/CVE-2024-56963.json) (`2025-01-28T20:15:53.423`) -- [CVE-2024-56964](CVE-2024/CVE-2024-569xx/CVE-2024-56964.json) (`2025-01-28T20:15:53.577`) -- [CVE-2024-56965](CVE-2024/CVE-2024-569xx/CVE-2024-56965.json) (`2025-01-28T20:15:53.733`) -- [CVE-2024-56966](CVE-2024/CVE-2024-569xx/CVE-2024-56966.json) (`2025-01-28T20:15:53.873`) -- [CVE-2024-56967](CVE-2024/CVE-2024-569xx/CVE-2024-56967.json) (`2025-01-28T20:15:54.010`) -- [CVE-2024-56968](CVE-2024/CVE-2024-569xx/CVE-2024-56968.json) (`2025-01-28T20:15:54.157`) -- [CVE-2024-56969](CVE-2024/CVE-2024-569xx/CVE-2024-56969.json) (`2025-01-28T20:15:54.297`) -- [CVE-2024-56971](CVE-2024/CVE-2024-569xx/CVE-2024-56971.json) (`2025-01-28T20:15:54.437`) -- [CVE-2024-56972](CVE-2024/CVE-2024-569xx/CVE-2024-56972.json) (`2025-01-28T20:15:54.580`) -- [CVE-2024-57052](CVE-2024/CVE-2024-570xx/CVE-2024-57052.json) (`2025-01-28T20:15:54.727`) -- [CVE-2024-57272](CVE-2024/CVE-2024-572xx/CVE-2024-57272.json) (`2025-01-28T20:15:54.870`) -- [CVE-2024-57373](CVE-2024/CVE-2024-573xx/CVE-2024-57373.json) (`2025-01-28T20:15:55.040`) -- [CVE-2024-57546](CVE-2024/CVE-2024-575xx/CVE-2024-57546.json) (`2025-01-28T20:15:55.203`) -- [CVE-2024-57547](CVE-2024/CVE-2024-575xx/CVE-2024-57547.json) (`2025-01-28T20:15:55.367`) -- [CVE-2024-57548](CVE-2024/CVE-2024-575xx/CVE-2024-57548.json) (`2025-01-28T20:15:55.547`) -- [CVE-2024-57549](CVE-2024/CVE-2024-575xx/CVE-2024-57549.json) (`2025-01-28T20:15:55.810`) -- [CVE-2024-57590](CVE-2024/CVE-2024-575xx/CVE-2024-57590.json) (`2025-01-28T20:15:55.973`) -- [CVE-2025-24137](CVE-2025/CVE-2025-241xx/CVE-2025-24137.json) (`2025-01-28T20:15:56.410`) +- [CVE-2024-26268](CVE-2024/CVE-2024-262xx/CVE-2024-26268.json) (`2025-01-28T21:37:57.970`) +- [CVE-2024-26270](CVE-2024/CVE-2024-262xx/CVE-2024-26270.json) (`2025-01-28T21:25:41.420`) +- [CVE-2024-27985](CVE-2024/CVE-2024-279xx/CVE-2024-27985.json) (`2025-01-28T21:17:20.540`) +- [CVE-2024-31871](CVE-2024/CVE-2024-318xx/CVE-2024-31871.json) (`2025-01-28T21:08:28.123`) +- [CVE-2024-31872](CVE-2024/CVE-2024-318xx/CVE-2024-31872.json) (`2025-01-28T21:11:32.790`) +- [CVE-2024-31873](CVE-2024/CVE-2024-318xx/CVE-2024-31873.json) (`2025-01-28T21:13:10.063`) +- [CVE-2024-3214](CVE-2024/CVE-2024-32xx/CVE-2024-3214.json) (`2025-01-28T21:03:01.313`) +- [CVE-2024-34732](CVE-2024/CVE-2024-347xx/CVE-2024-34732.json) (`2025-01-28T21:15:16.583`) +- [CVE-2024-34733](CVE-2024/CVE-2024-347xx/CVE-2024-34733.json) (`2025-01-28T21:15:16.713`) +- [CVE-2024-34748](CVE-2024/CVE-2024-347xx/CVE-2024-34748.json) (`2025-01-28T21:15:16.840`) +- [CVE-2024-3617](CVE-2024/CVE-2024-36xx/CVE-2024-3617.json) (`2025-01-28T21:22:14.473`) +- [CVE-2024-3618](CVE-2024/CVE-2024-36xx/CVE-2024-3618.json) (`2025-01-28T21:25:45.690`) +- [CVE-2024-3619](CVE-2024/CVE-2024-36xx/CVE-2024-3619.json) (`2025-01-28T21:28:57.787`) +- [CVE-2024-3620](CVE-2024/CVE-2024-36xx/CVE-2024-3620.json) (`2025-01-28T21:47:39.487`) +- [CVE-2024-40649](CVE-2024/CVE-2024-406xx/CVE-2024-40649.json) (`2025-01-28T21:15:17.117`) +- [CVE-2024-40651](CVE-2024/CVE-2024-406xx/CVE-2024-40651.json) (`2025-01-28T21:15:17.253`) +- [CVE-2024-40669](CVE-2024/CVE-2024-406xx/CVE-2024-40669.json) (`2025-01-28T21:15:17.387`) +- [CVE-2024-40670](CVE-2024/CVE-2024-406xx/CVE-2024-40670.json) (`2025-01-28T21:15:17.527`) +- [CVE-2024-40672](CVE-2024/CVE-2024-406xx/CVE-2024-40672.json) (`2025-01-28T21:15:17.657`) +- [CVE-2024-40677](CVE-2024/CVE-2024-406xx/CVE-2024-40677.json) (`2025-01-28T21:15:17.797`) +- [CVE-2024-57369](CVE-2024/CVE-2024-573xx/CVE-2024-57369.json) (`2025-01-28T21:15:17.933`) +- [CVE-2024-7993](CVE-2024/CVE-2024-79xx/CVE-2024-7993.json) (`2025-01-28T21:15:18.117`) +- [CVE-2025-22980](CVE-2025/CVE-2025-229xx/CVE-2025-22980.json) (`2025-01-28T22:15:16.890`) +- [CVE-2025-24156](CVE-2025/CVE-2025-241xx/CVE-2025-24156.json) (`2025-01-28T21:15:18.340`) +- [CVE-2025-24166](CVE-2025/CVE-2025-241xx/CVE-2025-24166.json) (`2025-01-28T22:15:17.080`) ## Download and Usage diff --git a/_state.csv b/_state.csv index eb984b82c82..70ffde1103b 100644 --- a/_state.csv +++ b/_state.csv @@ -97070,8 +97070,8 @@ CVE-2017-13313,0,0,0d6ac6befe081fba487675eab4252804ea375d01dfaa562bad14e41aa9aac CVE-2017-13314,0,0,33c48e6d8e6524fa065f82448defa764b8b3b9330b06ac294ae8e04b2d271ecd,2024-12-18T14:36:21.610000 CVE-2017-13315,0,0,a6c9ce499de7cc31ed3e6113da58d1ddbfa19fcf87a648f22bfa38731642b2e7,2024-12-18T14:23:37.877000 CVE-2017-13316,0,0,c19a74b376c80a4ddbedf3bda0070b9916cdc47d09974bb08101db1b768f4ae3,2024-12-18T19:49:51.540000 -CVE-2017-13317,0,1,22c87537b4dba4ccc4db24baf661558fbb9461010c81c50a2b8bd0345ffc517a,2025-01-28T20:15:26.523000 -CVE-2017-13318,0,1,3549211391f6d954bc139cf5a9e74a6e64a15ee1f58069202065bd8479204de1,2025-01-28T20:15:27.443000 +CVE-2017-13317,0,0,22c87537b4dba4ccc4db24baf661558fbb9461010c81c50a2b8bd0345ffc517a,2025-01-28T20:15:26.523000 +CVE-2017-13318,0,0,3549211391f6d954bc139cf5a9e74a6e64a15ee1f58069202065bd8479204de1,2025-01-28T20:15:27.443000 CVE-2017-13319,0,0,5342c9254a7aa93c30e3821bff0d04f61fa0f453e54198ca596e0a2ca08f2630,2024-12-18T20:30:33.813000 CVE-2017-1332,0,0,0269de81100b11e03b79ed33c30dc865a85b59fb90a2c2fe1abeaca397fa8d4e,2024-11-21T03:21:43.893000 CVE-2017-13320,0,0,0c48fd68654bc947b8b2708cab8c3d479d7ae69efe9b849697f59b556d05bfda,2024-12-18T20:30:58.303000 @@ -126945,12 +126945,12 @@ CVE-2018-9369,0,0,efe398d86f896ce0829c7cd80bba8188348d4bc41763d145022ec16c1945c7 CVE-2018-9370,0,0,87030da3b46653701fd5f7a865aef8798fab0242623ea0d195e8be90ff192871,2024-11-22T21:24:57.467000 CVE-2018-9371,0,0,222c2e4987b2e2d5c2e561d322c2393abcf0b781445c771ce77d7eaa6ac4047b,2024-11-22T21:25:48.853000 CVE-2018-9372,0,0,bf802d4801f9f860b3a398478713fbe7b249ed3f9ce1e6995b2077a1cb556211,2024-11-21T16:15:17.900000 -CVE-2018-9373,0,1,1386bccd621f7d6b4565fbffb3401da4425a8a96e4cf92a79db9b6bd44f6ba27,2025-01-28T20:15:27.593000 +CVE-2018-9373,0,0,1386bccd621f7d6b4565fbffb3401da4425a8a96e4cf92a79db9b6bd44f6ba27,2025-01-28T20:15:27.593000 CVE-2018-9374,0,0,3b6a94c92c93496e3937aecbafbcea0b081d505aad2846a5e6172408cea8db66,2024-12-18T20:25:33.723000 CVE-2018-9375,0,0,796c07416acf8cde600391dade7cacc2539272542d56dc601f7717adecb5bfb4,2025-01-21T17:15:11.717000 CVE-2018-9376,0,0,cc980c27d3656c448822c55fa140694c851c62fa72e54df15333c7855bb4f3dc,2024-12-18T19:37:08.323000 CVE-2018-9377,0,0,1a76ca591c622e996437a337b98c1fab200dd33e77f24b21e234d68799ab4b2c,2025-01-17T23:15:11.617000 -CVE-2018-9378,0,1,0cf283c2cd4aa210cc5807c75a4e4064d295b5244dc90c6f3eefe91377a4e115,2025-01-28T20:15:27.727000 +CVE-2018-9378,0,0,0cf283c2cd4aa210cc5807c75a4e4064d295b5244dc90c6f3eefe91377a4e115,2025-01-28T20:15:27.727000 CVE-2018-9379,0,0,3c4d0b24777c1bb158fa692a2de5b655465acc34135122c5d837cf9bf5f58562,2025-01-21T17:15:11.873000 CVE-2018-9380,0,0,e12a43dbeeb8da1df7c5ede895c56553a0364f94530599aafaca6e6f3326ce02,2024-12-18T19:42:11.093000 CVE-2018-9381,0,0,2ce1fffdcf5aa87d66006064137212243a0a262bfc7f2cf820777dea17a7c8cc,2024-12-18T19:39:05.097000 @@ -143170,7 +143170,7 @@ CVE-2019-8716,0,0,064332f5c486374ae1ba78c73965ec7112ff3c4d286a5a15d52b25ca652423 CVE-2019-8717,0,0,547d55c500b2f16691abc2d477391292fb5437b0b31d1ccb4d85e5c81c7600ba,2024-11-21T04:50:21.020000 CVE-2019-8718,0,0,accf28d72bb0f7a559f3c6c7aa5a40e8fdbb90788773f636bb5613408a997955,2024-11-21T04:50:21.133000 CVE-2019-8719,0,0,3a37c0f2f95c1f54a7a4f33ee8321296d4895851ca6cdff78ba068374b91c7a7,2024-11-21T04:50:21.240000 -CVE-2019-8720,0,0,796bbc9a85f20aa08b0565673b3bb72a9483c5cf6ce8ad7db32193d1cb18d3e8,2024-11-21T04:50:21.350000 +CVE-2019-8720,0,1,31ded78c9e63e59018ff3981e016438f2a7f4e88945df8ea2133488ae702c936,2025-01-28T22:15:07.963000 CVE-2019-8721,0,0,0f83e04e0abe3ee1721d5dff4c37f324b4a1e394222bc5ef8032da015c6e46d2,2024-11-21T04:50:21.477000 CVE-2019-8722,0,0,9f5b79a51c7de5fbb026e252fdc2fb97aef6ff0ca72bf7c93ce6c87d0d0ca5ed,2024-11-21T04:50:21.577000 CVE-2019-8723,0,0,afe013f92a61ee76ec3893400df68b4e04e1a4060bc4d431ac33964811727282,2024-11-21T04:50:21.680000 @@ -188857,7 +188857,7 @@ CVE-2022-1092,0,0,99c287d7195cbb5886488e6682c789459c003d17c8a5a74c1270eb4b95ed43 CVE-2022-1093,0,0,ad135d0f287fd4ca041369be7af0aeb4f22c4966eb7cc2da3aabeb579a93a96c,2024-11-21T06:40:01.150000 CVE-2022-1094,0,0,ce3d958389e7dcb3edb09fe4efbbeccedd14d99c2ffc44b83b8a4764121f00a4,2024-11-21T06:40:01.270000 CVE-2022-1095,0,0,528525785c2cc3c91f1c63ee0fd847c82b20913804fc8bf5624761acc4182aaa,2024-11-21T06:40:01.393000 -CVE-2022-1096,0,0,fa5d61df98a1e8faec48f8713d86c2adb307a464008309449b6598ae551e88a4,2024-11-21T06:40:01.510000 +CVE-2022-1096,0,1,6f7e8529e44ba09dd469e16b950416b33ec81d24c3db301542d471920ec08e57,2025-01-28T22:15:09.153000 CVE-2022-1097,0,0,773d85593113cf641f0509c46fe4d7dae1fcbfde360857554f2270a7e4e3649b,2024-11-21T06:40:01.633000 CVE-2022-1098,0,0,c9ea12433615572bd3eb7445b566b956db8cbc8b1346229cf159717bbb8169d4,2024-11-21T06:40:01.767000 CVE-2022-1099,0,0,368f64c72055c72e975c60f0c0451a3511da0a93b4e5ff0451b51b167a8e1025,2024-11-21T06:40:01.897000 @@ -192345,7 +192345,7 @@ CVE-2022-22671,0,0,45e3aec74933aee8afaecb8c21f01fd35faa1ff9c4bcaf50cb2218b868fb9 CVE-2022-22672,0,0,de90c6361fd9a1d97789e7a6ba0e8b7338e0a166d931a68d67a731ed410f90a5,2024-11-21T06:47:14.713000 CVE-2022-22673,0,0,1dd31fddf4bbbc6721841917516f4c12f29743bfe15c0fe0b54786a8e0aa0b40,2024-11-21T06:47:14.830000 CVE-2022-22674,0,0,0cc4648510cb747cb7c1a1994ebb43bcd2ca77350a0ab4957501c2149781a6d7,2024-11-21T06:47:14.930000 -CVE-2022-22675,0,0,3af8975aac90ecda3dda51fdc4d683e1f9746e3c56a92995b46124bab4bcb5c7,2024-11-21T06:47:15.030000 +CVE-2022-22675,0,1,cfd6816a102f3693b033a88bb74af3e64db16c6668a16fa43a05a06d6320f36a,2025-01-28T22:15:09.390000 CVE-2022-22676,0,0,6a65894de3df0ffc1b1b08e57dd9d4bcce3d4b842361847ed8290de73bac165c,2024-11-21T06:47:15.147000 CVE-2022-22677,0,0,56cd059e6c2c7587fd722cd34a2465621c7288dd46eadedfd0cf211c80aa959f,2024-11-21T06:47:15.250000 CVE-2022-22679,0,0,4a69ee0e3ac816e3bdec0a7cdd3e0ce5981180ce6ec4900c1ceb73fc1f259fc6,2025-01-14T19:29:55.853000 @@ -195635,8 +195635,8 @@ CVE-2022-26481,0,0,755e955489efea83c182aa4dec7d1f511815232b348e5dd7d14ab199785e2 CVE-2022-26482,0,0,e75509f0bd9a8a13c031cbb09cca69be5e865cb3455d1ed2d5212f35ea3044dc,2024-11-21T06:54:01.897000 CVE-2022-26483,0,0,d46b1e0568306cd157a05c629956f16285216db5bd5ad42154809895c86b9a0c,2024-11-21T06:54:02.043000 CVE-2022-26484,0,0,0d682b954d17e354b6e3ab68bd1f39f2ea2467b98fbad606737c826376a20f5b,2024-11-21T06:54:02.200000 -CVE-2022-26485,0,0,0cc0f5494e331abb7620d161bd66f41b1c500e326e35a1c23152e3a124518595,2024-11-21T06:54:02.350000 -CVE-2022-26486,0,0,10485d3d876c47ee7cd9346da5a4302b62d629cf0422cd65316c461b9d1d55f4,2024-11-21T06:54:02.457000 +CVE-2022-26485,0,1,2264f3f42cf8e38b2af4d0c22dc4949abb0a4c999f4c04add8657026033cf0f0,2025-01-28T22:15:09.727000 +CVE-2022-26486,0,1,1e94b8d8b2c0f16edcf369fc63638cde3b97a3aea75ce89a8ff1bd7b56e34ca2,2025-01-28T22:15:09.987000 CVE-2022-26487,0,0,aaa404b9f7bb30cc2e59ec05d3f9f09994f187371705fe9646d8a54450aaab35,2023-11-07T03:45:00.770000 CVE-2022-26488,0,0,952711c6f20d344fd00e1b04d066dbbb1b0cd08cfffe5b8f11cff8f9566d4b5d,2024-11-21T06:54:02.590000 CVE-2022-26490,0,0,3ec70abb96f3f28b15c6509be25a394715043c26b3bba20daa4ea98ebea1377a,2024-11-21T06:54:02.737000 @@ -200431,7 +200431,7 @@ CVE-2022-32354,0,0,0a7a58ad158a78c8135d1808aab8db9a458f531779bd7d89c2f6dea2c1fae CVE-2022-32355,0,0,60622e71b33dc0e5ee6f2645ba782accf6467a01d2b29ddb83fcb44adac7c00d,2024-11-21T07:06:13.673000 CVE-2022-32358,0,0,67c5617a11414c4d2bfe8f8670ff5342962366ab7f16eab65d1c2afd3c346ab8,2024-11-21T07:06:13.810000 CVE-2022-32359,0,0,8a2a5a54936460db92107381c94f1b380893417eb77e8569fc03972da9d584d7,2024-11-21T07:06:13.973000 -CVE-2022-3236,0,0,295d6c8a21ad7fc0f32446212384f5e86ec61bfe69fc44d704fefadf84299c03,2024-11-21T07:19:06.813000 +CVE-2022-3236,0,1,0c138dce4f7b015335b92c882e5521de29995aa3ff65f195e882913402863ab6,2025-01-28T22:15:10.673000 CVE-2022-32362,0,0,d1f79653bb1775e18cb80020e1d2974d6f7e4ca6bf26888e4e5285413f361178,2024-11-21T07:06:14.113000 CVE-2022-32363,0,0,269f03795377b8c7dffb27f5b838747ddb5996fc382aab9e52560096e3e73fb7,2024-11-21T07:06:14.253000 CVE-2022-32364,0,0,39138cb5f960f75762e173cafd7f0f67f11baa07f59c9144a5e27eaab0817088,2024-11-21T07:06:14.400000 @@ -202857,7 +202857,7 @@ CVE-2022-3540,0,0,58cbf2a311b27b0f3f2de58ab4d17a72cccd2c553e08eb1a72ead369975c8e CVE-2022-35401,0,0,503c27ad84cd08dc8b40b4412fb581cb1c85fc65eb089b31f5d55b21a7be7ef9,2024-11-21T07:11:06.070000 CVE-2022-35403,0,0,849036348b40334e1f2e596003ac2bcbd5b50d152abab43e405d35e392128506,2024-11-21T07:11:06.207000 CVE-2022-35404,0,0,203a1048ffadcee6936e648bcd736e54857a537b4c1f365745fc84f159a612b5,2024-11-21T07:11:06.367000 -CVE-2022-35405,0,0,ad0bff8193d0e07fdd7e5bf2ffa9dcf3da593f2576dcaa277b9a3334ce906b47,2024-11-21T07:11:06.590000 +CVE-2022-35405,0,1,29b1e67e6e964d8e1d7884cee9104bcbc7c8737da0fcc6266e979b4ced92482d,2025-01-28T22:15:10.200000 CVE-2022-35406,0,0,ac7189fc63277937cf2708f8fda8bbcc522a4dfe62892fa7f9e126afc6d14a6d,2024-11-21T07:11:06.747000 CVE-2022-35407,0,0,c0f7418792fbac4639c8ac30806b0477c007f1677ff58b24097d01d3547d7dad,2024-11-21T07:11:06.883000 CVE-2022-35408,0,0,2e08b21f6dd561ce8f5ccadb442f9faff1b369e6929040173cf254f2f5a06175,2024-11-21T07:11:07.030000 @@ -205851,7 +205851,7 @@ CVE-2022-39193,0,0,1f752c1f8e24e1bc86b01423170354723a7b90ef679e9ff0b11494a5d0561 CVE-2022-39194,0,0,46c8a570d410731976d04ee364f2f8e06f9ddaea94b4c2cf8db59b17e6c55d40,2024-11-21T07:17:45.533000 CVE-2022-39195,0,0,3a732f5cb026dddd584d4856f05e2b8f9d2cab78675cc49ceb96174e66c7c2da,2024-11-21T07:17:45.673000 CVE-2022-39196,0,0,74e906816e427af75641cb8c15fa5b5efcd016e7b224094c75d1351a79c991e8,2024-11-21T07:17:45.830000 -CVE-2022-39197,0,0,5f2143cc528028b2efd0bd6243c3af51bd5ea3a2bfdcc7991be605c57d9fbfdf,2024-11-21T07:17:45.977000 +CVE-2022-39197,0,1,de81b3b521f309c9885b90239d6046f0b0e156860702b173784ad20b41a9b242,2025-01-28T22:15:10.450000 CVE-2022-39198,0,0,14067e2e95e31a9b37acb04ef28242a7c83d84ec7fdc3fd3e6dc62428025ac1d,2024-11-21T07:17:46.130000 CVE-2022-39199,0,0,4552bf97674be2577ac75e8007964c61f9e40d714e38bda1724017cccee583c3,2024-11-21T07:17:46.260000 CVE-2022-3920,0,0,a6e463781a20a9efe14d7510cb7fc502a6256a711477304a32c34f0f536ee505,2024-11-21T07:20:32.077000 @@ -206935,7 +206935,7 @@ CVE-2022-40760,0,0,3b8330dcaeea66fc41cbbfb30e363441bace935cfa31035445cb64fb2e161 CVE-2022-40761,0,0,e0e8f95d864eea98671480b59c2f3d95626a783e1b1a70271c73b4973b6ef441,2024-11-21T07:22:00.490000 CVE-2022-40762,0,0,91f090a43b5aa597b92589edfa6d359b7230de62df78f964616afad8067a6692,2024-11-21T07:22:00.660000 CVE-2022-40764,0,0,4329a78e1452aef44a49b5773c9502aa0e5278c4fce482c8ddedb0e88209c008,2024-11-21T07:22:00.823000 -CVE-2022-40765,0,0,9b68f267f2b84e8fb7dc1002f937ebe0c8d70ff59f663e16499316a6667c6de9,2024-11-21T07:22:01.013000 +CVE-2022-40765,0,1,32ff631cb7e9c788768ce62db90546a4b974a96babd06f3bd24468cdc632a400,2025-01-28T22:15:10.877000 CVE-2022-40766,0,0,384298aaab8e727d5c41cfc1cd6817fb10a65417409619d3f2d1e81c8c938c73,2024-11-21T07:22:01.173000 CVE-2022-40768,0,0,095913b7bd4f4664c3632edd755e2e1de4009274ae79fb343bb666fe5608a7d2,2024-11-21T07:22:01.320000 CVE-2022-40769,0,0,6135cbca6394cea1de90da1966ac0c9fc5a9d22b26cd5efd8714509afefb0337,2024-11-21T07:22:01.510000 @@ -207320,7 +207320,7 @@ CVE-2022-4122,0,0,41a28625d75093b8185192cc27a639534f890a16e50aaf24efe1b495931226 CVE-2022-41220,0,0,ad29ea38b072bf58585a8e13186655e2e23bda37dd415a6a1e953b27bc78646e,2024-11-21T07:22:51.447000 CVE-2022-41221,0,0,1d788e62a46b3145dc2f8c2067c74a9f7096c138656e8475a2fe7d8b43e01f83,2025-01-17T16:15:28.683000 CVE-2022-41222,0,0,fbd6a19711cd9b300720e815b4d0be962776ffb964fd725ad987a249fc46d657,2024-11-21T07:22:51.743000 -CVE-2022-41223,0,0,d5c686c09d3342e8d375627b9a2b1c429335074239336f50b05e7aea94075f24,2024-11-21T07:22:51.913000 +CVE-2022-41223,0,1,18bb83192d68f4e1807ce83eb9ddebc00e3ce059bad0adc44e091df1686f4632,2025-01-28T22:15:11.147000 CVE-2022-41224,0,0,166e5234c48c055c19f09bc2c5da4feda446cc9117a08eefd15b6324545e43f6,2024-11-21T07:22:52.057000 CVE-2022-41225,0,0,104254acbd0ecbcd139c74c78fe2ddc373e3c341cbe383774c635239780ee854,2024-11-21T07:22:52.177000 CVE-2022-41226,0,0,65dbe44267b246aec11207d2d6019f4ad805131f8662e439190287595d17fc4f,2024-11-21T07:22:52.290000 @@ -208473,7 +208473,7 @@ CVE-2022-4258,0,0,ecdca27ca50fb68f6d5152ad079368aef079e93487090252e6756af61b69c1 CVE-2022-4259,0,0,609a0c72ffb79011d0c430f1498b690ee7b62acc54a2a283efa5c07d7a3c2f04,2024-11-21T07:34:53.517000 CVE-2022-4260,0,0,ee8f096f0d8a3355b542d1fe42358cf53426cf0f9c74e35e21145446363f1a80,2024-11-21T07:34:53.680000 CVE-2022-4261,0,0,f3ea8fa04a826c810d7c11a81d1a2eb57dc66ca87dd7fa34d25ba3d72ca65991,2024-11-21T07:34:53.797000 -CVE-2022-4262,0,0,a2eb60d20007b66fae9888e834e463f71178387e42ae41e95d2b4fedfd164da5,2024-11-21T07:34:53.933000 +CVE-2022-4262,0,1,ef8358b2d22460066565c30bb51bace7ba3c5c59e3fe80f720e715f35c7ee014,2025-01-28T22:15:13.580000 CVE-2022-4264,0,0,6e9c9191bcb2e4227a9683fd2ad7545762b7af98bacbcf085a177a7b291032dc,2024-11-21T07:34:54.050000 CVE-2022-4265,0,0,d4fc3bf03de824123639efd34aee081bf3da729510bd6fd0d9db85774cb4ab90,2024-11-21T07:34:54.190000 CVE-2022-4266,0,0,e93286bb1d277696fa139681d8d5b6a89c7a738e871d31529d0a1ed21cc63007,2024-11-21T07:34:54.307000 @@ -208605,7 +208605,7 @@ CVE-2022-42823,0,0,2706d6d702a162619e5c8c87a113083e113e2f3e61e1cb73de615fb73185b CVE-2022-42824,0,0,d5e685830c1a3c445ce4db0fcabb13d68cfc3c757166d52c61f443ffd19f26f8,2024-11-21T07:25:25.203000 CVE-2022-42825,0,0,5dc9e23b067062d81271ac617f8021956edc3bcba1071ec1aae0b7e0f379647d,2024-11-21T07:25:25.357000 CVE-2022-42826,0,0,92c4ff3890b8ea9adec9d54118fed5a0b345e84992b64cbd5aede5e0795d2144,2024-11-21T07:25:25.490000 -CVE-2022-42827,0,0,a4be1a5d00d6effa50368ab4323cd6da15c9119c1d45e576c3191395680ddcf3,2024-11-21T07:25:25.627000 +CVE-2022-42827,0,1,e8ecdcfd95913915aed8afbf96bb0dd5805546ba910b5b6246e6c3889e3f2241,2025-01-28T22:15:11.367000 CVE-2022-42828,0,0,dba5eb309f319c44f806f6e271576603250d0aa144d4c5e4518cece57738d438,2024-11-21T07:25:25.740000 CVE-2022-42829,0,0,60b7d93b772d03e8943ccdbb49b71d351a7499a5bf19d49948ac08d4b6c96b4c,2024-11-21T07:25:25.853000 CVE-2022-4283,0,0,7fc62bdf0195a91399c279623762a438ac8ad3fb55bb1c5f4a208e8fbedf4810,2024-11-21T07:34:56.373000 @@ -208636,7 +208636,7 @@ CVE-2022-42852,0,0,e0476a217fd31c1483be3c5faedef92147a868042acfbbedc0b4746165316 CVE-2022-42853,0,0,be314ca2e246b5cbd5d648caafe0058f4047aada97f0268096bc52c067d9151f,2024-11-21T07:25:28.887000 CVE-2022-42854,0,0,69b8e36a93fdf0ee869d865dc40773b09a080590f8a161d00ba036b8c8c87754,2024-11-21T07:25:29.040000 CVE-2022-42855,0,0,2438782da0ac107f7acfb77343c237e44eda85c7d815276b63602765d59cef45,2024-11-21T07:25:29.167000 -CVE-2022-42856,0,0,8a606b81918c9d74c0c183663075f25c1867ca186281a8ab27550175f9d4ba98,2024-11-21T07:25:29.330000 +CVE-2022-42856,0,1,dbe07b0474f502806cc25f2ff55ad774d36a421a12e119a94b8816b87e70e3a7,2025-01-28T22:15:11.590000 CVE-2022-42857,0,0,cdcf832ca21268788c00b206c507e4baf85763977b13479d6144d4ecea8b40eb,2023-11-07T03:53:39.147000 CVE-2022-42858,0,0,2f6a2e6f90e927d362f765a91993f74996b406f000aa75b4309f0f23fa1c599e,2024-11-21T07:25:29.493000 CVE-2022-42859,0,0,b7c3c34368d49525f8b5113c35fe596dc55c4694a7957ea7631d371197964aec,2024-11-21T07:25:29.623000 @@ -208712,7 +208712,7 @@ CVE-2022-42944,0,0,70202151aebb74d9aac796ec66983f9f0f8f63e2fef365b3c1ee0751442a5 CVE-2022-42945,0,0,9d31dd69f4bf8ed7f381ad9526748c9515882a5b4965fbcbdf22992adf8e16d9,2024-11-21T07:25:39.090000 CVE-2022-42946,0,0,568246802811f1fec8a0fc2668e3da73c26c755b064779f5738101fe7f7cba3e,2024-11-21T07:25:39.213000 CVE-2022-42947,0,0,cc1c615fc0f3f4cb7830c716c2ffa54b12b7dcb04bf0dea4f27cee8fc5a4fa31,2024-11-21T07:25:39.340000 -CVE-2022-42948,0,0,52cb53ffdeb86170303e38b22c7e9694f46b55e48d2d2d3fc1168d3f32ddfa36,2024-11-21T07:25:39.463000 +CVE-2022-42948,0,1,d801ac170f69b1b5f6b27f2cf3b5f50586c7bf90ee125a75558010c8bacf7c72,2025-01-28T22:15:11.827000 CVE-2022-42949,0,0,33394d4aeb0aa484f80ff643457959f66bf9c81fd9ae0c6d1e40c8dfacab8f0b,2024-11-21T07:25:40.050000 CVE-2022-4295,0,0,c4a101447ebb7f7b37118bbe688156dd6665cd3db754bc8da6ce671825797aa0,2024-11-21T07:34:57.627000 CVE-2022-42950,0,0,3665b747607f746305d0879f4c555c4b3d3722d692c3f8df972f021700deb573,2024-11-21T07:25:40.207000 @@ -211908,9 +211908,9 @@ CVE-2022-47465,0,0,8a8fffd064a15c5677456f002115e29312e330595e60c1a614758bbc7cdfe CVE-2022-47466,0,0,7d36fbdee122567476997009a85a60a63367ab5b99a3811049063f139e35602a,2024-11-21T07:32:01.253000 CVE-2022-47467,0,0,0930a30b598966a22b27d661ea815c01f23f439f28be03ecb6acbc5a63b6c45c,2024-11-21T07:32:01.380000 CVE-2022-47468,0,0,fd6dff424d4f578b5c6ddb939db70727d340290625acff91eb1e474d8961e9b7,2024-11-21T07:32:01.490000 -CVE-2022-47469,0,0,40a3d404e4e31a9eeac64b993edbb4e4e6ec1cfb62bf0de8b5cdb843d8d3e664,2024-11-21T07:32:01.610000 +CVE-2022-47469,0,1,5adcd3211b3f2a00584e97d1ad1e150d7fd1a6ffdea0463dc89b64217d1432f4,2025-01-28T21:15:09.720000 CVE-2022-4747,0,0,2cae0e1e4a7191b71dc69e8df4deb90e08691ea2a220f1b14d3c1cd5d65da5a2,2024-11-21T07:35:51.837000 -CVE-2022-47470,0,0,d25727e854789e568120174a0a96033665e72c8edb5b6a93ec8c57d7393348da,2024-11-21T07:32:01.730000 +CVE-2022-47470,0,1,3a8fdd214f63e68ec87a63f525c2fdb0dc5cc3b7b715cee87fc3205f38d5b7f2,2025-01-28T21:15:10.603000 CVE-2022-47471,0,0,19ddae6fe0d1b21d4057f0dd6e8f3543c448e4a2746a4d5db05d7b037b3305d1,2024-11-21T07:32:01.850000 CVE-2022-47472,0,0,9fedf2ddd34ef86d1b864027fd832881ccf70fced06accfd8af23ca518fa7feb,2024-11-21T07:32:01.983000 CVE-2022-47473,0,0,3335e5f0084985a2959a6836570a809e2a4bc068ee73d7232407f36e7fb1f62e,2024-11-21T07:32:02.103000 @@ -211927,21 +211927,21 @@ CVE-2022-47482,0,0,bba60f47d2c4b14e5e60bc809caf93734e38c1bd1d297867ae40bb729f81d CVE-2022-47483,0,0,db9be835628e60778bc7c7bdc9b6e53d3d9c0458990254351b7137c6b5b9e146,2024-11-21T07:32:03.347000 CVE-2022-47484,0,0,95cdc3653454b17f6b32a877606b56ec144381ab971b9c79d156105dbc65645e,2024-11-21T07:32:03.470000 CVE-2022-47485,0,0,eecb5b3928cede1970d9d92d33ff0363db96bd500ebfeeb15737e71a65f95750,2025-01-28T17:15:09.557000 -CVE-2022-47486,0,0,7e6f65785d737ef03f38d76dcd40df32b26b715f28aa4c6c3bb6ba0deeb24577,2024-11-21T07:32:03.727000 -CVE-2022-47487,0,0,b397bc50d67e61bd3bcf80d9acb2e84501baac8f716d706444c8a8edf2666d05,2024-11-21T07:32:03.840000 -CVE-2022-47488,0,0,3f6b9a4dbe2e8648f93df0b16394694f75a411bff21553d7e1b4f5d9cc9c9e6a,2024-11-21T07:32:03.953000 -CVE-2022-47489,0,0,e524c7bbf02be4d7e44111673982a173d7f87873b02e51cae239b770a435b003,2024-11-21T07:32:04.070000 +CVE-2022-47486,0,1,16c88cf26b6dc32923811585704a2b8521c7471c6728a414e2a58ac5c4fde9ac,2025-01-28T21:15:10.753000 +CVE-2022-47487,0,1,a8a5d05393e4580b5b3e8b869c299ab47395e2c6a52e0296f36bf76d5a24c145,2025-01-28T22:15:12.087000 +CVE-2022-47488,0,1,a0b696160186495d6c12a013fdf9f6bd37bbf2fd11611b1b2cb7d16ed94c6d36,2025-01-28T22:15:12.250000 +CVE-2022-47489,0,1,5e3c68ad7132c0474291500a52c6f078ed00a39388d28edf9b0a8b796fbd0dd9,2025-01-28T22:15:12.410000 CVE-2022-4749,0,0,12fbcb333ce194fa6305ce58dac201b2db817608c67cf3cdc264017eee62fbb8,2024-11-21T07:35:52.063000 -CVE-2022-47490,0,0,c2f7681f6410a9298b44e4e647679fb5e0e36b9428f7b7ca095526301784db87,2024-11-21T07:32:04.190000 -CVE-2022-47491,0,0,3e470e62d41aecf190f630b4e6ef242ca400ccf3197e2de890b1fc50afdc4066,2024-11-21T07:32:04.317000 -CVE-2022-47492,0,0,80eeac5071eac9de0d92caae3c8047273c87f374eefde45a4badbd9213587e1e,2024-11-21T07:32:04.417000 -CVE-2022-47493,0,0,b43c15c215e518db181b71bf8701ed1e733a0f7c611046a31a0a8c57ec133b54,2024-11-21T07:32:04.530000 -CVE-2022-47494,0,0,3f4224b36cd1bd8ebd370d0139ceba868e40a3b67784407853554c5cb591c87a,2024-11-21T07:32:04.657000 -CVE-2022-47495,0,0,4693cee5cb976e9a8cf27bc66688619a843664e4bba6bbe60bd1219bbe999e95,2024-11-21T07:32:04.793000 -CVE-2022-47496,0,0,4d4cb4f3d81f882ba09bb16fac14c861795d48fa2f6046e729b02b77c18b4f77,2024-11-21T07:32:04.910000 -CVE-2022-47497,0,0,c12061818f7bb8e1ad270dcbda2e3526b12688269414bff8f61455bd12622ab7,2024-11-21T07:32:05.030000 -CVE-2022-47498,0,0,46c91e96f693028d69554ce905ba857594040cd88ad9bc567f64c057d519990b,2024-11-21T07:32:05.150000 -CVE-2022-47499,0,0,c3fdb0529899ea85024d74a75d725f560d350cd163634efdc444c67ee4c166b2,2024-11-21T07:32:05.277000 +CVE-2022-47490,0,1,173a87b7f4c954b6484889057d4590c904193d1b6f5ce24936446855f118f063,2025-01-28T22:15:12.580000 +CVE-2022-47491,0,1,416b17b90fb1d2ceff983aa0c1097cfd23a28db36928f575bc3ff66f7c2a976d,2025-01-28T21:15:10.910000 +CVE-2022-47492,0,1,d5088934cec8ae48796f1c8b991534b7f0d9a73ae66625114623e002536c2f47,2025-01-28T22:15:12.743000 +CVE-2022-47493,0,1,5618f0e96c9f7126e475a7b19c0a94a050d871855f94b4030046bb0ecbee22f9,2025-01-28T22:15:12.917000 +CVE-2022-47494,0,1,c60d3c9a614e32e36dd245e56dfbcda86c1b334d8cf120c9cbdc5f1ae89181dc,2025-01-28T21:15:11.077000 +CVE-2022-47495,0,1,f09b7f7fba8cbe9445caa7f8b98e5ad565b2fee811e03834afc8509caa807341,2025-01-28T21:15:11.247000 +CVE-2022-47496,0,1,394781f2d701ee0b3b4d6ef7ebbb85a1371910a0e61ea849121dbc4e2c1d42c4,2025-01-28T21:15:11.407000 +CVE-2022-47497,0,1,c6876bd2bc636606405893c533035d007a54722c753535208072f07b7cba16e5,2025-01-28T21:15:11.560000 +CVE-2022-47498,0,1,b54d51000093628c2d110249db494227cd7a005468009673751812bcbd768bb3,2025-01-28T21:15:11.707000 +CVE-2022-47499,0,1,4f002514991db5df8058b7d31d105816e83940c12296ec588e8ba362df92d783,2025-01-28T21:15:11.863000 CVE-2022-4750,0,0,f246e5edc422b0662a030fb74d0d9bbf332bd6a84089398ae30ef739e69373e4,2024-11-21T07:35:52.167000 CVE-2022-47500,0,0,45e585ab19f37d4cbe9d80e0ce5ad06b6358f52d0dc8563aeead2f6200e17c4f,2024-11-21T07:32:05.410000 CVE-2022-47501,0,0,448ab631c1da14dc722a4290cfc43a31008f9f3654035ba5fd461d1e46e32262,2024-11-21T07:32:05.540000 @@ -212310,28 +212310,28 @@ CVE-2022-48227,0,0,0aab3d879d41ab81379d8f0d59e140f4653ea6d36f5e27810dae122b79c04 CVE-2022-48228,0,0,1728bc5020e9d5ce083789f95266fe6819a7c18f8e1fdc2ca823020c212eae33,2024-11-21T07:33:00.293000 CVE-2022-4823,0,0,e7fc5fb9db54eb08d7bdb32316cd03ccc89eddab098ff51ef8ef039a2942405f,2024-11-21T07:36:00.993000 CVE-2022-48230,0,0,e6db329d7865ba3b22f42e4c81ac2be3c151cb8eaf5834575e98ae1fd4a66d36,2024-11-21T07:33:00.437000 -CVE-2022-48231,0,0,7a5d8f8bc380e693276979e9ff4a6657a6ec4643163e53057eb824c0585d07ca,2024-11-21T07:33:00.540000 -CVE-2022-48232,0,0,782b88003b817592b5c9168ccc241116112b600cbfbe80d1ee8c3f8e54d1ca3e,2024-11-21T07:33:00.653000 -CVE-2022-48233,0,0,0de8aab8bde5c5b64a166d3225cfced5194ebd783a6a97f687a225a558e42aa8,2024-11-21T07:33:00.770000 -CVE-2022-48234,0,0,fd1c8fbf0e18d50a07ff0d98c38541d8a46e9a0f18b2f36648b6ef107a254600,2024-11-21T07:33:00.920000 -CVE-2022-48235,0,0,bf37b2928b5162bf76702d881eb59d4c3c8e53266629ba65f20061adb02c78e9,2024-11-21T07:33:01.057000 -CVE-2022-48236,0,0,11351e845f93899b4f4d9abc76dce1203a2df229a54de250e5fb8b7469ae6f3b,2024-11-21T07:33:01.180000 -CVE-2022-48237,0,0,09a44b6c8dbc11d4ea437d19447b085b327512ea8d832526b9ce5917a25aa1c5,2024-11-21T07:33:01.293000 -CVE-2022-48238,0,0,d486e56ccd1af28989a3754396bfc4b9d71bc34e77685fdbed6c1a537eded12b,2024-11-21T07:33:01.407000 +CVE-2022-48231,0,1,26f128061ebcc525a2f8b96097ae9bb9c0299076a1ca7053c51862c027a80a26,2025-01-28T22:15:13.080000 +CVE-2022-48232,0,1,67564556f129ea871f689b82c62a66bff3825eabc8ad9edabdc5a5da09260841,2025-01-28T22:15:13.257000 +CVE-2022-48233,0,1,e1aecb4f40e9b3951761a4c223d9d656185383a8fcc0e2037265894fb50a8137,2025-01-28T22:15:13.413000 +CVE-2022-48234,0,1,7ebdefecc61ea5529a0fcf9f850f77030ea102bd79ef50a60a41d42919e0094e,2025-01-28T21:15:12.020000 +CVE-2022-48235,0,1,2c006f17461c40d09d598f884f3fcb68f68b28bd31c7d4414dcaf896288e8d1a,2025-01-28T21:15:12.190000 +CVE-2022-48236,0,1,850fb4dcd8171cd15cb19c7aac6f7bab1434f0b7f306bad2cd68cf86ae8383b3,2025-01-28T21:15:12.350000 +CVE-2022-48237,0,1,6c5ca8ecfd414e8897abb5afce28bf8294cd5e71cc28a0415820c17c1ecfef21,2025-01-28T21:15:12.503000 +CVE-2022-48238,0,1,e0a3363b05434d90930d72ee63d7cd0f23451e39dd4127f60f3e457acf12474d,2025-01-28T21:15:12.663000 CVE-2022-48239,0,0,2b36af9631c5a605819f3a69da61c23f2a7c5a22328bff5e976273847904c542,2024-11-21T07:33:01.520000 CVE-2022-4824,0,0,cb365ab5076f58d6fea721db695d23f4ab58de5df6a90af86982f551b2e2c2cb,2024-11-21T07:36:01.127000 -CVE-2022-48240,0,1,b83423ba575e6be2e559f2f6a79613f36da5350453969e7c1b98d66b15908cb8,2025-01-28T19:15:08.860000 -CVE-2022-48241,0,1,a632f9d07ce4128422cead40398fa41d5943354be2b7b89da53b23cc8bf4cf53,2025-01-28T19:15:10.233000 -CVE-2022-48242,0,1,eaa3bc520a98e7911f4dff06b93742735f3b6cf14f5bffae1782f9ec6e714cc1,2025-01-28T19:15:10.467000 -CVE-2022-48243,0,0,efc81e05681a71fa1d0d717d3f4824c2ccc1ff4367a6cc1269cb108bea8983a3,2024-11-21T07:33:01.990000 -CVE-2022-48244,0,0,c0a9f3091e6daed6f5d2adffee9bed2c575662b1c969e371545656f0380875e2,2024-11-21T07:33:02.110000 -CVE-2022-48245,0,0,c1abdc1f0b29b08650e52bea057da6827ae90741d71e3cd1ebf0698cfe7619e1,2024-11-21T07:33:02.230000 -CVE-2022-48246,0,1,0e2de9fa82b9bc5c7edd41fd60a423841fe138543b259f1f97e1f572e4e640b4,2025-01-28T20:15:27.897000 -CVE-2022-48247,0,1,2517aa9e3d05f5877bf973eca5aca5c06102ce3db34f69f12e8b6905f11dc832,2025-01-28T20:15:28.050000 -CVE-2022-48248,0,1,32ea41c3012e34cf8d62e6da6f2d133fda00feb21017bd31c777968e1af27a76,2025-01-28T20:15:28.203000 -CVE-2022-48249,0,1,833ae9290bc0a168f29c1144597cb148b7be34d38329348bf389d6ee38544add,2025-01-28T20:15:28.360000 +CVE-2022-48240,0,0,b83423ba575e6be2e559f2f6a79613f36da5350453969e7c1b98d66b15908cb8,2025-01-28T19:15:08.860000 +CVE-2022-48241,0,0,a632f9d07ce4128422cead40398fa41d5943354be2b7b89da53b23cc8bf4cf53,2025-01-28T19:15:10.233000 +CVE-2022-48242,0,0,eaa3bc520a98e7911f4dff06b93742735f3b6cf14f5bffae1782f9ec6e714cc1,2025-01-28T19:15:10.467000 +CVE-2022-48243,0,1,dd952d08ed799452bfebe12a09eec59d87da44846ab376282456855dce46a308,2025-01-28T21:15:12.827000 +CVE-2022-48244,0,1,31211afe90d70bddffeb4dd8117d2ab15af82e4033f4d3376f4aa02c9dce0a0a,2025-01-28T21:15:12.980000 +CVE-2022-48245,0,1,91d2368adab428b3d697218de8d6274140921a5fd949b1116036adbc098c59b3,2025-01-28T21:15:13.127000 +CVE-2022-48246,0,0,0e2de9fa82b9bc5c7edd41fd60a423841fe138543b259f1f97e1f572e4e640b4,2025-01-28T20:15:27.897000 +CVE-2022-48247,0,0,2517aa9e3d05f5877bf973eca5aca5c06102ce3db34f69f12e8b6905f11dc832,2025-01-28T20:15:28.050000 +CVE-2022-48248,0,0,32ea41c3012e34cf8d62e6da6f2d133fda00feb21017bd31c777968e1af27a76,2025-01-28T20:15:28.203000 +CVE-2022-48249,0,0,833ae9290bc0a168f29c1144597cb148b7be34d38329348bf389d6ee38544add,2025-01-28T20:15:28.360000 CVE-2022-4825,0,0,a3ffc0bb7f78ec2b636b60f1a7d983f98ae406222a6201d2ddd2d5539f181aac,2024-11-21T07:36:01.247000 -CVE-2022-48250,0,1,57c4e2446f9c884baecc212717f599ba9cb23b07216eae905c88d4442b6ecd50,2025-01-28T20:15:28.510000 +CVE-2022-48250,0,0,57c4e2446f9c884baecc212717f599ba9cb23b07216eae905c88d4442b6ecd50,2025-01-28T20:15:28.510000 CVE-2022-48251,0,0,8c71538d3404e9a1a3a4cd540197959121e289beafc0cb1a9c886f3e624f08da,2024-11-21T07:33:02.947000 CVE-2022-48252,0,0,194dbe0e436336a7bdafcbc5c839c752d4a600d25c08f75a4322184473044b50,2024-11-21T07:33:03.123000 CVE-2022-48253,0,0,1e4b796ce980fd2d3ea2e1e61412d6274998adb73a4c43c69235da32887f01a1,2024-11-21T07:33:03.267000 @@ -212439,11 +212439,11 @@ CVE-2022-48364,0,0,389a006950dbd3156debcd5c772205d3b42a4dd07de138f247cf906a4a434 CVE-2022-48365,0,0,b935554843b9537d40e30b971626a708eb32cc0a7c1c7683e5ed169f2896d8ea,2024-11-21T07:33:15.613000 CVE-2022-48366,0,0,75258b876168fcbd6991b11ddddb8498c473455509bd89f55e02878066d92c9b,2024-11-21T07:33:15.753000 CVE-2022-48367,0,0,a624f3e93dd4cc5a193c7e3b785ef14b07571b38121346de63f21b74f0211e42,2024-11-21T07:33:15.907000 -CVE-2022-48368,0,1,cfdf0fb927519fcc4fbf933573497ea0bbcaa6b18dba88de4bcc45d5ac302c81,2025-01-28T20:15:28.660000 -CVE-2022-48369,0,1,54899196847c57d74a4cd598c1dede975771f962361a60ace2f6c23d87bd0a2b,2025-01-28T19:15:10.660000 +CVE-2022-48368,0,0,cfdf0fb927519fcc4fbf933573497ea0bbcaa6b18dba88de4bcc45d5ac302c81,2025-01-28T20:15:28.660000 +CVE-2022-48369,0,0,54899196847c57d74a4cd598c1dede975771f962361a60ace2f6c23d87bd0a2b,2025-01-28T19:15:10.660000 CVE-2022-4837,0,0,6d97788184674a1102a7bec1dd87cf23022e3b52a475e5f5f22f1d81fba5b96b,2024-11-21T07:36:02.690000 -CVE-2022-48370,0,1,e52f6ce1025b703fa07b1d91079e4e082c808ff0743ca27417eb52c3734175f3,2025-01-28T19:15:10.870000 -CVE-2022-48371,0,1,a463a72667e09565998c6cff8e92196ff6d2cf0b44fb388fd0c2580dbbc84031,2025-01-28T19:15:11.250000 +CVE-2022-48370,0,0,e52f6ce1025b703fa07b1d91079e4e082c808ff0743ca27417eb52c3734175f3,2025-01-28T19:15:10.870000 +CVE-2022-48371,0,0,a463a72667e09565998c6cff8e92196ff6d2cf0b44fb388fd0c2580dbbc84031,2025-01-28T19:15:11.250000 CVE-2022-48372,0,0,cee9e4f50c2de00fb1bd4bf85525c958e40829d57632d79830560c7c3825d513,2025-01-28T18:15:28.183000 CVE-2022-48373,0,0,988993806e15f13df3e38568ed2ffa5bcced6d63f9c3e1206d384f5306ba21f4,2025-01-28T18:15:28.393000 CVE-2022-48374,0,0,abf6979ae807a73d1146c040741a222b9f21355bd114489463b4b5f76b24dbb7,2025-01-28T18:15:28.607000 @@ -212459,7 +212459,7 @@ CVE-2022-48382,0,0,5d4b342e5702d881a06d100296f68f84ef99cd757bf0509dc62882ed88648 CVE-2022-48383,0,0,492fcc50d1c7bfc23e86f8eea4c6d0334ce7e29e2814f49cfccf4e757e18b78d,2025-01-28T18:15:30.513000 CVE-2022-48384,0,0,15df557c5c25862d281f07ed843dce275dd44e2518418119ba6e21471184a6ba,2025-01-28T18:15:30.723000 CVE-2022-48385,0,0,935cdd5a21c4c93631f7b55995f9a219bd1aba80c9a128a597723754b20e43f4,2025-01-28T18:15:30.937000 -CVE-2022-48386,0,1,d7a31ae9e838f26fc3329e48aa130eebdfa8d86844b5ea09d934b579be3ca0b8,2025-01-28T20:15:28.820000 +CVE-2022-48386,0,0,d7a31ae9e838f26fc3329e48aa130eebdfa8d86844b5ea09d934b579be3ca0b8,2025-01-28T20:15:28.820000 CVE-2022-48387,0,0,1c2ad655a31d609b4e92c1c03e9e9c170d9bf550fff2f1639c112969268cff33,2025-01-28T18:15:31.167000 CVE-2022-48388,0,0,d5f5dbbcdc282d063f3dfa8f77867431998ba29e6e7bb60f7db301be0bcebfb4,2025-01-28T17:15:09.743000 CVE-2022-48389,0,0,46046daa2f674ae4e2aee4dad333bff605876107bccb40f7db1c08b670f9ac30,2025-01-28T17:15:09.960000 @@ -213418,7 +213418,7 @@ CVE-2023-0264,0,0,6fac8abb0041323d099260247468abcda159cf0eee8b3f55df0d51afd893cf CVE-2023-0265,0,0,89f2bce5e942836917321a2fc0397105c35d7c3772ca86b7764f731c681924ae,2024-11-21T07:36:51.617000 CVE-2023-0266,0,0,eb7a1deb443d7989a0db7bcd9989b252f5c8dafa9c79d05773d3d97f8e3059c2,2024-11-21T07:36:51.723000 CVE-2023-0267,0,0,9b951ed6bfea4db41f11c640f15951ef1058f04f1c0053cfc0227ce6227beacc,2024-11-21T07:36:51.870000 -CVE-2023-0268,0,0,49a3362bca36e97e8192985a02385a87639562965c13471c80ab6f6909cf8d20,2024-11-21T07:36:51.983000 +CVE-2023-0268,0,1,f64be44cc2f1cc4aab5e750e0089c06b552b7b898fea44c492c7e2224b1d9268,2025-01-28T21:15:13.337000 CVE-2023-0269,0,0,a1444d79e87c3f19fbb848742fc9b600d4a4d1c593b1876129c5e0fadfa12980,2023-11-07T04:00:01.967000 CVE-2023-0270,0,0,44aab63ef7829127e706952e5b29c0e3a500353ef14558bd4aed6ac87298a3df,2024-11-21T07:36:52.103000 CVE-2023-0271,0,0,280857f7e76f082e2308a9504393a6f865c612ddaf8e3f42d53348f7b2e17b48,2024-11-21T07:36:52.207000 @@ -214753,7 +214753,7 @@ CVE-2023-1667,0,0,007039c95c2a66e283c8829a0e671b3f5d75acb867d7db6331aefe56e15ddd CVE-2023-1668,0,0,7026e054ee0e1ffc09cab5612ac02a2a9656fa9a506d74dfdcbe04798943fef0,2024-11-21T07:39:39.313000 CVE-2023-1669,0,0,1ce991c9a4e6bb9f3ac14e1d75a8fe1d54c99b80e814e4897327dfb6410b2181,2024-11-21T07:39:39.457000 CVE-2023-1670,0,0,c06c533e3f5f4366ef933e56765dccaa403d5072fca5a0c50a257590860253b0,2024-11-21T07:39:39.573000 -CVE-2023-1671,0,0,5f40a51b517061b0e56bade2ea9f387eee14fa00cd9f937e337339f365a190be,2024-11-21T07:39:39.697000 +CVE-2023-1671,0,1,ffd3253ede7b7e2fd00316e35b2d726f31e096e4810fa25700d5c280f05a32d0,2025-01-28T22:15:13.780000 CVE-2023-1672,0,0,2db498d952eda584270e55192f274b101001777d9a798432e84a793434073e3a,2024-11-21T07:39:39.810000 CVE-2023-1673,0,0,99969e71813952466a7fd54f2261c2e54244633ad230fcdc31ec71fb6752c49d,2024-08-20T18:15:07.140000 CVE-2023-1674,0,0,914e8d086ed7bf69c780a878eacfe68054cdf42fc07b9f3b1b79afee9e56f5ac,2024-11-21T07:39:39.973000 @@ -215812,7 +215812,7 @@ CVE-2023-20959,0,0,2bc0ce7ee713af0053bcb2abfb325d0532f06f2a8a76898d93a3abff68fd3 CVE-2023-2096,0,0,6790c0c4173f2a80c8fc6364bb8dca1458979a9c781f50f9a4a474739559a5fd,2024-11-21T07:57:55.790000 CVE-2023-20960,0,0,ee956132d1bab46972109c103afdccdb34c3b343cc4c9aeb125968a6a16df02e,2024-11-21T07:41:53.850000 CVE-2023-20962,0,0,aecae52f40c1b7322ccfbf481d8efa3135d014b332cf776666acf7d6237969cb,2024-11-21T07:41:53.980000 -CVE-2023-20963,0,0,b3cdfdf43d90261210817e62723e8dd9e83691a060772e5de119c08009c1002d,2024-11-21T07:41:54.667000 +CVE-2023-20963,0,1,46145ad8094d8e3ca63ec1423c2607433283b20a5bbdd471a36725c1cd8b8f2c,2025-01-28T22:15:13.970000 CVE-2023-20964,0,0,20d110ce5a795edd4537cff4242b6cda72e3f3ea463028e325e7f2f4229fb918,2024-11-21T07:41:54.773000 CVE-2023-20965,0,0,01461091bfeef6ac48916b9486af09adaa9c310c2f4a484792c231c2f1824588,2024-11-21T07:41:54.873000 CVE-2023-20966,0,0,80937ab2ecea9dad01376008c3ee5054c94650f43ab1a65179f879558cc56f53,2024-11-21T07:41:55.057000 @@ -217563,7 +217563,7 @@ CVE-2023-22784,0,0,2affb7048c1c19d64c57e9c5485dabf1b8a7f58cbb64656adea055b23ec21 CVE-2023-22785,0,0,3f3a318f788d17c97296e28f01b9f001661a07d255fb5b0ca81fc38aef976cf3,2024-11-21T07:45:25.400000 CVE-2023-22786,0,0,24f00118d73984630a284f40798e45627d7c4384e109880d7b8b7daa472faf1b,2024-11-21T07:45:25.517000 CVE-2023-22787,0,0,7518b3b4f2a32ed3a34453b336bc38e704d01e15dbeda65ecd188bf596c6bbf8,2024-11-21T07:45:25.627000 -CVE-2023-22788,0,0,ee7db4f7deb185195976854158b0dd3e0bc0fd0ae92942fcfb7f7523c46a910a,2024-11-21T07:45:25.737000 +CVE-2023-22788,0,1,0eebe854f4965cbbc4790c35ed48cabf414a27e94f2c58152dacbd0556d8647a,2025-01-28T21:15:13.493000 CVE-2023-22789,0,0,e71a0ae7c8f354e984bc71bb14d503bae840db46145fdf46ce4483afacf36132,2024-11-21T07:45:25.850000 CVE-2023-2279,0,0,13ca1e9b0be05ad331e204061f73a17bc406515a1c9c6ec0e74119d42511c337,2024-11-21T07:58:17.877000 CVE-2023-22790,0,0,024ed00f1d4e2409bd0f204fec18f93f84142148543721d7370ad26b27c01822,2024-11-21T07:45:25.960000 @@ -218035,7 +218035,7 @@ CVE-2023-23525,0,0,eda4b588d2d005cd9c9356e244382ceecba87975ef7b9e039d99b2659d262 CVE-2023-23526,0,0,b3086af3699ce741da5453a76d5bc85b8dee6ab0bc5dad43824708aca57bd44f,2024-11-21T07:46:21.370000 CVE-2023-23527,0,0,7467e1c2f945799a42381464b89b60e2fdc7f1263c16623761c55829161db0a6,2024-11-21T07:46:21.480000 CVE-2023-23528,0,0,650e9a99e0fd9e60e2db38b8f8e5930d222f449e060a9d63b17dc22d8f595647,2024-11-21T07:46:21.600000 -CVE-2023-23529,0,0,6bb8016b604eebfc6db815e1916df07075c1c80d546b609cc53c4f0ae35700f3,2024-11-21T07:46:21.710000 +CVE-2023-23529,0,1,06ea1c64d6e35ee6ba270e0752e3d0a3ff377c3acba0734c0c89a688e22ee1e5,2025-01-28T22:15:14.157000 CVE-2023-2353,0,0,d9677ccf6a1806a366039f2a958d6f73e93758433d611231baea25eb5f519b29,2024-11-21T07:58:26.637000 CVE-2023-23530,0,0,d04c218cad5b3190fc98feca7f327753f411ad97fa4c08572069ca30e03769e3,2024-11-21T07:46:21.827000 CVE-2023-23531,0,0,3a266917c705a24968ab3ed97ec3fdfa65e946f8403a4045383cd7e7c6ffbb7c,2024-11-21T07:46:21.933000 @@ -219980,7 +219980,7 @@ CVE-2023-25816,0,0,2e3d4de899064abfb0fc6d641f60a174b0a099761f4a1612a32ed64cb85c3 CVE-2023-25817,0,0,feacb7f57ce5a04af2559b54edf314cc0380a69c702d5b2cb861b3608f6424fe,2024-11-21T07:50:15.600000 CVE-2023-25818,0,0,6bdfa3bb3df4e67298a4f808f00fa8f724ef6751a6a39d54c09ff2883527329c,2024-11-21T07:50:15.717000 CVE-2023-25819,0,0,3bf7862c3d7bac89fdf649270a03e559097c55212a7e0219e64436de0e5ef56c,2024-11-21T07:50:15.840000 -CVE-2023-2582,0,0,a241b92b79371b6ee958314710a652dedf06941d546642baa24e311a5c355001,2024-11-21T07:58:52.350000 +CVE-2023-2582,0,1,6e6aec353a3e6318bf743d93c13e5f4990d028fe7e7582ac02232a73ec5df713,2025-01-28T21:15:14.863000 CVE-2023-25820,0,0,e22cc05faa7de5dee8061503259416f7e3cf576996cfe1a627d2a811a9a54c8c,2024-11-21T07:50:15.960000 CVE-2023-25821,0,0,9b1f3e34eceb118856b8638dbe935c7df9cf3979175c308643d30bc5814a6815,2024-11-21T07:50:16.077000 CVE-2023-25822,0,0,2220aa02132ec04d552aa80aea92fb9b94a4eff54f8c519838a4700a86e4fd3b,2024-11-21T07:50:16.197000 @@ -220682,7 +220682,7 @@ CVE-2023-26590,0,0,81026d0b9b1c018466411e0285636898c1c4b1f8c2710904882ad94fa0193 CVE-2023-26591,0,0,cb8b1433788fd981cf324c451c550b68d1d16a2521cc103f97b7a22224911fc2,2024-11-21T07:51:49.050000 CVE-2023-26592,0,0,25cf56c806a537b19ae74f034c88077cfa1cf5258e7f9d2da830d0ca93b65355,2024-11-21T07:51:49.167000 CVE-2023-26593,0,0,602b25afeb2bba96821ac41e04ec66b11e15122d78baba05d0b03413cc5b4c8d,2024-11-21T07:51:49.287000 -CVE-2023-26595,0,1,24284420d89a05f6e69fa31b2fed484c822ce9177d22aea9b492fabed05f885f,2025-01-28T19:15:11.500000 +CVE-2023-26595,0,0,24284420d89a05f6e69fa31b2fed484c822ce9177d22aea9b492fabed05f885f,2025-01-28T19:15:11.500000 CVE-2023-26596,0,0,473d756e5fc103c72c25cb52f36d58f77ec5ae61a2a53c9a3dc335fe84d6a907,2024-11-21T07:51:49.530000 CVE-2023-26597,0,0,aacf593fde559d15ce4638d00292bbc24591756418f0523c6654e6c81acd48a7,2024-11-21T07:51:49.657000 CVE-2023-26599,0,0,1dbb1f2d05db14b400489b090477c44b30116883ba51ce5b297c4ac394001c52,2024-11-21T07:51:49.787000 @@ -220909,7 +220909,7 @@ CVE-2023-27064,0,0,84dcabec60ecb51741ccb71be255c1eb38d7412ee2497e4430750bb66d90d CVE-2023-27065,0,0,c864d7df0e01b8823f27778776948581c70924ef2f7cd7b3bd9435b90973bdc7,2024-11-21T07:52:15.303000 CVE-2023-27066,0,0,dca412f5520041c4370cf9bb62ea0c840781590f5f91b138c5bfcd9fa1e7e00f,2024-11-21T07:52:15.473000 CVE-2023-27067,0,0,f0cda4f6cb0fd1040b85f34c738af3f40a303de3d0c5182d614046237ebcb0f5,2024-11-21T07:52:15.643000 -CVE-2023-27068,0,0,7cfe4a497df655671a49e6357d16fa0e9c5f7739157cea006c2a400536277d4e,2024-11-21T07:52:15.797000 +CVE-2023-27068,0,1,e431ed6fb399fc4497dda9a53200e774963211d0ed3f66b4fe98479433e88230,2025-01-28T21:15:13.647000 CVE-2023-27069,0,0,49ac387c47e6c2c01b238e1e71d94da751da2a76c545730445adad06ce8d8dc0,2024-11-21T07:52:15.947000 CVE-2023-2707,0,0,962e941311c97157758bc3df446195a5bfb2263a2f9839390441282872836d76,2024-11-21T07:59:07.690000 CVE-2023-27070,0,0,f5c115ac6729f39a464f4207bc6e21a6f6ad3ed79d5368304a99edf499a31e8b,2024-11-21T07:52:16.097000 @@ -221310,7 +221310,7 @@ CVE-2023-27529,0,0,688313a7c2d2ac3cbccb9b02f0a2482a012371b810941312b8acbfdb379df CVE-2023-2753,0,0,07c6e809a42ad3b510370047ca6a9af0cbf43d74dbab18486dd49105dce46294,2024-11-21T07:59:13.583000 CVE-2023-27530,0,0,b38d60292378b01f02071b1a709b01b4844b4ce61f4f988722b92fc121e4966a,2024-11-21T07:53:06.430000 CVE-2023-27531,0,0,470c592a54054490454a11c4bcc4669f0b59dff66b009f26fb795e2e9e988986,2025-01-09T22:15:26.207000 -CVE-2023-27532,0,0,e3663dce5d0ed9e697881b0b0fb6ed82ce0fa73f270203c1c47b2cc37854ca94,2024-11-21T07:53:06.657000 +CVE-2023-27532,0,1,6197657f54029169c51ead71db1e6e827ed06db04f0056bfbee40be032c0d053,2025-01-28T22:15:14.430000 CVE-2023-27533,0,0,4454110a1b2f4b69eb0494f7d72ff64548b9621981ce044c5c229000994a20ec,2024-11-21T07:53:06.787000 CVE-2023-27534,0,0,89bb3378a6d88f9b6e7db9854c050ad3fe776e1519d432e0012c35b7535689e5,2024-11-21T07:53:06.953000 CVE-2023-27535,0,0,c2b4abc030cb6f06518e4e055ad1676e5925ae5eca610f01961ce82bf7c34b3b,2024-11-21T07:53:07.093000 @@ -221817,8 +221817,8 @@ CVE-2023-28123,0,0,6aeaec24addbc5446d4b9dfcebba426183a2c5b7ba1d5c92eba28e82a2e7b CVE-2023-28124,0,0,115c3967a934e801b02b4b4aeb557c0ace0d5bb57a3b0139fd3dfece492e520b,2024-11-21T07:54:27.173000 CVE-2023-28125,0,0,9beb5954cda52e2e9fd1c557a74dab5e7d8a6fa59a7b363ab928157d3235c7dc,2024-11-21T07:54:27.287000 CVE-2023-28126,0,0,204a03ad38e769daa61a756a4db3bf54bfafa6d7355515d2eddac409e52b14e8,2024-11-21T07:54:27.410000 -CVE-2023-28127,0,0,4a6d9c2f7760a075ee695a96fae31b6dd82d3e499e83a237c6d37053c6fa0e8d,2024-11-21T07:54:27.537000 -CVE-2023-28128,0,0,f86c05f3b9d4dcd0f58e5727aab3f38076b52f71ea5abb3e80074c2fe80fe0e1,2024-11-21T07:54:27.650000 +CVE-2023-28127,0,1,cb19d557cd45d8477d19041eef65b871de8872b2af726736e204161a4df672c8,2025-01-28T21:15:13.850000 +CVE-2023-28128,0,1,735c14e977cb119525a50db5e7d0c570ffa4b44e1129f5923acca5ca0ded4641,2025-01-28T21:15:14.003000 CVE-2023-28129,0,0,e2a3867ae077eed14f4219bec8f42b7b4e6ec0beb5471c37832c7af4a73f5a2f,2024-11-21T07:54:27.773000 CVE-2023-2813,0,0,c80adc1c4941e18d7bb653fc72dc5858f070484f6c83f6530ae3a8652548b158,2024-11-21T07:59:20.313000 CVE-2023-28130,0,0,c695a1bac65841461455f58641742e8c00b5ac357783ba954d62616dbf10fa98,2024-11-21T07:54:27.897000 @@ -221887,7 +221887,7 @@ CVE-2023-28201,0,0,d32f98dffd71069baa9e03e46c720b8409c7128c98bb12bcc06703a79fa5d CVE-2023-28202,0,0,191014a0200c592d291fa5fba60b126bce7fe013f7105ee7dd188bda0cdcf7fe,2024-12-05T17:15:07.837000 CVE-2023-28203,0,0,4cb19dbc67823a1f2ef0f3a0d6b749db68c9403e1ae6273e5d0d612a7d2831a7,2024-11-21T07:54:35.627000 CVE-2023-28204,0,0,d29b1bc8f2cad26e0d01ee6d8c1150ddfc2761a38a4996cd387e5b09f29ccca7,2024-11-21T07:54:35.760000 -CVE-2023-28205,0,0,5c84232494f2fcfdae49b4240e0969a21c90ed06bcedd6171dec390938943816,2024-11-21T07:54:35.903000 +CVE-2023-28205,0,1,12484c8c390868a4b2e80fc3d5e2d1333ba0c493509776a9f6c24eeaf48c7cd4,2025-01-28T22:15:14.637000 CVE-2023-28206,0,0,666a3e14555d676a13efe3acbe928335c4d89b72343fe44661b875103c70a379,2025-01-28T17:15:12.633000 CVE-2023-28208,0,0,8fc033bc09b7b40815121b04865c55bdd349e84c32a87bcecfbf9bec0bf2a61e,2024-12-12T14:26:18.893000 CVE-2023-28209,0,0,ae4ef08c6845cc374897f4c97156cf6614c7c1aa7babc4b8a598ea53ad27998a,2024-11-21T07:54:36.330000 @@ -221991,9 +221991,9 @@ CVE-2023-28311,0,0,ae1d98713c13b437aeb41be3fb141850b3b329b1e2b07eb845b6321be0898 CVE-2023-28312,0,0,9bbbb50d3a478374571c35118a910e274ec76c430b5052387859617e62c880ac,2024-11-21T07:54:49.080000 CVE-2023-28313,0,0,7e92813a60a330cd8b200147bcc1a72031a7e6eb7ea7d87eae4d39aaca464fc4,2024-11-21T07:54:49.210000 CVE-2023-28314,0,0,0677a18d37e1afc599db6a9caa4520f9a84a365ea28fe178a16403c8396123d5,2024-11-21T07:54:49.333000 -CVE-2023-28316,0,0,afdda6cc1ead6cc81ba00f263c51ac9465d7ca8726f43216ab3351c2056633ee,2024-11-21T07:54:49.460000 -CVE-2023-28317,0,0,9fca8e37a5f16effde329a894565f685f1a580f3fd9795f7a92b105d47f6e502,2024-11-21T07:54:49.590000 -CVE-2023-28318,0,0,5677355d4a68e7382bd107644eb5403fbb104c2bf2f9e8d18b2828d5c599e5b7,2024-11-21T07:54:49.720000 +CVE-2023-28316,0,1,558e62b89b5a149a485a160de8c2ee1df5088034cced2f3baa9d450c448c2eca,2025-01-28T21:15:14.163000 +CVE-2023-28317,0,1,d385328a7720f0bfd5c04246f1002eaea3210e9adaa4b34ba1aba40fd3b52f94,2025-01-28T21:15:14.333000 +CVE-2023-28318,0,1,c860231d404c26463b5431368a52acf92e28f53bab89f1be400fe7ef02b5f811,2025-01-28T21:15:14.500000 CVE-2023-28319,0,0,15040a3e130e62b4bbee6fe0173dd15df369749ba859eeb51bc840aeeff21a7a,2025-01-15T16:15:25.690000 CVE-2023-2832,0,0,6c470e47464c8cc990c44e0364cc9743a38d0776c3716ddfc94ae9e534a695b2,2024-11-21T07:59:22.663000 CVE-2023-28320,0,0,c014f77a6cd188ee90eb2ae1f7fb217d7f627efff301db727a2b8a8671f0022b,2025-01-15T16:15:25.953000 @@ -222733,7 +222733,7 @@ CVE-2023-29089,0,0,d85533a74d47c8d2841cf73e04fcac4d562826480d2fdb7ae49c1f88a1d3f CVE-2023-2909,0,0,d1bf84ead080ed8e90f328532d5e1433894dd97c42e77dc617b5e17290a3d612,2024-11-21T07:59:32.860000 CVE-2023-29090,0,0,29d32b8166cdadf0338f1af592d525e8f00355f6737f5b19a267a4eb5199d1b0,2024-11-21T07:56:31.600000 CVE-2023-29091,0,0,29fb982a573d689a1e353a14e8bcfdeb8f73611968f5f342d71177e2e85efada,2024-11-21T07:56:31.763000 -CVE-2023-29092,0,1,78d46fd02421b8fb1a4b0beaff36cb561ac519804476bf8bda47e40c197ff4c7,2025-01-28T20:15:29.033000 +CVE-2023-29092,0,0,78d46fd02421b8fb1a4b0beaff36cb561ac519804476bf8bda47e40c197ff4c7,2025-01-28T20:15:29.033000 CVE-2023-29093,0,0,8db0f3ef581aad0c15089a1d41ee2ea51332d7a374d1f3b78f90753b48f03f94,2024-11-21T07:56:32.070000 CVE-2023-29094,0,0,0b1844e618070b846757399db0685c29737a5f4ff0c735214a0e1051b08654c9,2024-11-21T07:56:32.190000 CVE-2023-29095,0,0,3107a19b7d2a05a7dbb94a58a0adef40fed506d7acf001bcc7db430f18afd771,2024-11-21T07:56:32.310000 @@ -223158,7 +223158,7 @@ CVE-2023-29549,0,0,8799d61edf2028ecd1debe0aa906be8da419a38736119c1ef052665ed45d0 CVE-2023-2955,0,0,9c0e18923443b98b3624f6a20eb4112985b6c80a66e21eac353915004989baf6,2024-11-21T07:59:38.587000 CVE-2023-29550,0,0,c74fa6f7793170fa0f1a7dc6261b9b7fd7992c4bb83f77142c83dd3aff5c83ef,2025-01-10T20:15:29.630000 CVE-2023-29551,0,0,6f6042428f056388ae982f18e077673b6cf18c3fd9c579fabcd2adb1f3fc34b2,2025-01-08T22:15:27.373000 -CVE-2023-29552,0,0,581b98f26884acaa09a2e45c7906b5ad297c852b04af26ae94e2904276792077,2024-11-21T07:57:17.017000 +CVE-2023-29552,0,1,31d221247b49bc87f455e2b22711f3bc9223d8b92af9a1cf440cf0bb664bb7ed,2025-01-28T22:15:14.983000 CVE-2023-29562,0,0,1ce691e8d9f6f5deb206e8ff10b9ec0045c33f0503241d0cacef281445620ccd,2025-01-03T21:15:12.693000 CVE-2023-29566,0,0,72613a9047e5b74b43c598afd3a5332b14dad8bfb67cbbb4132d5bdb7fd4eb17,2024-11-21T07:57:17.310000 CVE-2023-29569,0,0,e838e1f5bbabf47f4c66b50e6c41d8d01307a1cf9562ef1e35b62f66e5510cd1,2024-11-21T07:57:17.467000 @@ -223277,7 +223277,7 @@ CVE-2023-2978,0,0,ee44bdff3bc9077dbbc663fe0140364d678849011078f4d2033355d188a2ee CVE-2023-29780,0,0,cd39c42a57d66a3e72171622ffcf04e4013249b5645e59ef63ca186cb0348f85,2024-11-21T07:57:30.837000 CVE-2023-2979,0,0,940b8b5de0a61f019fd0bb4626df1bcc3e538e4fdbed90682482103718fa5e10,2024-11-21T07:59:41.287000 CVE-2023-29790,0,0,3b7e7bb2fc189dfb0da936cef9967e2b65134075246924fac3fad8720d30f13e,2025-01-24T20:15:29.987000 -CVE-2023-29791,0,0,4b6f9ea2ad71afd296025135f53cd681f25dbb8240e6363e4604bd06dc15ea1b,2024-11-21T07:57:31.123000 +CVE-2023-29791,0,1,cfb1d9016bdb6782e3be35b297e2364344557cfd8542a4bb47f53d2521fd44ec,2025-01-28T21:15:14.663000 CVE-2023-29798,0,0,929fc11dd08aafb782ae337033d6502ede598af40c51265505538d2cc854416a,2024-11-21T07:57:31.270000 CVE-2023-29799,0,0,0ead7209bfbe112296ed08d38629564c44635e7c5af1a6e255bfe2d6058b47d3,2024-11-21T07:57:31.410000 CVE-2023-2980,0,0,009d83d6e32f60c241e47b540b063da57e8c850040f143c3ec04d0b4047fb88c,2024-11-21T07:59:41.437000 @@ -223396,7 +223396,7 @@ CVE-2023-3004,0,0,3397d0ff6d0c8243a1e902db02a3821e65a0625ad95eab454e899fc6a06c20 CVE-2023-3005,0,0,3bba8cacc036632961efeac95189798a09bffe62ba77b928588a5fed8bf055ce,2024-11-21T08:16:13.250000 CVE-2023-30053,0,0,f3bd1468b26518ad8d3304e0e8b887484d598f74b9be177880ff58c73fc48dcf,2024-11-21T07:59:44.783000 CVE-2023-30054,0,0,ce3a10e2e89bc097c6e0a1d7f7c4c67a67ab7f61c38515ebef8f05d7357297ae,2024-11-21T07:59:44.927000 -CVE-2023-30056,0,1,6d95d7c9a372d8253025b83485bbae5471165bbe0390d508b2d82c8663003e40,2025-01-28T20:15:29.300000 +CVE-2023-30056,0,0,6d95d7c9a372d8253025b83485bbae5471165bbe0390d508b2d82c8663003e40,2025-01-28T20:15:29.300000 CVE-2023-30057,0,0,1097e9c9efa4bc678fcfc635b3ea4a844ea8e292f33ae43e51d6b408894c0f64,2024-11-21T07:59:45.233000 CVE-2023-30058,0,0,a14c637e7ed9b07c2ce1d3897753efad75676fa7cd24b43bab168d6ecf9c03ed,2024-11-21T07:59:45.390000 CVE-2023-3006,0,0,57110f4979d3de6105b8e337e633736e1bd96816739ef045414e50bfe2f4ef02,2025-01-09T21:15:24.500000 @@ -223410,7 +223410,7 @@ CVE-2023-30078,0,0,b59993147a62c797f33e7c496e57076f579e3cbe18fcb581691b3e11b875e CVE-2023-30079,0,0,1864953fe33081a6ea74d96fafa4bcbdbe00bfd5214eb8cad4b963faa87f65ad,2023-11-07T04:13:39.547000 CVE-2023-3008,0,0,b8bd483b2ec70b6ad2626cdc7694f3bc2e5a2939898ff1ee6f945c20cd116aa1,2024-11-21T08:16:13.703000 CVE-2023-30082,0,0,9bb92d956ae82dd34b1e5eff81dd134b18a6dbb5022b10b0299f85bc1e4eed12,2025-01-06T17:15:12.460000 -CVE-2023-30083,0,1,8888e61bd828ffb4ab2bc9196072c75f60937c3595712f3dab71d9b2499fbdd3,2025-01-28T20:15:29.483000 +CVE-2023-30083,0,0,8888e61bd828ffb4ab2bc9196072c75f60937c3595712f3dab71d9b2499fbdd3,2025-01-28T20:15:29.483000 CVE-2023-30084,0,0,7552fbb903af88672409296a89ad83fd9ad9d43cf09e45ece4226f8cda3ea36a,2024-11-21T07:59:46.620000 CVE-2023-30085,0,0,8c1db376031a008fa08bd255201efb63329805c701c8606c89bd9a319998c4ed,2024-11-21T07:59:46.773000 CVE-2023-30086,0,0,8f278bd8578fae9ef0ccc8fe776e9cb44e07a988c299c5c62b0c5d5bbb0f6978,2024-11-21T07:59:46.917000 @@ -224644,7 +224644,7 @@ CVE-2023-31800,0,0,af6ce8518ad24ea6710bf61afe7d846aadd9ce7ee7c03f64251354ea9dea8 CVE-2023-31801,0,0,13ecab2491d6df94e55dde8f3c37f05217a38b6649e753d445e5caf8b2bd281a,2024-11-21T08:02:16.170000 CVE-2023-31802,0,0,f0728119a871e0027ecea2b0a581fa9f335ffdae83f4194131ed673e7baa1470,2024-11-21T08:02:16.310000 CVE-2023-31803,0,0,800ae3c57d9288a134a1ea859a6f85039e2c82a3a7f17be54a3e49f209338f2a,2024-11-21T08:02:16.467000 -CVE-2023-31804,0,1,5cb1d476c1c8df09517ccb8636302ef3d00d168a6cc1e7e3db5dbfd871586c55,2025-01-28T19:15:12.820000 +CVE-2023-31804,0,0,5cb1d476c1c8df09517ccb8636302ef3d00d168a6cc1e7e3db5dbfd871586c55,2025-01-28T19:15:12.820000 CVE-2023-31805,0,0,a85b70a2e43a651d059757e2e3cbdc6001b49a95b69b7027ca531ba7c2f429f8,2024-11-21T08:02:16.740000 CVE-2023-31806,0,0,776868ba1c7234e5d033ad4f6401b2f8c7396411a3eec3d1a962b69c16581ca4,2024-11-21T08:02:16.873000 CVE-2023-31807,0,0,767b5f080466fa8df5df923ded96cba99455e65929a37edf8f27f16c63dcd589,2024-11-21T08:02:17.007000 @@ -224736,7 +224736,7 @@ CVE-2023-3196,0,0,d9b74784bc7d9de14374aeeeebebc3ddf62cc6edcb1cdf15b53d8b927a02c1 CVE-2023-3197,0,0,2d2e228fa09a2cb7e9c716d1dd42b1ee0f8a840566c154f582461284f14d7376,2024-11-21T08:16:40.487000 CVE-2023-31972,0,0,4c381c0d0cc489fc90337811824d6e246d546c134e95dd0e4281ffe93a045819,2024-11-21T08:02:27.123000 CVE-2023-31973,0,0,6e6456171b37f2aaa7526d83df1ab82731bec2c18d070bee86a23239fc3d74d5,2024-11-21T08:02:27.260000 -CVE-2023-31974,0,1,3ffd996cd56c246f73da803263bf054a81dfca920177bd51e1c810a3441bbf56,2025-01-28T20:15:30.003000 +CVE-2023-31974,0,0,3ffd996cd56c246f73da803263bf054a81dfca920177bd51e1c810a3441bbf56,2025-01-28T20:15:30.003000 CVE-2023-31975,0,0,28b90207c43a24d10a54e70cf5bc0be424f3d9cc362fd41b85a6d4489464641c,2024-11-21T08:02:27.610000 CVE-2023-31976,0,0,a897a1e839bbc6dcf8baaa5bf238a96d494424ea15f869705f8885d9aa51fa2d,2024-11-21T08:02:27.783000 CVE-2023-31979,0,0,d300b44c03bc1c129975cbc0d8f58f0c399ebe733b11f42ec3f8f064dd4e0d42,2024-11-21T08:02:27.920000 @@ -228639,13 +228639,13 @@ CVE-2023-36994,0,0,fff5298c4b24c0e5b92702a6a1f0446ede67f47123caeb5ebf984e5560e81 CVE-2023-36995,0,0,4e2506dc3314d1c8d3c5decfa5d038b5e536042093e975b150aa20e381792196,2024-11-21T08:11:00.623000 CVE-2023-36998,0,0,12c332839a42b454726347abcd48046d6ed5c2035bbc23b68e1288628dbcb622,2025-01-22T15:15:09.647000 CVE-2023-3700,0,0,453d92acb238b2558e7054067437e7c096de953ccf1cbfc4152eb94511be7528,2024-11-21T08:17:52.480000 -CVE-2023-37002,0,0,eab4e88066629c0a8e5c1ab311b13942fcecd4616c08827686ca784a44050506,2025-01-22T15:15:09.757000 -CVE-2023-37003,0,0,cacf3e78e3dee0350ac93bfc6a1395adc99ab168ae46336d2952e4b0bbcf6d7f,2025-01-22T15:15:09.867000 -CVE-2023-37004,0,0,1df2b48be4d756ee7507e3fd3d9e25c5efdc6dc4f3bbec16805bc7c872a882ba,2025-01-22T15:15:09.970000 -CVE-2023-37005,0,0,c0ff9ba23fffadec58ff0f25731e8c471a2bd159f41d4edc5b724eb64cba4343,2025-01-22T15:15:10.067000 -CVE-2023-37006,0,0,053a9a073b7bf6fba39169fe89766057e067a1af40f3e39ac50d11ce0265d6c3,2025-01-22T15:15:10.170000 -CVE-2023-37007,0,0,d0ca3e9bbe320bc80ad5bd87cbbad4eda4d4b53ffef2c09847c584abc6d3b5d2,2025-01-22T15:15:10.270000 -CVE-2023-37008,0,0,4dca7cab7dac0c40e8327e37f4e041a3a0b8931669d521ca804153a13cb584b3,2025-01-22T15:15:10.373000 +CVE-2023-37002,0,1,df314e9021df581e9b224b49383fb6c154036709252f3e820487305adbc7809b,2025-01-28T21:15:15.130000 +CVE-2023-37003,0,1,af91a2eadb356545c7922c54bf3048b72a900702577ce059b3e9cce0639e5fff,2025-01-28T21:15:15.313000 +CVE-2023-37004,0,1,b5ae523dd57a643ad8c7dd9895f7966b748e9dac52fd0bf0759e03d7c73297b8,2025-01-28T21:15:15.520000 +CVE-2023-37005,0,1,7c63edfe3b03721d4e4df43e972fe5ac299ec6b5a525f53fc44064385ffd64f3,2025-01-28T21:15:15.700000 +CVE-2023-37006,0,1,572d34e8687db224837effd915af4edbb771901b8c2449f1ebf210d26fdf2fc7,2025-01-28T21:15:15.873000 +CVE-2023-37007,0,1,d100377de1ed8b674f21c0e3fd93dfa8bfab78192aa9759ff8679433142ef4cf,2025-01-28T22:15:15.220000 +CVE-2023-37008,0,1,d3110605a46f1fb497a55a34fae56073b61bbf8836b02a93c6f095eaa52d5749,2025-01-28T22:15:15.390000 CVE-2023-37009,0,0,746c07754a5e2ce734caaa9d0d209d365d6e349aa07166c793e9bbde64168605,2025-01-27T22:15:10.977000 CVE-2023-3701,0,0,50c60623ffa7110070b51e3894d8b141f7b048bb1af146331e25664835932475,2024-11-21T08:17:52.610000 CVE-2023-37010,0,0,d908b07ff15efd3f112b312845b37df564cac1595d68dddbec6d27befcaec0e2,2025-01-27T22:15:11.113000 @@ -229361,7 +229361,7 @@ CVE-2023-37936,0,0,f9977c568bd0493948c87cf9c508eb91f4fc8f7c0d9c1ad0845530dfaa570 CVE-2023-37937,0,0,66f78b4b34d638fe6fe234c97751063472ee4555cbf7e5a12f51702879c87e8c,2025-01-14T14:15:26.940000 CVE-2023-37939,0,0,d3b772421f93766dd5d56ed8a17336460359db9420b069ecd7dc476dd713d5ac,2024-11-21T08:12:30.200000 CVE-2023-3794,0,0,927c15dbb6ac6053f144e81718d1e10b00b61d9e23d4cd5797afe957900c37b5,2024-11-21T08:18:04.807000 -CVE-2023-37940,0,0,047021639e76af7b35157c12ff0afa1b906590a238eefc242a6a5cc5dab05f2b,2024-12-17T22:15:05.080000 +CVE-2023-37940,0,1,2ff3595f0a1972c0404b1eae9a974d0e055ee9b96f5b28c639cfb09dd6c5c65f,2025-01-28T21:18:48.497000 CVE-2023-37941,0,0,045990bf70986ff68a9d74299b9e03db0f69f1113bec39b268503d013f0d1d3f,2024-11-21T08:12:30.350000 CVE-2023-37942,0,0,eb652f02ef7ee1f3a7c8f0b67772922d057f1ee451b704d6002adc99480b2819,2024-11-21T08:12:30.510000 CVE-2023-37943,0,0,92f85b34597e38157fab7c43da73b4e716eee7d3851d52137f46124d34c52d42,2024-11-21T08:12:30.647000 @@ -231248,7 +231248,7 @@ CVE-2023-40186,0,0,86edd5b87d0a940d6fc0377483327ae5ee2582158c29e1468bcee4515a1a9 CVE-2023-40187,0,0,f41dae2dc66bd15153ebf352c78875ef6656cc0cc4ea2fca49eae31bea623b39,2024-11-21T08:18:57.723000 CVE-2023-40188,0,0,1fe48088f7dadefde3ff4366da12a36ff484dfdf29e6761c1c91ddba7d2f0a11,2024-11-21T08:18:57.860000 CVE-2023-4019,0,0,563dd69bbd1b21bdf5e5a349f892a320d5f3b1eaf45cb461e0309e90d6eb2459,2024-11-21T08:34:14.473000 -CVE-2023-40191,0,0,2dd77aa5b242b4a1a7f394c1d0a86dfbd7fd2871a93d8b61de2722f46a9bb549,2024-11-21T08:18:58.040000 +CVE-2023-40191,0,1,7905c8f1068e660077822faa40400aef6334f018932728e79863f842158f9933,2025-01-28T21:18:13.967000 CVE-2023-40193,0,0,cafd35faec76508ed47f2aebba98d2888261b451495f9a2f9a9981b5301f9a2e,2024-11-21T08:18:58.167000 CVE-2023-40194,0,0,706252a3f8f19b4db873b2cb5ccaecff041fbabe5afe3051d4f31489714dd5ed,2024-11-21T08:18:58.303000 CVE-2023-40195,0,0,9fcf30fb1cff30962f016cb89b905b58192316dfe3f112295d7f8cdfc08f1747,2024-11-21T08:18:58.440000 @@ -234356,7 +234356,7 @@ CVE-2023-44303,0,0,131d2b18fd8d0ea9d91f4aa0f06a4aad39ea8467225bf43d304d00bf32001 CVE-2023-44304,0,0,b663a3f64400697bae217ecb6cd664930609d57c82a287360ddbd64207a1f33e,2024-11-21T08:25:37.840000 CVE-2023-44305,0,0,4e80ca6139ca696be4a7418e499a78d935e938cbb9d06e0213301a0206d06f5b,2024-11-21T08:25:37.990000 CVE-2023-44306,0,0,4e3d05dd4bd5ae9789538f69449237a4c0b4f1906abe60518503d5044ad3c7fb,2024-11-21T08:25:38.117000 -CVE-2023-44308,0,0,0d2f1e5948259575a897b86d6e0e81ebcedca4d8871e45723a8c37fb42625e70,2024-11-21T08:25:38.240000 +CVE-2023-44308,0,1,175ca14406a54411e044122c49f45fe22df494d1cefdd57c6ea28ce16fcf4d64,2025-01-28T21:34:39.347000 CVE-2023-44309,0,0,04ebfd457994fd58f5251cb23dc81deab3a5915e3bb0012daacc132eb3e43359,2024-11-21T08:25:38.360000 CVE-2023-4431,0,0,bfe67478bf41ecfde69062639ae299138b8ac3ad6244a32b105f40d18d066e16,2024-11-21T08:35:08.173000 CVE-2023-44310,0,0,e08dd7ce1e2db1cc69ace080a59379aa01f7b603bebf513d413eae0966bd68f3,2024-11-21T08:25:38.483000 @@ -236798,7 +236798,7 @@ CVE-2023-47790,0,0,8b5dce88a170bb10d141b9b09a1a38a325a59d1036c852e5984345dca4779 CVE-2023-47791,0,0,3c706f7319a5daeb07831cf5da273a5da89fc70b60936307c4e50a2cc7c1c8ce,2024-11-21T08:30:49.107000 CVE-2023-47792,0,0,2e948dd52373861ef97deace4a7ccfcc4392453e76daec0f60ec22a85482993c,2024-11-21T08:30:49.233000 CVE-2023-47793,0,0,73d1da0ad020c0988f0efdc645ed9c6fe58faf3b9b14fdf1d2ff3fc0da71fc21,2024-12-09T13:15:30.773000 -CVE-2023-47795,0,0,ca67cffc3735efa47c60a551ac001e454bf0b40a82a57ff5ffbc2f5bd2df8ffc,2024-11-21T08:30:49.357000 +CVE-2023-47795,0,1,651e1bda01f276d632c1dbbf296826941ae0238d32329d3aed56359fbe25f8d7,2025-01-28T21:17:39.030000 CVE-2023-47797,0,0,0a3ec8caa3da0fc483988f07231b42a39bd1e3d7dc0b796a008e151f31d3fb7a,2024-11-21T08:30:49.477000 CVE-2023-47798,0,0,eabe9df12662645a26581da7b4c9c3364ea7ba78f7e46417e8d593c5db616cc0,2024-11-21T08:30:49.593000 CVE-2023-4780,0,0,9f7ccf66ba8678635b360d166ab38a48497fa91d8e39887310aa19865cfebd7d,2024-03-12T15:15:47.163000 @@ -237594,7 +237594,7 @@ CVE-2023-48773,0,0,69c2d10ce53d5bed5abbbabd5452f88c034b79ad27513b7475e9a369aba8c CVE-2023-48774,0,0,df67987526796cf9139d3a58e2031842a7b4119a36678e2120d6525442d00f66,2024-12-09T13:15:33.937000 CVE-2023-48775,0,0,fa9fe58a38a9119748279127f270d1ac54cb2b2cc1527bcfb3bd7dca7deb38b1,2024-12-31T13:15:05.650000 CVE-2023-48776,0,0,60422db6013f51551677e22d94d4d864bd4aac472b3cb692bc594e8b25dde16d,2024-12-09T13:15:34.077000 -CVE-2023-48777,0,1,b0a93df6a0e18e79dba0cb647c4faeffcb98e189411bc565757fca1aa71f049e,2025-01-28T19:20:32.813000 +CVE-2023-48777,0,0,b0a93df6a0e18e79dba0cb647c4faeffcb98e189411bc565757fca1aa71f049e,2025-01-28T19:20:32.813000 CVE-2023-48778,0,0,65cedce3479eb1a4b909913b713ad810f6c269d477fecb40f5921fedfb5b424e,2024-11-21T08:32:25.667000 CVE-2023-48779,0,0,ad26cfd6164ac54f543ef8fcb8307e29b6d3a58bbc35c290479288585f2a9880,2024-12-09T13:15:34.210000 CVE-2023-4878,0,0,47f789f232cb16fc017c697089a246311874c0e5f962f77cee0a6f5aad57d8ef,2024-11-21T08:36:10.537000 @@ -239698,7 +239698,7 @@ CVE-2023-51889,0,0,3b00172978d60b27ec54a443b58521b6ed216a8e7da237874a6927d5bb505 CVE-2023-5189,0,0,f877579052e7e020385bd9010538c2c710e7d8d7f1242bfd44a5823be3c89969,2024-12-06T11:15:07.380000 CVE-2023-51890,0,0,2b6091a001d1db9add9c03f6d7eff0ad33ec925e8861f3124beb43a9f1371b2a,2024-11-21T08:38:55.530000 CVE-2023-51892,0,0,3bf111d7113c2ca77c5072b2c91bf6ff4e21c167d83525db5fb8e9f00c36c4f5,2024-11-21T08:38:55.670000 -CVE-2023-5190,0,0,6961244d8f9a4e8e479c849849cba9728804abe3321727f08d4a01aa9c1c40af,2024-11-21T08:41:16.223000 +CVE-2023-5190,0,1,d8a4ea45160d47f1af14cb80d174ff8977d085cc3f8bb05f2897e432ea5f6fea,2025-01-28T21:34:19.250000 CVE-2023-51906,0,0,dcaa2f0b0dc30bcbd5cca54796e11f7cab839434a57be609c8c9a61ed0212161,2024-11-21T08:38:55.823000 CVE-2023-5192,0,0,59e8b3a63b756e27580f62a0295ee68438268b96ea1db1c38e14753d138f1013,2024-11-21T08:41:16.347000 CVE-2023-51924,0,0,1678821c3f9e1be69e4aca7f6a8feaaf1464677cf5adc5b66d0fdbfa3fd21416,2024-11-21T08:38:55.987000 @@ -241481,7 +241481,7 @@ CVE-2023-6210,0,0,02c9290708fde95949b1ca151f139c7c9b43a2860ff7716fb8f4c4c67f645c CVE-2023-6211,0,0,d92c46b01202ad02f1d65f49f37de45debc7ccbd90a49f886a3603bf953d5a13,2024-11-21T08:43:22.777000 CVE-2023-6212,0,0,e9cd8209e77de729765985589d614d64d3b20aad5238302e5d7e04d402eddb50,2024-11-21T08:43:22.893000 CVE-2023-6213,0,0,69c26f6e0d3c3ec1f9e8e383df5c98725fada25a86e2146248059d9eac690155,2024-11-21T08:43:23.027000 -CVE-2023-6214,0,1,388f603da21edb792f4384dfd717a62e7eaf2c425137df621a2f7ce84c952a94,2025-01-28T19:28:35.700000 +CVE-2023-6214,0,0,388f603da21edb792f4384dfd717a62e7eaf2c425137df621a2f7ce84c952a94,2025-01-28T19:28:35.700000 CVE-2023-6217,0,0,9810ecf6c59d7329e827cb6762f25b7a286bf752aa3fb224aef47a9922d524e1,2024-11-21T08:43:23.267000 CVE-2023-6218,0,0,6b136ed227e6d9a106a997506bd0ab6d1193880266b28ad779eecdafbfc0d320,2024-11-21T08:43:23.390000 CVE-2023-6219,0,0,234e803ae44ea198b1c5cbc3f7d287ef9f28d26cb17bcbe2e74596b21799789c,2024-11-21T08:43:23.520000 @@ -242474,7 +242474,7 @@ CVE-2024-0040,0,0,482e23ff76f3327407e40e3d508d01e97e22ee3b05630d7571f0b9bc84b628 CVE-2024-0041,0,0,30f391e32967bb0baf25d8a5436bac2e10d105d6b34926d3751c53b398bda865,2024-12-16T14:47:50.477000 CVE-2024-0042,0,0,7265bcce4e87025566b81559e9a2a904d94427e17ed2d8159b49b70351e50b78,2024-12-17T16:47:02.183000 CVE-2024-0043,0,0,9c5415d367b2b00fbb658ba49909a69019febd5394910268036d8c799fd4ab53,2024-12-17T16:47:21.967000 -CVE-2024-0044,0,1,390eee44c5719eb873a39ca1024261a0f80c6eacd2c165a8bb8bd19adf315b80,2025-01-28T20:15:30.207000 +CVE-2024-0044,0,0,390eee44c5719eb873a39ca1024261a0f80c6eacd2c165a8bb8bd19adf315b80,2025-01-28T20:15:30.207000 CVE-2024-0045,0,0,79d340372a8bb81ede9a0a5d782b03df861935527e1c69e6ad93b624934fbb31,2024-12-17T15:41:13.637000 CVE-2024-0046,0,0,d4f36216fab9e1ec2581ea3be4963a14d313be96285938f258349eb3ea9d310f,2024-12-16T19:50:16.587000 CVE-2024-0047,0,0,7dc617adc08be9f641c1e332a4f76abbe58d0e1d5c3bf8c9b4fcfd4d9ad9ba53,2024-11-21T21:26:15.987000 @@ -243695,7 +243695,7 @@ CVE-2024-10416,0,0,f5ba504905fce936286c88673091477d43f5c737293c3478f47244b1af8b3 CVE-2024-10417,0,0,a3289f1e8b2f45c4faa1825e522ea1151f1cb7b1a5fd60b3d90f44d2960f7ef8,2024-10-29T20:19:03.620000 CVE-2024-10418,0,0,a8d6b29d4ab2779851aa15ce5ee15626caf1ca8a24746f033c3bc57c841dd45e,2024-10-29T00:38:29.063000 CVE-2024-10419,0,0,521909bcfe86d575e17b7083d2c166b2aea8a7a87661c35f3a48b826db22bcf5,2024-10-29T00:28:59.117000 -CVE-2024-1042,0,0,ab07b5dc82b69e74d26487d67f9296473ba0fa3b7eaf5cf19d784637fc425993,2024-11-21T08:49:40.050000 +CVE-2024-1042,0,1,8bc8a2b7575822a7776a6b88349f1a43895a9a49c9fca065e360af68c1eaa05f,2025-01-28T21:05:07.490000 CVE-2024-10420,0,0,5bb506b20c6c6695d8b18ba875b972e284caff1d1332e0f12ba67afde94725de,2024-10-29T00:21:35.717000 CVE-2024-10421,0,0,363cb21c5334714f26e2af50949ced38efdf60fa1e0d6ddfd5e1360899229c21,2024-10-29T00:19:35.110000 CVE-2024-10422,0,0,f0815b378b12776be67275918a6c8b3fe7ef60008e650106734f85ff88e90cab,2024-10-29T00:16:35.510000 @@ -245113,7 +245113,7 @@ CVE-2024-1199,0,0,60ffbfb4cdc00bf543d03a59b91efea487f9cf6b0b352d45a15655d219ef20 CVE-2024-11990,0,0,d3429cf8c53343ced24272b548e57b9820685f26a76c9d0b20da4abeed376b1f,2024-11-29T13:15:04.170000 CVE-2024-11991,0,0,998c8cd2bea8fdf8923c0410f4cc2a917b77a592ae23b1ea7a6de1e2053706b2,2024-12-09T15:15:12.203000 CVE-2024-11992,0,0,5f6b3fe9a02fed360db85448439236baba3d6f232621fa4adc9c2b6319c7be24,2024-11-29T13:15:05.210000 -CVE-2024-11993,0,0,959857c484838d99ab2fab9e4e8d5380e9099455fb6e0d06c7650a80f01d5009,2024-12-17T21:15:07.013000 +CVE-2024-11993,0,1,2e414f78dfb36e91191c9b6ca3ae96c2ab4e876c4f2a911fe5f30974411ba70b,2025-01-28T21:18:09.027000 CVE-2024-11995,0,0,2072ff09f6a8d91ce5a6cb9ddb1c925e662d777c56c3ca9e5422a4217a97baba,2024-12-04T21:37:07.487000 CVE-2024-11996,0,0,c9890e109cbd3473a593b35fd7d1b915d4d2a7a9695a33296844a7786a35e6d8,2024-12-04T21:29:13.483000 CVE-2024-11997,0,0,2af8126987a27c26e5e9fb866e5bf6a59fe0bc68e164aa36d761876f8d96a284,2024-12-04T21:26:54.147000 @@ -245177,7 +245177,7 @@ CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669 CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000 CVE-2024-12083,0,0,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753fb3,2025-01-14T01:15:09.267000 CVE-2024-12084,0,0,85dd725fc2f0b24c79e999378b1f0199fad5fe5d164b31609c57a84bcb434c0d,2025-01-15T15:15:10.537000 -CVE-2024-12085,0,1,0b3f67b146b5cf234037ad71331d36ffee2667252d390f670b9aee26d30279b7,2025-01-28T19:15:13.630000 +CVE-2024-12085,0,0,0b3f67b146b5cf234037ad71331d36ffee2667252d390f670b9aee26d30279b7,2025-01-28T19:15:13.630000 CVE-2024-12086,0,0,e5130c03152639985c3e2f822b45f241716bd573825b1ce309364a23fc10467b,2025-01-14T22:15:26.370000 CVE-2024-12087,0,0,083db16c2a7b9baa1b397fd2cd269bff2aa8f7c2646d1851d134f1f8a052e34a,2025-01-14T22:15:26.503000 CVE-2024-12088,0,0,789608af69629f4130f54998ea59694fde701c19a329a9d8093e26a51277e55d,2025-01-14T22:15:26.600000 @@ -245336,7 +245336,7 @@ CVE-2024-12272,0,0,cbbb238a5fc49c4ada4f96dbd5ec3bf6a1bab33a6ad37ef5b0235e516631a CVE-2024-12274,0,0,754c33d384166421b8530c0b6be4d1f50e294eb962f01142a13c10f72064a9a9,2025-01-13T15:15:07.727000 CVE-2024-12279,0,0,28f926ab6f57c2b10bee59d6914cc0152fa6a23fa0d172ad6d11e3d9d407b5c2,2025-01-04T12:15:24.453000 CVE-2024-1228,0,0,02a2d35b9c29d8600ba5afee210d0e6465f5ee41eb5d9edcafc9d5f9e15f44ef,2024-11-21T08:50:06.280000 -CVE-2024-12280,0,0,729add23097923889b38394fd6cdf6c1901a5552c10a10a9a2833bdb3999c8d5,2025-01-27T06:15:21.207000 +CVE-2024-12280,0,1,877a1ef9090370a5789c2e7362afe046232f3567d1b51a01b5cd894549fa6293,2025-01-28T21:15:16.317000 CVE-2024-12283,0,0,27e00fa0bc574ce5113c52cfd02ee2100414eb1f36a7d99001797949356bf37d,2024-12-11T09:15:05.697000 CVE-2024-12285,0,0,a4a2b41992c880fc476ecd11de1a7b15521385b3ddf2ced01c35545193640e43,2025-01-09T11:15:12.883000 CVE-2024-12286,0,0,a2cf97a2f897256d80732f72cb83c0245f2eb4e867cc795bfeda6550048be20a,2024-12-10T18:15:27.150000 @@ -245964,7 +245964,7 @@ CVE-2024-13091,0,0,e9978d25b15eb759e2bc9cfbde0802cf5e89ad556f7a4c0b02504deb75ff4 CVE-2024-13092,0,0,8a150593dbe1f180e29b1c2e3ea75cd720a3d6f50bb74cd3f244a3b1730f66a4,2025-01-06T21:15:14.273000 CVE-2024-13093,0,0,efaf6e963b0d924999f6d8167a81917175f763e9f833fbf291aa1961a6ad2e71,2025-01-06T21:15:14.427000 CVE-2024-13094,0,0,ff89d51df0f55e55e053e6eb04680580a78be0201255f2c5e137b3c57d192608,2025-01-27T20:15:33.390000 -CVE-2024-13095,0,0,8b2839bbacb79c90817a06f59822177134d9ef3183ef241268f00c156b68d4a9,2025-01-27T06:15:23.440000 +CVE-2024-13095,0,1,09539e5e7a6afc7749c47ed659ed27b3a015bec4283229fae0e1cc00475de367,2025-01-28T21:15:16.453000 CVE-2024-1310,0,0,8eacc1832dc63ed57a42c33584abbb481a62a43a07e6f25f2b4df813accea989,2024-11-21T08:50:17.717000 CVE-2024-13102,0,0,2b3c51e550e0e3ae0feed858b8e9db25b6ba6af497f98896174a6e376c50dc7b,2025-01-02T18:15:16.517000 CVE-2024-13103,0,0,c39bf73e6ec2cebc85583a67f9a2540764bad904165de34e6f27feb6bbbccbbf,2025-01-02T18:15:16.747000 @@ -246212,7 +246212,7 @@ CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc2 CVE-2024-13467,0,0,bcd6474463b1a69c9a46d9b4d6f6f02b302b85f9777a4b31585c7467fbf3f38a,2025-01-25T08:15:09.520000 CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000 CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000 -CVE-2024-13484,0,1,712c057c7d39146a8afa657b40a8d67e5499db561a28666fb52dbcced8221de3,2025-01-28T19:15:13.753000 +CVE-2024-13484,0,0,712c057c7d39146a8afa657b40a8d67e5499db561a28666fb52dbcced8221de3,2025-01-28T19:15:13.753000 CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000 CVE-2024-13495,0,0,7a8bc062291cac2ab3dfb8a0fb7feeecd31abf131df44b7d6a18b1140227b207,2025-01-24T20:46:53.307000 CVE-2024-13496,0,0,192a8533534e044b339576d96e9cea7e19a2bbd248a7b183889cec35656a4f79,2025-01-24T20:45:57.463000 @@ -247535,7 +247535,7 @@ CVE-2024-20836,0,0,1cfb139c5fb15644ed863a471c42220304cb4d42cf03f8dad6e2f163b2928 CVE-2024-20837,0,0,1ea011c20c86433e1c029228a453e044085a95c2512bef655a258579d60b71a3,2024-12-23T16:29:57.827000 CVE-2024-20838,0,0,193a829a6abad700065cea67ae6d6da4eeca804ff07b3f78a7faeb13b32a7f01,2024-12-23T16:32:27.623000 CVE-2024-20839,0,0,0dad1e579794cb822858fc7ebd1b2881483c934995edeb7d585b194dfae8079d,2024-12-23T16:33:22.507000 -CVE-2024-2084,0,1,84be56f3117849cd0550ae8ef2dfc84e39601b1de1af7c967911547c2487dddc,2025-01-28T19:27:44.577000 +CVE-2024-2084,0,0,84be56f3117849cd0550ae8ef2dfc84e39601b1de1af7c967911547c2487dddc,2025-01-28T19:27:44.577000 CVE-2024-20840,0,0,207567d3518e4e0e6d1c96900c417915f9a3790743557a4f0f1dce6cd2f27677,2024-11-21T08:53:15.390000 CVE-2024-20841,0,0,4053c739c188c4b176a35a8fa2e16319a04cc752f349d61c40ff8d8ac8883c65,2024-11-21T08:53:15.503000 CVE-2024-20842,0,0,6fb79e2268b97e65756cbd5ade232276cfe51b41a89d06fad53a11a9ab8651ac,2024-11-21T08:53:15.610000 @@ -247546,7 +247546,7 @@ CVE-2024-20846,0,0,bc4e3fe1d50b31f61b6ac1da5770d0c4dff063a4417ff487ea47947485a28 CVE-2024-20847,0,0,57318bd88c923081f6d381fb4f5c100e7e50c82e6140bd69ed80aa961c5b4273,2024-11-21T08:53:16.147000 CVE-2024-20848,0,0,76b8aebe2905b056865c6c0fa1c2e6bcdf4e740ce81db55fdd3aab14598caabf,2024-11-21T08:53:16.253000 CVE-2024-20849,0,0,a73545b74afff54f13d51b7a5641ad3675049c12eac4aea829ffa7cf418fbbee,2024-11-21T08:53:16.370000 -CVE-2024-2085,0,1,1db3a54c8307495e311c7c78ac150ad661c01218fb44cce083981ea17f7c4e23,2025-01-28T19:27:14.843000 +CVE-2024-2085,0,0,1db3a54c8307495e311c7c78ac150ad661c01218fb44cce083981ea17f7c4e23,2025-01-28T19:27:14.843000 CVE-2024-20850,0,0,97a54f55ccc9fbf195322d9227a778c55548e1d783b11b773c4adcc2f8897573,2024-11-21T08:53:16.483000 CVE-2024-20851,0,0,35a513acde1e6621ca1425ee6ddec43d9098535ab1322b3aa397b5c2494dea2b,2024-11-21T08:53:16.597000 CVE-2024-20852,0,0,8673afaa1d4ca323d012a77e1a19bb7fa65ca513d00b5410776b96de94a41877,2024-11-21T08:53:16.710000 @@ -247916,7 +247916,7 @@ CVE-2024-21196,0,0,c09115a9c3d33c01e7962ae18835b5d9480efc2e7ae28d629a08afd0978ed CVE-2024-21197,0,0,4714519a65d14fa8d4fea5ce4608dffe4c7e68af6a036065aee47618e64253f7,2024-10-16T20:48:51.590000 CVE-2024-21198,0,0,1706f048845f31e4047a8593f5b5788106716f057c9bc3abeb4f55d89c90fe97,2024-10-16T20:48:23.717000 CVE-2024-21199,0,0,f0424484aecf7099f0bedb70cab86e537dad23819f94d2fe1202f5bc6486026f,2024-10-16T20:48:06.233000 -CVE-2024-2120,0,1,97f83d97687dc11c3f08225df181cf8dbf8b4720c8a9fe5e972062c01d6136c9,2025-01-28T20:31:11.527000 +CVE-2024-2120,0,0,97f83d97687dc11c3f08225df181cf8dbf8b4720c8a9fe5e972062c01d6136c9,2025-01-28T20:31:11.527000 CVE-2024-21200,0,0,2f122e998cd9b5cc1d47decd6a3e9c5c01911ad36b3575e08aa6f8c0007bcd19,2024-11-21T08:53:57.940000 CVE-2024-21201,0,0,bf402ba1a290f3d7a7e2218df736cbda3d038903f134e0f74980ef0ef3e1d14b,2024-10-16T20:46:55.087000 CVE-2024-21202,0,0,e790e96ac9350d46b4daec1a5a8e4fc84bfdd7dd3cb1e532ff6a2225b3f1081d,2024-10-18T18:58:24.417000 @@ -248098,7 +248098,7 @@ CVE-2024-21386,0,0,eee79b8341607bedacf91830f98e4d64d25fef67a94fd024489dd6b6dd762 CVE-2024-21387,0,0,90a38bc91324a0c4880a21b6b5b4b93910ef49cd5f95d39193e84c0c2b1973e3,2024-11-21T08:54:15.393000 CVE-2024-21388,0,0,c067a17177c7600714a83673ef800bf5f9e218ecffe79bb5e4529d6d2f807d9f,2024-11-21T08:54:15.523000 CVE-2024-21389,0,0,66346b5dd34932fd47b098540a659ffee9af1224ddeca02865b34d3619c10e3d,2024-11-21T08:54:15.643000 -CVE-2024-2139,0,1,c3911d55c764c07fd06be1319f30937814d9f024c1c1abdf50f5dc909b49ba4f,2025-01-28T19:24:14.513000 +CVE-2024-2139,0,0,c3911d55c764c07fd06be1319f30937814d9f024c1c1abdf50f5dc909b49ba4f,2025-01-28T19:24:14.513000 CVE-2024-21390,0,0,a5074eedd13a3365a29cac23272e831776e56651731246287bb462c43630f117,2024-11-21T08:54:15.763000 CVE-2024-21391,0,0,312bd39d59508ef1ca59592577f992c0665dd2a98faf802735d1d704cbd948a5,2024-11-21T08:54:15.893000 CVE-2024-21392,0,0,598fd112e75abba3c6c252ea490de4c6a8e36349ae35cf809de012c4cd6c1364,2024-11-29T20:52:32.870000 @@ -248666,7 +248666,7 @@ CVE-2024-22026,0,0,95ce485539115bc058c0d5e366224e51c8b45b49a0d3c411939b9a286d310 CVE-2024-22027,0,0,a7c9d5934453bf5491b14a748b6f63eed219ee655c259739b4569f7e9106ab3b,2024-11-21T08:55:25.607000 CVE-2024-22028,0,0,dc1d72f35c957d83174df179949d0c9b62a42ce5572e7016a9a9c3503481ee68,2024-11-21T08:55:25.737000 CVE-2024-22029,0,0,61b99797aa6a231a618162f9f5b74eca0d25567efbf111a10b650373d323aaba,2025-01-27T18:15:37.237000 -CVE-2024-2203,0,1,a1dbf17e8623e342c5dbc7964579ef9e95cc5b4f168448d3f20b2a34388d28be,2025-01-28T19:35:13.377000 +CVE-2024-2203,0,0,a1dbf17e8623e342c5dbc7964579ef9e95cc5b4f168448d3f20b2a34388d28be,2025-01-28T19:35:13.377000 CVE-2024-22030,0,0,e02699b846d34a18e8b7b6cf5888c535b133634cfe2a017ed58e28205a0d0b6d,2024-10-16T16:38:14.557000 CVE-2024-22032,0,0,beac3563a832af7ad2bb10e838ed7f4dba057a283ad9b47518d8f50d442b7b4f,2024-10-16T16:38:14.557000 CVE-2024-22033,0,0,67af1c2c407114537d4e89679db2f98dbaf388289faa0caf8bebb547f121bb48,2024-10-16T16:38:14.557000 @@ -248728,7 +248728,7 @@ CVE-2024-22096,0,0,c4602d88323b3424c44a18b3f76c72f6c73d14d53cf003d62bcccec494853 CVE-2024-22097,0,0,97b4a2d3ddf01aba1af28d36995be50ecee98d5bd6611f7b972a75fde029820f,2025-01-21T18:34:45.217000 CVE-2024-22098,0,0,aa82bbcfcdad7de5e03fc60fafc6844d23ca04b30a801f37c32f229b85434f4a,2025-01-02T19:12:54.717000 CVE-2024-22099,0,0,2aab8d395d6a42ecb54cfd21d97687ce18aadc84db395b6c4859d28ef1982d01,2024-11-21T08:55:34.813000 -CVE-2024-2210,0,1,781f7a99572141e6915772531482d19d913a07c99a5f42cc4423bbfd10e50c1a,2025-01-28T20:21:57.503000 +CVE-2024-2210,0,0,781f7a99572141e6915772531482d19d913a07c99a5f42cc4423bbfd10e50c1a,2025-01-28T20:21:57.503000 CVE-2024-22100,0,0,56f2af5bc1323d1c0ca1ddfc53290dc26ed685c2c5fdf820f38f4660cad65dae,2024-11-21T08:55:35.003000 CVE-2024-22102,0,0,84892b7b6e5d83a9d6c16f8dffd5e79d322057a8d97be177a66169a0e45abea6,2024-11-21T08:55:35.143000 CVE-2024-22103,0,0,21b0d01eb857ccfc96a63302f1d9c85525df74135dcbdd1b5b1e8e0e0ba5b800,2024-11-21T08:55:35.383000 @@ -249367,8 +249367,8 @@ CVE-2024-23134,0,0,0c652e256ce1f1fe7bfba98b0ae69d91fff14eaa969ed8e44915edef715a2 CVE-2024-23135,0,0,1c8ff4eb793abf6bcefbc0298485ccba7517f2f24b525939fa1ae9cfa5c974b6,2025-01-27T18:15:38.410000 CVE-2024-23136,0,0,0046a6fd6fa44480b309f723d133fe296b6446f9789a2ab6ce58b95a26a887ef,2025-01-27T19:15:15.900000 CVE-2024-23137,0,0,92324c318cd782f982d568bd84207a9460f216993788cadf6603af1edcab4fb8,2025-01-28T17:15:19.903000 -CVE-2024-23138,0,1,b2d5820d9a8ff916772a159e535653f2d5e83911cd64ad8ff5c2251901c1d396,2025-01-28T19:15:13.887000 -CVE-2024-23139,0,1,d15285a78b27fd72b039332b633e3504f9965450ced531c8004addb1e10784db,2025-01-28T20:15:30.430000 +CVE-2024-23138,0,0,b2d5820d9a8ff916772a159e535653f2d5e83911cd64ad8ff5c2251901c1d396,2025-01-28T19:15:13.887000 +CVE-2024-23139,0,0,d15285a78b27fd72b039332b633e3504f9965450ced531c8004addb1e10784db,2025-01-28T20:15:30.430000 CVE-2024-2314,0,0,e806b8e37c6871dfa18c0f6b69456ba8f142074dd0ab76f05a48a4f9265c7aee,2024-11-21T09:09:29.397000 CVE-2024-23140,0,0,a608c27fe00da622de4dd63352d746221407ae1df769bafbd230a2a5b2e3d26f,2025-01-28T17:15:20.130000 CVE-2024-23141,0,0,05044574b36911681114c4427416fb6a71ae34b244f5eefc39ea7e82eea53477,2025-01-28T17:15:20.363000 @@ -250368,7 +250368,7 @@ CVE-2024-24429,0,0,8dcc40757aa33771cd1714224b3f91f802137d08526f666faa2d3d508a181 CVE-2024-2443,0,0,1bdda57280ff24c7755bfc385c8c5e030e460e899c6d0c2078c3b0acbbc8fb06,2024-11-21T09:09:45.827000 CVE-2024-24430,0,0,bbeb452d0a78e4023881f525a04de9114ebaa1d6a1e4c74130e66ee8c8539e7c,2025-01-23T18:15:29.850000 CVE-2024-24431,0,0,df56f81b7c3a1e35add47673987ba3302b83c2d47d8419bd59e79e036d2e2abd,2024-12-03T16:15:21.187000 -CVE-2024-24432,0,0,bd3b03b4b11e8be659927a0dc766a8e3c2a3840e41e34cda6332f58e1da39678,2025-01-22T15:15:12.793000 +CVE-2024-24432,0,1,8c4e2fabcd47b9940ae9a92d5b673a40baaa4f559464b4c2101c6d1353f0e2e3,2025-01-28T22:15:15.557000 CVE-2024-2444,0,0,d9ff5dc2f1cec3e82221567fd131c75cf5704e6ca903fd99eda244483e9cdd6e,2024-11-21T09:09:45.953000 CVE-2024-24442,0,0,ee978616649e5f964d58831d9a89396afadb2cfa402f3f4d3cd199735f6dbfb6,2025-01-24T19:15:12.470000 CVE-2024-24443,0,0,61ee9c48ca4b7520a2cef22b1d83f9f14d157d857aab2d1ed38a31b2dd4c3b0e,2025-01-23T19:15:10.540000 @@ -250897,13 +250897,13 @@ CVE-2024-25143,0,0,135ee95864ec141ebde7278cc8981689253a34523b9fcac1e5d724866576b CVE-2024-25144,0,0,3dc63c0585af532961c0fe1fa86b66af7267847e46b9d7544e9152bc733b0db0,2024-11-21T09:00:20.550000 CVE-2024-25145,0,0,dbee4a8aa2955d24baa6ce590f567fd8a044639487641fff575b69d6b04e2e77,2024-11-21T09:00:20.713000 CVE-2024-25146,0,0,70580878c7e66c134303e82bf314a0ea51bb4c7efa77286154d103535edb2832,2024-11-21T09:00:20.870000 -CVE-2024-25147,0,0,84387167479e85437a489a3c440f913c2250ff97704942139aa39a68fe27bcc6,2024-11-21T09:00:21.010000 +CVE-2024-25147,0,1,9c971f93dad595a47edb7f4ccdd3d989147ee2c0c3ea302a65f044923ee197f7,2025-01-28T21:25:53.533000 CVE-2024-25148,0,0,baaba4bd1038fed5c1e9c1ed403cafba105c20610c41c31a35b866b1248f5d6d,2024-11-21T09:00:21.143000 CVE-2024-25149,0,0,c3bee153938ba2820767f603be3339e9a49705623e20e7321fe693091302456b,2024-12-10T23:03:54.853000 CVE-2024-2515,0,0,44f3fa018c3519699334cca505032d6c5d3c8e2affb7c2ada212e4ff428377b2,2024-11-21T09:09:55.143000 CVE-2024-25150,0,0,9beb971424f34e419f2e67ec3339fe7f8ab91aa6b6e1cf1fb61046498d7f4901,2024-12-10T23:01:58.647000 CVE-2024-25151,0,0,a4c322b80a85824537c1b7eed9b06ce1ba65938efaec3cdae6e0b58e6d2e2b54,2025-01-28T02:28:11.500000 -CVE-2024-25152,0,0,c4883d942930ec99a7ece74f3181fc32c370260063ba88e828c32188ee6d7978,2024-11-21T09:00:21.653000 +CVE-2024-25152,0,1,ceb801e8165316ac016fe3f822acb190520dfcd3154999216d5ec981331720bc,2025-01-28T21:26:06.277000 CVE-2024-25153,0,0,276d0e0eba2a7e7a97360fe02601b40f3b2fc90b401ae9d757e916966de425b7,2025-01-21T19:01:46.487000 CVE-2024-25154,0,0,7cd5ee3b427e3989a02b3c82e36ec257d930c9c6f4bec557cf5ca75dd266afaa,2025-01-21T19:01:35.060000 CVE-2024-25155,0,0,831d273875feb8840d15e6e3f2448939251eea9e4bd1bb15600946d38fa50978,2025-01-21T18:59:03.507000 @@ -251171,8 +251171,8 @@ CVE-2024-25598,0,0,d1a1805c77bf344303a6352c38a2d681b3301f1209882142cd84bf98bb95f CVE-2024-25599,0,0,1e405853502d37a32519454e3bbc96a90c793cbcb44778a175a4f144b956282a,2024-11-21T09:01:03.180000 CVE-2024-2560,0,0,43271ba3d968c1299b607dfd85a0caad1fabd1eefbce835e71c67cfc67678a7f,2025-01-22T17:51:20.490000 CVE-2024-25600,0,0,28903babf8e9ad9ce0e5926e98fade9a295a4e34c50bc53f7183dac7a35971aa,2024-11-21T09:01:03.307000 -CVE-2024-25601,0,0,592b72e8287af6c7a3150c0f52361c80173956d1cbaa844c63524e684c186930,2024-11-21T09:01:03.450000 -CVE-2024-25602,0,0,43c5fd7be09141d81d52c491e8514b96cba0daa24c348da2dd7a06a5b7ef9400,2024-11-21T09:01:03.573000 +CVE-2024-25601,0,1,7779a3cd8cda4c483583dc836038017c3b678e6e00890ce8735201492b4cbb87,2025-01-28T21:26:17.863000 +CVE-2024-25602,0,1,7e1bf2f8618c0f4e2ebde696708ea290da48f451abd6bcaaf1f6d3545470605d,2025-01-28T21:26:27.113000 CVE-2024-25603,0,0,15f1fd16bbca3ca772392fafebd6de61b94b9d00ebb590bee59f736ad8e46d17,2025-01-28T02:39:55.360000 CVE-2024-25604,0,0,adb2744e99dce2faa265e66e541e673623a62dc0725d7f7a02f3571eed752f2b,2024-12-10T22:59:32.727000 CVE-2024-25605,0,0,cd3f213631c053f1b608e3b480951743b40dfcd47cd39c4fbb6227f798899db1,2024-12-10T22:20:47.737000 @@ -251436,7 +251436,7 @@ CVE-2024-25959,0,0,eeae5a284a4ab1415fc3493674e6d3373472ea1d7e22b72b0b2c652574d3c CVE-2024-2596,0,0,6dae988370d6f22930ca41007288616d27291686c0799763d555ed4df2872133,2024-11-21T09:10:05.403000 CVE-2024-25960,0,0,f38ab1330997f4540b80aaede2ea75ba850d5750f8beec406ca741c932d2b424,2025-01-09T16:24:23.357000 CVE-2024-25961,0,0,29b890f356bf7ac64312af353b2e03345318684d64a96bf6eceadc52768a0c28,2025-01-09T16:48:12.033000 -CVE-2024-25962,0,1,9fedca5de3f5bf630fc8a16e46a9281ff8d18f912b1963232a0d25d365fc8dfd,2025-01-28T20:34:04.520000 +CVE-2024-25962,0,0,9fedca5de3f5bf630fc8a16e46a9281ff8d18f912b1963232a0d25d365fc8dfd,2025-01-28T20:34:04.520000 CVE-2024-25963,0,0,55fd859077dae39a86a32c5c77a28b3577d5b4f4d96d0903b9bd6f018ae9069e,2025-01-09T16:39:54.173000 CVE-2024-25964,0,0,3764efeb8c8e0b62c6b081fdaaa5a3bf3bc8f0a0ad347ed98fc853921ba33307,2025-01-09T16:44:51.983000 CVE-2024-25965,0,0,107bd6e82d1ce0bcc13e7dc9edc522431fd55397802e60806e92ba102bd7f0e3,2025-01-09T16:42:17.140000 @@ -251749,13 +251749,13 @@ CVE-2024-26261,0,0,ea050fe36770a79f634c68321e298b3d0311f61c7eef5fa30f9e5e53992f9 CVE-2024-26262,0,0,48faa9c8f82f43f5ddddebde7ddd39c5965df5b4841017d5e3ca24c98bf5e7d8,2025-01-23T19:56:40.100000 CVE-2024-26263,0,0,4c3c27be9e44229482fc65de58d9a75964fbda93b4efc1faa1c759d7bce5f40b,2025-01-23T17:39:42.940000 CVE-2024-26264,0,0,d26073945f8a1750ab8b84a6521d62808e0396382449651549814e669069a437,2025-01-23T17:41:02.890000 -CVE-2024-26265,0,0,29c43167899c1dbc950269c2d0f3c390b0b24b82f080d0d6380d8b30693e17dd,2024-11-21T09:02:15.967000 +CVE-2024-26265,0,1,dd89ee2ec2abaff079f4d4cc9e265eb147a7f8b24505c52d68456729a1349687,2025-01-28T21:35:11.500000 CVE-2024-26266,0,0,6441f76a5c0293aff30c9711cf06837859fa32e97b1c912fef10fba3f8a63f36,2025-01-28T02:33:22.940000 -CVE-2024-26267,0,0,708039bd80e9dcc410cd16bc4a3c22a0a5e08bf17b8e0a60d4b29c40faed4512,2024-11-21T09:02:16.190000 -CVE-2024-26268,0,0,23e044f877833d2fc9c6cb2791fea7f1b133aec4b8fae18bf04051ac445c250f,2024-11-21T09:02:16.310000 +CVE-2024-26267,0,1,ed544311eb2162f0e80fa9ab4b47d0d55dbfa7e630160a0fdce895fb92748a0b,2025-01-28T21:36:47.403000 +CVE-2024-26268,0,1,5e4204fff4137a8e1ecd072c9ff9b8dc668a65eedd71761d47dc25d44dcd0125,2025-01-28T21:37:57.970000 CVE-2024-26269,0,0,a3d6634e74869fe215cf28a9b4d8b2fe7550a983642c2bb7e9b5a42a34d3b05b,2025-01-28T02:31:06.663000 CVE-2024-2627,0,0,de67bfac37d74088e8645fc2f654e4a2f29dfe354b1fc4a8ac77cbde5ca7bfda,2024-11-21T09:10:09.897000 -CVE-2024-26270,0,0,49db57e31c30404ffb3f7bccb6cb6e19533f6fa5e6e33873d874c52de8711e91,2024-11-21T09:02:16.553000 +CVE-2024-26270,0,1,ad0ebd99c88bf96a7f283c8115f1f249790da7a38623a87ebd6539675a6e9dfa,2025-01-28T21:25:41.420000 CVE-2024-26271,0,0,f5e20f3e7ade7688c430ad4b5e84f0ca9756226805976c19d5b4529200159d1e,2024-12-10T21:07:04.467000 CVE-2024-26272,0,0,58a64a22c48ee9a99d489ffa86f4aa8bb22502dcecbaf406b7d5815d612ddd8d,2024-12-10T21:07:02.180000 CVE-2024-26273,0,0,3ee41ff0c2ea2c1b4a7735a51d1950b78cbd34107596c9cdbc77e1aa48114140,2024-12-10T21:07:07.587000 @@ -251797,7 +251797,7 @@ CVE-2024-26311,0,0,eccd625bfc3960072c1c96a8fc8ef57d0c8f8ecfdb1ef82d95f6e017b6260 CVE-2024-26312,0,0,bd29f61468e0d592b162f1b9bca8f7cdfe3ab243569e230296a7e2555de1ea3c,2024-11-21T09:02:21.183000 CVE-2024-26313,0,0,e95d02de1d4052be713c0be90ef61847e38271af8acd03c78fcc8ef33c2d3d5f,2024-11-21T09:02:21.417000 CVE-2024-26314,0,0,16b14b790b204a9dce3861ce2b360799ee7dfafcd5ac190bba6e667b6569b4c3,2024-11-21T09:02:21.567000 -CVE-2024-26317,0,1,1d8dd478405205f5413ee335572758a0bcbe89ffb7397dbf28481b9d00567bcd,2025-01-28T20:15:30.597000 +CVE-2024-26317,0,0,1d8dd478405205f5413ee335572758a0bcbe89ffb7397dbf28481b9d00567bcd,2025-01-28T20:15:30.597000 CVE-2024-26318,0,0,906eb8b230325eda251dececda86313ac591223ac614c32b0aa55e4dcc7ca895,2024-11-21T09:02:21.757000 CVE-2024-2632,0,0,300d9ac42b8f019a855e8e9024543531f20a59a664cf33a5a9a35b4647186c67,2024-11-21T09:10:10.750000 CVE-2024-26327,0,0,72a77ae0b6d90693319dc4a70872140f4bf0e1116dd5bbfb2cdcf10d61353777,2024-11-21T09:02:21.927000 @@ -253079,7 +253079,7 @@ CVE-2024-27896,0,0,cefb57e4fd2360f9ca76121f5d55c0879f2b9778073436f6d450ff9f01865 CVE-2024-27897,0,0,e0fd628e199d1ad9f7d1973d04b30e3b226e987f2d07bcbb58339313ac383abd,2024-11-21T09:05:22.297000 CVE-2024-27898,0,0,af89e17a8df4c3a779fd434e3e11879bb6cd54de374fc7845601631da86da367,2024-11-21T09:05:22.490000 CVE-2024-27899,0,0,a604999ac254f893bf484b56f8c916b1c621d5e943e54c837b0fa2e56a53a410,2024-11-21T09:05:22.627000 -CVE-2024-2790,0,1,46430baf671506f8e8e0e96de5abb2a9dbcf4a843ba1d0b27f99c14044a5e043,2025-01-28T19:26:37.203000 +CVE-2024-2790,0,0,46430baf671506f8e8e0e96de5abb2a9dbcf4a843ba1d0b27f99c14044a5e043,2025-01-28T19:26:37.203000 CVE-2024-27900,0,0,0959b2054b27454fdc1ef4ac218f2c38f403415af9de5e09c07c2e491cac493b,2024-11-21T09:05:22.767000 CVE-2024-27901,0,0,446889df5d6f342bce9db6ffc9b1986b1759b684a2d1d50d324de40c727810fd,2024-11-21T09:05:22.907000 CVE-2024-27902,0,0,3ed35f57e19fea9dc67cc2f0d80160581d1f940b7dddb56881544543ee19baa8,2024-11-21T09:05:23.040000 @@ -253167,7 +253167,7 @@ CVE-2024-27981,0,0,5ad287609e78a5c57ad9f50892c9f3767ac8a9a55b04be511b8a794f3a0d6 CVE-2024-27982,0,0,3b4edd38916d4b70e6bd265fb1fcaa37369c9af685bd7f99d27c1bbef3d48182,2024-11-21T09:05:33.463000 CVE-2024-27983,0,0,b2589cbbb580d16047bd9ecbfda79c782676d32c5fdcf965b61589244d8bb50d,2024-11-21T09:05:33.613000 CVE-2024-27984,0,0,aae42ff7c5e2f91ad6145729ed698347fd731a0e279fcf89bf92ea79157be3c0,2024-11-21T09:05:33.767000 -CVE-2024-27985,0,0,9679fe24d68a7f5f2c10bb4c13c0afa57c8fea04d57b528532db987befe8dabb,2024-11-21T09:05:33.917000 +CVE-2024-27985,0,1,f676f56e2e471158652755ca904ec0d0cde36c5d02615232aa2347c1a3f78b3e,2025-01-28T21:17:20.540000 CVE-2024-27986,0,0,6e6ed6493f00348a10c965f4cc638de5d51e1e8a66be90ac10c9b5e04d22c698,2025-01-23T19:18:34.027000 CVE-2024-27987,0,0,fae87e6a46a51cadc955d1613c451a2ff702574b3ff9d5a457489bddc03af350,2024-11-21T09:05:34.230000 CVE-2024-27988,0,0,c686d670cc748ce822fc38945ce5b40635e2e005a14b8e9934b0adbae696c579,2024-11-21T09:05:34.380000 @@ -254395,6 +254395,7 @@ CVE-2024-29864,0,0,500db002acb5f8444110c04fdf6c1755d974238286749d97d2f574426dd00 CVE-2024-29865,0,0,9ff88181cc09011dacc69644a77d36e95923b0be430e91548467a246755f07e0,2024-11-21T09:08:30.040000 CVE-2024-29866,0,0,8fc166448f3fbecaecd8b7ed9d6aa230d3bb984af892d0077240e75b9b6f7a9a,2024-11-21T09:08:30.190000 CVE-2024-29868,0,0,654a536670a62fb45b5203eb432335632fdfc103e225c6be2f801ded9b3b1341,2024-11-21T09:08:30.413000 +CVE-2024-29869,1,1,22c555b93a36f18446cc1cf68eeeb14e97734936fd6f27757415ad27e679a959,2025-01-28T22:15:15.727000 CVE-2024-2987,0,0,e4d4968f2ab326fc6f93467dbe0c42753ad32258cee7fd3257881b95a825941e,2025-01-14T15:10:15.733000 CVE-2024-29870,0,0,b73bbe674034b941cb1de42af16181f829d1cbe733c707402192e9d9f2c3eec7,2025-01-24T18:18:36.670000 CVE-2024-29871,0,0,61f4b4d6f5a977f77b612c4fe0dcdf35eb10ba2cd3db813456ced514fcadbcf3,2025-01-24T18:18:34.350000 @@ -254439,9 +254440,9 @@ CVE-2024-29908,0,0,2015ea0a79e2dfbfcfcc8c9f56219cb4aa05d88d8743a9e6a62e5bb7ea1c4 CVE-2024-29909,0,0,fb9ae7b23fa5013e6341fa9c080778ffeab890f332e295ba676aa55a587bf1de,2024-11-21T09:08:35.787000 CVE-2024-2991,0,0,f0d75c29e897c922f15c2f748d83b090b7fdb8711147be6c36e835f48c893bd7,2025-01-22T17:59:21.180000 CVE-2024-29910,0,0,c41d09944920a9d8d61c20066a9b3c470d9f0156387a3f57445729a2f0a08722,2024-11-21T09:08:35.910000 -CVE-2024-29911,0,1,f25c0b2d785ce28963e6e183efa13436d6a827fc049625dbca68cd0b77dfe5c4,2025-01-28T20:25:31.467000 +CVE-2024-29911,0,0,f25c0b2d785ce28963e6e183efa13436d6a827fc049625dbca68cd0b77dfe5c4,2025-01-28T20:25:31.467000 CVE-2024-29912,0,0,4295d9a37bfaa06115d9f12a98aef4d1b4334764122065277f0bd2af0a62ed4a,2024-11-21T09:08:36.173000 -CVE-2024-29913,0,1,4b95f6d7b2415812dbf11ebb30932ca1a187037482b34219d7dffd7469624706,2025-01-28T20:29:09.363000 +CVE-2024-29913,0,0,4b95f6d7b2415812dbf11ebb30932ca1a187037482b34219d7dffd7469624706,2025-01-28T20:29:09.363000 CVE-2024-29914,0,0,7c5531720064523c200888ff21e4ecd129aa835bc9d9b4bbb5043cd65c102278,2024-11-21T09:08:36.433000 CVE-2024-29915,0,0,102e298fb86162b5224bdef00b35afccefc860b69e50236c5b86acf8ef4309f0,2024-11-21T09:08:36.560000 CVE-2024-29916,0,0,fed07f372a294d1dc418025e45647dee93bbfe0cfafb11ea87699b7604e5c33d,2024-11-21T09:08:36.687000 @@ -254701,7 +254702,7 @@ CVE-2024-30179,0,0,f8038176185d07e7f724f868e44725dee5d89f9e567d5a1272779cd6cb9c4 CVE-2024-3018,0,0,f65a264962ae2b96d7ccf9718d594d89d33b43e0d817bc446c0cdf042d66d063,2025-01-08T19:35:58.073000 CVE-2024-30180,0,0,9ad3efa7e683e4471ea88f07410b3c0c613e57d65ed8126b5bf9db13a8b4971b,2024-11-21T09:11:22.647000 CVE-2024-30181,0,0,4b63a15f923a825c1f6a8173bcb6b942101ded5f17f3fc266f511573c31cc6ed,2024-11-21T09:11:22.757000 -CVE-2024-30182,0,1,a81fe3e00d46c578a5fa49e4c9a985f129425c5b65c74e18be12daadef011fdc,2025-01-28T20:39:34.613000 +CVE-2024-30182,0,0,a81fe3e00d46c578a5fa49e4c9a985f129425c5b65c74e18be12daadef011fdc,2025-01-28T20:39:34.613000 CVE-2024-30183,0,0,3c466350958593d90ca423ea65b4cb5e481df5dfd1cc5ae5c5525bde0c6264fe,2024-11-21T09:11:23.023000 CVE-2024-30184,0,0,687d938a7f6ece9acd3b8185e8886757183e17afb63a5ca83ac7911758ed5b39,2024-11-21T09:11:23.150000 CVE-2024-30185,0,0,d9a11fa1493c3d39202258e7784ebd32e5e9ef6143e723e534df965b9d61d3e5,2024-11-21T09:11:23.273000 @@ -255971,9 +255972,9 @@ CVE-2024-31868,0,0,0d5ce77a04f63618efd6d252927d5cdd5e5859a80b445229466cb2b980b73 CVE-2024-31869,0,0,2ffafda190fd3f9769077c39173f16d6691e314e9f09ff10aaae5cd3cdbf37da,2024-11-21T09:14:03.703000 CVE-2024-3187,0,0,c0e5052d9b952d8b8908e4d27ef2406b2719f78ee0fedcc13d2d47e8cc27cd87,2024-10-18T12:52:33.507000 CVE-2024-31870,0,0,a22970b8b31c24a890ef795348787c61b651a2014a187c16beca7c8cd6d6b381,2024-11-21T09:14:03.823000 -CVE-2024-31871,0,0,6726649180f3a1806bdaab7f76584a792c1a4c30a81ae42603563cb5aa329f15,2024-11-21T09:14:03.970000 -CVE-2024-31872,0,0,29a178642ac0509a5f609aaa76fc288eb59034f98c76c7a491a288614172bdf2,2024-11-21T09:14:04.110000 -CVE-2024-31873,0,0,7798c708b9c946bab1527fa4810663c59a7ee1ec5efc7ceb302050266cac5427,2024-11-21T09:14:04.250000 +CVE-2024-31871,0,1,bbb403d13d46e8ce3c1507dd558afbfac4032a6f819acfb921c5d57e56131242,2025-01-28T21:08:28.123000 +CVE-2024-31872,0,1,f5bc09e6a2df86bfd4de5a6fdaf4fe0d715df99392ac9adaaa5ca1952f29bf53,2025-01-28T21:11:32.790000 +CVE-2024-31873,0,1,42749b8f228a93de4fee58feee1bc868e8f1819d97142974bb29f31c9125aba4,2025-01-28T21:13:10.063000 CVE-2024-31874,0,0,08d97743873b504cf45e78bca1a14f05191c21552dceacefeba0a8daf5d6fcb2,2025-01-28T17:31:15.617000 CVE-2024-31878,0,0,2cdf4c028654e8fbf3c35b620eb5619fea9f488afd53ab3b9767908578e7f92c,2024-11-21T09:14:04.550000 CVE-2024-31879,0,0,daa01d9448ebcd5d37ce13841b8ea893e99fc319219124230413ac967ea6f1d6,2024-11-21T09:14:04.690000 @@ -256211,7 +256212,7 @@ CVE-2024-32136,0,0,9f84115ffa8720b79560c03c1cb35df4341d773004df02eef74e13766a109 CVE-2024-32137,0,0,3827b4422b9a7a673518e4e22d10627690791b57bfc4b56bb5770b98889cd1e6,2024-11-21T09:14:31.960000 CVE-2024-32138,0,0,a85ca8385032bb0b8967310c42d90da7476a74dd42ae3b77657a5051665a1347,2024-11-21T09:14:32.100000 CVE-2024-32139,0,0,c32bcfc8942913cbc403a22b77b60ed334b0e94bc9ec726671f532b47933271c,2024-11-21T09:14:32.227000 -CVE-2024-3214,0,0,64e0b5726095d49e625d9a8a2c0674f31e6d0eb644d726d21af276b4a567af79,2024-11-21T09:29:09.770000 +CVE-2024-3214,0,1,e49117e773b743e4cfaeb7a84fec89702a5c934d3c4aceae9e7d0655bfa5aef4,2025-01-28T21:03:01.313000 CVE-2024-32140,0,0,08c8b7dac087cd4e7957c91fad7f2a62ace1c6fa7c0f736b04fb2301121d2ede,2024-11-21T09:14:32.363000 CVE-2024-32141,0,0,dcf8a0c01e6a7f5d3d6e92d0dd77ce174bd42a293c36bad371a0e0a22df2e91b,2024-11-21T09:14:32.497000 CVE-2024-32142,0,0,b217a174100db973d030d1b55e39f5014e0fb04c15ff4a976a3ab77b68a2e5aa,2024-11-21T09:14:32.630000 @@ -256992,12 +256993,12 @@ CVE-2024-33066,0,0,323275c133034cf4224fb00037d116cf25466127dfeb2577a4ca56f8f20e5 CVE-2024-33067,0,0,638bc9109794811420c30f35ea11d5d4e8d641b82ad31ae2a8a04e02b6bda35c,2025-01-10T15:39:01.290000 CVE-2024-33068,0,0,1d4eb491ffd27751b128ddbcdd27665d885fb6c0654a60e64c8908848b5f2e57,2024-11-07T20:07:29.220000 CVE-2024-33069,0,0,4a5a5f18faff9786c7e7eff1069eadfad4725803a4dd186adcecf1b88d434afa,2024-10-16T19:48:32.207000 -CVE-2024-3307,0,1,192c069e9bf434972ea7f5761eacb8a4023245d4288c2839efa1316d2a577a00,2025-01-28T19:25:45.740000 +CVE-2024-3307,0,0,192c069e9bf434972ea7f5761eacb8a4023245d4288c2839efa1316d2a577a00,2025-01-28T19:25:45.740000 CVE-2024-33070,0,0,ab6221ecd33104a17e11c9938ba8ceaaa061b181be94c7202aa830fb34495274,2024-10-16T19:47:04.547000 CVE-2024-33071,0,0,e53a736ac9461278da91e39c670c56974ca6fab70efa5d500f79ba198c2fad5e,2024-10-16T19:41:46.737000 CVE-2024-33073,0,0,b5d4e58d81439b774e84f6a69dd2172492c1aa589c80a5b1d8e24f1117a3650e,2024-10-16T18:25:05.420000 CVE-2024-33078,0,0,123868d87f2c6966578811c80dde93d57aaf0a1755ff1ef0a3801a7fd096c3f8,2024-11-21T09:16:30.573000 -CVE-2024-3308,0,1,4eadc0f787891a7ad3f284e6810e7b17c27d93f326fb16a29ca2ad907805a95c,2025-01-28T19:24:31.713000 +CVE-2024-3308,0,0,4eadc0f787891a7ad3f284e6810e7b17c27d93f326fb16a29ca2ad907805a95c,2025-01-28T19:24:31.713000 CVE-2024-3309,0,0,2c84c7c9dab970b4398fd9c8317b4103338d80007aa6cfc05ae442f3fe447961,2024-11-21T09:29:22.003000 CVE-2024-33101,0,0,060d2f20cd090be3be4b153edf45165363fd6d1d8c8d6968335cdbba1b546382,2024-11-21T09:16:30.790000 CVE-2024-33102,0,0,4953918f2cf07b479b9dc9d307ae24825f1d3a4cdfd759416b7c167da4c7fd50,2024-11-21T09:16:31.010000 @@ -258210,8 +258211,8 @@ CVE-2024-34729,0,0,a9c60c9154b250ad0ad8fb09f024d8d1b9a123940a86c93e901bc505dc2f9 CVE-2024-3473,0,0,635984728ea9670d6b9cfdf6ab19079fff83892dfbc983db637b3e272784b4e4,2024-11-21T09:29:40.730000 CVE-2024-34730,0,0,45d08741aee6202ff7c55a96f7bd28befafc59a755472c03986c43b146b721b7,2025-01-22T18:15:18.827000 CVE-2024-34731,0,0,dabcba1d59e1f025a63b5ba7e0e668c40ba804a6e53f3f2f1868cf15359d53cd,2024-12-17T18:12:43.217000 -CVE-2024-34732,1,1,d1bf3d82707d7749cafbd7359cb7994cb92c729cfe73f5b95ac27df0bacb1d33,2025-01-28T20:15:30.790000 -CVE-2024-34733,1,1,afbb1f7ec81f4142ddf66d81971acd53cffd71cce9fcfb26d2a9813d296c6b02,2025-01-28T20:15:30.893000 +CVE-2024-34732,0,1,bc6f33faa9dc95ba18db23d3e7fd801527f8751f4bfd0a01e712d0b2695f76e1,2025-01-28T21:15:16.583000 +CVE-2024-34733,0,1,13600ac68d538500c7a19b54933f5aa847a8eb1b86134247e5782f8d933a31af,2025-01-28T21:15:16.713000 CVE-2024-34734,0,0,d30ceeebe447a9d3b85ba81bb31ffe8db8e1bfaa20f969b2a1722a59d0c81073,2024-12-17T18:49:54.800000 CVE-2024-34736,0,0,796d4e22dedbbf6a45bf78b4b61b6b991a6074c75d5a0d88ca4d35b7a87b1fd1,2024-12-17T18:49:00.327000 CVE-2024-34737,0,0,593f66ce741ff2e6b0ae794a6711b3f436177aea1f4a0a005ee528acb1b244a1,2024-12-17T18:41:50.840000 @@ -258223,7 +258224,7 @@ CVE-2024-34741,0,0,a200ff859f75cbb740f0c4700156237f5570a0c5a7e335eb045f98ab4ecf9 CVE-2024-34742,0,0,9fb58a874ed531eae6b8f87bbca2a07dd0fc59db4798ac22215d023539652d17,2024-11-25T18:15:11.980000 CVE-2024-34743,0,0,435ed3326ede6ddd67e461747dbe51de0c1ad4cc5af9b9a7445aee748ca92c8c,2024-12-17T17:47:48.797000 CVE-2024-34747,0,0,59f7ab211e0009fe0101ef2f22c321cd0b38ca2b0f6d0bc8b6a93b6fe1ddf0f0,2024-12-17T19:37:38.390000 -CVE-2024-34748,1,1,3746aeda8a7be03d2b424009bf89c682faf683a87af8668699a495ea057929dd,2025-01-28T20:15:30.993000 +CVE-2024-34748,0,1,c4139606229ccf7bbe5667312e7949bd9149ac75b701c8fa9694242f465db3d9,2025-01-28T21:15:16.840000 CVE-2024-34749,0,0,fa8c0597f222663ae582de190ba5fc78d5347907a5cc8941aa2a688c78cdaa19,2024-11-21T09:19:19.233000 CVE-2024-3475,0,0,2ee81b44f59f26f61cb7b02cc275bbb17da2abb64544c940f3eacda6485f50e8,2024-11-21T09:29:40.967000 CVE-2024-34750,0,0,9678d8d73fc1fd82b79fe1d162449e447db128b26495e0b4c62758c13f59d499,2024-11-21T09:19:19.377000 @@ -259308,7 +259309,7 @@ CVE-2024-36166,0,0,df05fce01ece155b3ddc95ac2f43357137d1aef21df04a4adac62336507e3 CVE-2024-36167,0,0,249388badd0552cf7894ffe46b0d4fef947fcbfb207976f06490ceac8dde40fe,2024-11-21T09:21:45.420000 CVE-2024-36168,0,0,cce5793c3d14787c77e9bc23fd90d03c666e9fde28945812ff77d67617dde9bc,2024-11-21T09:21:45.580000 CVE-2024-36169,0,0,daabae02d7b27e13023e0f24eea17ad67fc04d71ca0984b55586a08f2ea855b4,2024-11-21T09:21:45.723000 -CVE-2024-3617,0,0,67158837ac8c7713cc36e97920c72b82449b0b27940dd90bba6c1e4e88f4fca4,2024-11-21T09:29:59.990000 +CVE-2024-3617,0,1,146e8448dc0db72f058b02dc493232c3db68495499aa10a16ebc8669e05cd43b,2025-01-28T21:22:14.473000 CVE-2024-36170,0,0,63522f72466bd833df545e462da400082ecd411ddd244a9abd30662a55732553,2024-11-21T09:21:45.870000 CVE-2024-36171,0,0,2340321a945f53798f358a8c3a84e378d7623296346bc51d21441bc05f1e73b4,2024-11-21T09:21:46.010000 CVE-2024-36172,0,0,262ec0486cfe48c5c30f93fa757d5f114876b4f326ba126bc71ca3a3ea3db5c6,2024-11-21T09:21:46.150000 @@ -259319,7 +259320,7 @@ CVE-2024-36176,0,0,afabc11c691b29a1d4ae5e8ab903b4a391c6d43263fc1c0197fd7cda6d255 CVE-2024-36177,0,0,b1222e24c386edae98d375ff874d45e634b2bd21562b4a728ee24e260ae1c4b8,2024-11-21T09:21:46.860000 CVE-2024-36178,0,0,1e7e81d86ecf02bb863811bb405c63faf8940ac8fa1eb7f4d737eaa4bbc01bb7,2024-11-21T09:21:47.010000 CVE-2024-36179,0,0,f2052551fd4ee5bb4e4bcf7378fdb1230be80136f7af676971fc78773c9f8e30,2024-11-21T09:21:47.187000 -CVE-2024-3618,0,0,96e4428f1e5a57eeb81dfad9efc3cf7d646ec1ba659a6a634fab9340c623479b,2024-11-21T09:30:00.147000 +CVE-2024-3618,0,1,1a36ccddd0da998751b88433fc379d8b6a51b3516e6543cf66fde334347b4635,2025-01-28T21:25:45.690000 CVE-2024-36180,0,0,8da908aeb8987b49c76212324815472a21da969fc6276ffbe3def4e38a376080,2024-11-21T09:21:47.323000 CVE-2024-36181,0,0,ee8356aefc8c3c56a4cec93c514ce272b99c37f1bac8545821cc17624c699c9c,2024-11-21T09:21:47.467000 CVE-2024-36182,0,0,24c09a1a9ff386665cdc170aec4d6d1de33f77a8a41a43293e9476f54bdbd1b1,2024-11-21T09:21:47.650000 @@ -259330,7 +259331,7 @@ CVE-2024-36186,0,0,d3af5f74f31f908b2edc16b171376304a4075a826526a095c137e043c1402 CVE-2024-36187,0,0,fb85f7aabc5f5c8728b6f922630d6c7750550239eb3421cd2ceab5109e1f2d3e,2024-11-21T09:21:48.367000 CVE-2024-36188,0,0,7193af7642c45a0d2d1708ed6541ad005d168deda28a00a16a91533956795169,2024-11-21T09:21:48.513000 CVE-2024-36189,0,0,47f234cc708dab6b052b17b1cfaa8a6c0d5353748638ae274a46817fda3c7500,2024-11-21T09:21:48.660000 -CVE-2024-3619,0,0,7f903d1d14b0d5a1d3be2695dff879f1a17669c008158c56a64cd7710838f6a9,2024-11-21T09:30:00.287000 +CVE-2024-3619,0,1,e10c193817ee78c039ae1292cd88508cec817614130c9ca6cd5df3b0c25e7bf1,2025-01-28T21:28:57.787000 CVE-2024-36190,0,0,46c045c3ac5a07e8e8836e1b1b8069db4cd2c26c8c6a672b41a8b83faab507dd,2024-11-21T09:21:48.790000 CVE-2024-36191,0,0,41b586a04bcc830cf90be1dad1665d7c687083af35bec13a48e1fee8de35ef53,2024-11-21T09:21:48.940000 CVE-2024-36192,0,0,1e543c5bf80e2d15dd8fd67e64b5e9dc2585cdaac9b22962f5a7529a02cf2275,2024-11-21T09:21:49.073000 @@ -259341,7 +259342,7 @@ CVE-2024-36196,0,0,61292177aca287c3c0a44cd4fddccfb884477e1bdeb897226569e573cfbda CVE-2024-36197,0,0,f137e6bd1a0d6deb440cc2a96cb3f64486f6208a71b3e62c1ba971e40c77b6ec,2024-11-21T09:21:49.793000 CVE-2024-36198,0,0,cea9255fc0428aafd34f54988d4c354821dbdc99f1507ff03ea88281267f1265,2024-11-21T09:21:49.933000 CVE-2024-36199,0,0,e034f98e24e69ba2738fb246c3fd2158cd9707616a3aaf7a81baa627f554785e,2024-11-21T09:21:50.060000 -CVE-2024-3620,0,0,ab3ebe3a085344912b69aa70b0a8bde41aeab865600825a935f6e5ffb106ecb7,2024-11-21T09:30:00.430000 +CVE-2024-3620,0,1,d8bb3ccd55140721cac1e36a5b73516454969a6b8dba1aabaffb8147439d1c7d,2025-01-28T21:47:39.487000 CVE-2024-36200,0,0,0668c1b6764ab34a74fff2b4f28e553b022f8d08eae52892c0ebb3ebcc850d12,2024-11-21T09:21:50.187000 CVE-2024-36201,0,0,0dc97a7cfc62160ff92b619187a59d964db7e0c30f9220b552b4496a17808923,2024-11-21T09:21:50.320000 CVE-2024-36202,0,0,cdfcd2687c72678ca600fa8224952368b904dc50e23bd9d7dffba1718fead97e,2024-11-21T09:21:50.460000 @@ -261616,7 +261617,7 @@ CVE-2024-38993,0,0,172de65e7240c6a5f6bf645e694b0d2e344b70f8de661fa2be14422eb43b5 CVE-2024-38994,0,0,2a61e436904a48b4ded58b92d6bc8b107cabc4ea861dff38f3dcd8ff23c78c3a,2024-11-21T09:27:04.170000 CVE-2024-38996,0,0,8fd4a7ef6b42b1a63cd868322179bb9481740ea02fd238379ee386c0fbf6a026,2024-11-21T09:27:04.387000 CVE-2024-38997,0,0,29421658f8acbee523241d363ca96c6a4d61054e874bc93ac98fb62157248214,2024-11-21T09:27:04.613000 -CVE-2024-38998,0,1,1ddfa2c100a7af4725f52a46bac654024fff6a96a1ee34fbb54fd0ca70641bb2,2025-01-28T20:15:31.103000 +CVE-2024-38998,0,0,1ddfa2c100a7af4725f52a46bac654024fff6a96a1ee34fbb54fd0ca70641bb2,2025-01-28T20:15:31.103000 CVE-2024-38999,0,0,7f217baaa25d7f40b740199108f4604ad2f09c6c0fdc981cabbaf727e9dace92,2024-11-21T09:27:05.063000 CVE-2024-3900,0,0,237e455ad1182954d947891d10732281c5e53fdf19636fc42d58fae27637f1c4,2024-11-21T09:30:39.610000 CVE-2024-39000,0,0,530f16d741de9db26cb1201234320349b7ea94293b8a7e4203a71d20e34e8516,2024-11-21T09:27:05.280000 @@ -262322,7 +262323,7 @@ CVE-2024-39895,0,0,6c9f43bf2d5b14f7c195d7f27e8da55d0fdfce3c789ba8e50bd50c39978ed CVE-2024-39896,0,0,94854292dd96847b416ee3a98f9f2538650654ead9d516ca3f42ab04a45acc43,2025-01-03T16:30:43.367000 CVE-2024-39897,0,0,2556606fbcf0e7ba0936e5da490b4aa4283af8c4bc064dbc26051be7c494f614,2024-11-21T09:28:31.350000 CVE-2024-39899,0,0,5a1391f0b0d9dee2f37bbd1f62e59efe6b2b51d0e7e95d4354ecbbe7b3b6e4e2,2024-11-21T09:28:31.470000 -CVE-2024-3990,0,1,a3a5d60b620758cbf1c2a459c77513e82cdd6295ebb65b625ab2d99098447b48,2025-01-28T19:23:34.850000 +CVE-2024-3990,0,0,a3a5d60b620758cbf1c2a459c77513e82cdd6295ebb65b625ab2d99098447b48,2025-01-28T19:23:34.850000 CVE-2024-39900,0,0,a80cba3ff0874444694054f5b966edb196bd914599676a927a76749ba297830b,2024-11-21T09:28:31.610000 CVE-2024-39901,0,0,dfe56b10f6e323b587500698e0833597c95fdbbfc63c2621d91311d6c3045504,2024-11-21T09:28:31.763000 CVE-2024-39902,0,0,8a92fe2eb2d3c1d09c05c44d4dd4b076496180333be346b46d05c5ed84c2a7c1,2024-11-21T09:28:31.950000 @@ -262615,10 +262616,10 @@ CVE-2024-40644,0,0,a57ad1bfdf68296ce8a9539e505efa1809fefd866555c9c76d8987e02e0e4 CVE-2024-40645,0,0,a3f49b95b4c12b5444ede2f523391703502ab565df4a5cf2c506d73c2cde7df4,2024-09-05T17:09:16.947000 CVE-2024-40647,0,0,88935cfcec599678993a6403e316caa0b9a2d4c594531b02670b7f84c2cb6867,2024-11-21T09:31:25.587000 CVE-2024-40648,0,0,d1a60a844ec096d2fa051ae2f056504ecbdead31db11117a3172d5ff5e1a66d4,2024-11-21T09:31:25.720000 -CVE-2024-40649,1,1,e2075297b73a66443d22d04777dca6b0569f976c3a6ac2838592c7c61c27509e,2025-01-28T20:15:49.063000 +CVE-2024-40649,0,1,7a54a74e254f395efdbe074887fffc9943c1e093563b1650234f92bd7b7497da,2025-01-28T21:15:17.117000 CVE-2024-4065,0,0,8104e642d3086741414933f46b271721462b9ac994c8f65befa5dad67209802e,2025-01-21T19:05:04.657000 CVE-2024-40650,0,0,78138be7e0cafd2635985c4e24ab654bf9d1895811ba8f47491211caaf20f74f,2024-12-17T19:08:50.857000 -CVE-2024-40651,1,1,7a6556b431b790a2ed5fd47420fa1bbfb3954808117f61e5eb0e0967db515b54,2025-01-28T20:15:49.160000 +CVE-2024-40651,0,1,c31642b2d92355c7b52082e21540805c9cfb1b38379409a94e7680d09d5afac4,2025-01-28T21:15:17.253000 CVE-2024-40652,0,0,3f440f86342c58e47996d56495558243ae5edd7e5b0d377daab8b5a46ab73bda,2024-12-17T19:09:03.173000 CVE-2024-40654,0,0,92b6520c587274abcdf8c0d347f6bea7ed6a9174c82ea6943ece9915b4ce4a3b,2024-12-17T19:09:27.327000 CVE-2024-40655,0,0,73cefba958d24ff7dc513473b2797d5e63d9a5a24312d4dd5a6749f216069379,2024-12-17T19:09:51.027000 @@ -262630,16 +262631,16 @@ CVE-2024-4066,0,0,3af5df6c145362d9851cd86a7d51e714cf54c4e6049b7ebef259e6d9cb06fb CVE-2024-40660,0,0,b7c78dc1f99c1908de45423562bff4e1020b202a8369eadb6ebe92a17540bbaa,2024-12-17T19:36:04.020000 CVE-2024-40661,0,0,e9311a0488c8beb4857508062f47da62f4761ca246a30ea7974cdfed1317449f,2024-12-17T19:32:42.070000 CVE-2024-40662,0,0,f930fc5956328b9ceaccc04df86a895546984aaffbdfff03287ccf231f34c2aa,2024-12-17T19:07:42.750000 -CVE-2024-40669,1,1,8de0696503bba6672fb5c3d652cb2ab4e8bfbf9ef39f21fbf4ba1a55f53c6021,2025-01-28T20:15:49.250000 +CVE-2024-40669,0,1,7d12689dc989351d0524fc7dda90960c08b639b8dd104d4388dae193c60232ab,2025-01-28T21:15:17.387000 CVE-2024-4067,0,0,06cf73941215eebfb58b3f7712c48b8f71a364f025c4b7e91b6494998e5c5a95,2024-11-21T09:42:07.587000 -CVE-2024-40670,1,1,37162e4a5212ce0665865224b8a27eb12afd6ea8694ac57c22da2f9559a1a358,2025-01-28T20:15:49.343000 +CVE-2024-40670,0,1,bfe0100857c2ba0ca6a2dec6acce27fbaed41ee4c3df8635be511e970dc3268e,2025-01-28T21:15:17.527000 CVE-2024-40671,0,0,4520d06fdb2a855ee77cf9a82325fd4ddc6fdfedc3ecf68cb89582eb0d5cc2c7,2024-12-17T19:30:29.457000 -CVE-2024-40672,1,1,ed6e4757ddaf73853f5c03009bcff47addf403633e8a6d704ee8c0d182d7086a,2025-01-28T20:15:49.433000 -CVE-2024-40673,1,1,26f66cf78ec7eb12173b1ec970f697249d4eb8d3a28275c500a8c4ea6622e6cc,2025-01-28T20:15:49.530000 -CVE-2024-40674,1,1,719de82aed37087b80dce23165237b3c2e682349281cd9079c29b0fb4ee14fcb,2025-01-28T20:15:49.620000 -CVE-2024-40675,1,1,8e755fbaef606f54a9ee8d0483846ffde91a70e1b31e5742cc034f19180aa3bf,2025-01-28T20:15:49.710000 -CVE-2024-40676,1,1,4d5b396aebd3e9cd9619990194f2bd1522cb27f6e4ee469df63ca1d4394e371c,2025-01-28T20:15:49.800000 -CVE-2024-40677,1,1,5609542847df0552b92ca3577cf66076222360a76a834a2522ce6d0d3effd62f,2025-01-28T20:15:49.890000 +CVE-2024-40672,0,1,d65c72e9152afc190cc40c0c41011c2a48a527c16ecf5260b318f417e8eee233,2025-01-28T21:15:17.657000 +CVE-2024-40673,0,0,26f66cf78ec7eb12173b1ec970f697249d4eb8d3a28275c500a8c4ea6622e6cc,2025-01-28T20:15:49.530000 +CVE-2024-40674,0,0,719de82aed37087b80dce23165237b3c2e682349281cd9079c29b0fb4ee14fcb,2025-01-28T20:15:49.620000 +CVE-2024-40675,0,0,8e755fbaef606f54a9ee8d0483846ffde91a70e1b31e5742cc034f19180aa3bf,2025-01-28T20:15:49.710000 +CVE-2024-40676,0,0,4d5b396aebd3e9cd9619990194f2bd1522cb27f6e4ee469df63ca1d4394e371c,2025-01-28T20:15:49.800000 +CVE-2024-40677,0,1,56c391b2052acaf6eaf5eef903108ee1833315f5a80e8d11a697dfee479ac97f,2025-01-28T21:15:17.797000 CVE-2024-40679,0,0,1a4f43e2caee22490662a400e96b2c2bc6cc2720e0ab97475d03ecb065f8ddc1,2025-01-08T01:15:06.953000 CVE-2024-4068,0,0,6064b7191c4bfe6385dfb9559ff0d900f6a3c128ca3c30b46fda682863dc73a3,2024-11-21T09:42:07.710000 CVE-2024-40680,0,0,bd67df4a239df055ff0046ce7193fc2f150970ac8a25905d079ed701abf99ef9,2024-10-31T17:15:12.990000 @@ -268258,12 +268259,12 @@ CVE-2024-4841,0,0,177b39cd4a0e83cfae37bbb1b481e330bd5314d74a4028705ec45704dd9da4 CVE-2024-48410,0,0,76acfbbba797fbded687285f1d6b7f4e69da30abbf2ce3a40c171e75e974afe7,2024-11-04T21:35:10.317000 CVE-2024-48411,0,0,8c635fbfe1f17c34a6d067e8b46ccb07648ab30edbd28d9ac158683932c5ce62,2024-10-16T19:35:11.290000 CVE-2024-48415,0,0,bb9e3b97ff90d39743d554ba54d4e6857ce95f8c7a439d575dc2c98763652ebd,2024-11-26T20:29:57.070000 -CVE-2024-48416,0,1,29decd2545745852f0b3bd806430647ddf50e35438ebb0b0f6f40c1b2052b2fe,2025-01-28T20:15:49.987000 -CVE-2024-48417,0,1,59f2a0de5969ada51249d1f6ea52133c8e8d1e70cc1504c4105530677f3feb32,2025-01-28T20:15:50.143000 -CVE-2024-48418,0,1,3c74c8c1712fe4f6d91646ce47422397df724e29057ea45622e0cac4b0f0c2de,2025-01-28T20:15:50.283000 -CVE-2024-48419,0,1,5dbc3fc453936c2e63a6537fe01304e925021ce2dd4b3a295e9fd1ce60011e0b,2025-01-28T20:15:50.423000 +CVE-2024-48416,0,0,29decd2545745852f0b3bd806430647ddf50e35438ebb0b0f6f40c1b2052b2fe,2025-01-28T20:15:49.987000 +CVE-2024-48417,0,0,59f2a0de5969ada51249d1f6ea52133c8e8d1e70cc1504c4105530677f3feb32,2025-01-28T20:15:50.143000 +CVE-2024-48418,0,0,3c74c8c1712fe4f6d91646ce47422397df724e29057ea45622e0cac4b0f0c2de,2025-01-28T20:15:50.283000 +CVE-2024-48419,0,0,5dbc3fc453936c2e63a6537fe01304e925021ce2dd4b3a295e9fd1ce60011e0b,2025-01-28T20:15:50.423000 CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d426,2024-05-30T20:15:09.703000 -CVE-2024-48420,0,1,7ec9df5dde76d961d221a571bd3b8fb06a63d9c9c007d7fd46ebe0677ddb7896,2025-01-28T20:15:50.573000 +CVE-2024-48420,0,0,7ec9df5dde76d961d221a571bd3b8fb06a63d9c9c007d7fd46ebe0677ddb7896,2025-01-28T20:15:50.573000 CVE-2024-48423,0,0,905d7aa9f40bc2315b64415beaca8558efff30feb4eedc78c3f814354c0055b2,2024-11-21T09:40:45.127000 CVE-2024-48424,0,0,9375606a1385c09668a8d2d1f5401d048515fbfd22cd289e15fe454c4a078717,2024-10-28T18:35:03.257000 CVE-2024-48425,0,0,e76f599f374f33c20c74bfcd6e8302eb09e83f2739633f465d68d77fe419098b,2024-10-28T19:35:28.823000 @@ -268359,7 +268360,7 @@ CVE-2024-48656,0,0,356ac527d627a35ae4fb887d06c7ebf57fe1e9ea88032a7bf0d0e2b62a0c4 CVE-2024-48657,0,0,18cbce2a64471ea851cf63f59039293963cbba9258e0d2e6c68a3e04257848cb,2024-10-24T14:38:41.620000 CVE-2024-48659,0,0,a4994eec5cde2ff529af4c431e21090733a1ede66f6e8603b23cda70d71a876c,2024-10-23T15:12:34.673000 CVE-2024-4866,0,0,daa8bd59cfc9e1317ae914c4e0c8d7abc6dfad68ea3a67c32b9eb16148687390,2024-11-21T09:43:45.430000 -CVE-2024-48662,0,1,ce7829f966a704731a8de90e7a6af83e3acf0153fe3904776e8ec3ba3f1f522e,2025-01-28T20:15:50.727000 +CVE-2024-48662,0,0,ce7829f966a704731a8de90e7a6af83e3acf0153fe3904776e8ec3ba3f1f522e,2025-01-28T20:15:50.727000 CVE-2024-4868,0,0,7fcac4c223abfc0b7449e6babe1af74ba6e012053b04591d0d82006400a0b852,2024-11-21T09:43:45.557000 CVE-2024-4869,0,0,a498392e92d4315a3c1a63f0751024c8b7def437eeab49123db178ff4b1bb7ed,2024-11-21T09:43:45.670000 CVE-2024-48694,0,0,faeae9ab327b97202e086aff921470e6b984670cc294f1289742129b482c0fbd,2024-11-21T17:15:20.110000 @@ -268385,7 +268386,7 @@ CVE-2024-48743,0,0,8a901d521bee4fb37fa6631ae86bffe209ffd6825102f3fe83b6c17d5586b CVE-2024-48744,0,0,2075f33fe8737914bba0330897293beec62cfc78359643f6fd0ded65a78587d3,2024-10-16T18:35:07.013000 CVE-2024-48746,0,0,70b1bf92976f7b515824754b06ef5e640b752fe34bb7804f1674438f52e03c18,2024-11-06T18:17:17.287000 CVE-2024-48747,0,0,f03e580691c37a981f499cf0b560468ec0253c9c99edec66cb15f26778f95804,2024-11-26T19:15:26.443000 -CVE-2024-4875,0,1,ac1a4cd3c3015a7e51b909244836132983e845092f22afd31b06eebb6822f810,2025-01-28T19:20:29.297000 +CVE-2024-4875,0,0,ac1a4cd3c3015a7e51b909244836132983e845092f22afd31b06eebb6822f810,2025-01-28T19:20:29.297000 CVE-2024-48758,0,0,6d6595f4f9c5157363905a29de4e8aa05d9c595a5b50795bcb679a26374e8aff,2024-10-18T12:53:04.627000 CVE-2024-4876,0,0,65d8065cbe56070f462c8629050b655fbc478bb065b4ab8ba51acd1e3033dac7,2025-01-24T13:44:58.993000 CVE-2024-48760,0,0,2c515de9d3808545a7fdee77c025d0a4f76a44cfac1a6b1790d2a3a6eabc5e21,2025-01-23T17:15:13.713000 @@ -270594,7 +270595,7 @@ CVE-2024-51723,0,0,405dcadcdbf00249437ac8a26372209fb3d01c194653eab79c47481a1ec06 CVE-2024-51727,0,0,8858c32e9c05ed142d6035368629a58d5f5511d07aca54fdd69ef146c2c5ebd8,2024-12-10T19:51:08.360000 CVE-2024-51728,0,0,3bbad1d60c33e7237d8b468e87256ba82f10b9e78f6e5515e077c2c0433acca1,2025-01-13T10:15:08.360000 CVE-2024-51729,0,0,0f55e9102ab1f809882a11b078feb4a5eddc3c61bea203a3afaf0721d78465a3,2025-01-11T13:15:24.650000 -CVE-2024-5173,0,1,c89d4e627c90f45a45535ae5f227b77a7cf6eb9df9b98bb2f7d1bb81dae192a9,2025-01-28T19:18:40.393000 +CVE-2024-5173,0,0,c89d4e627c90f45a45535ae5f227b77a7cf6eb9df9b98bb2f7d1bb81dae192a9,2025-01-28T19:18:40.393000 CVE-2024-51734,0,0,14929ea2cfd8244892589bf2c0ce5543b7359978b4b9a4825d85680dcc28a977,2025-01-22T20:15:30.610000 CVE-2024-51735,0,0,48473e5db4cd5ecc77914f0341bc3fe19cd3b449987f541b0b758a8a1a3f060f,2024-11-06T18:17:17.287000 CVE-2024-51736,0,0,29e0c9e964880fe165f986cd62daad2610accc1f9fe0e31c385a89c289e90f1f,2024-11-08T19:01:25.633000 @@ -270897,7 +270898,7 @@ CVE-2024-5211,0,0,7cd6e2e70261fb739ea7e3e47a4f6fba32a9363515da62c2688f8608cf4764 CVE-2024-5212,0,0,0f9b3d1e48853644476ae3ee9a1d012690d355070fce3d62201caa71c818cbf6,2024-09-03T20:45:20.603000 CVE-2024-5213,0,0,5c8c63d05576e1770ede47d4378a318d4160943c618f7de2f4e944b5684fb8f5,2024-11-21T09:47:11.893000 CVE-2024-5214,0,0,63d7572dfe3fc62d2b94f5bd6d323fcf441de42b521ffae91ecf8348de5e238f,2024-06-03T19:15:09.360000 -CVE-2024-5215,0,1,bb0a336c4d67073895e309ebdb438f7b5ff1bc4c7549d2fd8103676a5f6ab3ae,2025-01-28T19:17:56.683000 +CVE-2024-5215,0,0,bb0a336c4d67073895e309ebdb438f7b5ff1bc4c7549d2fd8103676a5f6ab3ae,2025-01-28T19:17:56.683000 CVE-2024-5216,0,0,a6cb0d78c97f1833668004bce4e1a3d8ad03ce71671240c1316442591a36a40c,2024-11-21T09:47:12.147000 CVE-2024-5217,0,0,bcb367f5e8f4934ec54457a6bf1d1b467936c7817252514fef2d7bb7ed19c2bf,2024-11-27T18:56:05.783000 CVE-2024-5218,0,0,4adcb0c34373dcdf3d317dd8a7e6d0439942258855805a791e5be6a5f3796ff5,2024-11-21T09:47:12.460000 @@ -272591,7 +272592,7 @@ CVE-2024-5470,0,0,b70339f8a022f56de8d4eb030bd8f5d3563ba0fc9c1634fd55ea697aee92ed CVE-2024-5471,0,0,631b7a50303d6f9a193814092037f29379ca6ca2282e0b67207306f8abcc9ba4,2024-11-21T09:47:44.903000 CVE-2024-5472,0,0,5e12957cd076edb077638ab18db3a7202837e8fd64948bba00e3365a85b54117,2024-11-21T09:47:45.027000 CVE-2024-54724,0,0,ba745a806f7adf5ec3f012771244838e01c7aa8ab9a8bb0162dc83573ba19f7a,2025-01-21T16:15:13.583000 -CVE-2024-54728,0,1,42216ac564624e9e133e33caa2f322a39ce480465064ef1713dc9e7ecc39c198,2025-01-28T20:15:50.873000 +CVE-2024-54728,0,0,42216ac564624e9e133e33caa2f322a39ce480465064ef1713dc9e7ecc39c198,2025-01-28T20:15:50.873000 CVE-2024-5473,0,0,fdd6160c6121db618882f16bfc9c17f8c3a2501715cb9519638ef5a1fcd2441d,2024-11-21T09:47:45.190000 CVE-2024-54730,0,0,1f5b2039ec78df882c8a067f1f2e14a50bc9fc3855df85b8baefb9b0165aa937,2025-01-16T16:15:31.407000 CVE-2024-54731,0,0,acd86fbebdd274bead6535bf83cf37467581b483235e177fd7e87a697a25d37c,2025-01-08T05:15:11.810000 @@ -272732,7 +272733,7 @@ CVE-2024-55224,0,0,4f8d131824b20fb869af69c38a084a00b535a965cb641c1dcc385c5e0ee6c CVE-2024-55225,0,0,65ed599876ed6d6a32d724946af47b3c7b45688e546c4270a7c0aa2b7e07dd80,2025-01-10T18:15:24.530000 CVE-2024-55226,0,0,33de94a32577e3a21e3bfd2bd3c203596c6338516324a9df6e2cd8fabe427868,2025-01-10T17:15:17.393000 CVE-2024-55227,0,0,e950112fa5df25206bee3f882fcc5fb384b448d0299283a73df0986a8631e81b,2025-01-27T17:15:16.523000 -CVE-2024-55228,0,1,ff675650c5ee6876dc62989bcceef2bde061894c1c46820a3a385da0d4aa1378,2025-01-28T20:15:51.017000 +CVE-2024-55228,0,0,ff675650c5ee6876dc62989bcceef2bde061894c1c46820a3a385da0d4aa1378,2025-01-28T20:15:51.017000 CVE-2024-5523,0,0,0b2c43ef384781b0113b9be6f2b000f9de2199a81d337c7e51164ef3b409e6ae,2024-11-21T09:47:51.940000 CVE-2024-55231,0,0,bc333f6409b44ab3c99000a12bad2fde8a29ce447ecd07b39a700d49ee237739,2024-12-26T20:15:22.363000 CVE-2024-55232,0,0,1864ac97778845b0c2006d5c17dbf59eb90aad80a835e2f552f3f64f26c6392b,2024-12-26T20:15:22.673000 @@ -272947,6 +272948,7 @@ CVE-2024-55957,0,0,ada0c45326625ede7128814a2ddf1c6230493a1309cb930f3b7b704c3c7a0 CVE-2024-55958,0,0,805e9804f2e0f436a8b6462c6f5ea66eb72f3312c0b5dba8bff8785036cb57cd,2025-01-22T22:15:09.453000 CVE-2024-55959,0,0,1be9d85eb46493c77ed7db4321425d1d95d759742cf6d5fdd1afad68017b844f,2025-01-23T16:15:36.147000 CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e06,2024-11-21T09:47:59.330000 +CVE-2024-55968,1,1,6d11fa4978388981fa7ab5e137e2a4683d2b3584e877259ec30742448cc87026,2025-01-28T22:15:15.860000 CVE-2024-55969,0,0,1d80cecd30844cd68ce96a6b7ee5ef5d3b9107e1b08adee083a129c50a18336c,2024-12-16T17:15:12.337000 CVE-2024-5597,0,0,c028f291e4b563828a2ebebe088654ce56adccaea078f8905bc0de855460aa3c,2024-11-21T09:47:59.443000 CVE-2024-55970,0,0,16abb0c0e0265704de9252f7802bb4c1dcee3b6024c122812d4fa638388a012b,2024-12-16T17:15:12.517000 @@ -273096,7 +273098,7 @@ CVE-2024-56170,0,0,32611264582c3e86fc6149b20f12d5acbffe58d1028228c5f9baa4ad2faec CVE-2024-56173,0,0,5336dffcdc7d9618ebdef949381efb90ee1b3998a2588e22f737fe5a77849f25,2024-12-18T16:15:15.600000 CVE-2024-56174,0,0,3281f470ed49ef5807bf603f02908731fff1047853105938ff5649e5ffd7e97c,2024-12-18T17:15:15.190000 CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f6144b,2024-12-18T15:15:13.723000 -CVE-2024-56178,0,1,5cc5bc09d299e47cd8de55ac25d0c0eac961f22577b1f610a8dab4a387640af1,2025-01-28T20:15:51.173000 +CVE-2024-56178,0,0,5cc5bc09d299e47cd8de55ac25d0c0eac961f22577b1f610a8dab4a387640af1,2025-01-28T20:15:51.173000 CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 CVE-2024-56198,0,0,d9de207e762af79ae5486154cdbb63e6556ac0599a95c1cf37d7f9e9fe1adfd1,2024-12-31T16:15:27.247000 @@ -273217,7 +273219,7 @@ CVE-2024-56311,0,0,ae98370c926cf4035db6beab289ec95f535595d8cbeb5d5d170bb60f5e930 CVE-2024-56312,0,0,a105d2d2c496ae4a31974572451f1a2391cb63512239c561ea05256145cfc002,2025-01-14T17:15:19.057000 CVE-2024-56313,0,0,5f9fbb8f2eda640c1b051bfdc491a6a52b895e91ada0d44715e60ffa8a2b7b44,2025-01-14T17:15:19.187000 CVE-2024-56314,0,0,06b0777f9ad266c15efb615a2fa29ad1728f8b2f5f78756efb9474bdd057a57b,2025-01-14T17:15:19.280000 -CVE-2024-56316,0,1,49f32ec22d0efbcfed1f30696d2d5fa857e6214e96e2e028ad8350a4040346ad,2025-01-28T20:15:51.320000 +CVE-2024-56316,0,0,49f32ec22d0efbcfed1f30696d2d5fa857e6214e96e2e028ad8350a4040346ad,2025-01-28T20:15:51.320000 CVE-2024-56317,0,0,8d6cb761ec1de8db3f8894652188d82bc1e600feec839db7f7746cdf2c5b129d,2025-01-02T20:16:06.723000 CVE-2024-56318,0,0,4614542827deff1ff7fc917535aa016ec46ffc813ff98610f6d274ec4b4e2e50,2025-01-02T20:16:06.917000 CVE-2024-56319,0,0,28ca3f0845265026262f805138452dcd32240d1eb92a7bdb1a246f385a35fe7a,2024-12-31T20:16:08.380000 @@ -273642,31 +273644,31 @@ CVE-2024-56923,0,0,be73f26a48655a6c99b484271ed1e42d7600b948c1a837d43e3410b428c3f CVE-2024-56924,0,0,2dfd0f4cb2cee49ddeeea2a79bc2fa0288c3fc810897b51482d81940308871b9,2025-01-23T17:15:16.710000 CVE-2024-5693,0,0,21ec44ee8ed5f9de3ae93fab02d376513f10f0c9f8c82a8733146d6a99b0ff3a,2024-11-21T09:48:10.807000 CVE-2024-5694,0,0,96312914234d61d70e9f2b2f2db102c559d8f68a0c34e1673db920a9b13837b6,2024-11-21T09:48:10.990000 -CVE-2024-56947,0,1,de2dbd42f02c6815b309904992c8d2e0ee10dbda0e015e0471bf9a8137017390,2025-01-28T20:15:51.500000 -CVE-2024-56948,0,1,8742881b72f361dc2543476e98570b9c75cf607bb78be3d886dcff581e6d1279,2025-01-28T20:15:51.650000 -CVE-2024-56949,0,1,9badb9d193ec802649c03676d00eb21db1a186f3dabe0299b597023b2e5f3799,2025-01-28T20:15:51.797000 +CVE-2024-56947,0,0,de2dbd42f02c6815b309904992c8d2e0ee10dbda0e015e0471bf9a8137017390,2025-01-28T20:15:51.500000 +CVE-2024-56948,0,0,8742881b72f361dc2543476e98570b9c75cf607bb78be3d886dcff581e6d1279,2025-01-28T20:15:51.650000 +CVE-2024-56949,0,0,9badb9d193ec802649c03676d00eb21db1a186f3dabe0299b597023b2e5f3799,2025-01-28T20:15:51.797000 CVE-2024-5695,0,0,561e6cb4d08160ed6fafa90e521f897721e64759a362dc9a8276e2a94b600bf4,2024-11-21T09:48:11.110000 -CVE-2024-56950,0,1,f79787b2c1c3096bd677e9577da20322864a928b82f464e3719fee4b1d99e1ef,2025-01-28T20:15:51.960000 -CVE-2024-56951,0,1,ac5fa69e4b858d865d6df9839c487b01f40e4745b3135a04c928e581cb5c9365,2025-01-28T20:15:52.107000 -CVE-2024-56952,0,1,f0f7f55ac49aee470fd23da9b32506e1155a884940297661f20950a423e6b7e6,2025-01-28T20:15:52.250000 -CVE-2024-56953,0,1,d6af1d37996ec3677425338015d999c9d9d8619edba09f72270e5a3ae1468df3,2025-01-28T20:15:52.390000 -CVE-2024-56954,0,1,5d95940f4500e4c8ed1c79d18da6b28e89ae8e21b6ac5f6f5d9e7bf553492caa,2025-01-28T20:15:52.540000 -CVE-2024-56955,0,1,695572a5b43187fae26cfd564d6083408fea2627baf453a4637e921b7d077e8e,2025-01-28T20:15:52.693000 -CVE-2024-56957,0,1,a365f0dba6fa5a6a54d32b6e465b7e4720d23d8b2e7adbfd200091b6dfd36d15,2025-01-28T20:15:52.837000 -CVE-2024-56959,0,1,443e07d6aa8cbad9f593e7593ba2d839cf52eefdd0713fc78166f22ec2070f70,2025-01-28T20:15:52.987000 +CVE-2024-56950,0,0,f79787b2c1c3096bd677e9577da20322864a928b82f464e3719fee4b1d99e1ef,2025-01-28T20:15:51.960000 +CVE-2024-56951,0,0,ac5fa69e4b858d865d6df9839c487b01f40e4745b3135a04c928e581cb5c9365,2025-01-28T20:15:52.107000 +CVE-2024-56952,0,0,f0f7f55ac49aee470fd23da9b32506e1155a884940297661f20950a423e6b7e6,2025-01-28T20:15:52.250000 +CVE-2024-56953,0,0,d6af1d37996ec3677425338015d999c9d9d8619edba09f72270e5a3ae1468df3,2025-01-28T20:15:52.390000 +CVE-2024-56954,0,0,5d95940f4500e4c8ed1c79d18da6b28e89ae8e21b6ac5f6f5d9e7bf553492caa,2025-01-28T20:15:52.540000 +CVE-2024-56955,0,0,695572a5b43187fae26cfd564d6083408fea2627baf453a4637e921b7d077e8e,2025-01-28T20:15:52.693000 +CVE-2024-56957,0,0,a365f0dba6fa5a6a54d32b6e465b7e4720d23d8b2e7adbfd200091b6dfd36d15,2025-01-28T20:15:52.837000 +CVE-2024-56959,0,0,443e07d6aa8cbad9f593e7593ba2d839cf52eefdd0713fc78166f22ec2070f70,2025-01-28T20:15:52.987000 CVE-2024-5696,0,0,9ae6c44d348ef9d24ec8ca5439b37c50da2ca251572759d1d18bb2a62c7efe3a,2024-11-21T09:48:11.303000 -CVE-2024-56960,0,1,37e2be0ec82bb034d2e2028e2ce56b2586f141a84e855af0badd56a1d71121a9,2025-01-28T20:15:53.127000 -CVE-2024-56962,0,1,f93bf8ccff4c99060a7ebb57d88104301c7ef42923a9fdd490b7de1971a9a550,2025-01-28T20:15:53.273000 -CVE-2024-56963,0,1,7bb629f288477f1368d70432b9845302d59f2abdab13ed7f914c7a59d4d42a20,2025-01-28T20:15:53.423000 -CVE-2024-56964,0,1,7007280c50e70a4a8746eaf47643c5f9a5673345aa14fd9de7ec948cfe6a9114,2025-01-28T20:15:53.577000 -CVE-2024-56965,0,1,19e3e4ec593f9ccbb1206dce2bd38aba0228642050827527d775dc01c6904460,2025-01-28T20:15:53.733000 -CVE-2024-56966,0,1,52b326a13a34171b9c227228b907567f7991a15d515ceb0bae287e608fc79468,2025-01-28T20:15:53.873000 -CVE-2024-56967,0,1,43e0a24b4c771bc99ba8ec0af3f57cdcff26761c26dfb1524def0e2633506be7,2025-01-28T20:15:54.010000 -CVE-2024-56968,0,1,38aa881fecaf4056d90c984cf8016063fe8becd3efea087ac658ba8bdb0cb613,2025-01-28T20:15:54.157000 -CVE-2024-56969,0,1,6ac568be18148d8fcdd8d68339e261c470b024f783d4b1afd4465c66e8f042ed,2025-01-28T20:15:54.297000 +CVE-2024-56960,0,0,37e2be0ec82bb034d2e2028e2ce56b2586f141a84e855af0badd56a1d71121a9,2025-01-28T20:15:53.127000 +CVE-2024-56962,0,0,f93bf8ccff4c99060a7ebb57d88104301c7ef42923a9fdd490b7de1971a9a550,2025-01-28T20:15:53.273000 +CVE-2024-56963,0,0,7bb629f288477f1368d70432b9845302d59f2abdab13ed7f914c7a59d4d42a20,2025-01-28T20:15:53.423000 +CVE-2024-56964,0,0,7007280c50e70a4a8746eaf47643c5f9a5673345aa14fd9de7ec948cfe6a9114,2025-01-28T20:15:53.577000 +CVE-2024-56965,0,0,19e3e4ec593f9ccbb1206dce2bd38aba0228642050827527d775dc01c6904460,2025-01-28T20:15:53.733000 +CVE-2024-56966,0,0,52b326a13a34171b9c227228b907567f7991a15d515ceb0bae287e608fc79468,2025-01-28T20:15:53.873000 +CVE-2024-56967,0,0,43e0a24b4c771bc99ba8ec0af3f57cdcff26761c26dfb1524def0e2633506be7,2025-01-28T20:15:54.010000 +CVE-2024-56968,0,0,38aa881fecaf4056d90c984cf8016063fe8becd3efea087ac658ba8bdb0cb613,2025-01-28T20:15:54.157000 +CVE-2024-56969,0,0,6ac568be18148d8fcdd8d68339e261c470b024f783d4b1afd4465c66e8f042ed,2025-01-28T20:15:54.297000 CVE-2024-5697,0,0,b7a4dc6c87306b1faedc3f85852add4556913bfcdad208dc9ec44ed1d967aaa8,2024-11-21T09:48:11.493000 -CVE-2024-56971,0,1,276a7a86ad106648443da06863e2300c9d96ea86918eba3d47a3ad54989777d6,2025-01-28T20:15:54.437000 -CVE-2024-56972,0,1,98acd6acd98c6f5290bb615c9d8f957523c0a42981f4e179e443761ee06a5635,2025-01-28T20:15:54.580000 +CVE-2024-56971,0,0,276a7a86ad106648443da06863e2300c9d96ea86918eba3d47a3ad54989777d6,2025-01-28T20:15:54.437000 +CVE-2024-56972,0,0,98acd6acd98c6f5290bb615c9d8f957523c0a42981f4e179e443761ee06a5635,2025-01-28T20:15:54.580000 CVE-2024-5698,0,0,f82f3ede8f3a0f37db39e7c1594784573d509729718d4233e67322de0394663b,2024-11-21T09:48:11.610000 CVE-2024-5699,0,0,1f6b745154d0c66e136c94c9cf6848fa0ef03de7ad43314ef7aabc398131e7bc,2024-11-21T09:48:11.727000 CVE-2024-56990,0,0,69df5a378059c143fb0394a632fffd1a0d17ff51d4e63a6bcfb36930a4a43f66,2025-01-21T16:15:13.947000 @@ -273700,7 +273702,7 @@ CVE-2024-57035,0,0,5b4d21f0e6f76521453f47b20f8d7e46bcfa11378320e2eaefaad51e3d6de CVE-2024-57036,0,0,53a08b77e64e14052538b358d3b699e5ff91badbb6cbef1e8c382e8b41ad333f,2025-01-21T16:15:14.143000 CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000 CVE-2024-57041,0,0,ddfb29be19bbf27e0e79d11117c70804483f6627ba362e993db3cc41d054c8a6,2025-01-24T20:15:33.353000 -CVE-2024-57052,0,1,bc00b5d037064b7099093b076a5f146c014e4111e7d4ea6fcb302d9ad48a909f,2025-01-28T20:15:54.727000 +CVE-2024-57052,0,0,bc00b5d037064b7099093b076a5f146c014e4111e7d4ea6fcb302d9ad48a909f,2025-01-28T20:15:54.727000 CVE-2024-5708,0,0,f68252af81d3d9fd48c33f6db887b706921f7e4e9ec883679703f59930376646,2024-08-06T16:30:24.547000 CVE-2024-5709,0,0,9e7f02d16313ead7a68864ca2ed2dc29106d9085227941350b2847c3e4c2a85b,2024-08-06T16:30:24.547000 CVE-2024-57095,0,0,875cae30bc2fea90461df4c9f6d426bd980c17969b9a5f071ece2b68c57f9206,2025-01-24T20:15:33.473000 @@ -273739,7 +273741,7 @@ CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d CVE-2024-57252,0,0,1934cc1672f51074e73fec8f79c8c1a0c2b2ef217ce3d8eb4ed233f3d5050e7d,2025-01-17T22:15:28.817000 CVE-2024-5726,0,0,4ceeef37c455f852012651a7e920e126aeb659ebe7ba7b011f93539db03748f1,2024-11-21T09:48:14.060000 CVE-2024-5727,0,0,fcb5435c7826764738326be67041da3dad875d35da2f0e0301dde5c6609d328a,2024-11-21T09:48:14.180000 -CVE-2024-57272,0,1,dbc324cdb83c481b4de69dd5fc8cc4b86ee368b27cc30cc7365a1b8df8dc0a02,2025-01-28T20:15:54.870000 +CVE-2024-57272,0,0,dbc324cdb83c481b4de69dd5fc8cc4b86ee368b27cc30cc7365a1b8df8dc0a02,2025-01-28T20:15:54.870000 CVE-2024-57276,0,0,56f9d8dfeaea339eb4f7830f5e47071be6d43333a2aa1e4e9551dc0218c18991,2025-01-27T17:15:16.827000 CVE-2024-57277,0,0,cf3bfbd32910c82a101c705fc837da91aff2f392e35fb884cbc5ee32ed42427b,2025-01-24T20:15:33.587000 CVE-2024-5728,0,0,5c443df1ac8c53ac147f54c0053d74d00fcb14e9c202dddb628d942cdb86d4d7,2024-11-21T09:48:14.357000 @@ -273755,11 +273757,12 @@ CVE-2024-5734,0,0,e11a2eabf858c649c3672ef7dfee7440a5aa55af470ebaa049ac3482850265 CVE-2024-5735,0,0,1aecf1dad861da728b2f9826c6f1c9c383af7e2a97744eeffda3009b167fdae6,2024-11-21T09:48:15.447000 CVE-2024-5736,0,0,6b1b18dd72938ab32e71ae9b9c3e5aef903a076b6bda077e482ad25858245f35,2024-11-21T09:48:15.580000 CVE-2024-57360,0,0,b55b093ca2518eac39079440800bfb25c14c6bd692dd0f78a706c0ccb71a2e4b,2025-01-23T16:15:36.437000 -CVE-2024-57369,0,0,ce35d8d439ec5b10e19b8254c4b2aaedfd6d2315486d0723f1d0dfc5c7549525,2025-01-17T20:15:29.140000 +CVE-2024-57369,0,1,0beeb3a945370495c7fab19794a2bd15bf04ce80c00d4b38b5b7c779de67923e,2025-01-28T21:15:17.933000 CVE-2024-5737,0,0,fb7afad0bdcad96b29de7c5519f73ad0e5af614975f3cc39b56e0ff717aa63e5,2024-11-21T09:48:15.713000 CVE-2024-57370,0,0,dba61003ac0742f925ea5ff1cc95bfbaed4369615ca108aeba895cf60279fedb,2025-01-23T21:15:14.663000 CVE-2024-57372,0,0,359f6085d50456f0eac4043a58ce1cc9b440df64af0e5401b40a68976c846ffa,2025-01-17T22:15:28.957000 -CVE-2024-57373,0,1,74730975947491afdedfbebc28e66e12f3622db8206f792838168db38a80a123,2025-01-28T20:15:55.040000 +CVE-2024-57373,0,0,74730975947491afdedfbebc28e66e12f3622db8206f792838168db38a80a123,2025-01-28T20:15:55.040000 +CVE-2024-57376,1,1,e95b386207c3770a9d6a0b865b82a180ad5fc53bbc01066c4a87ea838284c166,2025-01-28T22:15:15.990000 CVE-2024-57386,0,0,581b3c2804a2401ceb5ccd2cee1eff29157b5f56941a4ae147cc84b888d64fff,2025-01-24T22:15:34.727000 CVE-2024-5739,0,0,0e4f510b66deb8d2a70ee4b32b2e47de655e3949e52e35934a40b7f5adddcb57,2024-11-21T09:48:15.850000 CVE-2024-5741,0,0,055094e9aabecf080e8eb2a3d882a04f3fba90f18ee04ead7d8cff271ac3f02a,2024-11-21T09:48:15.963000 @@ -273779,6 +273782,7 @@ CVE-2024-57488,0,0,cab6b66e7059e8f245e671e69563c712386f2de2b58d5eb8328ea47276f13 CVE-2024-5749,0,0,36203d1040051e343d9d050a3c2e3f863a807627eb7d14e1470ca394531f4751,2024-10-16T16:38:43.170000 CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000 CVE-2024-5751,0,0,a075ba1bce0283dcf2eb1909116e18ed1aeef6c0cfd6415ef5931a3fb6320c2f,2024-11-21T09:48:16.813000 +CVE-2024-57514,1,1,e99a7b2deac18e183210e68fabf07af7499306a8f2837163a590f976255e8484,2025-01-28T22:15:16.103000 CVE-2024-5753,0,0,35e5857965ec4fb8ff4da87da0ad57743fc77f757356d105b68f8e07a9b9291a,2024-11-21T09:48:16.923000 CVE-2024-57536,0,0,02e8c7373d9548e0be6ef2dd6f50d54d1dae50f3849a42bda8fca1e700f8b5b0,2025-01-22T21:15:10.100000 CVE-2024-57537,0,0,7a57264ee99ea2cf07d8beff99c09ac577ded2e5e2c43aa0cae71e5949ab6ad2,2025-01-22T21:15:10.287000 @@ -273791,10 +273795,10 @@ CVE-2024-57542,0,0,9f4f21ed016285b89d83a6c564ff71907e5abf82e51bb01bf73b7d294ec7a CVE-2024-57543,0,0,898d6f8a88c778c4280c4ecff7f0698ccecae47925ad74f2985898b4ac306118,2025-01-22T21:15:10.837000 CVE-2024-57544,0,0,0d7692301f68e1a54af26539095dbcdd0b4efd46060b39551d96338252e7c0b8,2025-01-22T22:15:09.613000 CVE-2024-57545,0,0,920e5d8c212074216a1e84000536dbfa8a4a938f249df8348a02d6e14021f484,2025-01-22T22:15:09.790000 -CVE-2024-57546,0,1,bad587a0ceeef9b89c8828f054c4bda84de49437c94ed18023e6d225f79a97b6,2025-01-28T20:15:55.203000 -CVE-2024-57547,0,1,0f4f2ee4c32bcc32e45071c962f8fc6a920b1dde381101e80a92042b066e6572,2025-01-28T20:15:55.367000 -CVE-2024-57548,0,1,1f93c0d12d8fe21bacce0b119a038c3d7fd2c3fed86744ec0bc35262e74ff670,2025-01-28T20:15:55.547000 -CVE-2024-57549,0,1,79f94dbd41b8017d0827021d04c9fd9e841f0b96e590a0bd61cafe206909e091,2025-01-28T20:15:55.810000 +CVE-2024-57546,0,0,bad587a0ceeef9b89c8828f054c4bda84de49437c94ed18023e6d225f79a97b6,2025-01-28T20:15:55.203000 +CVE-2024-57547,0,0,0f4f2ee4c32bcc32e45071c962f8fc6a920b1dde381101e80a92042b066e6572,2025-01-28T20:15:55.367000 +CVE-2024-57548,0,0,1f93c0d12d8fe21bacce0b119a038c3d7fd2c3fed86744ec0bc35262e74ff670,2025-01-28T20:15:55.547000 +CVE-2024-57549,0,0,79f94dbd41b8017d0827021d04c9fd9e841f0b96e590a0bd61cafe206909e091,2025-01-28T20:15:55.810000 CVE-2024-5755,0,0,d9beb74b4cc757e5dafe2ce46b6f3c5c752c1749a1b4a2abdedbdd95bff1173d,2024-11-21T09:48:17.093000 CVE-2024-57556,0,0,bb0c8b6daab6a4685a3c223d5c61804de336ccacfb88de2d986d4a4a234b5bc3,2025-01-24T21:15:10.680000 CVE-2024-5756,0,0,f306d50c688e90f1ac281dc052b52f0a73fe2794efab7031898c419d58649207,2024-11-21T09:48:17.217000 @@ -273809,7 +273813,7 @@ CVE-2024-57581,0,0,d33766716cfcc1229c50a7310d1424328b4dc7c6b3c33c20370b98899cfad CVE-2024-57582,0,0,2a1d35e4fc860c65eb8a4315ed1ba4c31f49b01c911d5b356fd3e8b7f891a8b3,2025-01-17T17:15:12.797000 CVE-2024-57583,0,0,a02bfc66fca0e321afc33c8ed95edf293ab0d78b8736a62da8c5a6dc7f2892d3,2025-01-22T16:53:20.263000 CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000 -CVE-2024-57590,0,1,468c69413bd6e8b154542bd7668e59449dcd31e5c13459bc4d0598be16b164ab,2025-01-28T20:15:55.973000 +CVE-2024-57590,0,0,468c69413bd6e8b154542bd7668e59449dcd31e5c13459bc4d0598be16b164ab,2025-01-28T20:15:55.973000 CVE-2024-57595,0,0,e945c5b3578d3dde99010919578995e95b82ad320cb57326cf2ce4ca0414d822,2025-01-27T16:15:31.613000 CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 @@ -275998,7 +276002,7 @@ CVE-2024-7988,0,0,d171cb4fd9af3657c3ce7424faeda8f9ac9cb76e63f8674e50a948949f457d CVE-2024-7989,0,0,cd26af6c9ba19e6a7e0856f5be7c1437b90e54abd28d7f811499d7cb8cc81786,2024-08-26T21:15:29.777000 CVE-2024-7991,0,0,3b6a42e11507e3c37be016f9dc0f628f1d93e122cd2a438d2e6e2c18db2a05f3,2024-11-01T16:26:17.797000 CVE-2024-7992,0,0,54cfc93da240f56575bb9e4fafff092d33bdde755f48b3a9608b09c9f5cadfa0,2024-11-01T16:26:35.113000 -CVE-2024-7993,0,0,10464f0bb5b3b5886d1c4ade05662ecbd193a197d0231dda4a209e169473577e,2024-10-21T18:27:01.950000 +CVE-2024-7993,0,1,852d516ac0b5df7254e7ea575e4b851416ce537bf6247c4aba855b611b890168,2025-01-28T21:15:18.117000 CVE-2024-7994,0,0,677bb0d3a07210a7d5902c83c522b3beb4ddf65c53dfa15f4ee3e8a6eb5c8b23,2024-10-21T18:35:55.397000 CVE-2024-7995,0,0,a8b278e923ed83ab90058edd8bf9d51cbec9eb8e7e1669b64ad19e97359b7962,2024-11-06T18:17:17.287000 CVE-2024-7998,0,0,5a96b2d058d8fa22c17d15139fb41166f629052179fc1be6b8add20fbdc8bcac,2024-12-03T19:15:13.330000 @@ -277894,7 +277898,7 @@ CVE-2025-0615,0,0,ebbe675921592ae8cbe2172db6e2765a464d273fff841eec1146e0ddf51f2d CVE-2025-0619,0,0,76104b7b24094ee59b4cec6d4f4ee7db8e2e97a6bfdfd21603079adfc8fdb2bd,2025-01-23T11:15:10.700000 CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000 CVE-2025-0625,0,0,7f36541620787f4bb57811d2ab5017a08dd72bab5c190081458ac3e7009d06f3,2025-01-22T19:15:10.397000 -CVE-2025-0631,1,1,3196a9fbde6d9168d64fe97245fb465de3553c9c773b397433d0b7598697488d,2025-01-28T19:15:14.270000 +CVE-2025-0631,0,0,3196a9fbde6d9168d64fe97245fb465de3553c9c773b397433d0b7598697488d,2025-01-28T19:15:14.270000 CVE-2025-0635,0,0,48e9501b358d6daac6b23f86a2f36310ca1507ac697731ba1d1365d13a451552,2025-01-23T11:15:10.890000 CVE-2025-0637,0,0,527088f0979b18ce444b6ef69464399256b011e8d9eae0913ca1205a9c4503aa,2025-01-23T16:15:36.617000 CVE-2025-0638,0,0,a6e4b77b7413b2b4aa2934053a70dffa8b1ba9dca4ba939faec1f3b554888d0d,2025-01-22T16:15:29.977000 @@ -277935,8 +277939,11 @@ CVE-2025-0752,0,0,1b42777fbab8f210bb46e72869b6d162494a92c3430459e509f1ea2dbae152 CVE-2025-0753,0,0,29a68c520c1ada30651b7f7625e23d6a168a36c3acded86be6c51a51e40dbdd7,2025-01-27T21:15:13.653000 CVE-2025-0754,0,0,21b0a16e61d630284d94dc77a57efde391026f0970f86dbbcd4b271b50d2d4d2,2025-01-28T10:15:09.697000 CVE-2025-0781,0,0,214a818c7c2b2293ca3062156b160496a04ecec4361de80f5717a7c9f099ef63,2025-01-28T17:15:25.947000 -CVE-2025-0783,1,1,3c77d3cfdf2201674ecbdede441dab5378dd73d2ccd0550d79b37d0ba4ece4d4,2025-01-28T19:15:14.410000 -CVE-2025-0784,1,1,a8c3e506115e968bf468e598a7692b89d7da0f46aee3c8c8a5b369bef734be1a,2025-01-28T20:15:56.230000 +CVE-2025-0783,0,0,3c77d3cfdf2201674ecbdede441dab5378dd73d2ccd0550d79b37d0ba4ece4d4,2025-01-28T19:15:14.410000 +CVE-2025-0784,0,0,a8c3e506115e968bf468e598a7692b89d7da0f46aee3c8c8a5b369bef734be1a,2025-01-28T20:15:56.230000 +CVE-2025-0785,1,1,2992afab5cf313550498ef84714c1e7ce64ba998bb955708bf5bf24ca107c2be,2025-01-28T22:15:16.227000 +CVE-2025-0786,1,1,6f511fdf24b161499607ed1af7269b33bd8c799131441e982437a286b62ed574,2025-01-28T22:15:16.423000 +CVE-2025-0787,1,1,b94bbfdae5956ccc142cc8bf5ad249ec2a3929865330e7b7c9d5f46a6f438eec,2025-01-28T22:15:16.600000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000 @@ -278305,7 +278312,7 @@ CVE-2025-22152,0,0,089f04aace28abfa88265f6c9c2782b5476de8a0e353916617123187c142e CVE-2025-22153,0,0,25942cbccd29909e1ea0be6d083f0e8cabc6b2b46ac2d218bce2acfdeffc85bf,2025-01-23T18:15:33.267000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 CVE-2025-22215,0,0,e26e39627ebf88fc4492196348e13c55563ef72a3b7150347ad788f5576b3be6,2025-01-08T15:15:21.927000 -CVE-2025-22217,1,1,feb391972c0b9cea12eac2644fa650dfd74fa775909a2be34ec05a7261c4fd8e,2025-01-28T19:15:14.640000 +CVE-2025-22217,0,0,feb391972c0b9cea12eac2644fa650dfd74fa775909a2be34ec05a7261c4fd8e,2025-01-28T19:15:14.640000 CVE-2025-22261,0,0,33a310cbc7efb685d95693f6e008875a8290fc5f9c6bce0cde03f1c0742bf7b7,2025-01-07T11:15:13.290000 CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000 CVE-2025-22264,0,0,79177f17455e861265910dfa8dd2caa5a78c248a179fa18c3179e839e36cde00,2025-01-23T16:15:37.257000 @@ -278611,13 +278618,14 @@ CVE-2025-22907,0,0,7f4df8d028c2fe44cc7562e2d8471c7b2f2133589b9f732904dbb3e904199 CVE-2025-22912,0,0,76a106dcfc3b15a68f41cb86af5f0bc6ce507166c1320e2c062df05ffbaedd44,2025-01-16T15:15:15.717000 CVE-2025-22913,0,0,3bc9600e263923113da087744ed3f4aa37ff9ee04dbfd0442bed480f8f497585,2025-01-16T15:15:15.903000 CVE-2025-22916,0,0,3b1c3cad59207b1adc896532af2f2e01463f789a6a5c3c67e9a5bc2566ececf1,2025-01-16T15:15:16.113000 +CVE-2025-22917,1,1,cceb121fc3141a273948bad5e011f82085a64955f68d8d363c22dab392705ce6,2025-01-28T22:15:16.770000 CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000 CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000 CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11ba78,2025-01-13T16:15:19.367000 CVE-2025-22964,0,0,7b43a22f35a1092582599b8d0a085880cf69a0a81631ab9d491f283c3453cad7,2025-01-23T21:15:14.900000 CVE-2025-22968,0,0,41c7a798ef1cac51f67409788e09403bf1c73ade164309e1bf03d8de0a22a69b,2025-01-16T16:15:35.917000 CVE-2025-22976,0,0,7635385bbb1168f03f689653f73812b5306e7c676072ca854591d831ffee9997,2025-01-15T23:15:10.783000 -CVE-2025-22980,0,0,df60c5ba231db3a8ab6989fdd2029f954bac79d598e3ef3761416d02952bcd79,2025-01-27T18:15:40.933000 +CVE-2025-22980,0,1,90bf7bf36cc737404c9d40dc6715966f270a478ee523b3c5a983294878d28120,2025-01-28T22:15:16.890000 CVE-2025-22983,0,0,3f91e33a7409029e8feb1969bf0fd19dc254a37fe16ab3c9358513b3c91fd751,2025-01-23T17:15:26.577000 CVE-2025-22984,0,0,79f7e0821d57086a5b30160c1ac3f4ee3a3942289c8274a9ca479dc29c59767f,2025-01-23T17:15:26.780000 CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000 @@ -279120,7 +279128,7 @@ CVE-2025-24131,0,0,492b4d07fecf4242d99445d22ec2b604c4752abdb9655e15b1f5b48aa5d3c CVE-2025-24134,0,0,27238626902f107163f836767722de11324242b7de9766f8bb0b3cd4757025b5,2025-01-28T16:15:42.780000 CVE-2025-24135,0,0,37ac14929adcc1c58b3cc68046a7e240d0be8c2e4cf8312f9a3c0faefe0605bc,2025-01-28T16:15:42.930000 CVE-2025-24136,0,0,d26fe55217fd6ef5dc1f9572dae6512c03ac3218ad54517efe699f2e84ee27cc,2025-01-27T22:15:18.340000 -CVE-2025-24137,0,1,04c64c426bacf16b84ebfa21934b389a675da3a154e1b710c9e3a0886823032f,2025-01-28T20:15:56.410000 +CVE-2025-24137,0,0,04c64c426bacf16b84ebfa21934b389a675da3a154e1b710c9e3a0886823032f,2025-01-28T20:15:56.410000 CVE-2025-24138,0,0,8ba7e2a460f500f479f243de8e5f463ca2f4161b2ff8b847e539449f56fe2683,2025-01-28T16:15:43.077000 CVE-2025-24139,0,0,d6c7fd3e2db2143c5e7584244c4444900037ff452b8e30271343396f1c3cbd36,2025-01-28T16:15:43.230000 CVE-2025-24140,0,0,64cd79c453bd015139aff243e9bda4d70b37899b275a2f0befe19b92cbbc635d,2025-01-27T22:15:18.710000 @@ -279134,14 +279142,14 @@ CVE-2025-24151,0,0,3b90ee302fbacfd0127254bdfe696d59abb92aacf4dcc8e99b49cae621366 CVE-2025-24152,0,0,9875511f91869e98c63cef2f35db10cd0155ee0f27be472f10837aa54dc5c773,2025-01-27T22:15:19.443000 CVE-2025-24153,0,0,59d669342a492b9d2d8a609c8e00e457983b611fbf4a79373f564b00b215da7e,2025-01-27T22:15:19.537000 CVE-2025-24154,0,0,c4623b888872e9bd806d6476f60723aca6e3e8ef47fe953b172a0b16a1c68fd1,2025-01-28T16:15:43.533000 -CVE-2025-24156,0,0,b31e860ae0f287a4e55d80ce5295e8b216141d9744778e55fcbf70961f9196e0,2025-01-27T22:15:19.710000 +CVE-2025-24156,0,1,fa2a466c11edf05a7c6f3e83d316724d46ff61cd4c8bf9cbb9507c6b0faaced6,2025-01-28T21:15:18.340000 CVE-2025-24158,0,0,b480328077e53e4161097a766fad1482b065ad3b58ae4ae456fb1fa65cdfa65c,2025-01-28T16:15:43.693000 CVE-2025-24159,0,0,e25599ac271888e49238b528ab28908bfa9393a8f6137edf8a25905c7d6c7a77,2025-01-28T16:15:43.843000 CVE-2025-24160,0,0,5cd3c10ec42e427ac539d98658330a74a29433ef6efe7d191efaf4206f615f9a,2025-01-28T16:15:44.003000 CVE-2025-24161,0,0,7f65dc99e7781432bd49455eaa73c8925a5877a6d13c71b03a8ba16d090afb3d,2025-01-27T22:15:20.083000 CVE-2025-24162,0,0,9cf81295cd6bd2a6dc3874c53712e03c0cb8ec582d8e812473c8041f4e6d5f29,2025-01-28T16:15:44.187000 CVE-2025-24163,0,0,ff21254150a2ff67a849e5cdc971468f1fbd7feadfbd74e9ad8839fc3fbc5d7f,2025-01-28T16:15:44.330000 -CVE-2025-24166,0,0,9ca035738a2e0b4c88133f181378b4ebabcfdd0e45c248150891735b95780aa9,2025-01-27T22:15:20.357000 +CVE-2025-24166,0,1,15edf859d475720db53f3f95ed8d575ade96a95f125f2377032600fe411e75ab,2025-01-28T22:15:17.080000 CVE-2025-24169,0,0,fbfdd654253f3994c874b40dfb221a6e1355c2dbace515b15a5c93f393bd01e2,2025-01-27T22:15:20.460000 CVE-2025-24174,0,0,be06ee7f489987d682aeeea47e1dd78afc2054cd3b573d5b857e79bdfbd28045,2025-01-28T16:15:44.490000 CVE-2025-24176,0,0,0a13e167281064295cb7d6ac3b662de69e357179cbe1fefabb03dbb784e50b69,2025-01-28T16:15:44.630000 @@ -279177,9 +279185,11 @@ CVE-2025-24458,0,0,03e16f621e1b9e4e70e73985609e6df9be85cc317385d52b463a59fae87dd CVE-2025-24459,0,0,c083202f8944227211ab4ec18f1b1811e261bceb2079bbb92a48c6e7c058d3bc,2025-01-21T18:15:18.890000 CVE-2025-24460,0,0,91287787f4d848d8e28c04d17a6364c6b1da8dd244cdf6af640fa2b8371b6e01,2025-01-21T18:15:19.067000 CVE-2025-24461,0,0,ad0935e17c290ba8ab95f02ea53cd2528798caff1030b0f8ad947dd515e65dfd,2025-01-21T18:15:19.260000 -CVE-2025-24478,1,1,489807abc8b3ac20963ab9718a91a7aef5527f911d78441ab168e0bbd3662f38,2025-01-28T19:15:14.777000 -CVE-2025-24479,1,1,5b17b976259e83197a8085e93f801f9d4ec374bab1cdd4bfcdb02db805fe2920,2025-01-28T19:15:14.910000 -CVE-2025-24480,1,1,6175dc6a2dc51becbf31db587b185fc0cf5ca4083049b1eeaefe14ce192b439b,2025-01-28T19:15:15.033000 +CVE-2025-24478,0,0,489807abc8b3ac20963ab9718a91a7aef5527f911d78441ab168e0bbd3662f38,2025-01-28T19:15:14.777000 +CVE-2025-24479,0,0,5b17b976259e83197a8085e93f801f9d4ec374bab1cdd4bfcdb02db805fe2920,2025-01-28T19:15:14.910000 +CVE-2025-24480,0,0,6175dc6a2dc51becbf31db587b185fc0cf5ca4083049b1eeaefe14ce192b439b,2025-01-28T19:15:15.033000 +CVE-2025-24481,1,1,d4c5f694be1964c793671f83858574d39267f41102637d90efe71d5e986d8cd1,2025-01-28T21:15:18.520000 +CVE-2025-24482,1,1,bffc5c2a6aec76e0e32e2e073e316933365710b3f1f42623c1fb53cca20472b6,2025-01-28T21:15:18.687000 CVE-2025-24529,0,0,659084d0f901a45c8b21d541729e6cc04c83a80a3825fa751f6337219739cf86,2025-01-23T06:15:27.710000 CVE-2025-24530,0,0,4a56bb568b6bd32a8936d0fb868cc9221851e3049a709c6787a03d46cd9e8858,2025-01-23T06:15:27.893000 CVE-2025-24533,0,0,7b36821849ab798d81c60afcd620ba9ed617eb480eb18f61a881f0c2f7c8a39d,2025-01-27T14:15:28.653000 @@ -279323,4 +279333,5 @@ CVE-2025-24783,0,0,16acaefd8445952b553e27b44c44e73c798d385c295acd08deef74497b7f7 CVE-2025-24800,0,0,92ce9341d9d5dcab9ec4de59a19d838c194a1a5ea345070b5216d35b2e3823ef,2025-01-28T16:15:45.063000 CVE-2025-24810,0,0,9aadcf7445dd03539c4634635be857a9e6e77ee72d1b60352718480c3867482c,2025-01-28T05:15:11.413000 CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000 +CVE-2025-24826,1,1,a7644a31e02355bb510bf7d19c7cfad2325be8f7fb1f39c773cd5bf91edd8ae9,2025-01-28T21:15:18.817000 CVE-2025-24858,0,0,d12649c9d5260ddeed993adcd8689bf34bfabe29dfc43567bb27e34f71ab98dd,2025-01-26T07:15:09.237000