diff --git a/CVE-2019/CVE-2019-108xx/CVE-2019-10891.json b/CVE-2019/CVE-2019-108xx/CVE-2019-10891.json index cca8d016451..12907ba6b74 100644 --- a/CVE-2019/CVE-2019-108xx/CVE-2019-10891.json +++ b/CVE-2019/CVE-2019-108xx/CVE-2019-10891.json @@ -2,7 +2,7 @@ "id": "CVE-2019-10891", "sourceIdentifier": "cve@mitre.org", "published": "2019-09-06T20:15:11.003", - "lastModified": "2025-01-06T15:15:09.593", + "lastModified": "2025-01-09T18:15:23.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47069.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47069.json index 0d995d7ff57..1aca12a8132 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47069.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47069.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47069", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-01T22:15:46.857", - "lastModified": "2024-11-21T06:35:18.510", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T18:21:01.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,120 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ipc/mqueue, msg, sem: evite confiar en una referencia de pila despu\u00e9s de su vencimiento do_mq_timedreceive llama a wq_sleep con una direcci\u00f3n local de pila. El remitente (do_mq_timedsend) usa esta direcci\u00f3n para luego llamar a pipelined_send. Esto conduce a una ejecuci\u00f3n muy dif\u00edcil de desencadenar en la que una llamada do_mq_timedreceive puede regresar y dejar que do_mq_timedsend dependa de una direcci\u00f3n no v\u00e1lida, lo que provoca el siguiente bloqueo: RIP: 0010:wake_q_add_safe+0x13/0x60 Seguimiento de llamadas: __x64_sys_mq_timedsend+0x2a9/0x490 do_syscall_64+0x80 /0x680 Entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f5928e40343 La ejecuci\u00f3n ocurre como: 1. do_mq_timedreceive llama a wq_sleep con la direcci\u00f3n de `struct ext_wait_queue` en la pila de funciones (alias `ewq_addr` aqu\u00ed): contiene una `struct ext_wait_queue * v\u00e1lida ` siempre y cuando la pila no haya sido sobrescrita. 2. `ewq_addr` se agrega a info->e_wait_q[RECV].list en wq_add, y do_mq_timedsend lo recibe a trav\u00e9s de wq_get_first_waiter(info, RECV) para llamar a __pipelined_op. 3. El remitente llama a __pipelined_op::smp_store_release(&this->state, STATE_READY). Aqu\u00ed es donde comienza la ventana de ejecuci\u00f3n. (`esto` es `ewq_addr`.) 4. Si el receptor se activa ahora en do_mq_timedreceive::wq_sleep, ver\u00e1 `state == STATE_READY` y se interrumpir\u00e1. 5. do_mq_timedreceive regresa y ya no se garantiza que `ewq_addr` sea una `struct ext_wait_queue *` ya que estaba en la pila de do_mq_timedreceive. (Aunque es posible que la direcci\u00f3n no se sobrescriba hasta que otra funci\u00f3n la toque, lo que significa que puede persistir por un tiempo indefinido). 6. do_mq_timedsend::__pipelined_op() todav\u00eda cree que `ewq_addr` es una `struct ext_wait_queue *`, y lo usa para encontrar una task_struct para pasar a la llamada wake_q_add_safe. En el afortunado caso de que nada haya sobrescrito `ewq_addr` todav\u00eda, `ewq_addr->task` es la estructura de tarea correcta. En el desafortunado caso, __pipelined_op::wake_q_add_safe recibe una direcci\u00f3n falsa como la task_struct del receptor que causa el bloqueo. do_mq_timedsend::__pipelined_op() no debe eliminar la referencia a \"esto\" despu\u00e9s de configurar STATE_READY, ya que la contraparte del receptor ahora puede regresar. Cambie __pipelined_op para llamar a wake_q_add_safe en el task_struct del receptor devuelto por get_task_struct, en lugar de desreferenciar \"this\" que se encuentra en la pila del receptor. Como se\u00f1al\u00f3 Manfred, la ejecuci\u00f3n tambi\u00e9n existe potencialmente en ipc/msg.c::expunge_all e ipc/sem.c::wake_up_sem_queue_prepare. Arr\u00e9glelos de la misma manera." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-672" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.6", + "versionEndExcluding": "5.10.40", + "matchCriteriaId": "CC04C860-B3F3-4630-B20D-99BEA8F2A42A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.7", + "matchCriteriaId": "E8F2CE30-38B0-4716-B12B-A139B0F9C5C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4528c0c323085e645b8765913b4a7fd42cf49b65", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/807fa14536b26803b858da878b643be72952a097", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a11ddb37bf367e6b5239b95ca759e5389bb46048", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4528c0c323085e645b8765913b4a7fd42cf49b65", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/807fa14536b26803b858da878b643be72952a097", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a11ddb37bf367e6b5239b95ca759e5389bb46048", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-370xx/CVE-2022-37056.json b/CVE-2022/CVE-2022-370xx/CVE-2022-37056.json index d78ee40c7eb..b4dfedb7866 100644 --- a/CVE-2022/CVE-2022-370xx/CVE-2022-37056.json +++ b/CVE-2022/CVE-2022-370xx/CVE-2022-37056.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37056", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-28T17:15:08.413", - "lastModified": "2025-01-06T15:15:09.993", + "lastModified": "2025-01-09T18:15:24.797", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1945.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1945.json index f814ed80c57..26a2c58cc34 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1945.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1945.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1945", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:10.493", - "lastModified": "2024-11-21T07:40:12.070", + "lastModified": "2025-01-09T17:15:08.213", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-239xx/CVE-2023-23913.json b/CVE-2023/CVE-2023-239xx/CVE-2023-23913.json index 05b4f57776f..c7868121580 100644 --- a/CVE-2023/CVE-2023-239xx/CVE-2023-23913.json +++ b/CVE-2023/CVE-2023-239xx/CVE-2023-23913.json @@ -2,16 +2,55 @@ "id": "CVE-2023-23913", "sourceIdentifier": "support@hackerone.com", "published": "2025-01-09T01:15:07.257", - "lastModified": "2025-01-09T01:15:07.257", + "lastModified": "2025-01-09T18:15:24.993", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a potential DOM based cross-site scripting issue in rails-ujs which leverages the Clipboard API to target HTML elements that are assigned the contenteditable attribute. This has the potential to occur when pasting malicious HTML content from the clipboard that includes a data-method, data-remote or data-disable-with attribute." + }, + { + "lang": "es", + "value": "Existe un problema potencial de Cross-Site Scripting basado en DOM en rails-ujs que aprovecha la API del portapapeles para apuntar a elementos HTML a los que se les asigna el atributo contenteditable. Esto puede ocurrir al pegar contenido HTML malicioso desde el portapapeles que incluye un atributo data-method, data-remote o data-disable-with." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033263", diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28159.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28159.json index 6e5a6ce93e8..cc2c3fd8a2f 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28159.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28159.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28159", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:12.033", - "lastModified": "2024-11-21T07:54:30.473", + "lastModified": "2025-01-09T17:15:09.523", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] } ], "configurations": [ @@ -103,6 +133,15 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1783561", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking", + "Permissions Required", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29722.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29722.json index e9268dd400a..6ec49a2000f 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29722.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29722.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29722", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T21:15:09.360", - "lastModified": "2024-11-21T07:57:25.073", + "lastModified": "2025-01-09T18:15:25.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29723.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29723.json index ae4ba2b67d3..ddf0f30cf89 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29723.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29723.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29723", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T21:15:09.407", - "lastModified": "2024-11-21T07:57:25.203", + "lastModified": "2025-01-09T18:15:25.333", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29736.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29736.json index 8e9255ae89c..d099b234b7f 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29736.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29736.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29736", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T21:15:09.450", - "lastModified": "2024-11-21T07:57:26.743", + "lastModified": "2025-01-09T18:15:25.493", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29748.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29748.json index 85cb7cb8e28..570b79d2f4f 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29748.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29748.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29748", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T03:15:20.500", - "lastModified": "2024-11-21T07:57:28.317", + "lastModified": "2025-01-09T18:15:25.667", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2977.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2977.json index 3b8982618dd..2819248bef0 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2977.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2977.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2977", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-01T01:15:17.917", - "lastModified": "2024-11-21T07:59:40.960", + "lastModified": "2025-01-09T18:15:25.850", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, diff --git a/CVE-2023/CVE-2023-307xx/CVE-2023-30758.json b/CVE-2023/CVE-2023-307xx/CVE-2023-30758.json index 5066ae61cef..4f873a30639 100644 --- a/CVE-2023/CVE-2023-307xx/CVE-2023-30758.json +++ b/CVE-2023/CVE-2023-307xx/CVE-2023-30758.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30758", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-01T02:15:09.847", - "lastModified": "2024-11-21T08:00:50.750", + "lastModified": "2025-01-09T18:15:26.083", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-334xx/CVE-2023-33461.json b/CVE-2023/CVE-2023-334xx/CVE-2023-33461.json index 18c18e8f532..79e5a215140 100644 --- a/CVE-2023/CVE-2023-334xx/CVE-2023-33461.json +++ b/CVE-2023/CVE-2023-334xx/CVE-2023-33461.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33461", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T03:15:20.547", - "lastModified": "2024-11-21T08:05:35.730", + "lastModified": "2025-01-09T17:15:09.730", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33544.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33544.json index d613d77b571..4310d6ea712 100644 --- a/CVE-2023/CVE-2023-335xx/CVE-2023-33544.json +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33544.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33544", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T13:15:10.637", - "lastModified": "2024-11-21T08:05:41.690", + "lastModified": "2025-01-09T17:15:09.997", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33552.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33552.json index f30afdca8b5..c739d0a7581 100644 --- a/CVE-2023/CVE-2023-335xx/CVE-2023-33552.json +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33552.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33552", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T15:15:09.163", - "lastModified": "2024-11-21T08:05:42.310", + "lastModified": "2025-01-09T17:15:10.250", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33716.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33716.json index 82337f552d9..3d70ba52c81 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33716.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33716.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33716", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T03:15:20.590", - "lastModified": "2024-11-21T08:05:53.460", + "lastModified": "2025-01-09T18:15:26.273", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-401" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33719.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33719.json index 31ecc232c5f..9a33d55472c 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33719.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33719.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33719", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T03:15:20.630", - "lastModified": "2024-11-21T08:05:53.927", + "lastModified": "2025-01-09T18:15:26.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-401" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33754.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33754.json index 8c254b803c7..6ef9e7c8b5e 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33754.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33754.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33754", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T20:15:09.467", - "lastModified": "2024-11-21T08:05:56.947", + "lastModified": "2025-01-09T17:15:10.470", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-307" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33764.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33764.json index b3caf2b7800..d3378cab31a 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33764.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33764.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33764", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T20:15:09.523", - "lastModified": "2024-11-21T08:05:58.363", + "lastModified": "2025-01-09T18:15:26.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33778.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33778.json index e6cbda9438e..35b9954fea3 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33778.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33778.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33778", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T04:15:10.313", - "lastModified": "2024-11-21T08:05:58.853", + "lastModified": "2025-01-09T18:15:26.790", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34312.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34312.json index 01496cf0e95..d697ef9115e 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34312.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34312.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34312", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T03:15:20.673", - "lastModified": "2024-11-21T08:06:59.357", + "lastModified": "2025-01-09T17:15:10.757", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-763" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-763" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-480xx/CVE-2023-48082.json b/CVE-2023/CVE-2023-480xx/CVE-2023-48082.json index a474ad876ae..0097b6621b4 100644 --- a/CVE-2023/CVE-2023-480xx/CVE-2023-48082.json +++ b/CVE-2023/CVE-2023-480xx/CVE-2023-48082.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48082", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T19:15:10.780", - "lastModified": "2024-10-25T17:15:03.903", + "lastModified": "2025-01-09T18:15:27.130", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,30 +15,7 @@ "value": "Se descubri\u00f3 que Nagios XI anterior a 5.11.3 2024R1 manejaba incorrectamente la generaci\u00f3n de claves API (generadas aleatoriamente), lo que permit\u00eda a los atacantes generar posiblemente el mismo conjunto de claves API para todos los usuarios y utilizarlas para autenticarse." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", - "baseScore": 9.1, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.2 - } - ] - }, + "metrics": {}, "references": [ { "url": "https://www.nagios.com/change-log/", diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49275.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49275.json index 1a9de125887..8615c5bdb32 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49275.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49275.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49275", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-19T15:15:49.847", - "lastModified": "2024-11-21T08:33:09.917", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-09T17:42:46.960", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,32 +69,81 @@ "value": "CWE-476" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2.0", + "versionEndExcluding": "4.7.1", + "matchCriteriaId": "1423F835-4122-4332-85F6-B66CADB156DB" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1573", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1578", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-4mq7-w9r6-9975", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1573", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1578", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-4mq7-w9r6-9975", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50260.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50260.json index 7ab7d784833..3cc73211314 100644 --- a/CVE-2023/CVE-2023-502xx/CVE-2023-50260.json +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50260.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50260", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-19T15:15:50.040", - "lastModified": "2024-11-21T08:36:46.290", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-09T17:41:36.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,53 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.0", + "versionEndExcluding": "4.7.2", + "matchCriteriaId": "A4731D6B-7AF2-4064-8D9B-792314DD0940" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-mjq2-xf8g-68vw", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-mjq2-xf8g-68vw", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10466.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10466.json index 4cfcacf5da1..8e23ef16520 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10466.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10466.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10466", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-29T13:15:04.273", - "lastModified": "2024-11-04T13:29:51.947", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-09T18:15:27.253", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,26 +36,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 } ] }, @@ -69,16 +49,6 @@ "value": "NVD-CWE-noinfo" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-89" - } - ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10525.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10525.json index 510800587b9..c94210b6925 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10525.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10525.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10525", "sourceIdentifier": "emo@eclipse.org", "published": "2024-10-30T12:15:02.787", - "lastModified": "2024-11-01T12:57:03.417", + "lastModified": "2025-01-09T18:15:27.403", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,28 +59,6 @@ "providerUrgency": "NOT_DEFINED" } } - ], - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", - "baseScore": 9.1, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.2 - } ] }, "weaknesses": [ diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10917.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10917.json index 7a42caee217..8f125441bbe 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10917.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10917.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10917", "sourceIdentifier": "emo@eclipse.org", "published": "2024-11-11T17:15:04.203", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T18:08:16.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,20 +69,60 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eclipse:openj9:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.8.0", + "versionEndExcluding": "0.48.0", + "matchCriteriaId": "FCC7DE02-3642-44C5-BBA7-81914AB315E6" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/eclipse-openj9/openj9/pull/20362", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/eclipse-openj9/openj9/releases/tag/openj9-0.48.0", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/47", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11614.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11614.json index 441958dc3b9..80d7bb39e83 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11614.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11614.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11614", "sourceIdentifier": "secalert@redhat.com", "published": "2024-12-18T09:15:06.660", - "lastModified": "2025-01-09T16:15:35.980", + "lastModified": "2025-01-09T17:15:10.980", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -64,6 +64,18 @@ "url": "https://access.redhat.com/errata/RHSA-2025:0210", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:0220", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:0221", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:0222", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-11614", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1289.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1289.json index 053f9005a9a..f40e37c02c5 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1289.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1289.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1289", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:15.990", - "lastModified": "2024-11-21T08:50:14.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T17:41:10.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.2.6.4", + "matchCriteriaId": "3A49C601-BDD9-4F3D-9159-6617A460BFD9" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042945%40learnpress%2Ftags%2F4.2.6.3&new=3061851%40learnpress%2Ftags%2F4.2.6.4", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0c410d91-08cc-496d-9c8e-c57f107399da?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042945%40learnpress%2Ftags%2F4.2.6.3&new=3061851%40learnpress%2Ftags%2F4.2.6.4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0c410d91-08cc-496d-9c8e-c57f107399da?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13191.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13191.json index a30fec06803..95d02df0da7 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13191.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13191.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13191", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T23:15:08.807", - "lastModified": "2025-01-08T23:15:08.807", + "lastModified": "2025-01-09T17:15:11.267", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in ZeroWdd myblog 1.0. This issue affects the function upload of the file src/main/java/com/wdd/myblog/controller/admin/uploadController.java. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en ZeroWdd myblog 1.0. Este problema afecta a la funci\u00f3n de carga del archivo src/main/java/com/wdd/myblog/controller/admin/uploadController.java. La manipulaci\u00f3n del archivo de argumentos provoca una carga sin restricciones. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,14 @@ { "url": "https://vuldb.com/?submit.469229", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ZeroWdd/myblog/issues/3", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://github.com/ZeroWdd/myblog/issues/3#issue-2759839215", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13192.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13192.json index 261a8789b09..f52dc7190c1 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13192.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13192.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13192", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T23:15:09.017", - "lastModified": "2025-01-08T23:15:09.017", + "lastModified": "2025-01-09T17:15:11.420", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in ZeroWdd myblog 1.0. Affected is the function update of the file src/main/java/com/wdd/myblog/controller/admin/BlogController.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "En ZeroWdd myblog 1.0 se ha detectado una vulnerabilidad clasificada como problem\u00e1tica. La funci\u00f3n de actualizaci\u00f3n del archivo src/main/java/com/wdd/myblog/controller/admin/BlogController.java se ve afectada. La manipulaci\u00f3n provoca ataques de cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.469232", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ZeroWdd/myblog/issues/4", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13193.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13193.json index 515b245944c..d6615ff6a0e 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13193.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13193.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13193", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T23:15:09.220", - "lastModified": "2025-01-08T23:15:09.220", + "lastModified": "2025-01-09T17:15:11.553", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in SEMCMS up to 4.8 and classified as critical. Affected by this vulnerability is an unknown functionality of the file SEMCMS_Images.php of the component Image Library Management Page. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en SEMCMS hasta la versi\u00f3n 4.8 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo SEMCMS_Images.php del componente Image Library Management Page. La manipulaci\u00f3n conduce a una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.469563", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Upgradeextension/SEMCMS/blob/main/README.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13194.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13194.json index ae4f56f654f..ab6f506dfbf 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13194.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13194.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13194", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T00:15:25.357", - "lastModified": "2025-01-09T00:15:25.357", + "lastModified": "2025-01-09T17:15:11.690", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Sucms 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/admin_members.php?ac=search. The manipulation of the argument uid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Sucms 1.0 y se clasific\u00f3 como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /admin/admin_members.php?ac=search. La manipulaci\u00f3n del argumento uid conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.469566", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Upgradeextension/Sucms-v1.0SQLinjection/blob/main/README.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13195.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13195.json index c1e1f727e91..f478bfdb244 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13195.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13195.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13195", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T00:15:25.570", - "lastModified": "2025-01-09T00:15:25.570", + "lastModified": "2025-01-09T17:15:11.827", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in donglight bookstore\u7535\u5546\u4e66\u57ce\u7cfb\u7edf\u8bf4\u660e 1.0.0. It has been classified as critical. This affects the function getHtml of the file src/main/java/org/zdd/bookstore/rawl/HttpUtil.java. The manipulation of the argument url leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en donglight bookstore???????? 1.0.0. Se ha clasificado como cr\u00edtica. Afecta a la funci\u00f3n getHtml del archivo src/main/java/org/zdd/bookstore/rawl/HttpUtil.java. La manipulaci\u00f3n del argumento url conduce a server-side request forgery. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,14 @@ { "url": "https://vuldb.com/?submit.469689", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/donglight/bookstore/issues/11", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://github.com/donglight/bookstore/issues/11#issue-2760929273", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13196.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13196.json index 0d37c3cb7b5..32446365fc1 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13196.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13196.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13196", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T00:15:25.760", - "lastModified": "2025-01-09T00:15:25.760", + "lastModified": "2025-01-09T17:15:11.957", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in donglight bookstore\u7535\u5546\u4e66\u57ce\u7cfb\u7edf\u8bf4\u660e 1.0.0. It has been declared as problematic. This vulnerability affects the function BookSearchList of the file src/main/java/org/zdd/bookstore/web/controller/BookInfoController.java. The manipulation of the argument keywords leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en donglight bookstore???????? 1.0.0. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n BookSearchList del archivo src/main/java/org/zdd/bookstore/web/controller/BookInfoController.java. La manipulaci\u00f3n de las palabras clave del argumento provoca cross site scripting. El ataque se puede iniciar de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse." } ], "metrics": { @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,14 @@ { "url": "https://vuldb.com/?submit.469771", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/donglight/bookstore/issues/12", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://github.com/donglight/bookstore/issues/12#issue-2760934170", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13202.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13202.json index 6fac8ca5f7c..27238cbe16b 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13202.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13202.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13202", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T03:15:24.220", - "lastModified": "2025-01-09T03:15:24.220", + "lastModified": "2025-01-09T17:15:12.110", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in wander-chu SpringBoot-Blog 1.0 and classified as problematic. This issue affects the function modifiyArticle of the file src/main/java/com/my/blog/website/controller/admin/PageController.java of the component Blog Article Handler. The manipulation of the argument content leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en wander-chu SpringBoot-Blog 1.0 y se ha clasificado como problem\u00e1tica. Este problema afecta a la funci\u00f3n modifiyArticle del archivo src/main/java/com/my/blog/website/controller/admin/PageController.java del componente Blog Article Handler. La manipulaci\u00f3n del contenido del argumento provoca cross site scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.470914", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wander-chu/SpringBoot-Blog/issues/7#issue-2761643235", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13203.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13203.json index 305b7fbf830..81c8f6befbb 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13203.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13203.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13203", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T03:15:24.410", - "lastModified": "2025-01-09T03:15:24.410", + "lastModified": "2025-01-09T17:15:12.280", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in kurniaramadhan E-Commerce-PHP 1.0. It has been classified as problematic. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en kurniaramadhan E-Commerce-PHP 1.0. Se ha clasificado como problem\u00e1tica. Se trata de una funci\u00f3n desconocida. La manipulaci\u00f3n conduce a cross-site request forgery. Es posible lanzar el ataque de forma remota. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +136,10 @@ { "url": "https://www.websecurityinsights.my.id/2024/12/ecommerce-php-by-kurniaramadhan-sql.html?m=1", "source": "cna@vuldb.com" + }, + { + "url": "https://www.websecurityinsights.my.id/2024/12/ecommerce-php-by-kurniaramadhan-sql.html?m=1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1463.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1463.json index d3039d1b2d9..9314c958256 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1463.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1463.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1463", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:17.540", - "lastModified": "2024-11-21T08:50:38.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T17:37:21.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 1.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.2.6.4", + "matchCriteriaId": "3A49C601-BDD9-4F3D-9159-6617A460BFD9" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042945%40learnpress%2Ftags%2F4.2.6.3&new=3061851%40learnpress%2Ftags%2F4.2.6.4", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/abb4b617-884b-4e72-812f-5f23a0976ab6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042945%40learnpress%2Ftags%2F4.2.6.3&new=3061851%40learnpress%2Ftags%2F4.2.6.4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/abb4b617-884b-4e72-812f-5f23a0976ab6?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21652.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21652.json index 70a5285b469..5c8e0ac1b10 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21652.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21652.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21652", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-18T18:15:09.697", - "lastModified": "2024-11-21T08:54:48.430", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-09T17:07:47.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,64 @@ "value": "CWE-307" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.8.13", + "matchCriteriaId": "6312AE1F-68E1-4B95-952B-BCFA03CCC7AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.9.0", + "versionEndExcluding": "2.9.9", + "matchCriteriaId": "89CCBDB3-E3A5-4529-9483-556AE5F93775" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.10.0", + "versionEndExcluding": "2.10.4", + "matchCriteriaId": "5FD6C646-5A70-42B0-A92A-DEB525C09A64" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-x32m-mvfj-52xv", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-x32m-mvfj-52xv", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21661.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21661.json index 96921bf3542..ebdb7475085 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21661.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21661.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21661", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-18T19:15:06.687", - "lastModified": "2024-11-21T08:54:49.030", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-09T17:09:38.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,48 +69,122 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.8.13", + "matchCriteriaId": "6312AE1F-68E1-4B95-952B-BCFA03CCC7AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.9.0", + "versionEndExcluding": "2.9.9", + "matchCriteriaId": "89CCBDB3-E3A5-4529-9483-556AE5F93775" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.10.0", + "versionEndExcluding": "2.10.4", + "matchCriteriaId": "5FD6C646-5A70-42B0-A92A-DEB525C09A64" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/argoproj/argo-cd/blob/54601c8fd30b86a4c4b7eb449956264372c8bde0/util/session/sessionmanager.go#L302-L311", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/2a22e19e06aaf6a1e734443043310a66c234e345", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/5bbb51ab423f273dda74ab956469843d2db2e208", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/ce04dc5c6f6e92033221ec6d96b74403b065ca8b", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-6v85-wr92-q4p7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/argoproj/argo-cd/blob/54601c8fd30b86a4c4b7eb449956264372c8bde0/util/session/sessionmanager.go#L302-L311", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/2a22e19e06aaf6a1e734443043310a66c234e345", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/5bbb51ab423f273dda74ab956469843d2db2e208", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/ce04dc5c6f6e92033221ec6d96b74403b065ca8b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-6v85-wr92-q4p7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21662.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21662.json index 988755d0010..948525d4334 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21662.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21662.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21662", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-18T19:15:06.870", - "lastModified": "2024-11-21T08:54:49.157", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-09T17:13:17.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -49,48 +69,122 @@ "value": "CWE-307" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.8.13", + "matchCriteriaId": "6312AE1F-68E1-4B95-952B-BCFA03CCC7AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.9.0", + "versionEndExcluding": "2.9.9", + "matchCriteriaId": "89CCBDB3-E3A5-4529-9483-556AE5F93775" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.10.0", + "versionEndExcluding": "2.10.4", + "matchCriteriaId": "5FD6C646-5A70-42B0-A92A-DEB525C09A64" + } + ] + } + ] } ], "references": [ { "url": "https://argo-cd.readthedocs.io/en/stable/security_considerations/#cve-2020-8827-insufficient-anti-automationanti-brute-force", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/17b0df1168a4c535f6f37e95f25ed7cd81e1fa4d", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/6e181d72b31522f886a2afa029d5b26d7912ec7b", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/cebb6538f7944c87ca2fecb5d17f8baacc431456", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2vgg-9h6w-m454", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://argo-cd.readthedocs.io/en/stable/security_considerations/#cve-2020-8827-insufficient-anti-automationanti-brute-force", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/17b0df1168a4c535f6f37e95f25ed7cd81e1fa4d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/6e181d72b31522f886a2afa029d5b26d7912ec7b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/cebb6538f7944c87ca2fecb5d17f8baacc431456", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2vgg-9h6w-m454", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2181.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2181.json index dd954c5508c..f083066ac0a 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2181.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2181.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2181", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:28.957", - "lastModified": "2024-11-21T09:09:12.207", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-09T17:23:38.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpzoom:beaver_builder_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.5", + "matchCriteriaId": "3AD967ED-D8DA-4DA1-99A3-D4385C2264E6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6baa44c7-1c13-45ad-9fb5-da06933f3cd0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6baa44c7-1c13-45ad-9fb5-da06933f3cd0?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2183.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2183.json index 242cebeb28d..d776f07959d 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2183.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2183.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2183", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:29.127", - "lastModified": "2024-11-21T09:09:12.500", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-09T17:18:25.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpzoom:beaver_builder_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.5", + "matchCriteriaId": "3AD967ED-D8DA-4DA1-99A3-D4385C2264E6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/781987af-3753-46ec-9d56-fb8b6ef42277?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/781987af-3753-46ec-9d56-fb8b6ef42277?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2187.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2187.json index 4f4172b4daf..fa8238fd5a9 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2187.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2187.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2187", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:29.627", - "lastModified": "2024-11-21T09:09:13.087", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-09T17:06:43.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpzoom:beaver_builder_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.5", + "matchCriteriaId": "3AD967ED-D8DA-4DA1-99A3-D4385C2264E6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/02fceb91-7691-4629-b18b-57959e9f3f62?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3046905/wpzoom-addons-for-beaver-builder", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/02fceb91-7691-4629-b18b-57959e9f3f62?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2201.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2201.json index f6ebe5b4caa..35a51a9545c 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2201.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2201.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2201", "sourceIdentifier": "cret@cert.org", "published": "2024-12-19T21:15:08.103", - "lastModified": "2024-12-19T21:15:08.103", + "lastModified": "2025-01-09T17:15:12.423", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Una vulnerabilidad de cross-privilege en Spectre v2 permite a los atacantes eludir todas las mitigaciones implementadas, incluida la reciente Fine (IBT), y filtrar memoria arbitraria del kernel de Linux en sistemas Intel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/09/15", diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2492.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2492.json index 912a02be3c9..7ba16fbcb0d 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2492.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2492.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2492", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:34.350", - "lastModified": "2024-11-21T09:09:52.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T17:01:54.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ideabox:powerpack_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.19", + "matchCriteriaId": "CD3979F8-819D-4DE3-93BE-DA26C30F856F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3059841/powerpack-lite-for-elementor", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/11386b6a-632c-451a-b726-846f74b6f42d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3059841/powerpack-lite-for-elementor", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/11386b6a-632c-451a-b726-846f74b6f42d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27299.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27299.json index 0384dd96196..21dc3849a17 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27299.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27299.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27299", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:57.563", - "lastModified": "2024-11-21T09:04:16.593", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T17:27:11.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,32 +69,79 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "99BD7923-9316-46E2-B3C4-33105AD9E901" + } + ] + } + ] } ], "references": [ { "url": "https://drive.google.com/drive/folders/1BFL8GHIBxSUxu0TneYf66KjFA0A4RZga?usp=sharing", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/commit/1b68a5f89fb65996c56285fa636b818de8608011", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-qgxx-4xv5-6hcw", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://drive.google.com/drive/folders/1BFL8GHIBxSUxu0TneYf66KjFA0A4RZga?usp=sharing", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/commit/1b68a5f89fb65996c56285fa636b818de8608011", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-qgxx-4xv5-6hcw", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27300.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27300.json index e11f9f2ebf7..2be31f65b75 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27300.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27300.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27300", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:57.807", - "lastModified": "2024-11-21T09:04:16.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T17:16:12.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,32 +69,79 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "99BD7923-9316-46E2-B3C4-33105AD9E901" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/thorsten/phpMyFAQ/commit/09336b0ff0e0a04aa0c97c5975651af4769d2459", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/commit/de90315c9bd4ead5fe6ba5586f6b016843aa8209", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-q7g6-xfh2-vhpx", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/commit/09336b0ff0e0a04aa0c97c5975651af4769d2459", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/commit/de90315c9bd4ead5fe6ba5586f6b016843aa8209", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-q7g6-xfh2-vhpx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28105.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28105.json index 03da15318e2..2b2a5f3f1a1 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28105.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28105.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28105", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:58.020", - "lastModified": "2024-11-21T09:05:49.490", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T17:14:59.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,24 +69,65 @@ "value": "CWE-434" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "99BD7923-9316-46E2-B3C4-33105AD9E901" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/thorsten/phpMyFAQ/commit/9136883776af67dfdb0e8cf14f5e0ca22bf4f2e7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-pwh2-fpfr-x5gf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/commit/9136883776af67dfdb0e8cf14f5e0ca22bf4f2e7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-pwh2-fpfr-x5gf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28106.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28106.json index 1b92a302608..4147d7c903d 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28106.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28106.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28106", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:58.263", - "lastModified": "2024-11-21T09:05:49.623", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T17:30:11.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,24 +69,65 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "99BD7923-9316-46E2-B3C4-33105AD9E901" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/thorsten/phpMyFAQ/commit/c94b3deadd87789389e1fad162bc3dd595c0e15a", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6p68-36m6-392r", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/commit/c94b3deadd87789389e1fad162bc3dd595c0e15a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6p68-36m6-392r", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28107.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28107.json index 9fe6ff230df..924340402d9 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28107.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28107.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28107", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:58.477", - "lastModified": "2024-11-21T09:05:49.743", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T17:01:02.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,24 +69,65 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "99BD7923-9316-46E2-B3C4-33105AD9E901" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/thorsten/phpMyFAQ/commit/d0fae62a72615d809e6710861c1a7f67ac893007", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-2grw-mc9r-822r", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/commit/d0fae62a72615d809e6710861c1a7f67ac893007", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-2grw-mc9r-822r", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28108.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28108.json index b5eeb8c23da..ca6a71b5298 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28108.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28108.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28108", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-25T19:15:58.700", - "lastModified": "2024-11-21T09:05:49.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T17:00:12.770", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -53,24 +73,65 @@ "value": "CWE-80" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpmyfaq:phpmyfaq:3.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "99BD7923-9316-46E2-B3C4-33105AD9E901" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/thorsten/phpMyFAQ/commit/4fed1d9602f0635260f789fe85995789d94d6634", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-48vw-jpf8-hwqh", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/commit/4fed1d9602f0635260f789fe85995789d94d6634", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-48vw-jpf8-hwqh", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28175.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28175.json index 77d9ae416ea..f772508b55b 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28175.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28175.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28175", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T21:16:00.570", - "lastModified": "2024-11-21T09:05:57.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-09T17:05:59.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,24 +69,79 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "2.8.12", + "matchCriteriaId": "E0393269-E1BA-4E3B-9A76-6EECFD36FDA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.9.0", + "versionEndExcluding": "2.9.8", + "matchCriteriaId": "CFDD1F75-11BA-4CB4-BAD8-7A2DC23339D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.10.0", + "versionEndExcluding": "2.10.3", + "matchCriteriaId": "91F1733A-B8C1-4676-96B5-C9EF16E9C23B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/argoproj/argo-cd/commit/479b5544b57dc9ef767d49f7003f39602c480b71", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-jwv5-8mqv-g387", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/479b5544b57dc9ef767d49f7003f39602c480b71", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-jwv5-8mqv-g387", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29020.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29020.json index 8815837ca13..cbdaa3a4b5c 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29020.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29020.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29020", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-29T15:15:11.437", - "lastModified": "2024-11-21T09:07:23.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T17:20:18.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-639" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.10.6", + "matchCriteriaId": "07104EF2-D3BA-4E56-95DB-23114EF726F7" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7mqc-23hr-cr62", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7mqc-23hr-cr62", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29024.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29024.json index f0dacded9f6..e58e9e85ae2 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29024.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29024.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29024", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-29T15:15:11.707", - "lastModified": "2024-11-21T09:07:23.763", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T17:32:54.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-639" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.10.6", + "matchCriteriaId": "07104EF2-D3BA-4E56-95DB-23114EF726F7" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-8wqm-rfc7-q27q", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-8wqm-rfc7-q27q", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29201.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29201.json index eba8cad0512..60d32f1b3fb 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29201.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29201.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29201", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-29T15:15:11.963", - "lastModified": "2024-11-21T09:07:47.373", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T17:27:57.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 } ] }, @@ -49,16 +69,53 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.10.7", + "matchCriteriaId": "5D9BDDB1-9645-419E-A682-7693BC8A7141" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-pjpp-cm9x-6rwj", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-pjpp-cm9x-6rwj", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29202.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29202.json index b3a9884d5f4..7dc86a18a96 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29202.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29202.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29202", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-29T15:15:12.223", - "lastModified": "2024-11-21T09:07:48.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T17:25:13.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 } ] }, @@ -49,16 +69,53 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.10.7", + "matchCriteriaId": "5D9BDDB1-9645-419E-A682-7693BC8A7141" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-2vvr-vmvx-73ch", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-2vvr-vmvx-73ch", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30262.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30262.json index 5a40ad6015a..46757776bdd 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30262.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30262.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30262", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-09T17:16:02.850", - "lastModified": "2024-11-21T09:11:34.673", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-09T17:51:27.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 } ] }, @@ -53,24 +73,64 @@ "value": "CWE-613" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.13.40", + "matchCriteriaId": "481B6B86-03CA-4612-99A8-18381D0E16F2" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30962.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30962.json index 11bc26e4b4d..a503a1db433 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30962.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30962.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30962", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-05T23:15:05.147", - "lastModified": "2024-12-18T17:44:24.507", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-09T17:15:12.600", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31278.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31278.json index 8104d5c23a0..1b0a53e4bfc 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31278.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31278.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31278", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-10T16:15:13.483", - "lastModified": "2024-11-21T09:13:10.977", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T17:15:33.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.10.22", + "matchCriteriaId": "576A3771-51C0-4EED-885B-502161566B2C" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/premium-addons-for-elementor/wordpress-premium-addons-for-elementor-plugin-4-10-22-sensitive-data-exposure-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/premium-addons-for-elementor/wordpress-premium-addons-for-elementor-plugin-4-10-22-sensitive-data-exposure-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31988.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31988.json index 293f252a9a7..6c97cb279fa 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31988.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31988.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31988", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T21:15:07.297", - "lastModified": "2024-11-21T09:14:17.400", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T18:54:53.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,56 +69,137 @@ "value": "CWE-352" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.9", + "versionEndExcluding": "14.10.19", + "matchCriteriaId": "C98B05F5-893C-40C4-A707-4230DF901C0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.5.4", + "matchCriteriaId": "C15AC764-BCCE-4AF3-98F5-28EC637500A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.6", + "versionEndExcluding": "15.9", + "matchCriteriaId": "3E8A87CB-01A7-4C55-99FF-93FAAC70532B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/xwiki/xwiki-platform/commit/4896712ee6483da623f131be2e618f1f2b79cb8d", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/9f8cc88497418750b09ce9fde5d67d840f038fbf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/d88da4572fb7d4f95e1f54bb0cce33fce3df08d9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/d9f5043da289ff106f08e23576746fd8baf98794", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-r5vh-gc3r-r24w", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-21424", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/4896712ee6483da623f131be2e618f1f2b79cb8d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/9f8cc88497418750b09ce9fde5d67d840f038fbf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/d88da4572fb7d4f95e1f54bb0cce33fce3df08d9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/d9f5043da289ff106f08e23576746fd8baf98794", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-r5vh-gc3r-r24w", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-21424", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31990.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31990.json index c3275259de3..55561173d60 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31990.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31990.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31990", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-15T20:15:11.127", - "lastModified": "2024-11-21T09:14:17.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-09T17:04:35.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 } ] }, @@ -49,40 +69,107 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.4.0", + "versionEndExcluding": "2.8.16", + "matchCriteriaId": "9B87AF18-0754-4EA4-B6D6-B29F1DD75590" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.9.0", + "versionEndExcluding": "2.9.12", + "matchCriteriaId": "5FBE3254-59C6-4CA7-AE67-673BA527A8DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.10.0", + "versionEndExcluding": "2.10.7", + "matchCriteriaId": "71FAC3BD-2DF6-400F-813C-A98370A10F0A" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/argoproj/argo-cd/commit/c514105af739eebedb9dbe89d8a6dd8dfc30bb2c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/c5a252c4cc260e240e2074794aedb861d07e9ca5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/e0ff56d89fbd7d066e9c862b30337f6520f13f17", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2gvw-w6fj-7m3c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/c514105af739eebedb9dbe89d8a6dd8dfc30bb2c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/c5a252c4cc260e240e2074794aedb861d07e9ca5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/commit/e0ff56d89fbd7d066e9c862b30337f6520f13f17", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2gvw-w6fj-7m3c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31996.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31996.json index ff4ce3e89c5..6650681153e 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31996.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31996.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31996", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T21:15:07.510", - "lastModified": "2024-11-21T09:14:18.477", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T18:50:19.793", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,56 +69,139 @@ "value": "CWE-95" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.1", + "versionEndExcluding": "14.10.19", + "matchCriteriaId": "7385D8A9-93D4-4B6D-8030-67F9E3F3CB83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.5.4", + "matchCriteriaId": "C15AC764-BCCE-4AF3-98F5-28EC637500A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.6", + "versionEndExcluding": "15.9", + "matchCriteriaId": "3E8A87CB-01A7-4C55-99FF-93FAAC70532B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/xwiki/xwiki-commons/commit/b0805160ec7b01ee12417e79cb384e60ae4817aa", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-commons/commit/b94142e2a66ec32e89eacab67c3da8d91f5ef93a", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-commons/commit/ed7ff515a2436a1c6dcbd0c6ca0c41e434d58915", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-hf43-47q4-fhq5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XCOMMONS-2828", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-21438", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/xwiki/xwiki-commons/commit/b0805160ec7b01ee12417e79cb384e60ae4817aa", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-commons/commit/b94142e2a66ec32e89eacab67c3da8d91f5ef93a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-commons/commit/ed7ff515a2436a1c6dcbd0c6ca0c41e434d58915", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-hf43-47q4-fhq5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XCOMMONS-2828", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-21438", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32035.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32035.json index 2357a491785..f881bc3d08c 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32035.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32035.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32035", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-15T20:15:11.323", - "lastModified": "2024-11-21T09:14:21.920", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-09T18:35:14.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,48 +69,113 @@ "value": "CWE-789" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sixlabors:imagesharp:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1.8", + "matchCriteriaId": "A06E81B0-6C7F-43A9-B154-E5BF07241973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sixlabors:imagesharp:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.1.4", + "matchCriteriaId": "CDB61675-C17E-41D0-AFBF-24E39F753A0A" + } + ] + } + ] } ], "references": [ { "url": "https://docs.sixlabors.com/articles/imagesharp.web/processingcommands.html#securing-processing-commands", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://docs.sixlabors.com/articles/imagesharp/security.html", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/SixLabors/ImageSharp/commit/b6b08ac3e7cea8da5ac1e90f7c0b67dd254535c3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/SixLabors/ImageSharp/commit/f21d64188e59ae9464ff462056a5e29d8e618b27", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-g85r-6x2q-45w7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://docs.sixlabors.com/articles/imagesharp.web/processingcommands.html#securing-processing-commands", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://docs.sixlabors.com/articles/imagesharp/security.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/SixLabors/ImageSharp/commit/b6b08ac3e7cea8da5ac1e90f7c0b67dd254535c3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/SixLabors/ImageSharp/commit/f21d64188e59ae9464ff462056a5e29d8e618b27", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-g85r-6x2q-45w7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32036.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32036.json index ee1c3d04640..d99d6592f60 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32036.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32036.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32036", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-15T20:15:11.543", - "lastModified": "2024-11-21T09:14:22.033", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-09T18:14:46.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,32 +69,85 @@ "value": "CWE-226" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-212" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sixlabors:imagesharp:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1.8", + "matchCriteriaId": "A06E81B0-6C7F-43A9-B154-E5BF07241973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sixlabors:imagesharp:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.1.4", + "matchCriteriaId": "CDB61675-C17E-41D0-AFBF-24E39F753A0A" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/SixLabors/ImageSharp/commit/8f0b4d3e680e78d479a88e7b1472bccd8f096d68", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/SixLabors/ImageSharp/commit/da5f09a42513489fe359578d81cec2f15ba588ba", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-5x7m-6737-26cr", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/SixLabors/ImageSharp/commit/8f0b4d3e680e78d479a88e7b1472bccd8f096d68", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/SixLabors/ImageSharp/commit/da5f09a42513489fe359578d81cec2f15ba588ba", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/SixLabors/ImageSharp/security/advisories/GHSA-5x7m-6737-26cr", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32038.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32038.json index f60203d1f29..88f3ec7c2a6 100644 --- a/CVE-2024/CVE-2024-320xx/CVE-2024-32038.json +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32038.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32038", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-19T15:15:50.610", - "lastModified": "2024-11-21T09:14:22.157", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-09T17:38:55.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.8.0", + "versionEndExcluding": "4.7.2", + "matchCriteriaId": "72216961-C021-43DF-B94D-099AB12D6190" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-fcpw-v3pg-c327", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-fcpw-v3pg-c327", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35314.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35314.json index 00e36da808d..0828bd302f5 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35314.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35314.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35314", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T21:15:05.533", - "lastModified": "2024-11-08T18:15:16.867", + "lastModified": "2025-01-09T18:15:27.657", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,42 +15,7 @@ "value": "Una vulnerabilidad en el cliente de escritorio de Mitel MiCollab hasta la versi\u00f3n 9.7.1.110 y en MiVoice Business Solution Virtual Instance (MiVB SVI) 1.0.0.25 podr\u00eda permitir que un atacante no autenticado realice un ataque de inyecci\u00f3n de comandos debido a una desinfecci\u00f3n insuficiente de los par\u00e1metros. Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante ejecute scripts arbitrarios." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-94" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_24-0015-001-v3.pdf", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37392.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37392.json index 052e90079c2..e8db04b3486 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37392.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37392.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37392", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-23T21:15:07.253", - "lastModified": "2024-12-03T18:15:13.410", + "lastModified": "2025-01-09T18:15:27.790", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", - "baseScore": 6.1, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 2.7 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-79" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39924.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39924.json index d4275e6f144..2dbdc357c18 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39924.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39924.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39924", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-13T18:15:03.810", - "lastModified": "2024-11-11T21:15:06.150", + "lastModified": "2025-01-09T18:15:27.987", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,42 +15,7 @@ "value": "Se descubri\u00f3 un problema en Vaultwarden (anteriormente Bitwarden_RS) 1.30.3. Se identific\u00f3 una vulnerabilidad en el proceso de autenticaci\u00f3n y autorizaci\u00f3n del endpoint responsable de alterar los metadatos de un acceso de emergencia. Permite que un atacante con acceso de emergencia concedido escale sus privilegios cambiando el nivel de acceso y modificando el tiempo de espera. En consecuencia, el atacante puede obtener control total sobre la b\u00f3veda (cuando solo se pretende que tenga acceso de lectura) mientras se salta el per\u00edodo de espera necesario." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "HIGH", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-269" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://github.com/dani-garcia/vaultwarden/blob/1.30.3/src/api/core/emergency_access.rs#L115-L148", diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39925.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39925.json index db2e3dd3455..12e50a74fd9 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39925.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39925.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39925", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-13T18:15:03.927", - "lastModified": "2024-11-11T21:15:06.237", + "lastModified": "2025-01-09T18:15:28.117", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,42 +15,7 @@ "value": "Se descubri\u00f3 un problema en Vaultwarden (anteriormente Bitwarden_RS) 1.30.3. Carece de un proceso de desvinculaci\u00f3n para los miembros que abandonan una organizaci\u00f3n. Como resultado, la clave de organizaci\u00f3n compartida no se rota cuando un miembro se va. En consecuencia, el miembro que se va, cuyo acceso debe revocarse, conserva una copia de la clave de la organizaci\u00f3n. Adem\u00e1s, la aplicaci\u00f3n no protege adecuadamente algunos datos cifrados almacenados en el servidor. En consecuencia, un usuario autenticado podr\u00eda obtener acceso no autorizado a los datos cifrados de cualquier organizaci\u00f3n, incluso si el usuario no es miembro de la organizaci\u00f3n en cuesti\u00f3n. Sin embargo, el usuario necesitar\u00eda saber el ID de organizaci\u00f3n correspondiente. Por lo tanto, si un usuario (cuyo acceso a una organizaci\u00f3n ha sido revocado) ya posee la clave de la organizaci\u00f3n, ese usuario podr\u00eda usar la clave para descifrar los datos filtrados." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "HIGH", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-269" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://github.com/dani-garcia/vaultwarden/releases", diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39926.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39926.json index 13b79f6f3f0..800cf1b65f8 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39926.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39926.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39926", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-13T18:15:04.013", - "lastModified": "2024-11-11T21:15:06.297", + "lastModified": "2025-01-09T18:15:28.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,42 +15,7 @@ "value": "Se descubri\u00f3 un problema en Vaultwarden (anteriormente Bitwarden_RS) 1.30.3. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de HTML o de Cross-site Scripting (XSS) almacenado, debido a la CSP predeterminada, en el panel de control del administrador. Esto potencialmente permite que un atacante autenticado inyecte c\u00f3digo malicioso en el panel de control, que luego se ejecuta o se muestra en el contexto del navegador de un administrador al visualizar el contenido inyectado. Sin embargo, es importante tener en cuenta que la Pol\u00edtica de seguridad de contenido (CSP) predeterminada de la aplicaci\u00f3n bloquea la mayor\u00eda de las rutas de explotaci\u00f3n, lo que mitiga significativamente el impacto potencial." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "HIGH", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-79" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://github.com/dani-garcia/vaultwarden/blob/1.30.3/src/static/scripts/admin_users.js#L201", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3933.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3933.json index 709bb9b919f..7c24bb9b424 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3933.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3933.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3933", "sourceIdentifier": "emo@eclipse.org", "published": "2024-05-27T06:15:09.367", - "lastModified": "2024-11-21T09:30:43.833", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T18:00:53.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.5 } ] }, @@ -57,24 +77,73 @@ "value": "CWE-805" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eclipse:openj9:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.13.0", + "versionEndExcluding": "0.44.0", + "matchCriteriaId": "76AC6E23-7314-4C84-8BB7-EF9D7DB1C71C" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/eclipse/omr/pull/7275", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/21", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/eclipse/omr/pull/7275", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3935.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3935.json index bc443595c0e..6d8e1ef97dc 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3935.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3935.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3935", "sourceIdentifier": "emo@eclipse.org", "published": "2024-10-30T12:15:03.090", - "lastModified": "2024-11-01T12:57:03.417", + "lastModified": "2025-01-09T18:15:28.337", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,28 +59,6 @@ "providerUrgency": "NOT_DEFINED" } } - ], - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - } ] }, "weaknesses": [ diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4452.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4452.json index 2b432f21805..eb7b1047d04 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4452.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4452.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4452", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-21T14:15:12.563", - "lastModified": "2024-11-21T09:42:51.580", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T17:46:34.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "3.6.2", + "matchCriteriaId": "49350E3D-5C97-4857-90E9-CC2C78E9FA76" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpmet.com/plugin/elementskit/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/488ac848-786e-4100-a387-5a40e8fc4175?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wpmet.com/plugin/elementskit/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/488ac848-786e-4100-a387-5a40e8fc4175?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45346.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45346.json index b831d9fdff7..62fff29adff 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45346.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45346.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45346", "sourceIdentifier": "security@xiaomi.com", "published": "2024-08-28T07:15:08.823", - "lastModified": "2024-08-29T03:15:05.247", + "lastModified": "2025-01-09T18:15:28.703", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-94" - } - ] - } - ], "references": [ { "url": "https://trust.mi.com/misrc/bulletins/advisory?cveId=545", diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46972.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46972.json index 4f40a08e29b..71023b3ab8f 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46972.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46972.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46972", "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2024-12-28T05:15:08.497", - "lastModified": "2024-12-28T05:15:08.497", + "lastModified": "2025-01-09T17:15:15.030", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El software instalado y ejecutado como un usuario sin privilegios puede realizar llamadas al sistema de GPU indebidas para activar excepciones de kernel de use-after-free." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "367425dc-4d06-4041-9650-c2dc6aaa27ce", diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47220.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47220.json index 8eef9aba049..037570fe020 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47220.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47220.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47220", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-22T01:15:11.950", - "lastModified": "2024-09-26T13:32:55.343", + "lastModified": "2025-01-09T18:15:28.837", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,42 +22,7 @@ "value": "Se descubri\u00f3 un problema en el kit de herramientas WEBrick a trav\u00e9s de la versi\u00f3n 1.8.1 para Ruby. Permite el contrabando de solicitudes HTTP al proporcionar un encabezado Content-Length y un encabezado Transfer-Encoding, por ejemplo, \"GET /admin HTTP/1.1\\r\\n\" dentro de una solicitud \"POST /user HTTP/1.1\\r\\n\". NOTA: la posici\u00f3n del proveedor es \"Webrick no debe usarse en producci\u00f3n\"." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "HIGH", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-444" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://github.com/ruby/webrick/issues/145", diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48063.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48063.json index 9a809b7cde4..593a0fb9f28 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48063.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48063.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48063", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T21:15:04.080", - "lastModified": "2024-11-01T13:15:12.020", + "lastModified": "2025-01-09T18:15:29.013", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,42 +22,7 @@ "value": " En PyTorch <=2.4.1, RemoteModule tiene RCE de deserializaci\u00f3n." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-502" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://gist.github.com/hexian2001/c046c066895a963ecc0a2cf9e1180065", diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json index c829f50e446..d2b54482146 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48955", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T18:15:05.690", - "lastModified": "2024-11-01T12:57:35.843", + "lastModified": "2025-01-09T18:15:29.147", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,42 +15,7 @@ "value": " En NetAdmin 4.0.30319, un atacante puede robar una cookie de sesi\u00f3n v\u00e1lida e inyectarla en otro dispositivo, lo que le otorga acceso no autorizado. Este tipo de ataque se conoce com\u00fanmente como secuestro de sesi\u00f3n." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", - "baseScore": 8.1, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 5.2 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-384" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://github.com/BrotherOfJhonny/CVE-2024-48955_Overview", diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53564.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53564.json index aa03967c362..cf0a5793892 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53564.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53564.json @@ -2,7 +2,7 @@ "id": "CVE-2024-53564", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-02T18:15:11.353", - "lastModified": "2025-01-09T01:15:08.627", + "lastModified": "2025-01-09T17:15:15.423", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -43,26 +43,6 @@ }, "exploitabilityScore": 0.7, "impactScore": 1.4 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 8.8, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 2.8, - "impactScore": 5.9 } ] }, @@ -76,16 +56,6 @@ "value": "CWE-434" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-94" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55539.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55539.json index 890915ea44e..90416cb4421 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55539.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55539.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55539", "sourceIdentifier": "security@acronis.com", "published": "2024-12-23T14:15:06.270", - "lastModified": "2024-12-23T14:15:06.270", + "lastModified": "2025-01-09T17:15:16.057", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 2.5, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.0, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "security@acronis.com", @@ -42,7 +64,7 @@ "weaknesses": [ { "source": "security@acronis.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7474.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7474.json index 5c434e6b5e4..38c07f1dd20 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7474.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7474.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7474", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-29T13:15:09.530", - "lastModified": "2024-11-14T14:15:19.373", + "lastModified": "2025-01-09T18:15:29.380", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", - "baseScore": 9.1, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.2 } ], "cvssMetricV30": [ @@ -84,7 +64,7 @@ "weaknesses": [ { "source": "security@huntr.dev", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7807.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7807.json index 0f0a0aaed14..2e67759fe33 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7807.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7807.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7807", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-29T13:15:10.360", - "lastModified": "2024-11-14T14:15:19.500", + "lastModified": "2025-01-09T18:15:29.543", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -81,16 +81,6 @@ "value": "CWE-770" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-770" - } - ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9202.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9202.json index d9486ee606d..bf43e2404b2 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9202.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9202.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9202", "sourceIdentifier": "emo@eclipse.org", "published": "2024-09-27T10:15:02.827", - "lastModified": "2024-09-30T12:46:20.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T18:07:29.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "AMBER" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -71,20 +93,61 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eclipse:eclipse_dataspace_components:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.1.3", + "versionEndExcluding": "0.9.1", + "matchCriteriaId": "19307830-8F92-4DE4-9921-4E8204DD647E" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/eclipse-edc/Connector/pull/4490", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/eclipse-edc/Connector/pull/4491", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/35", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9575.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9575.json index b06c9dc61c1..a8e4a3ab385 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9575.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9575.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9575", "sourceIdentifier": "655498c3-6ec5-4f0b-aea6-853b334d05a6", "published": "2024-10-09T10:15:06.853", - "lastModified": "2024-10-14T08:15:02.970", + "lastModified": "2025-01-09T18:15:29.763", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,28 +59,6 @@ "providerUrgency": "NOT_DEFINED" } } - ], - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", - "baseScore": 8.1, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 5.2 - } ] }, "weaknesses": [ diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0328.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0328.json index 05d32ee74d6..abade9b7db5 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0328.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0328.json @@ -2,13 +2,17 @@ "id": "CVE-2025-0328", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T05:15:07.997", - "lastModified": "2025-01-09T05:15:07.997", + "lastModified": "2025-01-09T17:15:17.330", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in KaiYuanTong ECT Platform up to 2.0.0. Affected by this issue is some unknown functionality of the file /public/server/runCode.php of the component HTTP POST Request Handler. The manipulation of the argument code leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en KaiYuanTong ECT Platform hasta la versi\u00f3n 2.0.0. Este problema afecta a algunas funciones desconocidas del archivo /public/server/runCode.php del componente HTTP POST Request Handler. La manipulaci\u00f3n del c\u00f3digo de argumentos conduce a la inyecci\u00f3n de comandos. El ataque puede ejecutarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.470601", "source": "cna@vuldb.com" + }, + { + "url": "https://note.zhaoj.in/share/ASPsoVCrLqKK", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0331.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0331.json index cd2bf1df03d..7c8f2e48044 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0331.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0331.json @@ -2,13 +2,17 @@ "id": "CVE-2025-0331", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T05:15:08.237", - "lastModified": "2025-01-09T05:15:08.237", + "lastModified": "2025-01-09T17:15:17.933", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in YunzMall up to 2.4.2. This issue affects the function changePwd of the file /app/platform/controllers/ResetpwdController.php of the component HTTP POST Request Handler. The manipulation of the argument pwd leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en YunzMall hasta la versi\u00f3n 2.4.2. Este problema afecta a la funci\u00f3n changePwd del archivo /app/platform/controllers/ResetpwdController.php del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento pwd provoca una recuperaci\u00f3n de contrase\u00f1as d\u00e9bil. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +136,10 @@ { "url": "https://vuldb.com/?submit.471663", "source": "cna@vuldb.com" + }, + { + "url": "https://note.zhaoj.in/share/DsijzdQDJSAp", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0333.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0333.json index cc8e3d58676..e46a7b5d29b 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0333.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0333.json @@ -2,13 +2,17 @@ "id": "CVE-2025-0333", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-09T05:15:08.453", - "lastModified": "2025-01-09T05:15:08.453", + "lastModified": "2025-01-09T17:15:18.077", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in leiyuxi cy-fast 1.0. Affected is the function listData of the file /sys/role/listData. The manipulation of the argument order leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "En leiyuxi cy-fast 1.0 se ha detectado una vulnerabilidad clasificada como cr\u00edtica. La funci\u00f3n listData del archivo /sys/role/listData est\u00e1 afectada. La manipulaci\u00f3n del orden de los argumentos provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.475297", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/d3do-23/cvelist/blob/main/cy-fast/sqli1.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21592.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21592.json new file mode 100644 index 00000000000..32ba480e373 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21592.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-21592", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-01-09T17:15:18.203", + "lastModified": "2025-01-09T17:15:18.203", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Exposure of Sensitive Information to an Unauthorized Actor\u00a0vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents of sensitive files on the file system.\n\nThrough the execution of either 'show services advanced-anti-malware' or 'show services security-intelligence' command, a user with limited permissions (e.g., a low privilege login class user) can access protected files that should not be accessible to the user. These files may contain sensitive information that can be used to cause further impact to the system.\n\n\nThis issue affects Junos OS SRX Series:\n\n\n\n * All versions before 21.4R3-S8,\n\n * from 22.2 before 22.2R3-S5,\n\n * from 22.3 before 22.3R3-S3,\n * from 22.4 before 22.4R3-S2,\n\n * from 23.2 before 23.2R2-S1,\n\n * from 23.4 before 23.4R2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA92860", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21593.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21593.json new file mode 100644 index 00000000000..2d336ef9511 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21593.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-21593", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-01-09T17:15:18.380", + "lastModified": "2025-01-09T17:15:18.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Control of a Resource Through its Lifetime vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to cause a Denial-of-Service (DoS).\n\nOn devices with SRv6 (Segment Routing over IPv6) enabled, an attacker can send a malformed BGP UPDATE packet which will cause the rpd to crash and restart. Continued receipt of these UPDATE packets will cause a sustained DoS condition.\u00a0\n\nThis issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.This issue affects Junos OS:\u00a0\n\n\n\n * All versions before 21.2R3-S9,\u00a0\n * from 21.4 before 21.4R3-S10,\u00a0\n * from 22.2 before 22.2R3-S5,\u00a0\n * from 22.3 before 22.3R3-S4,\u00a0\n * from 22.4 before 22.4R3-S3,\u00a0\n * from 23.2 before 23.2R2-S2,\u00a0\n * from 23.4 before 23.4R2;\n\n\n\nand Junos OS Evolved:\u00a0\n\n\n\n * All versions before 21.2R3-S9-EVO,\u00a0\n * from 21.4-EVO before 21.4R3-S10-EVO,\u00a0\n * from 22.2-EVO before 22.2R3-S5-EVO,\u00a0\n * from 22.3-EVO before 22.3R3-S4-EVO,\u00a0\n * from 22.4-EVO before 22.4R3-S3-EVO,\n * from 23.2-EVO before 23.2R2-S2-EVO,\u00a0\n * from 23.4-EVO before 23.4R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "AUTOMATIC", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-664" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA92861", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21596.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21596.json new file mode 100644 index 00000000000..a23f09dafaf --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21596.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-21596", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-01-09T17:15:18.593", + "lastModified": "2025-01-09T17:15:18.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Handling of Exceptional Conditions vulnerability in the command-line processing of Juniper Networks Junos OS on SRX1500, SRX4100, and SRX4200 devices allows a local, low-privileged authenticated attacker executing the 'show chassis environment pem' command to cause the chassis daemon (chassisd) to crash and restart, resulting in a temporary Denial of Service (DoS). However, repeated execution of this command will eventually cause the chassisd process to fail to restart, impacting packet processing on the system.\n\nThis issue affects Junos OS on SRX1500, SRX4100, SRX4200:\u00a0\n\n\n\n * All versions before 21.4R3-S9,\u00a0\n * from 22.2 before 22.2R3-S5,\u00a0\n * from 22.3 before 22.3R3-S4,\u00a0\n * from 22.4 before 22.4R3-S4,\u00a0\n * from 23.2 before 23.2R2-S3,\u00a0\n * from 23.4 before 23.4R2-S1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:X/RE:M/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA92864", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21599.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21599.json new file mode 100644 index 00000000000..25b86089df8 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21599.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-21599", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-01-09T17:15:18.770", + "lastModified": "2025-01-09T17:15:18.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A\u00a0Missing Release of Memory after Effective Lifetime vulnerability in the Juniper Tunnel Driver (jtd) of Juniper Networks Junos OS Evolved allows an unauthenticated network-based attacker to cause Denial of Service.\u00a0\n\nReceipt of specifically malformed IPv6 packets, destined to the device, causes kernel memory to not be freed, resulting in memory exhaustion leading to a system crash and Denial of Service (DoS).\u00a0Continuous receipt and processing of these packets will continue to exhaust kernel memory, creating a sustained Denial of Service (DoS) condition.\nThis issue only affects systems configured with IPv6.\n\nThis issue affects Junos OS Evolved:\u00a0\n\n\n\n * from 22.4-EVO before 22.4R3-S5-EVO,\u00a0\n * from 23.2-EVO before 23.2R2-S2-EVO,\u00a0\n * from 23.4-EVO before 23.4R2-S2-EVO,\u00a0\n * from 24.2-EVO before 24.2R1-S2-EVO, 24.2R2-EVO.\n\n\n\n\nThis issue does not affect Juniper Networks Junos OS Evolved versions prior to 22.4R1-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA92869", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21600.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21600.json new file mode 100644 index 00000000000..58b82a35ec1 --- /dev/null +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21600.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-21600", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-01-09T17:15:18.960", + "lastModified": "2025-01-09T17:15:18.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Out-of-Bounds Read vulnerability in\n\nthe routing protocol daemon (rpd) of \n\n Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.\n\n\n\nThis issue only affects systems configured in\n either of two ways:\n\n \n \n * systems with BGP traceoptions enabled\n\n * systems with BGP family traffic-engineering (BGP-LS)\n configured\n\n\n and can be exploited from a directly connected and configured BGP peer.\u00a0\n\nThis issue affects iBGP and eBGP \n\nwith \n\nany address family\n\n configured, and both IPv4 and IPv6 are affected by this vulnerability.\n\nThis issue affects:\n\nJunos OS:\u00a0\n\n\n\n * All versions before 21.4R3-S9,\u00a0\n * from 22.2 before 22.2R3-S5,\u00a0\n * from 22.3 before 22.3R3-S4,\u00a0\n * from 22.4 before 22.4R3-S5,\u00a0\n * from 23.2 before 23.2R2-S3,\u00a0\n * from 23.4 before 23.4R2-S3,\u00a0\n * from 24.2 before 24.2R1-S2, 24.2R2;\u00a0\n\n\n\n\nJunos OS Evolved:\u00a0\n\n\n\n * All versions before 21.4R3-S9-EVO,\u00a0\n * from 22.2 before 22.2R3-S5-EVO,\u00a0\n * from 22.3 before 22.3R3-S4-EVO,\u00a0\n * from 22.4 before 22.4R3-S5-EVO,\u00a0\n * from 23.2 before 23.2R2-S3-EVO,\u00a0\n * from 23.4 before 23.4R2-S2-EVO,\u00a0\n * from 24.2 before 24.2R1-S2-EVO, 24.2R2-EVO.\n\n\n\nThis is a similar, but different vulnerability than the issue reported as CVE-2024-39516." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:A/V:C/RE:M/U:Green", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "AUTOMATIC", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "GREEN" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA92870", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21602.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21602.json new file mode 100644 index 00000000000..8db92a079d1 --- /dev/null +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21602.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-21602", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-01-09T17:15:19.150", + "lastModified": "2025-01-09T17:15:19.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated adjacent attacker sending a specific BGP update packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). \n\nContinuous receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.\n\nThis issue affects iBGP and eBGP, and both IPv4 and IPv6 are affected by this vulnerability.\n\nThis issue affects Junos OS:\u00a0\n\n\n\n * from 21.4 before 21.4R3-S9,\u00a0\n * from 22.2 before 22.2R3-S5,\u00a0\n * from 22.3 before 22.3R3-S4,\n * from 22.4 before 22.4R3-S5,\u00a0\n * from 23.2 before 23.2R2-S3,\u00a0\n * from 23.4 before 23.4R2-S3,\u00a0\n * from 24.2 before 24.2R1-S2, 24.2R2;\u00a0\n\n\nThis issue does not affect versions prior to\u00a021.1R1.\n\n\n\n\n\nJunos OS Evolved:\u00a0\n\n\n\n * from 21.4 before 21.4R3-S9-EVO,\u00a0\n * from 22.2 before 22.2R3-S5-EVO,\u00a0\n * from 22.3 before 22.3R3-S4-EVO,\n * from 22.4 before 22.4R3-S5-EVO,\u00a0\n * from 23.2 before 23.2R2-S3-EVO,\u00a0\n * from 23.4 before 23.4R2-S3-EVO,\u00a0\n * from 24.2 before 24.2R1-S2-EVO, 24.2R2-EVO.\n\n\nThis issue does not affect versions prior to 21.1R1-EVO" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:A/V:C/RE:M/U:Green", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "AUTOMATIC", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "GREEN" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA92872", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21628.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21628.json new file mode 100644 index 00000000000..bd6a41484ae --- /dev/null +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21628.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-21628", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-09T18:15:30.070", + "lastModified": "2025-01-09T18:15:30.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Chatwoot is a customer engagement suite. Prior to 3.16.0, conversation and contact filters endpoints did not sanitize the input of query_operator passed from the frontend or the API. This provided any actor who is authenticated, an attack vector to run arbitrary SQL within the filter query by adding a tautological WHERE clause. This issue is patched with v3.16.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 5.3 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/chatwoot/chatwoot/commit/b34dac7bbe3c910186083b680e51aad5ea60b44b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/chatwoot/chatwoot/security/advisories/GHSA-g8f9-hh83-rcq9", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22149.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22149.json new file mode 100644 index 00000000000..35737f9b142 --- /dev/null +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22149.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-22149", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-09T18:15:30.233", + "lastModified": "2025-01-09T18:15:30.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "JWK Set (JSON Web Key Set) is a JWK and JWK Set Go implementation. Prior to 0.6.0, the project's provided HTTP client's local JWK Set cache should do a full replacement when the goroutine refreshes the remote JWK Set. The current behavior is to overwrite or append. This is a security issue for use cases that utilize the provided auto-caching HTTP client and where key removal from a JWK Set is equivalent to revocation. The affected auto-caching HTTP client was added in version v0.5.0 and fixed in v0.6.0. The only workaround would be to remove the provided auto-caching HTTP client and replace it with a custom implementation. This involves setting the HTTPClientStorageOptions.RefreshInterval to zero (or not specifying the value)." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-672" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/MicahParks/jwkset/commit/01db49a90f7f20c7fb39a699a2f19a7a5f379ed3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/MicahParks/jwkset/issues/40", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/MicahParks/jwkset/security/advisories/GHSA-675f-rq2r-jw82", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 621b2951a20..9332584703d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-09T17:00:48.657060+00:00 +2025-01-09T19:00:29.420592+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-09T16:59:41.167000+00:00 +2025-01-09T18:54:53.390000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -276509 +276517 ``` ### CVEs added in the last Commit -Recently added CVEs: `50` +Recently added CVEs: `8` -- [CVE-2025-22801](CVE-2025/CVE-2025-228xx/CVE-2025-22801.json) (`2025-01-09T16:16:29.323`) -- [CVE-2025-22802](CVE-2025/CVE-2025-228xx/CVE-2025-22802.json) (`2025-01-09T16:16:29.470`) -- [CVE-2025-22803](CVE-2025/CVE-2025-228xx/CVE-2025-22803.json) (`2025-01-09T16:16:29.627`) -- [CVE-2025-22804](CVE-2025/CVE-2025-228xx/CVE-2025-22804.json) (`2025-01-09T16:16:29.787`) -- [CVE-2025-22805](CVE-2025/CVE-2025-228xx/CVE-2025-22805.json) (`2025-01-09T16:16:29.937`) -- [CVE-2025-22806](CVE-2025/CVE-2025-228xx/CVE-2025-22806.json) (`2025-01-09T16:16:30.090`) -- [CVE-2025-22807](CVE-2025/CVE-2025-228xx/CVE-2025-22807.json) (`2025-01-09T16:16:30.253`) -- [CVE-2025-22808](CVE-2025/CVE-2025-228xx/CVE-2025-22808.json) (`2025-01-09T16:16:30.403`) -- [CVE-2025-22809](CVE-2025/CVE-2025-228xx/CVE-2025-22809.json) (`2025-01-09T16:16:30.557`) -- [CVE-2025-22810](CVE-2025/CVE-2025-228xx/CVE-2025-22810.json) (`2025-01-09T16:16:30.713`) -- [CVE-2025-22811](CVE-2025/CVE-2025-228xx/CVE-2025-22811.json) (`2025-01-09T16:16:30.880`) -- [CVE-2025-22812](CVE-2025/CVE-2025-228xx/CVE-2025-22812.json) (`2025-01-09T16:16:31.047`) -- [CVE-2025-22813](CVE-2025/CVE-2025-228xx/CVE-2025-22813.json) (`2025-01-09T16:16:31.200`) -- [CVE-2025-22814](CVE-2025/CVE-2025-228xx/CVE-2025-22814.json) (`2025-01-09T16:16:31.370`) -- [CVE-2025-22815](CVE-2025/CVE-2025-228xx/CVE-2025-22815.json) (`2025-01-09T16:16:31.543`) -- [CVE-2025-22817](CVE-2025/CVE-2025-228xx/CVE-2025-22817.json) (`2025-01-09T16:16:31.693`) -- [CVE-2025-22818](CVE-2025/CVE-2025-228xx/CVE-2025-22818.json) (`2025-01-09T16:16:31.850`) -- [CVE-2025-22819](CVE-2025/CVE-2025-228xx/CVE-2025-22819.json) (`2025-01-09T16:16:32.000`) -- [CVE-2025-22820](CVE-2025/CVE-2025-228xx/CVE-2025-22820.json) (`2025-01-09T16:16:32.173`) -- [CVE-2025-22821](CVE-2025/CVE-2025-228xx/CVE-2025-22821.json) (`2025-01-09T16:16:32.363`) -- [CVE-2025-22822](CVE-2025/CVE-2025-228xx/CVE-2025-22822.json) (`2025-01-09T16:16:32.557`) -- [CVE-2025-22823](CVE-2025/CVE-2025-228xx/CVE-2025-22823.json) (`2025-01-09T16:16:32.717`) -- [CVE-2025-22824](CVE-2025/CVE-2025-228xx/CVE-2025-22824.json) (`2025-01-09T16:16:32.893`) -- [CVE-2025-22826](CVE-2025/CVE-2025-228xx/CVE-2025-22826.json) (`2025-01-09T16:16:33.047`) -- [CVE-2025-22827](CVE-2025/CVE-2025-228xx/CVE-2025-22827.json) (`2025-01-09T16:16:33.200`) +- [CVE-2025-21592](CVE-2025/CVE-2025-215xx/CVE-2025-21592.json) (`2025-01-09T17:15:18.203`) +- [CVE-2025-21593](CVE-2025/CVE-2025-215xx/CVE-2025-21593.json) (`2025-01-09T17:15:18.380`) +- [CVE-2025-21596](CVE-2025/CVE-2025-215xx/CVE-2025-21596.json) (`2025-01-09T17:15:18.593`) +- [CVE-2025-21599](CVE-2025/CVE-2025-215xx/CVE-2025-21599.json) (`2025-01-09T17:15:18.770`) +- [CVE-2025-21600](CVE-2025/CVE-2025-216xx/CVE-2025-21600.json) (`2025-01-09T17:15:18.960`) +- [CVE-2025-21602](CVE-2025/CVE-2025-216xx/CVE-2025-21602.json) (`2025-01-09T17:15:19.150`) +- [CVE-2025-21628](CVE-2025/CVE-2025-216xx/CVE-2025-21628.json) (`2025-01-09T18:15:30.070`) +- [CVE-2025-22149](CVE-2025/CVE-2025-221xx/CVE-2025-22149.json) (`2025-01-09T18:15:30.233`) ### CVEs modified in the last Commit -Recently modified CVEs: `126` +Recently modified CVEs: `88` -- [CVE-2024-53164](CVE-2024/CVE-2024-531xx/CVE-2024-53164.json) (`2025-01-09T16:16:21.297`) -- [CVE-2024-53179](CVE-2024/CVE-2024-531xx/CVE-2024-53179.json) (`2025-01-09T16:16:21.440`) -- [CVE-2024-53522](CVE-2024/CVE-2024-535xx/CVE-2024-53522.json) (`2025-01-09T16:16:21.560`) -- [CVE-2024-53704](CVE-2024/CVE-2024-537xx/CVE-2024-53704.json) (`2025-01-09T15:15:18.640`) -- [CVE-2024-53705](CVE-2024/CVE-2024-537xx/CVE-2024-53705.json) (`2025-01-09T15:15:18.800`) -- [CVE-2024-53706](CVE-2024/CVE-2024-537xx/CVE-2024-53706.json) (`2025-01-09T16:16:21.743`) -- [CVE-2024-55459](CVE-2024/CVE-2024-554xx/CVE-2024-55459.json) (`2025-01-09T15:15:18.963`) -- [CVE-2024-56582](CVE-2024/CVE-2024-565xx/CVE-2024-56582.json) (`2025-01-09T16:16:21.920`) -- [CVE-2024-56588](CVE-2024/CVE-2024-565xx/CVE-2024-56588.json) (`2025-01-09T16:16:22.040`) -- [CVE-2024-56599](CVE-2024/CVE-2024-565xx/CVE-2024-56599.json) (`2025-01-09T16:16:22.167`) -- [CVE-2024-56607](CVE-2024/CVE-2024-566xx/CVE-2024-56607.json) (`2025-01-09T16:16:22.327`) -- [CVE-2024-56609](CVE-2024/CVE-2024-566xx/CVE-2024-56609.json) (`2025-01-09T16:16:22.443`) -- [CVE-2024-56616](CVE-2024/CVE-2024-566xx/CVE-2024-56616.json) (`2025-01-09T16:16:22.620`) -- [CVE-2024-56626](CVE-2024/CVE-2024-566xx/CVE-2024-56626.json) (`2025-01-09T16:16:22.770`) -- [CVE-2024-56627](CVE-2024/CVE-2024-566xx/CVE-2024-56627.json) (`2025-01-09T16:16:22.907`) -- [CVE-2024-56694](CVE-2024/CVE-2024-566xx/CVE-2024-56694.json) (`2025-01-09T16:16:23.053`) -- [CVE-2024-56715](CVE-2024/CVE-2024-567xx/CVE-2024-56715.json) (`2025-01-09T16:16:23.240`) -- [CVE-2024-56716](CVE-2024/CVE-2024-567xx/CVE-2024-56716.json) (`2025-01-09T16:16:23.387`) -- [CVE-2024-56759](CVE-2024/CVE-2024-567xx/CVE-2024-56759.json) (`2025-01-09T16:16:23.547`) -- [CVE-2024-56761](CVE-2024/CVE-2024-567xx/CVE-2024-56761.json) (`2025-01-09T16:16:23.667`) -- [CVE-2024-56763](CVE-2024/CVE-2024-567xx/CVE-2024-56763.json) (`2025-01-09T16:16:23.780`) -- [CVE-2024-56766](CVE-2024/CVE-2024-567xx/CVE-2024-56766.json) (`2025-01-09T16:16:23.913`) -- [CVE-2024-56767](CVE-2024/CVE-2024-567xx/CVE-2024-56767.json) (`2025-01-09T16:16:24.063`) -- [CVE-2024-56769](CVE-2024/CVE-2024-567xx/CVE-2024-56769.json) (`2025-01-09T16:16:24.203`) -- [CVE-2024-8809](CVE-2024/CVE-2024-88xx/CVE-2024-8809.json) (`2025-01-09T16:11:32.663`) +- [CVE-2024-32035](CVE-2024/CVE-2024-320xx/CVE-2024-32035.json) (`2025-01-09T18:35:14.097`) +- [CVE-2024-32036](CVE-2024/CVE-2024-320xx/CVE-2024-32036.json) (`2025-01-09T18:14:46.097`) +- [CVE-2024-32038](CVE-2024/CVE-2024-320xx/CVE-2024-32038.json) (`2025-01-09T17:38:55.253`) +- [CVE-2024-35314](CVE-2024/CVE-2024-353xx/CVE-2024-35314.json) (`2025-01-09T18:15:27.657`) +- [CVE-2024-37392](CVE-2024/CVE-2024-373xx/CVE-2024-37392.json) (`2025-01-09T18:15:27.790`) +- [CVE-2024-3933](CVE-2024/CVE-2024-39xx/CVE-2024-3933.json) (`2025-01-09T18:00:53.140`) +- [CVE-2024-3935](CVE-2024/CVE-2024-39xx/CVE-2024-3935.json) (`2025-01-09T18:15:28.337`) +- [CVE-2024-39924](CVE-2024/CVE-2024-399xx/CVE-2024-39924.json) (`2025-01-09T18:15:27.987`) +- [CVE-2024-39925](CVE-2024/CVE-2024-399xx/CVE-2024-39925.json) (`2025-01-09T18:15:28.117`) +- [CVE-2024-39926](CVE-2024/CVE-2024-399xx/CVE-2024-39926.json) (`2025-01-09T18:15:28.220`) +- [CVE-2024-4452](CVE-2024/CVE-2024-44xx/CVE-2024-4452.json) (`2025-01-09T17:46:34.190`) +- [CVE-2024-45346](CVE-2024/CVE-2024-453xx/CVE-2024-45346.json) (`2025-01-09T18:15:28.703`) +- [CVE-2024-46972](CVE-2024/CVE-2024-469xx/CVE-2024-46972.json) (`2025-01-09T17:15:15.030`) +- [CVE-2024-47220](CVE-2024/CVE-2024-472xx/CVE-2024-47220.json) (`2025-01-09T18:15:28.837`) +- [CVE-2024-48063](CVE-2024/CVE-2024-480xx/CVE-2024-48063.json) (`2025-01-09T18:15:29.013`) +- [CVE-2024-48955](CVE-2024/CVE-2024-489xx/CVE-2024-48955.json) (`2025-01-09T18:15:29.147`) +- [CVE-2024-53564](CVE-2024/CVE-2024-535xx/CVE-2024-53564.json) (`2025-01-09T17:15:15.423`) +- [CVE-2024-55539](CVE-2024/CVE-2024-555xx/CVE-2024-55539.json) (`2025-01-09T17:15:16.057`) +- [CVE-2024-7474](CVE-2024/CVE-2024-74xx/CVE-2024-7474.json) (`2025-01-09T18:15:29.380`) +- [CVE-2024-7807](CVE-2024/CVE-2024-78xx/CVE-2024-7807.json) (`2025-01-09T18:15:29.543`) +- [CVE-2024-9202](CVE-2024/CVE-2024-92xx/CVE-2024-9202.json) (`2025-01-09T18:07:29.847`) +- [CVE-2024-9575](CVE-2024/CVE-2024-95xx/CVE-2024-9575.json) (`2025-01-09T18:15:29.763`) +- [CVE-2025-0328](CVE-2025/CVE-2025-03xx/CVE-2025-0328.json) (`2025-01-09T17:15:17.330`) +- [CVE-2025-0331](CVE-2025/CVE-2025-03xx/CVE-2025-0331.json) (`2025-01-09T17:15:17.933`) +- [CVE-2025-0333](CVE-2025/CVE-2025-03xx/CVE-2025-0333.json) (`2025-01-09T17:15:18.077`) ## Download and Usage diff --git a/_state.csv b/_state.csv index cd099f36a2a..ea61609fe26 100644 --- a/_state.csv +++ b/_state.csv @@ -129222,7 +129222,7 @@ CVE-2019-10886,0,0,ddaae779ca882312c5add87ed4862fa7f66bd0fd28489f44793f8d58a7ddb CVE-2019-10887,0,0,01e06e359a228959a59e2c1ac4b13fd0e0fe165a8b08414fc2c26fe4b388e9c1,2024-11-21T04:20:03.337000 CVE-2019-10888,0,0,feee76c67ffdd6ca7f445b77c82bdb35a0e95ffe370d8c4b36c16b5fcacf047b,2024-11-21T04:20:03.500000 CVE-2019-1089,0,0,fe72a4d92999ae0b1e480880bfaa7703302ef038a793508cad76935177755551,2024-11-21T04:35:59.643000 -CVE-2019-10891,0,0,facf8db02ef6d3201f83450bbcef6264e2fec1a4c0f0105fa66c8658ba4daae6,2025-01-06T15:15:09.593000 +CVE-2019-10891,0,1,2213dd1ad777f5b3a5ae11d80212cfdaef650479a1cb1f72e3849e003da898af,2025-01-09T18:15:23.760000 CVE-2019-10892,0,0,52cb4ec98e5e23db3941a83183cbc75d45e57c7e11fe5b32a20618dce5743311,2024-11-21T04:20:03.790000 CVE-2019-10893,0,0,5f21bdad6dca3236d197222535a6a5359214793124b2165da61fd6011f0db465,2024-11-21T04:20:04 CVE-2019-10894,0,0,48f3061b32b51d7b68c6ed90aec044e2f5b73828788bffa80ab992a8f1ade96c,2024-11-21T04:20:04.160000 @@ -187165,7 +187165,7 @@ CVE-2021-46970,0,0,c23c5cb83b84430d150f611567d3e72323bcb9362042ce1e780ad58464423 CVE-2021-46971,0,0,718b8f31acefc18354a6a9ad36400f079af7061ecf6db955dff16cfe0b2de9a9,2025-01-08T17:26:07.483000 CVE-2021-46972,0,0,d54f1e379c0936501bbcf2a007e41febc77de908653b48c0bf790a47c993ceb8,2025-01-08T17:30:28.093000 CVE-2021-46973,0,0,772c1c53f3e4cc24986ccd57ccf0ec094a68fe4cfeeafc7ec535f83ca45ff8d1,2024-11-21T06:35:05.160000 -CVE-2021-46974,0,1,16509e2863a293e4e3f58dd80fb9ec8fd0a97390aec217cf146b275609b92189,2025-01-09T15:00:55.557000 +CVE-2021-46974,0,0,16509e2863a293e4e3f58dd80fb9ec8fd0a97390aec217cf146b275609b92189,2025-01-09T15:00:55.557000 CVE-2021-46975,0,0,379ee4cd812bfdbb2fdb73351c9c5db9b3f393ba3702c95ca5be896799b9eeec,2024-03-19T14:15:07.467000 CVE-2021-46976,0,0,e1a10dcaf0ca218c08f2f984000603635b5a62d77a616e1c0588f5d4012ca1ec,2024-11-21T06:35:05.727000 CVE-2021-46977,0,0,fb7e65a2ee2cfc4c782b464ed66dffaf2c1e2b947534eaa9d639009c14c56121,2025-01-08T17:34:32.217000 @@ -187217,24 +187217,24 @@ CVE-2021-47022,0,0,18bd31d392a5c02945109dddde06693773e37865cf00c7d42b9e3940dc4b3 CVE-2021-47023,0,0,0109eec0b42af28c982167aeb3f0fdd2566bc0de058f24a95337952c27921478,2024-11-21T06:35:12.587000 CVE-2021-47024,0,0,f0888732418df50b2419b52313140681b7bbcdf5356692b89bed55cf02a6c034,2024-12-06T20:53:23.077000 CVE-2021-47025,0,0,ee50fde26af33349414069695c5a3e83e5c39b9aeb74c1620ab0889c7d727001,2024-12-06T18:52:52.237000 -CVE-2021-47026,0,1,a9dc421c921500d0ee9ce70384cfd8fd91e635b89532e05569324b58cad45cf8,2025-01-09T15:04:56.983000 +CVE-2021-47026,0,0,a9dc421c921500d0ee9ce70384cfd8fd91e635b89532e05569324b58cad45cf8,2025-01-09T15:04:56.983000 CVE-2021-47027,0,0,91e0a7fea72cccfa20fd38be02a20609137152c80cd9f128e227402b952dc124,2024-11-21T06:35:13.093000 CVE-2021-47028,0,0,8b21cedaac150f13efb7734c2962600b0f8f30d0128d30a32504ba31acf1032f,2024-12-06T20:53:43.170000 -CVE-2021-47029,0,1,dfe81efb19563d843f498971f35d8c427c143d8cc58f0e0d4678554e7244fa1f,2025-01-09T15:06:32.360000 +CVE-2021-47029,0,0,dfe81efb19563d843f498971f35d8c427c143d8cc58f0e0d4678554e7244fa1f,2025-01-09T15:06:32.360000 CVE-2021-47030,0,0,ecad03b4b788e4b50bb95d7a117907eea8bbaefdfbfb5b26d128ef6a75b29a56,2024-12-06T20:54:28.907000 CVE-2021-47031,0,0,f25d58627717c7a924412e6b385dc0162de8a15a4b87c0428fe4a16ade98fe6f,2024-11-21T06:35:13.540000 CVE-2021-47032,0,0,f22b5c2b67e4a40c2eae631e37e00c6244655f0e82c48b647957682054f83dad,2024-12-12T15:38:48.267000 CVE-2021-47033,0,0,0c47657436e397a05f9881d648a026b558b2d013a92d5e54cb5a3af71fee4259,2024-12-12T15:39:46.350000 CVE-2021-47034,0,0,24c3e8f7c4176b8f22212c00c61bbb11a7d89013e052d0b7d3fa32ebbfb9913f,2024-11-21T06:35:13.940000 -CVE-2021-47035,0,1,dc54a11a69ec198dc44eaaf29e9f3953f7aa3a74a57d8fb339dec15690dca7f4,2025-01-09T15:15:16.310000 +CVE-2021-47035,0,0,dc54a11a69ec198dc44eaaf29e9f3953f7aa3a74a57d8fb339dec15690dca7f4,2025-01-09T15:15:16.310000 CVE-2021-47036,0,0,9939d9a1abe4903c9b004e1597837cbf7d4fcfd5ded4c3f1d0e9ce0bb05762a2,2024-11-21T06:35:14.233000 CVE-2021-47037,0,0,27be04eae6debe1539d842e4e15be2869f9e85bf92ee888f3b701790d705f467,2024-11-21T06:35:14.347000 CVE-2021-47038,0,0,173970a6c5d44bb723efd6b764e694ea73860ece1a8d9e4523c1041c196f5023,2024-12-06T20:56:10.230000 -CVE-2021-47039,0,1,2043692ba0d7056630e43be01a6f62167c27f203a3c1aa6722409f5a759c38a1,2025-01-09T15:31:27.123000 -CVE-2021-47040,0,1,9b576377681428ef2e044f0239ba1c5def7ee06eb8f2eff2a663a8d34c9fe0ef,2025-01-09T15:29:49.397000 +CVE-2021-47039,0,0,2043692ba0d7056630e43be01a6f62167c27f203a3c1aa6722409f5a759c38a1,2025-01-09T15:31:27.123000 +CVE-2021-47040,0,0,9b576377681428ef2e044f0239ba1c5def7ee06eb8f2eff2a663a8d34c9fe0ef,2025-01-09T15:29:49.397000 CVE-2021-47041,0,0,6a0f035255b6b042a61f23563d301f0db881f6bc2a7f6d666be6fcd81e6f0e46,2024-12-06T18:41:12.523000 CVE-2021-47042,0,0,f62e43eb2094bfd4929dbf432cc8f4f5e957ec60be7a215df23a5a27bc84c40f,2024-12-06T18:41:24.943000 -CVE-2021-47043,0,1,1d1ca444d52be7eed32ab95d82bb24333bcb17f2679fab77a3b8a5a40e709bb8,2025-01-09T15:21:46.843000 +CVE-2021-47043,0,0,1d1ca444d52be7eed32ab95d82bb24333bcb17f2679fab77a3b8a5a40e709bb8,2025-01-09T15:21:46.843000 CVE-2021-47044,0,0,ac906fae73c178677dbb5393fc756eb8fcfc0d61257dd7757de6ecbc7caa9f0c,2024-11-21T06:35:15.187000 CVE-2021-47045,0,0,e12b71e92d92cceb4b5bf1346393f1a4c79e1d92869176ced4bfae375468f342,2024-12-06T18:41:37.933000 CVE-2021-47046,0,0,fbe80aadee0b9fefdef28d954a868c0042bb30920fbf18c8b2b68f2957651622,2024-12-09T19:02:52.227000 @@ -187246,7 +187246,7 @@ CVE-2021-47051,0,0,9fdd407364b82f6119278c24e39338806764a45074e27a8865265d141ce16 CVE-2021-47052,0,0,4b71437751e645e347a71b404b8bbc1d6fbfffd8664191ea6db3d12143e014e4,2024-12-09T18:46:53.900000 CVE-2021-47053,0,0,dc67adfebafac048d7b7d3afa8764867a036f33476cae5e9a7fc56793f5b22bb,2024-12-09T18:47:08.947000 CVE-2021-47054,0,0,8728a4aa24aff20c84953ddb1f2d1bf71aa3aa120f6a118d91b33727d9bd2d78,2024-12-10T17:53:39.547000 -CVE-2021-47055,0,1,98e911b4c4016e41d93c37555d7abfffd14aa72b6896aaa1f389a8325fb8c67d,2025-01-09T15:34:43.780000 +CVE-2021-47055,0,0,98e911b4c4016e41d93c37555d7abfffd14aa72b6896aaa1f389a8325fb8c67d,2025-01-09T15:34:43.780000 CVE-2021-47056,0,0,b45b88e369390925ea8cc956d89a8046d78e16e4fea049a22946e0c390cb845b,2024-11-21T06:35:16.687000 CVE-2021-47057,0,0,a5f7156f2242c8fde6f47e7a17ad9e17535902be6f79887e10dee986d9fb0d57,2024-11-21T06:35:16.827000 CVE-2021-47058,0,0,f68b4024523ee8f9f466f08f30806589b0a7135e0b16ab04a4fee7c86f058115,2024-12-10T17:54:27.030000 @@ -187260,11 +187260,11 @@ CVE-2021-47065,0,0,ccbad5bde72572b0cedb79689aa5e03efef443c56720d7aff976c615bc24e CVE-2021-47066,0,0,63cb7a656e47c5eb34316a10892fb8a1eafc05b262d1637b4e3dab9d49fc6701,2024-11-21T06:35:18.120000 CVE-2021-47067,0,0,9df5b0005af4045c4050adb25d4d0a3c7ed0af17ec105b20f7776b61c08f0157,2024-12-10T19:50:32.683000 CVE-2021-47068,0,0,e902a18ffbe6654398a0348af04e476fbaf331e8e30fa78b6bfe4762a12c956f,2024-12-10T19:50:49.147000 -CVE-2021-47069,0,0,c1eca05ee668952c1f7b1291c7ec7a82c3eb142d2cda65e66b7909adc2d987bc,2024-11-21T06:35:18.510000 +CVE-2021-47069,0,1,7cca6428a9430485997bd7f087335ca19eb60052d15a49c70984ca79074cbc42,2025-01-09T18:21:01.560000 CVE-2021-47070,0,0,affc793dd141d8f358bff7bbf0e6544f3d5ab387f0d1d9fdbb175a861def15c6,2024-11-21T06:35:18.633000 CVE-2021-47071,0,0,d800b8ddcd96789ad1c1f5273161686a71669bb9dbf533fd7eca685a04a147dd,2024-12-12T14:43:19.253000 CVE-2021-47072,0,0,954df5847b9e8b8847398a4fb353515add1c8b9bc355ca2ca788b956a977c290,2024-11-21T06:35:20.567000 -CVE-2021-47073,0,1,61fff509ff98c70b9c201e4106ec5100133e4908fe8990fbce9b00b4229f10ed,2025-01-09T15:24:54.467000 +CVE-2021-47073,0,0,61fff509ff98c70b9c201e4106ec5100133e4908fe8990fbce9b00b4229f10ed,2025-01-09T15:24:54.467000 CVE-2021-47074,0,0,49866fe835e78e03621976826fedc250f3287bb5acca2d0153d10814806d0b1b,2024-12-12T14:43:36.903000 CVE-2021-47075,0,0,36eeb7f2e930817c1b1fe865ad9fae545910e7fd96de6d94f28c455e8e24109c,2024-11-21T06:35:20.930000 CVE-2021-47076,0,0,d73ef7581eddf57c90dedb9553a930cea360fd3157b9a516f25e7504c936d196,2024-12-12T14:48:50.960000 @@ -192122,7 +192122,7 @@ CVE-2022-22488,0,0,751c29dbee36d83335b23168d227cd8328bede456f664b99f974a1bfe6336 CVE-2022-22489,0,0,5f1556c7256c6f92b82acd98490ae006367c358c421db4749ae385bce82df17d,2024-11-21T06:46:53.557000 CVE-2022-2249,0,0,ceabd1c20b10f38cdd0b712e84486da1a6a7b8ef842b2b1ebb84e463cbd612f9,2024-11-21T07:00:36.947000 CVE-2022-22490,0,0,593a00f1de774c9ec0a96444726f03fa955e796e0aa4f002be8bb0d843d5006b,2024-11-21T06:46:53.687000 -CVE-2022-22491,0,1,52e85de5e80c95fe72a7a5ed054ccbdb93d2768b6d4900f9a0439b596c518651,2025-01-09T15:15:09.430000 +CVE-2022-22491,0,0,52e85de5e80c95fe72a7a5ed054ccbdb93d2768b6d4900f9a0439b596c518651,2025-01-09T15:15:09.430000 CVE-2022-22493,0,0,2c81a9a1c4db3537835f820bdb8dfd63582e309e954db84e55dc0894d89b17e1,2024-11-21T06:46:53.810000 CVE-2022-22494,0,0,628b4d685fe11b805cdf2fdac5d4434648bcf8e613d0cf599e9aa7bdb337a1e2,2024-11-21T06:46:53.923000 CVE-2022-22495,0,0,df0152cb71335edc282cedfe69dc1685f87727909f151648d280807fd77b54bc,2024-11-21T06:46:54.053000 @@ -204245,7 +204245,7 @@ CVE-2022-37051,0,0,f9f5a60e888d559d1ab2bcafe356ee13479584911a3ed3048280916155f38 CVE-2022-37052,0,0,6a394760189288f7574f5b11c869f13acc8631383cdcb25608fb7dbdd19eaa35,2024-11-21T07:14:21.557000 CVE-2022-37053,0,0,dd19473a37f9d32e9ae7d0e20e0e36478a17051ccca407a238ae7c620e86e6e6,2024-11-21T07:14:21.710000 CVE-2022-37055,0,0,99fe1b90a1e738e90e5f6eac83ca05f6974b2b7663ae3f0f9c2eee4610867482,2025-01-06T15:15:09.830000 -CVE-2022-37056,0,0,ffca9801e43db0fd7859c7760e21bfb44c4c6230d11d373595083571b42b24f0,2025-01-06T15:15:09.993000 +CVE-2022-37056,0,1,135fe584c11f6b6a7ccb722620edfd8afcb2bdc67fe1193124d6faf3ffd02e65,2025-01-09T18:15:24.797000 CVE-2022-37057,0,0,dd28037e644edafa9fd9e43757050b1d91726f01db98eaf62a98a6312337c549,2025-01-06T15:15:10.147000 CVE-2022-37059,0,0,2eefb354470e4941edf10d216ad1f91f19208928aef8952c5bb7ab53efbd8d1c,2024-11-21T07:14:22.337000 CVE-2022-3706,0,0,e12338ac6ae091430a77dc88b3adb48260db8ec44fe506086ed6dcd27e6a25c4,2024-11-21T07:20:04.717000 @@ -214937,7 +214937,7 @@ CVE-2023-1903,0,0,efc0da96e9efec639f57af0da1386824a9dd54cff194afba825592fcb11607 CVE-2023-1904,0,0,ffbb7dc031b91f22a73be42c7f56c7040dc466cc7cc9e04b2035e3635dd9de4c,2024-11-21T07:40:06.983000 CVE-2023-1905,0,0,1c8e69e154302dafb57f6191602005d1fb9f553d13ff7fd58cbba47c267631e4,2024-11-21T07:40:07.103000 CVE-2023-1906,0,0,2474c3121c418f8f1b9c7898365edb5f0f5ff817f30d9fbbb045c48845873f42,2024-11-21T07:40:07.200000 -CVE-2023-1907,0,1,17434c9b55aaeec8c2bbd187b92c8a0c1370e44ddaaae0f0be8e16bb856a68d6,2025-01-09T15:15:10.753000 +CVE-2023-1907,0,0,17434c9b55aaeec8c2bbd187b92c8a0c1370e44ddaaae0f0be8e16bb856a68d6,2025-01-09T15:15:10.753000 CVE-2023-1908,0,0,a7f3750c6e61e1597fb00574a671512440b074bfd7d382966345f4da285e0184,2024-11-21T07:40:07.320000 CVE-2023-1909,0,0,e49817fc9d0a21e868f8dcf99cb6ba1f1e8637a8a1ac71c8aea4dcba2d56a97b,2024-11-21T07:40:07.440000 CVE-2023-1910,0,0,37c041e704ac5ae2514337a89fa66ad555ee848903b68628fbb411ed56a08fa9,2024-11-25T16:47:33.943000 @@ -214973,7 +214973,7 @@ CVE-2023-1941,0,0,dd2ee2d8a41982ad3f62b0340e08f23801b2d05e4a5c5a9e095f8862a85ef5 CVE-2023-1942,0,0,8a80f994d955a4aae8819b93e53f9a9b95fed01d83e4c2bb198ef2531a586af4,2024-11-21T07:40:11.683000 CVE-2023-1943,0,0,4a4b6ad156925ea8ff93976ed65f7b12228d9fcd2eb313a8817e804825978fc7,2024-11-21T07:40:11.810000 CVE-2023-1944,0,0,9f184b3e02f0c31aaeb83f9e2bb8508c7ce7afc7c7b54a5f17fd94e1d06d7915,2024-11-21T07:40:11.950000 -CVE-2023-1945,0,0,fdd04fc6aef0b0ed9fb34fdda8d5558ecee13ac3ab865415e297686debda5732,2024-11-21T07:40:12.070000 +CVE-2023-1945,0,1,0f4a95c884d1aa40e59ce218f24d130726e7f218eadf6722d0f6e4c1f7c97cd9,2025-01-09T17:15:08.213000 CVE-2023-1946,0,0,c66bba2b5f0b70d7a5ecfa1e71c9b7784ff978e82c51b8f24ac3b122bca826d7,2024-11-21T07:40:12.180000 CVE-2023-1947,0,0,30ec6c8e60269bd6a69558afe4e6f131605b90751e13689d8c4fc446654c0fe5,2024-11-21T07:40:12.307000 CVE-2023-1948,0,0,9a7b34697bdfca358d90932363e8f0521d6449eff2e9c1b5de0cf11a6e8e065b,2024-11-21T07:40:12.430000 @@ -218378,7 +218378,7 @@ CVE-2023-2391,0,0,842b5ed1e83f3843cc8ff569595999d59ab60a89d681911295b32b17482d8a CVE-2023-23910,0,0,63dd2cbd6ea1319bd3dfbe7034480d2df6c3610536e09ad75b890a6424f8445c,2024-11-21T07:47:04.990000 CVE-2023-23911,0,0,21f6240ed9aeb3ac846a763b503b5b3c1d795b32a63b3bf506eaaf00a1bef61d,2024-11-21T07:47:05.107000 CVE-2023-23912,0,0,161d529023d5efa110c9e01ceedff90a5c8e1f1dbacb3f558d319d2d5b757b61,2024-11-21T07:47:05.220000 -CVE-2023-23913,0,0,2e8c907a237617f09d2af6fe3eb12ddd30440fae4607e415ab1a121092147ab5,2025-01-09T01:15:07.257000 +CVE-2023-23913,0,1,9897ef3eb127d3e36d381f562c75b48d2950336d7df095f8384743a3b01afff4,2025-01-09T18:15:24.993000 CVE-2023-23914,0,0,121f340e4a39b81a4db03b348db17224f75a3193a520311b64556a5e4bc44031,2024-11-21T07:47:05.357000 CVE-2023-23915,0,0,dcd22de65c54681cbaaa36e8c3304723129cf00bf12179d0d4f5df436b3c2155,2024-11-21T07:47:05.507000 CVE-2023-23916,0,0,50b3eac92c83746250383e0d0c2541bdf9456b5720cc86fdbbe8c6ebf0f59647,2024-11-21T07:47:05.653000 @@ -218474,9 +218474,9 @@ CVE-2023-24007,0,0,6a24c347f0b8463b4572e0a24f9ca98a7dbd80db0fa8c7ec9e8bc11fd747e CVE-2023-24008,0,0,02a1ed0d1e18731487ef9c44b206e07e2c31abc738ce33c22e81a092fceef383,2024-11-21T07:47:15.373000 CVE-2023-24009,0,0,0c24bd24ff15762e844810a28a0ab724a37ac7c10dee186b8dce92a14ce8fedc,2024-11-21T07:47:15.493000 CVE-2023-2401,0,0,de3ebd2f5178f8cc174ba00a1341d9845db88638c383f99065882adf2e200bac,2024-12-12T17:15:07.527000 -CVE-2023-24010,1,1,a1b8fb65806a77ca547c45ff950a788755d7cbd488174e0ea12d8e894daf2183,2025-01-09T16:15:30.803000 -CVE-2023-24011,1,1,336d6d6cfdf8d9cd3a336a2fd4f38449967446cdc53a88d865b9f66b91698bfa,2025-01-09T16:15:31.323000 -CVE-2023-24012,1,1,bfe7ca5fb437c7517fae6158aeda73075c09dde9be3d1cd3bd0e7669583f3392,2025-01-09T16:15:31.440000 +CVE-2023-24010,0,0,a1b8fb65806a77ca547c45ff950a788755d7cbd488174e0ea12d8e894daf2183,2025-01-09T16:15:30.803000 +CVE-2023-24011,0,0,336d6d6cfdf8d9cd3a336a2fd4f38449967446cdc53a88d865b9f66b91698bfa,2025-01-09T16:15:31.323000 +CVE-2023-24012,0,0,bfe7ca5fb437c7517fae6158aeda73075c09dde9be3d1cd3bd0e7669583f3392,2025-01-09T16:15:31.440000 CVE-2023-24014,0,0,32f856f86fe8d2de973a5458b37a5a1dc0d01d6415d716c92f76c8a0e438acf8,2024-11-21T07:47:15.617000 CVE-2023-24015,0,0,9ecbc6a93f98518f757a2df0d46ee23ef35d716dbcadadf0691d5faa7144f101,2024-11-21T07:47:15.730000 CVE-2023-24016,0,0,b48667be27205d0b93087b031ab3c023bde5a4e35b4ee2229386ecdc467a170d,2024-11-21T07:47:15.870000 @@ -221084,7 +221084,7 @@ CVE-2023-27354,0,0,da8df92338820c5fb20f4e89f33e47b9c7eb5150157c3cb9df33e4647bb7e CVE-2023-27355,0,0,d2bda171b63f748905f526dc6ad3e975cfc4febb56bbae61b7a5e800be48b8ac,2024-11-21T07:52:43.850000 CVE-2023-27356,0,0,ca800bfb4f92a29dd2a2a1f653811d147a63f9e618a6ed4c52f852751940496f,2025-01-03T17:15:37.810000 CVE-2023-27357,0,0,fa65af5937538c2d763be0f2a055e197deaea902bb831ee9aafd5a0da56f6d5d,2025-01-03T17:29:55.853000 -CVE-2023-27358,0,1,438dadc72bd163600e19460d5d0e892bd592df8f7564e3b464d757af96acb799,2025-01-09T15:37:04.203000 +CVE-2023-27358,0,0,438dadc72bd163600e19460d5d0e892bd592df8f7564e3b464d757af96acb799,2025-01-09T15:37:04.203000 CVE-2023-27359,0,0,efe37eff2098ab2ebfe3e366776ee27ed09a254caeb19b2c1236a05179269e53,2024-11-21T07:52:44.960000 CVE-2023-2736,0,0,029afefcfee12ce70bc21ef9a9111309236914bda59377983cc5ec5de213ee16,2024-11-21T07:59:11.743000 CVE-2023-27360,0,0,0564779fef4214695b6ad370571e5e7ee15b6d75d9adea1008c74a2eedd2256d,2025-01-03T17:32:11.500000 @@ -221794,13 +221794,13 @@ CVE-2023-28153,0,0,0f96f112755f13c2f698695666f7ef05307d30a9cdadfed1b836b39db2b20 CVE-2023-28154,0,0,1789c944dd2f50f8e2f8697e5dad5368024e3d322efada71217c4cf620c70f0c,2024-11-21T07:54:30.030000 CVE-2023-28155,0,0,5f10453fafa7e761d33f7605b8a870efa0c943633ed9cc3fbe760cae904558de,2024-11-21T07:54:30.183000 CVE-2023-28158,0,0,b5d20082fb4d70d2147f05630323fcf1dccdac1f8b2eeab559e2a9ecbe9a5fbf,2024-11-21T07:54:30.337000 -CVE-2023-28159,0,0,62fbbcd6ae491aa2824c66e02e397e2997b707900c6f0e01862c1dfbb4abc056,2024-11-21T07:54:30.473000 +CVE-2023-28159,0,1,3a449c52c7ba4013bcdbfcd1295eb1a399ed8fac434b5151137137ea4a69c7ae,2025-01-09T17:15:09.523000 CVE-2023-2816,0,0,7c8e31ca0eb32cb0c7207d758c7d7a994717bb8d5393f58b08f93bb8ff77a290,2024-11-21T07:59:20.730000 -CVE-2023-28160,0,1,987b29e5210824909becba2f42f3b3a4d8fc4a041123d3cea0a6346a62a1e68c,2025-01-09T16:15:33.733000 -CVE-2023-28161,0,1,c890581001185b4c2fefd08567d2a22793be926d3446e92653a664ce14058305,2025-01-09T16:15:33.927000 -CVE-2023-28162,0,1,7670906448e68d1465478f461257d64909df72e6a102841dabea720153c37627,2025-01-09T16:15:34.110000 -CVE-2023-28163,0,1,2939c92aa91ad3d6c87c387d809393457d070b917c8e364bec8efb3a78478ff2,2025-01-09T16:15:34.343000 -CVE-2023-28164,0,1,f746c79b6a1335f4e1e0b224d5d4bce0f30bdeb934f44065a219aaa4ab97874e,2025-01-09T15:15:12.207000 +CVE-2023-28160,0,0,987b29e5210824909becba2f42f3b3a4d8fc4a041123d3cea0a6346a62a1e68c,2025-01-09T16:15:33.733000 +CVE-2023-28161,0,0,c890581001185b4c2fefd08567d2a22793be926d3446e92653a664ce14058305,2025-01-09T16:15:33.927000 +CVE-2023-28162,0,0,7670906448e68d1465478f461257d64909df72e6a102841dabea720153c37627,2025-01-09T16:15:34.110000 +CVE-2023-28163,0,0,2939c92aa91ad3d6c87c387d809393457d070b917c8e364bec8efb3a78478ff2,2025-01-09T16:15:34.343000 +CVE-2023-28164,0,0,f746c79b6a1335f4e1e0b224d5d4bce0f30bdeb934f44065a219aaa4ab97874e,2025-01-09T15:15:12.207000 CVE-2023-28165,0,0,b096553d347a2c690f97b7c4cadd84b54ba23f38c5fc2badf04c98fa2d2a4795,2024-12-09T13:15:25.550000 CVE-2023-28166,0,0,d3429a139a598910b164921c6bee579af1bdddf5d08463a2bcba7a0785dc3f9c,2024-11-21T07:54:31.227000 CVE-2023-28167,0,0,af1070958b87f2861cb3deffd67fd613f0b704fa7cb5ad48c59bb9b6558cde8f,2024-11-21T07:54:31.367000 @@ -222181,7 +222181,7 @@ CVE-2023-28543,0,0,e52a46a9ea7dfdf3cc35ae7bd0638d3245a59b1af5e4496f184ce798a95c9 CVE-2023-28544,0,0,c8eea89feae12afb6bac985a79adc0221b44974610249210abf82120fa6d6f04,2024-11-21T07:55:22.083000 CVE-2023-28545,0,0,ae45765de4d15325e0d1ba08a6ae86869e1f6c4cd19ebd7152760371eaef229d,2024-11-21T07:55:22.540000 CVE-2023-28546,0,0,e5f120e5599e97fadb11cbbdeb51648eeefe67d28fa3b5ba36467d1aed6f2276,2024-11-21T07:55:22.947000 -CVE-2023-28547,0,1,15c03d444a9436bddf82d90964f8435b6851e0d524849793214a6b8ff8d1c526,2025-01-09T16:17:24.953000 +CVE-2023-28547,0,0,15c03d444a9436bddf82d90964f8435b6851e0d524849793214a6b8ff8d1c526,2025-01-09T16:17:24.953000 CVE-2023-28548,0,0,a7b057389a1bd3ddc9a44d1a1a56fb33c1055a5a45fcc784b2e7a67944e2f82e,2024-11-21T07:55:23.877000 CVE-2023-28549,0,0,727182d4f5ccdaf309a3cf974f353c569ca0713b57fc162226d46f2fca2ce6da,2024-11-21T07:55:24.253000 CVE-2023-2855,0,0,008e8354bc679f9889f6cb5f0292cfdabc0f158fde1e193ae05e057c9e83dfdd,2024-11-21T07:59:25.707000 @@ -223179,8 +223179,8 @@ CVE-2023-29714,0,0,f64975efb15c581a3eb606f94a31330a7ab5e099f36c5c0db97a36c33a46b CVE-2023-2972,0,0,d5c968d2bb89a1b48ddfc3f682f9483a90bbcddb7cf510116994e76efad62b91,2024-11-21T07:59:40.277000 CVE-2023-29720,0,0,1f61853af6e31b6d17a1f07774bef430ef61e62aac6cb8edc9d923d77020b562,2024-11-21T07:57:24.780000 CVE-2023-29721,0,0,16bc6df95e94fb6a5ef25e342a42709e7a4b72452d3121be94f25487bab35666,2024-11-21T07:57:24.930000 -CVE-2023-29722,0,0,2303a4a35c865e2854536c12e174491e5ff732a5659c8412d42d68b1b5eff76f,2024-11-21T07:57:25.073000 -CVE-2023-29723,0,0,8cf5c95d58605565e8f6ab042e6525cd3ae54d69fe2f07d70439054bb34d5d4e,2024-11-21T07:57:25.203000 +CVE-2023-29722,0,1,695aadf048ad09ea7d0fa795d1abf3a163d64bc0e0271d705ac95188359d83bb,2025-01-09T18:15:25.153000 +CVE-2023-29723,0,1,303fcea14f09e3d0e64d1a961af341a2b88ba23c47ab885ec21656a91d852499,2025-01-09T18:15:25.333000 CVE-2023-29724,0,0,b957a3fcc2f908978b34709bccb4beaef482657df33bc886f526eec59e4351ea,2025-01-08T21:15:08.470000 CVE-2023-29725,0,0,ab64230b18916f62d493ac57f81dd5cd07baf6987ff2e6626d94f28801370f14,2025-01-08T21:15:08.740000 CVE-2023-29726,0,0,5edc83c46b4a4e4c7f7af4e90e64c34e867ab2e973eaa6365edabd0821085e67,2024-11-21T07:57:25.623000 @@ -223192,7 +223192,7 @@ CVE-2023-29732,0,0,f94e9686fbe519a8c495df8ed366b108e9bda254de50a7c6d104ea710cfbd CVE-2023-29733,0,0,c51bea24c064b880a851146bc05b8c6e822c81e733f1c202e53690264330aa3f,2024-11-21T07:57:26.323000 CVE-2023-29734,0,0,d2512d2c554e758ed63e86670d1f9584041b9a42fd646ee9680b58f2d7d670cd,2024-11-21T07:57:26.463000 CVE-2023-29735,0,0,ac0fbbbf4c20aeb8486bb27338eec4c385ff2696249b5748dda15ac99705a956,2024-11-21T07:57:26.597000 -CVE-2023-29736,0,0,2b80d2263220b8d97b11fd6a13cdb154e7aa9e757210419794be9e74f1a41c0f,2024-11-21T07:57:26.743000 +CVE-2023-29736,0,1,009507085341f8bc239b33226ff4a399f9b727c2c45fc6f4758061eff269be18,2025-01-09T18:15:25.493000 CVE-2023-29737,0,0,20ab0f22b4b2ab035f6c6b50227cd9494620ad841b1b1824a90174c2ef52d2ae,2024-11-21T07:57:26.890000 CVE-2023-29738,0,0,5ceb70c7bc783ad5cd61ee05d3116bc2a3c6d05670b1c9a685b4f525e90b05a2,2024-11-21T07:57:27.030000 CVE-2023-29739,0,0,6bdb2a29dbe515525140288cb3b1c706ed59488ca2c6ccc8fee6310c2bb04f85,2024-11-21T07:57:27.173000 @@ -223204,7 +223204,7 @@ CVE-2023-29743,0,0,4e343bfe2c90db6c5c6eae7c79e7bbdbef00ae4d945362466d77b4fdbd049 CVE-2023-29745,0,0,68e3675b29535613bcb2472df3ab338bd82f6db11be2be773fa63d5dc8c2934c,2024-11-21T07:57:27.887000 CVE-2023-29746,0,0,133c031c39348c96f95d9e43b02a0f81b2e172f555bea6970e402c248a23e4a6,2024-11-21T07:57:28.020000 CVE-2023-29747,0,0,136ce121e376918b0a32772053c87673baadc2f913087856d8be12a0c0a8f781,2024-11-21T07:57:28.170000 -CVE-2023-29748,0,0,a4e83df62ba2577db9b71c893df3464a133c4513399945481272b650f70964fe,2024-11-21T07:57:28.317000 +CVE-2023-29748,0,1,3bb616611a42918b2d8d55bbdc2fe5b94fea76d10f8313180c5224af166ba7e2,2025-01-09T18:15:25.667000 CVE-2023-29749,0,0,bee435745394068e96f0cb8168118acb0d5340cb0881d4dd204dc44457c341ca,2025-01-06T18:15:13.163000 CVE-2023-2975,0,0,eff2e981c6d761b203377651befd2b307795817f2e933153b4cfe0cdd2ccccca,2024-11-21T07:59:40.690000 CVE-2023-29751,0,0,9e80ee2a4e5e9c03521d242a06ec1b47864e2c325cdbc8b3aaa09507ee90d366,2025-01-06T20:15:26.433000 @@ -223219,7 +223219,7 @@ CVE-2023-2976,0,0,b03475082f280b2feded368efd6f1b9f33545192f289f4208674beed7a69ee CVE-2023-29761,0,0,992d2056506a2987fd7ab2b68c55346a067e713bdeb552e0dc79bfbfccc4af58,2025-01-06T19:15:11.883000 CVE-2023-29766,0,0,e147ab37d4dab4567b8cc411515720d6b96417916c76b495c14d4fdd1a43c279,2025-01-06T19:15:12.067000 CVE-2023-29767,0,0,b68faaf3b45ffb0d2cbc64ebbea41b6a0ffb61e7f1e4d4fda9dfa4cba199dc98,2025-01-06T18:15:13.400000 -CVE-2023-2977,0,0,1a752c54f745f538d9c93d46f646c0f344e447c42a75ce35891896c78e608b98,2024-11-21T07:59:40.960000 +CVE-2023-2977,0,1,20bdfa4fe830195862d29d75a36a569d8db13c8694be1f4fd35b646a0f9f4378,2025-01-09T18:15:25.850000 CVE-2023-29770,0,0,2194bec03536589ba63983ee5a9fc8756c676ff1e07518ca2875ebc40fa29460,2024-11-21T07:57:30.110000 CVE-2023-29772,0,0,236d384474273915c0e96c3d9fc6b4ea5ae20135fdb39e54b28539475f08e864,2024-11-21T07:57:30.257000 CVE-2023-29774,0,0,3a3d6c78cfec542f798df791970125d5815d94e715fc487a8d0026f4a219bbbc,2024-11-21T07:57:30.403000 @@ -223875,7 +223875,7 @@ CVE-2023-30754,0,0,62c232ba670b05bb9a24d2118264b62e9b1680077a4fd46b96441afdcdc0a CVE-2023-30755,0,0,0da84c32e644b9ff47f71b6aa8c8a3157711a8ff8b1f941b968146b0ed950f89,2024-09-10T12:09:50.377000 CVE-2023-30756,0,0,d3b979c5f0f9ea4ec3f2980feed339808bc75a3762f808c9e1822bd9b96ed90f,2024-09-10T12:09:50.377000 CVE-2023-30757,0,0,7a3139987a120b8bfbcf14769e62683750650826dc18d636318bfee1f5035a8c,2024-12-10T14:30:34.017000 -CVE-2023-30758,0,0,69789da5f8f59db8a057dbcc738c84dadc223d98fbb066bd2249c87113264f6b,2024-11-21T08:00:50.750000 +CVE-2023-30758,0,1,b97068120bc56dd3fd041d56779b7df91fda3520167e13f7c317432382c51c97,2025-01-09T18:15:26.083000 CVE-2023-30759,0,0,e3f6846ace05560f9c09c1d35874a157f57ea7e2bc1faad6b9eb3ea11e876614,2024-12-12T21:15:07.260000 CVE-2023-3076,0,0,d008cda2cdfac6bbdcbeeb6338eac7a719e6e3a4220fd820508d02a6856e7e80,2024-11-21T08:16:23.437000 CVE-2023-30760,0,0,8ce1174080c412d47616cb62cc2689d1ae6e7692c25094a976eaf3d28ddfb223,2024-11-21T08:00:50.987000 @@ -225691,7 +225691,7 @@ CVE-2023-3302,0,0,6a18e35da5e9b490e89e0a6d88c5d10225b52b29e5bc006ac0764582343c56 CVE-2023-33020,0,0,89c99aed7d5a4107df535aaff534f7be5caad427a563c04b987a35f09de50fb8,2024-11-21T08:04:26.573000 CVE-2023-33021,0,0,9a9d6e8d41fa4e22a70832f5acc8d47127968f635ef24478e1d96c799e21b695,2024-11-21T08:04:26.810000 CVE-2023-33022,0,0,a6b9811400f818a910573d29026f6f96f2ffe10ae86c10c37fe53a4989dd913e,2024-11-21T08:04:27.163000 -CVE-2023-33023,0,1,d8491a55edfd51e4aeb3ad2ebb88d14ccdb7a19523469caa519625c4efc1c9cf,2025-01-09T16:20:50.163000 +CVE-2023-33023,0,0,d8491a55edfd51e4aeb3ad2ebb88d14ccdb7a19523469caa519625c4efc1c9cf,2025-01-09T16:20:50.163000 CVE-2023-33024,0,0,512eaac2da5a238b6b0093ed5779b998482913ad977e3b54189e665a60d190a8,2024-11-21T08:04:27.850000 CVE-2023-33025,0,0,bb7c17277517b0bf9e127c5a39cb12e13c373cde5217ba3a95212006982f2073,2024-11-21T08:04:28.040000 CVE-2023-33026,0,0,7cb9a1e9fb79a51e8a785540a2738e2a83c5e18bd48feff17a5b536da2193a95,2024-11-21T08:04:28.200000 @@ -226058,7 +226058,7 @@ CVE-2023-3345,0,0,219d5c772aa02f0c4a4b16b09721d8934adb3c1505c85a870be2fa6ad37ab3 CVE-2023-33457,0,0,7eee79e2e603000fdc9c79d0c7f54a28226aded759ba1bc0cbce35446680feba,2025-01-08T16:15:29.587000 CVE-2023-3346,0,0,09f68a6670d4a69cff8e11fa4ad9eea39d73cc8d7fe0a2dacd2a911bbd61aee1,2024-11-21T08:17:04.037000 CVE-2023-33460,0,0,6e418258c1a2b91b79efff9c4f69791d5894d1876ad79ba0f82b40a9644edd3e,2025-01-08T17:15:12.020000 -CVE-2023-33461,0,0,ce5229701e545884ff53bba52824ca76317925574fd4a34ac97d8d9ec204f20d,2024-11-21T08:05:35.730000 +CVE-2023-33461,0,1,73789af10b9ae0fd2efb66f1e3bc26a3e0c8473895c51caeef38c98c5b93ea6a,2025-01-09T17:15:09.730000 CVE-2023-33466,0,0,8f3bb95382db1efdd63c10853d2c8cab520a0781d1269adfe6c9d0fc3cdbbf5b,2024-11-26T19:15:20.670000 CVE-2023-33468,0,0,4e03c49a7594212a8b1ff77b489a307327dcf22bee135bc562fbafc7e39748ec,2024-11-21T08:05:36.110000 CVE-2023-33469,0,0,994bea01d55c6edda4d230c6ca8daa28df27e07f5b1b8935938681fe0f2d3bb6,2024-11-21T08:05:36.320000 @@ -226101,12 +226101,12 @@ CVE-2023-33536,0,0,4483a4c84bae9df5f08f3544144640e560096a5f4d7b065a9e0bcbbe03247 CVE-2023-33537,0,0,06a836a8ec9a8a82dac73cdff5c990d7b4a0e29c9bc271ecada9cf746e2d2bd8,2025-01-07T16:15:31.423000 CVE-2023-33538,0,0,b3b643fe39302a1c48ae218034aade7823381ded5695561882bb311b6c1280d5,2025-01-07T15:15:08.190000 CVE-2023-3354,0,0,c1971a8d35c84792a7e3b4b69170665e207a3bb365fff75d5a707072047933e4,2024-11-21T08:17:05.117000 -CVE-2023-33544,0,0,88bef72ec7a83ed8f48a74d9d233d68d45815d12dcef7901cc8dd38c21b6c141,2024-11-21T08:05:41.690000 +CVE-2023-33544,0,1,ea770ac3095100c0cf3dfef2c91d44acce796d4bc92ed10e70a1e80795446c94,2025-01-09T17:15:09.997000 CVE-2023-33546,0,0,9e82aede766f4b9b701714d917a2868af3b3571a49bd4b295d6aba2bb98c278a,2024-11-21T08:05:41.850000 CVE-2023-33548,0,0,b51dc1575c1f7daa608b0b5836c474f314a242a913214763d5debf853883d3e8,2024-11-21T08:05:42.010000 CVE-2023-3355,0,0,66c43df3dd0ee91c832932172c9cb5c8a55655cbcbf5f77d9dc727f70b08e4ec,2024-11-21T08:17:05.290000 CVE-2023-33551,0,0,15ca22be4f110c38b80ef279ae23e0f0520d88f7835dffae7ff26ecf6ce6cde8,2024-11-21T08:05:42.157000 -CVE-2023-33552,0,0,d954eec01e7648a78344657472a098bc82cdf50ddc5f7580444f9b507c1e3dbe,2024-11-21T08:05:42.310000 +CVE-2023-33552,0,1,ee1087ccfd9a3e3baacbad0d60bd717ae7303666f219bedcf581fc6b1a61de5e,2025-01-09T17:15:10.250000 CVE-2023-33553,0,0,100e48dbe8dcd919ffada509e862616914253c61bf4e10f091c0f3eae04e1bbc,2025-01-07T15:15:08.367000 CVE-2023-33556,0,0,296f7cfa4be2684388b87c0d047b815a94475706490d2524330b63115be6fe38,2025-01-07T15:15:08.523000 CVE-2023-33557,0,0,cc03734a1aa1840f74f9352ffd50d3d02541603dee095c93032d40edd69bf2c3,2025-01-06T18:15:15.217000 @@ -226199,10 +226199,10 @@ CVE-2023-3370,0,0,9dddf58da1ae42a7566c0b92e84336c0d08e63f3c33e8ad56b0a0ee4f51516 CVE-2023-33706,0,0,fad1968fea65403211fd2c9385b3602092ccc20b01e9d150d57322ea4fc84c68,2024-11-21T08:05:53.283000 CVE-2023-3371,0,0,df34f309dbb56ab4c9e10189049735675c625cabb2e1178e461a2d83b4b45473,2024-11-21T08:17:07.337000 CVE-2023-33715,0,0,70f8ea39909ccc7d7fedfea0a5651610ab41bdd10d186bbb572c059a14a3b869,2023-11-07T04:15:24.220000 -CVE-2023-33716,0,0,7b7604c19d61f731509886830b48df38fb105a9ff3e0c4a119ce7f619853d73e,2024-11-21T08:05:53.460000 +CVE-2023-33716,0,1,4db99c9c1621fc404197baa253ff070fe3c15ce45b5a77db9ce4d83a97546dcc,2025-01-09T18:15:26.273000 CVE-2023-33717,0,0,0cc9e8551affca6d31d9fa047b600ffdb3ddc33ab5b125ddf432d7a93b0fcd71,2025-01-08T21:15:11 CVE-2023-33718,0,0,1586778d15355ffee6648b131924ae371a3d2019604b5073fe93a8180e3a40a7,2024-11-21T08:05:53.770000 -CVE-2023-33719,0,0,e8d9af2859dd56526dff03f2841c96e8870510e475c2a98cbdaa79fea915b66f,2024-11-21T08:05:53.927000 +CVE-2023-33719,0,1,d00c5f95efb97cdb3bff500a13a96570ea04e4dcdf87867c9053c065db4b5e7b,2025-01-09T18:15:26.460000 CVE-2023-3372,0,0,84f21b60d2b56cb6d011b3c76313017d3ef2b1ee20e683414c273e919f5c98c6,2024-11-21T08:17:07.493000 CVE-2023-33720,0,0,49c5977ed0f3bfeda29a066cdc9aaf5213c67aeca9e267720e129fdb485032f6,2024-11-21T08:05:54.077000 CVE-2023-33722,0,0,577f04a66dba80af8edcb620e449171536c8a33547fdb2eb1e16f5993cabc42b,2024-11-21T08:05:54.217000 @@ -226226,7 +226226,7 @@ CVE-2023-33747,0,0,d2699a05616f30c1e7ca483405ca99837def2bbf37b557a89a642263da86f CVE-2023-3375,0,0,ed69dd5f2d60488645045aa54f0e29533bc4472a62197da1d6611e55b211edcc,2024-11-21T08:17:07.917000 CVE-2023-33750,0,0,aed6daf7e716a87fceec1eed9329a12707fd14ed21830eebad1771c0c1c58668,2024-11-21T08:05:56.653000 CVE-2023-33751,0,0,922b1876d9efd9122a1657bd36c006c98332bec0d3fdd66cc5db930306beadd1,2024-11-21T08:05:56.800000 -CVE-2023-33754,0,0,b9b8c665e76820cd8e6dd40b85a415d9f8cb34523b670061ac90d459b7122477,2024-11-21T08:05:56.947000 +CVE-2023-33754,0,1,551589754bcad06265eedd49f40286694f147c2d672aaf48d8f22b3c72ff7ad3,2025-01-09T17:15:10.470000 CVE-2023-33756,0,0,93e2630186b706017f2ab92a12986cb000cfda357a93b4031862c9863dcca035,2024-11-21T08:05:57.090000 CVE-2023-33757,0,0,2abe9e84e22c94d2d9937dd6326625a6d4e8b0ac9bdc5c42a38f0cae598eb1a3,2024-11-21T08:05:57.263000 CVE-2023-33758,0,0,6eb30d4e57047cf78716b1a561c980b2c569f119a705cede04e789e29e71fb09,2024-11-21T08:05:57.423000 @@ -226236,11 +226236,11 @@ CVE-2023-33760,0,0,66395363814916b245c0a8e20054660baa6a6c6428560780ce09fd6c751d5 CVE-2023-33761,0,0,57a93ac893ae35326e39c092126e5e13d5e331d3b8372e3a303e80db32ec6902,2025-01-08T20:15:25.050000 CVE-2023-33762,0,0,38f5fcfaba70048850b3e019780dd18dda0074fae37a3f2fe1c49610ea38ff47,2025-01-08T20:15:25.250000 CVE-2023-33763,0,0,4b714c19fd58c23cabcc96b7c2627201896bc29e6a1b69cfe75a61bb1cfa788e,2025-01-08T20:15:26.130000 -CVE-2023-33764,0,0,25064556854711887dc1bb6f6f1cf49e5299f880c7c82df8184b1321f68c6f8d,2024-11-21T08:05:58.363000 +CVE-2023-33764,0,1,dc98ceb4eaa4a9b71101129c16945b154bda68892aee5a114fa0c4bdb2b72a2f,2025-01-09T18:15:26.620000 CVE-2023-33768,0,0,06ef0c0decf4640dfb51ab40e4d57977e0315f708c6bde014cfbf4d1da8e9b5e,2024-11-21T08:05:58.517000 CVE-2023-3377,0,0,bfef5eba24979a4babeeac5a2ac2afab2bc4aa25a44e9271085be4c4d2c0fcdc,2024-11-21T08:17:08.190000 CVE-2023-33777,0,0,50a5f477c0f4706aa508d2368fc5f7e983bca67878ee542bcc66695b11a8545c,2024-11-21T08:05:58.693000 -CVE-2023-33778,0,0,a42a0c1ec1262b6938bad9833717ee5df22f921f3c2249d491299db7d9b42d9c,2024-11-21T08:05:58.853000 +CVE-2023-33778,0,1,ec297d113928561e7859958d46d7eccb202240d5061dd5aa70f2fa420f9137e8,2025-01-09T18:15:26.790000 CVE-2023-33779,0,0,1eb55c2bfcdb14a79b3fd3b01e17b005110092a805fd4ef937e8dad4263f6c70,2024-11-21T08:05:59.100000 CVE-2023-3378,0,0,b0837eae984d75a22386db3789972e8c74c698027c143f4d7579a37ec8c86ee2,2023-11-07T04:18:37.350000 CVE-2023-33780,0,0,9ae1d559f1968f9d1c9b4ea057170a356d47e42b68a94bb638f2d18fa1a6a09f,2024-11-21T08:05:59.243000 @@ -226751,7 +226751,7 @@ CVE-2023-34309,0,0,a5bcf49901f3cacd43210ceb43a5eb2625a00bc48d4ccf5a5d61e770b756d CVE-2023-3431,0,0,47d5fe33fa45796e2b60627714a7ecf0adb44c979d9a3cab7c6aa40ff24f8ebf,2024-11-21T08:17:15.083000 CVE-2023-34310,0,0,d721df5238a9cfdfe886488fab8e06b0eef6a25c6410bddb9a10e4a475f4ac8e,2024-11-21T08:06:59.090000 CVE-2023-34311,0,0,a93e4a6e12e53e897f90d598b9e7bc481d789fd2af799c57a1445fb0fd449194,2024-11-21T08:06:59.213000 -CVE-2023-34312,0,0,762945ffc2943ac0fd1e570a0c5535b6e502b77f856c0d70f3e41f2c45148640,2024-11-21T08:06:59.357000 +CVE-2023-34312,0,1,443247c34fb5fdd29ae4e4348cf5ce61af549f386bfc16c3b4b4ef357aec9518,2025-01-09T17:15:10.757000 CVE-2023-34314,0,0,78e82052be492c6cb71fedd8385b825ffb4f86961fede5bcf9258eaf01737e2b,2024-11-21T08:06:59.533000 CVE-2023-34315,0,0,d7e134dcc60888edf7812914f1fd263be02b8117a702f2bd76c4b4ac691e3cf0,2024-11-21T08:06:59.670000 CVE-2023-34316,0,0,712701f3aa4dd7646f14528468aff56617b664d7bd54156f30fb2658c544a751,2024-11-21T08:06:59.807000 @@ -230027,7 +230027,7 @@ CVE-2023-38723,0,0,c0b7da50016495e27fa04b70a8cc557032c60d05cd9c0ed17709534e17fd5 CVE-2023-38724,0,0,d59e90f67976217e8f636246851df9c527001c49ed9a26468d50fc52a76ccd3f,2024-11-21T08:14:07.423000 CVE-2023-38727,0,0,d232fac763f93dcc72f2df82ad0da1b2740fe808331eb90889f51508ad22bd7e,2024-11-21T08:14:07.570000 CVE-2023-38728,0,0,b278d4bde976c6edf9881102f2b5d31a5bfcd2ee2d690bfbc635338ecd9048fb,2024-11-21T08:14:07.723000 -CVE-2023-38729,0,1,cd103430ecd07bd5c6af9e8f3cbc3544f32040f71e6ad57b9e159688f8de6afe,2025-01-09T15:15:12.583000 +CVE-2023-38729,0,0,cd103430ecd07bd5c6af9e8f3cbc3544f32040f71e6ad57b9e159688f8de6afe,2025-01-09T15:15:12.583000 CVE-2023-3873,0,0,799c9e2ab21dedf3f02114f50a9f6aae184493743d0bf44ab6b034eb1fa9c32c,2024-11-21T08:18:15.577000 CVE-2023-38730,0,0,c95981d48be8dac3762657b93e0c48c804cbd968f06d46e3acb90dd1df8cbc3f,2024-11-21T08:14:08.013000 CVE-2023-38732,0,0,fc84d890efc559722c43c3d61c5aab4f0378d22c8b96f52c2f8f403a2e64fff2,2024-11-21T08:14:08.157000 @@ -230616,7 +230616,7 @@ CVE-2023-39467,0,0,817f908c62b12ffb0fc1ecd473b5e55bb66887b0edee02a427bf2c3ef3c23 CVE-2023-39468,0,0,ea3d874a3c8ddf52e59332b6a34fb8c85536681068f9b000ea95be8928f3c9ce,2024-11-21T08:15:29.043000 CVE-2023-39469,0,0,7aaacc88f4bf4b562a45fc649eb56721bce63e74bc433e287c53f211624f752e,2024-11-21T08:15:29.180000 CVE-2023-3947,0,0,a882b8170091b888362dd968275aa1d03f197bce9f60b79e29e3ff20eeaf98a2,2024-11-21T08:18:23.003000 -CVE-2023-39470,0,1,ce6409ef0267ddef1aa9b64420d22c73981db36d5f3e4981a8ab237750875895,2025-01-09T15:46:02.227000 +CVE-2023-39470,0,0,ce6409ef0267ddef1aa9b64420d22c73981db36d5f3e4981a8ab237750875895,2025-01-09T15:46:02.227000 CVE-2023-39471,0,0,e36e6acbad3c0111cce5d3933ca4f104103e93885f2ea148b492ede0a1e34014,2024-11-21T08:15:29.303000 CVE-2023-39472,0,0,04f211ed1598e6ee1a061c13e41dbce3347763ddbb2b32db8f192213fa06f143,2024-11-21T08:15:29.420000 CVE-2023-39473,0,0,58b1fde4612c6ad8ce1039f207b2401c323b536fa670df73af9169c48c5e93a9,2024-11-21T08:15:29.547000 @@ -233638,7 +233638,7 @@ CVE-2023-4355,0,0,31e03f4e6ed9da3337f02df7b2a36e634a929103c7b5b7f716c88e82351c62 CVE-2023-43550,0,0,9116db212c63f59f1e961755c524db564f0505f9e6ef2eb6edcbc4facfc909f6,2024-11-21T08:24:20.913000 CVE-2023-43551,0,0,c6d6594514e008e5f5eb6cf6fe49b89489e4b66c0c963652f49cdd38190f788a,2024-11-21T08:24:21.137000 CVE-2023-43552,0,0,5d555ba609f6e06ec5181357be9a90908be283d642c20b46da61b3cc0473c82c,2024-11-21T08:24:21.347000 -CVE-2023-43553,0,1,682f7d23ef8b45bcf50fdf913eb41bf598d75002eaef8d47d9fc2f3b01a78ee5,2025-01-09T16:13:46.290000 +CVE-2023-43553,0,0,682f7d23ef8b45bcf50fdf913eb41bf598d75002eaef8d47d9fc2f3b01a78ee5,2025-01-09T16:13:46.290000 CVE-2023-43554,0,0,ff9e342df67acc361772ce756ca6aa590135fd661810b5be1b959abd99f4154d,2024-11-21T08:24:21.780000 CVE-2023-43555,0,0,bc25a97104aae8f848caa0d79e38e515c16028dde8c76756739290c2abccfc42,2024-11-21T08:24:22.017000 CVE-2023-43556,0,0,7687bba0bd1d47443659047e96d5e00b125073782ad27a03cd5936564268da53,2024-11-21T08:24:22.213000 @@ -236802,7 +236802,7 @@ CVE-2023-48068,0,0,9925cf1603cbf765c65e72a2a850403dfd97ecc36b2289682be1a9c50b44c CVE-2023-4807,0,0,620b132307db3f6f2bb7e18d5353c627ec97616d5132b4d5ab5c7049ee765f56,2024-11-21T08:36:00.613000 CVE-2023-48078,0,0,c00a34b2155b03134fcb71a136a573c4ca124e70fd5c11ad7c6b0156e7d076eb,2024-11-21T08:31:04.257000 CVE-2023-4808,0,0,1e248f811281a2283818508423115c4f5b2209c6a3d1e643a18ee20419e43c2e,2024-11-21T08:36:00.777000 -CVE-2023-48082,0,0,ab81796b9e11059a14bac61c2980355192e44525ba344fd9430f39cf8a406629,2024-10-25T17:15:03.903000 +CVE-2023-48082,0,1,a7812668f9e8838374689293ad69a555ede53f151772e7eebc760f5f3564285c,2025-01-09T18:15:27.130000 CVE-2023-48084,0,0,b9fbaeafe3cbbef02fa1ee7ff6f293ae50c0b1ac60029655c70d5c4ef083ad94,2024-11-21T08:31:04.710000 CVE-2023-48085,0,0,b173e19803ed3a1e9a75fa1cf0a9f8bd9f7858382985a14af5cbf3d19ceab825,2024-11-21T08:31:04.873000 CVE-2023-48087,0,0,8b296318ab748138cc44a05b6535055adbe0dc5ab26fbf63a6cf2caa0f5e6da6,2024-11-21T08:31:05.017000 @@ -237805,7 +237805,7 @@ CVE-2023-49271,0,0,3ee7fe5fabf65ae91d91abd3dccc841c18fce80fddef5eb9b4fd417e38f08 CVE-2023-49272,0,0,0946094207708538d60d035a18fc96e57bc231ab115abdedd6facdc34eff0a1d,2024-11-21T08:33:09.540000 CVE-2023-49273,0,0,4f35abcd5bcdd766ba76465bb84e443958f51a8132140e975e02f10a3dec77af,2024-11-21T08:33:09.653000 CVE-2023-49274,0,0,7a10f5bb5c7d27aa1d630fcaa313dff6b14980121c4305bb03dc8f0c827fb955,2024-11-21T08:33:09.790000 -CVE-2023-49275,0,0,f26573be6546b84af17534749f7e117d4eb5613eab0b248aefc21fce3648242f,2024-11-21T08:33:09.917000 +CVE-2023-49275,0,1,09f484300df19ce3359a6b8817e9475087ed9b0503cafe6f535b5680a58d6d7a,2025-01-09T17:42:46.960000 CVE-2023-49276,0,0,163f056daa92c1728dfc281cacd9f899d52d023e14a63d659fd9d938e1a46053,2024-11-21T08:33:10.040000 CVE-2023-49277,0,0,87da47a37da0266815ecb33f285ea0e3964c01a1d9cf49535a95cb9fa8a40d86,2024-11-21T08:33:10.167000 CVE-2023-49278,0,0,3b7c27ffd487bef673a65ca3ae26c5ab00ffdb39a26d53846eeb7b38c498ea7a,2024-11-21T08:33:10.300000 @@ -238483,7 +238483,7 @@ CVE-2023-50257,0,0,422bbd5b173542f5638fed112002b594b70f76b4620b6b6706dc89a677585 CVE-2023-50258,0,0,847fa1f0f820a174925ea6fb780e6cf01b87f2b699c99f9c70c4db921dbd3519,2024-11-21T08:36:46.033000 CVE-2023-50259,0,0,9f991c0c57473e6d502a9c6f82897d37226c244db1d75ff551d7e3bb115df69b,2024-11-21T08:36:46.160000 CVE-2023-5026,0,0,6f3ad55e3005cc6b320278909fb4588d9e0224f859df01ede35784fbb5292522,2024-11-21T08:40:55.157000 -CVE-2023-50260,0,0,afbd2fc123e1fe06425688c1537fc824db444674501dc7444b2901594dcca472,2024-11-21T08:36:46.290000 +CVE-2023-50260,0,1,59768fa8ca1d0d0a15a3809fa5e10b63da570b2af41200d141437522599a07f1,2025-01-09T17:41:36.720000 CVE-2023-50262,0,0,cbac494b3a55c49581e86ea6f9f79a8ba5aa93a5b898512d29915aa201f1bffe,2024-11-21T08:36:46.420000 CVE-2023-50263,0,0,6248dfe38cbcbb15a6b1bde2a956eca930f019b419e3d34efb60804dd3e6f99a,2024-11-21T08:36:46.563000 CVE-2023-50264,0,0,77005a1b7b7ce9223325433d0848d2dfe06c950a94756fd4438e4f05b8df690a,2024-11-21T08:36:46.707000 @@ -239853,7 +239853,7 @@ CVE-2023-52331,0,0,62ef0031155309b76bb1f307755a4bd733642066bdc308fc86dafb7e927b8 CVE-2023-52332,0,0,8e6f1fc64aa83640f459fb8fd857ece347956e5cc83ab68fd06d6a37232c65a6,2025-01-03T19:29:05.487000 CVE-2023-52333,0,0,a8f9329a651dddc94300c25b63ddcd98738fb66152c065975b86094d0524712e,2025-01-03T19:49:29.147000 CVE-2023-52334,0,0,414d78dfbc068faf1ec26bd6ac4b7d3e27d68eaaed571e69547d9e8cff27fd0b,2025-01-03T19:54:44.617000 -CVE-2023-52335,0,1,fe69896d5e68ca16b373355e913cfc3ab6ceb4a49943631647f618d20cf9ce65,2025-01-09T16:05:53.673000 +CVE-2023-52335,0,0,fe69896d5e68ca16b373355e913cfc3ab6ceb4a49943631647f618d20cf9ce65,2025-01-09T16:05:53.673000 CVE-2023-52337,0,0,5d30b2e795d30af25a7c2557afed1bcb45315c4a68f523353a17c18460ac449a,2024-11-21T08:39:35.070000 CVE-2023-52338,0,0,a8379d6b9439ab072316828f426542121a26cdd77617df5ce049082cb5dd92bc,2024-11-21T08:39:35.220000 CVE-2023-52339,0,0,c232e5beff640262d179f48a1b35143cbfe7ae848e34c1a4d068ef49caa03384,2024-11-21T08:39:35.450000 @@ -240464,7 +240464,7 @@ CVE-2023-52917,0,0,ad07ff99d1b6f5c28213275a00a82b217dcc6f45e2e5c6b28e6f348e60140 CVE-2023-52918,0,0,b756056ec028a3f8dbe95359b4e6a9ee9c3aee022710af984fbcd888a01bb989,2024-10-24T03:55:26.737000 CVE-2023-52919,0,0,428ae0b617ce1503b5cd1e233daf56322f531cad4cdc2d0ff04fec45c15d021d,2024-10-24T03:53:16.377000 CVE-2023-5292,0,0,053cd6bdc838ec8e58310af23c6d4e5e608dfbec5f41437eefe04e4d3a1ca985,2024-11-21T08:41:27.907000 -CVE-2023-52920,0,1,d3f31fdc95b4a67b67ed332bc8577a6c103a6cc3b65bec1715fea71c281674f5,2025-01-09T16:15:35.587000 +CVE-2023-52920,0,0,d3f31fdc95b4a67b67ed332bc8577a6c103a6cc3b65bec1715fea71c281674f5,2025-01-09T16:15:35.587000 CVE-2023-52921,0,0,db860eb263bc8c980e12e17429a087c45572e4c4d54038923230b290b9052477,2024-12-11T15:15:07.307000 CVE-2023-52922,0,0,0257647582c181cfc3c3426a0282aca59fe8801f0370a44aec6ca0f680b7f26b,2024-12-11T15:15:07.500000 CVE-2023-5293,0,0,9b2cea486d7a7f42acc94669701d574bcf5844db44201d8d4650d958cfdded9f,2024-11-21T08:41:28.027000 @@ -242612,7 +242612,7 @@ CVE-2024-0371,0,0,5c3d442f8ecd87f51d1c113b9afa4febd80318afc8cd2eb08f21826e970119 CVE-2024-0372,0,0,cdefb651d58754406381dc11b785774bfb0c82915c9d61404379e3d0e8cdf370,2024-11-21T08:46:25.763000 CVE-2024-0373,0,0,b3d6470f0700058f6e23c0d0b489ad351710ad7e19a0b33418d3b851d8dc6006,2024-11-21T08:46:25.927000 CVE-2024-0374,0,0,8a8885831ece676186f8806efeec3a4eb9c300cbed5e4e0d0e9da25264b19834,2024-11-21T08:46:26.073000 -CVE-2024-0376,0,1,e519b0b3ccb0380dc644ca1c0a0d806c3aa99c34eb8019def3cd5d2de9305e23,2025-01-09T15:13:53.520000 +CVE-2024-0376,0,0,e519b0b3ccb0380dc644ca1c0a0d806c3aa99c34eb8019def3cd5d2de9305e23,2025-01-09T15:13:53.520000 CVE-2024-0377,0,0,735a1af5eb43820c1d494a6cccbb0f7ffef81c321c8032d6a00b46fa1e7caf3b,2024-11-21T08:46:27.067000 CVE-2024-0378,0,0,dee33b21bb8124c1a59644d8892f9f82e952c7299098f5d09b6290ef48610457,2024-11-21T08:46:27.207000 CVE-2024-0379,0,0,7f2a5e29717edae18ab4f87ffdcc74cd55d78d960b0bb83761954261632040c0,2024-11-21T08:46:27.353000 @@ -243277,7 +243277,7 @@ CVE-2024-10101,0,0,fec1f0c88678ca99198bb58f95f12b144e2edf82230ea1a8688c401204e64 CVE-2024-10102,0,0,906252b364857cef0be371ad8a47aa6b14b73ae692c77500512501801da251ca,2025-01-07T17:15:17.017000 CVE-2024-10103,0,0,e854e5edfcf43e70adfea03c62a4fcbb787ffe431d5323bec06ca7656746d9ef,2024-11-19T21:57:32.967000 CVE-2024-10104,0,0,edcf9a609eefa3129230f441c58905f876237c83c0092e5bc98e317fac05c0fd,2024-11-15T19:35:04.683000 -CVE-2024-10106,1,1,0dc16f828d77ef443f7b29af6285c9d4a8f217572ca6372dd601d613d97365f1,2025-01-09T15:15:12.770000 +CVE-2024-10106,0,0,0dc16f828d77ef443f7b29af6285c9d4a8f217572ca6372dd601d613d97365f1,2025-01-09T15:15:12.770000 CVE-2024-10108,0,0,57e3bdf5c93deb8dbbc7ad9bd9f5c8802e9586c3214ce14e9acc02b653026e84,2024-11-01T12:57:03.417000 CVE-2024-1011,0,0,bfb7dacaf11538e8035ffab6b60ef05605d5500427c2dd2c2a27b471f6c2bfbc,2024-11-21T08:49:35.437000 CVE-2024-10111,0,0,097f42f3ae37c905f2ec02b1d69af706261083e42346720ac9362d7f1a50c012,2024-12-12T04:15:04.633000 @@ -243582,7 +243582,7 @@ CVE-2024-10462,0,0,2786d011829da8771867443f24aa66a7980a2c1c4ede689df85c917119c6e CVE-2024-10463,0,0,3ddfd266b41fd173cebb851d2bc34cbf2c785db4b330494b6a3f4845aa6052a5,2024-11-04T13:31:20.073000 CVE-2024-10464,0,0,fa0fca4ba089b4bc982df15af00e5fe7b90b3385712043456e98d4b150175b15,2024-11-04T13:30:23.513000 CVE-2024-10465,0,0,8955d1f0157719f4fbefe7fae8269c4898adc0f8f926a16acb2d50f72eb39e2b,2024-11-04T13:30:10.847000 -CVE-2024-10466,0,0,f7cc934b0223d3f9c57954944f37db60f248caabd8d5248697f5bc6830d27db6,2024-11-04T13:29:51.947000 +CVE-2024-10466,0,1,56606dd3a844c97b0e77369c2884b635a3f644e0864760575415bc55442ba9d5,2025-01-09T18:15:27.253000 CVE-2024-10467,0,0,e1f34dd6104cfd3e09c5a71b6aa3ee970947971a56a24313d0f901ec95ffb9ce,2024-11-04T13:26:32.343000 CVE-2024-10468,0,0,2e0775a6f7da096b11ed271b6d824dfb524d1f0c9aba0d0194c0beb3e139a796,2024-11-04T13:29:23.937000 CVE-2024-10469,0,0,a0a81c5c238b5574bd50f73f6f4f4fb8256c54c21007050a70e7590fedc07d95,2024-11-05T16:51:35.450000 @@ -243635,7 +243635,7 @@ CVE-2024-10521,0,0,f7bfdcf48e9bf7480e023febd093f90408a44bab6aec43e2cc338ab0d3f56 CVE-2024-10522,0,0,1e8d26a1978fe59d2c13acd7d1429d6305d44d553647bab9c6da717f248808f0,2024-11-21T13:57:24.187000 CVE-2024-10523,0,0,7cc4719be638488b8b84233b435754a6a5dcc357f333b40290bb3e99a0f909ef,2024-11-08T15:14:30.070000 CVE-2024-10524,0,0,c2da650c8fb959e3655afb050ea98d59c38083a2db2a6841d4636c9a53404b99,2024-11-21T08:48:42.313000 -CVE-2024-10525,0,0,550cf84729b31fb0a9e5663c63d50687239e5a204169e8c50724c4cdf639431a,2024-11-01T12:57:03.417000 +CVE-2024-10525,0,1,bda89aff8006f9fba1d6edcae335516aad3cff7775fec489bf06a3c7c2abf668,2025-01-09T18:15:27.403000 CVE-2024-10526,0,0,6f7e328f774c00887292c6a9b6f09466273e7b5111063f43f180124280a00fc6,2024-11-08T19:01:03.880000 CVE-2024-10527,0,0,2ac72a7f22b2d63c7ccf4054363b685d4c86d8a1de32c24784406b994a4aa3ee,2025-01-07T05:15:09.497000 CVE-2024-10528,0,0,e18f91787a7b7b21f226c7e02b70dcb124a943b826e8ab41e00995ddf212c285,2024-11-21T13:57:24.187000 @@ -243887,7 +243887,7 @@ CVE-2024-1081,0,0,4e0bb84bfbb515e8e6662d2f875a9bb7899411cc135025881bd47d9f276345 CVE-2024-10810,0,0,462940493f0b1c5b280616ee9b6e4ca0acc2fe73d901d9b38b41895de26ba591,2024-11-06T15:16:12.497000 CVE-2024-10813,0,0,8f0d87c8561d66a428b124b04ac3dd7eb7202f93dd365239b75e2107b61a0c57,2024-11-23T04:15:07.800000 CVE-2024-10814,0,0,24cd3cc9c72ab7020b87ed743b9bbaf59702cba37c3042eada5a620d131514e7,2024-11-12T13:56:24.513000 -CVE-2024-10815,0,1,6dedd8b9c56b86dc375a171e36ba5934f6968c6a5785fa82859c5e5636f79c27,2025-01-09T16:15:35.800000 +CVE-2024-10815,0,0,6dedd8b9c56b86dc375a171e36ba5934f6968c6a5785fa82859c5e5636f79c27,2025-01-09T16:15:35.800000 CVE-2024-10816,0,0,26285e9b2ee00beb2b7e65eb9860b931d998a377d6a13b3bf8cda452f0b657d2,2024-11-13T17:01:16.850000 CVE-2024-1082,0,0,15848b2b0524454d542c04087dfa80d78199ba8d7edfbd0b12b87db452374b0f,2024-11-21T08:49:45.430000 CVE-2024-10820,0,0,bf9d28b16e948ef83988df033dfb0ac82ff3713b45d4528e33ad22cd94422f74,2024-11-19T17:38:16.363000 @@ -243966,7 +243966,7 @@ CVE-2024-10913,0,0,639e0b55d02891f5478b4712f7fb23002245caf49026270fe765e7bbdd3b7 CVE-2024-10914,0,0,0c0e1d2bc49848006e629bb079ed677411f0de4d90fb8273d64b81628c286fd7,2024-11-24T15:15:06.090000 CVE-2024-10915,0,0,f4d1f5fde3e41011229b6dda50918740fae123d55bbcbdab068e5991f4642cf8,2024-11-08T20:11:10.973000 CVE-2024-10916,0,0,c185625e4e8251922509c643eb1e03f44cb369b9bc576eca97c8d131f0a248b3,2024-11-08T20:11:37.567000 -CVE-2024-10917,0,0,5ad647cc8d673c5bca4df7249deb8386a3bc78a56752d538bcf21d7c1fd3aa79,2024-11-12T13:55:21.227000 +CVE-2024-10917,0,1,84897b64fd1cc994ca19c4da8d78c402e8655004c7da87e25c0ffb4739accfa2,2025-01-09T18:08:16.097000 CVE-2024-10919,0,0,a1bcc0bbdb4661c8e486fd4d8b01a051ebf0ba38e9253021ca78ae5b5fc3b9aa,2024-11-08T21:07:58.383000 CVE-2024-1092,0,0,47c9be5ad5d6bfb5c86e50521ea7c7460de8f4234d2b7a56d90fcf159ceb457a,2024-11-21T08:49:46.720000 CVE-2024-10920,0,0,ceba72435cf6aaa11cd42a90b3be4de81e949f934bd61b9a123731c509825d85,2024-11-22T20:05:52.530000 @@ -244557,7 +244557,7 @@ CVE-2024-11608,0,0,8ddbc230a8730b76ffe6955779ba3c4d90ea8f23edd3f564c2db516009c0d CVE-2024-1161,0,0,68cc61ca71a85d6059ad02181ec1fb4a89655dbd3db8900d271e7a26ec14fb67,2024-11-21T08:49:56.127000 CVE-2024-11612,0,0,bb444eed2bab8dc9d7d3d2707a19c782bc9311cf8cab3a2875a904169993bb7a,2024-11-22T21:15:17.387000 CVE-2024-11613,0,0,3746b018d4d1f1fb0e968320de63f963db0e724636c6c2189025fbf55f5bc984,2025-01-08T07:15:26.407000 -CVE-2024-11614,0,1,c156669df5d42d5f44984e061abc9aa5839a4a2939444cd1eab211dfc384c69a,2025-01-09T16:15:35.980000 +CVE-2024-11614,0,1,1d826b2223c9231b79790e24a1be505b7093f92d797415bb25ce372201436776,2025-01-09T17:15:10.980000 CVE-2024-11616,0,0,5cf2247f3b5e7ef2cbc9a5a8f08413199c8203f7939f04113ffefbe510dd1f2f,2024-12-19T10:15:13.323000 CVE-2024-11618,0,0,faa524e213716321f8f8b440fa9593fea7194f824084fdf0ccb0ec4689ef9c66,2024-11-22T19:15:05.437000 CVE-2024-11619,0,0,17535dfba9741d471fadae0fb91280b5ae16dfa5d4f7978c2708116e3a1ee713,2024-11-22T21:15:17.500000 @@ -245319,7 +245319,7 @@ CVE-2024-12596,0,0,5fc66f30988060a8b7bb1a593c82bd6c3fc2c995268e617c35d93ef410dc9 CVE-2024-1260,0,0,237fdcd6650ec6f817190c6cbe0c450181ce5f478e263f9f314859cdec5f8244,2024-11-21T08:50:10.880000 CVE-2024-12601,0,0,f9b91f2d20d6914a3b5ca3c9af2a431f615ff9e20926a30171bf1c35967a6eba,2024-12-17T12:15:20.543000 CVE-2024-12603,0,0,b77b6c9527bd0798c4124cb6a67b3eb0384daf1c81bc149052bbc09ab0e74875,2024-12-13T03:15:05.187000 -CVE-2024-12605,0,1,8a8c58874160061e08ecb18707aaa292a96cf368b219a0f8d84a0cbc9ee9b0b9,2025-01-09T15:15:14.150000 +CVE-2024-12605,0,0,8a8c58874160061e08ecb18707aaa292a96cf368b219a0f8d84a0cbc9ee9b0b9,2025-01-09T15:15:14.150000 CVE-2024-1261,0,0,7451d11c24f2ac390a05020abbe5be1a7d1e877de58a9c0842a513a0e1790005,2024-11-21T08:50:11.030000 CVE-2024-12616,0,0,12117fcf52b11bd06f0b2df3a48b15a3d855d5a677e047656ff1ff12b92b9905,2025-01-09T11:15:14.970000 CVE-2024-12617,0,0,fa783f9d7a3d972025357eb9fc5c4fe83a667f5b392e03f824f0f0bb531ed431,2024-12-24T05:15:07.013000 @@ -245386,9 +245386,9 @@ CVE-2024-12710,0,0,47453914e1b74979b7cb104fe22d1ae9255e40512305ca5e5237f17f98821 CVE-2024-12711,0,0,af63df0fc664529f876fb1b7e42d9f7f11e38264d63e374c64c561e006838c50,2025-01-07T12:15:24.503000 CVE-2024-12712,0,0,984c619ebdcbfd1e3e1dca93b7658387a748ef9201a06bcad981abce7c3ba06f,2025-01-08T10:15:06.660000 CVE-2024-12713,0,0,e6c175f4b410ded191dec5f6f687c64efe390496ffa1b50119935b0d26dfb4ad,2025-01-08T04:15:06.967000 -CVE-2024-12714,0,1,ea3c0b8148048a81afdd79de2b4911210677f00a008864451e807764bf4f22e2,2025-01-09T16:15:36.200000 -CVE-2024-12715,0,1,5f3eb147c52388a3fd1d9b94572ca79798f64b780f80c291c18ee0e0d7773717,2025-01-09T16:15:36.360000 -CVE-2024-12717,0,1,dc87f3e814dbdbf42528ec2ee5e8db114bcd113c684e4f914eb9ed63e22a8b11,2025-01-09T15:15:14.493000 +CVE-2024-12714,0,0,ea3c0b8148048a81afdd79de2b4911210677f00a008864451e807764bf4f22e2,2025-01-09T16:15:36.200000 +CVE-2024-12715,0,0,5f3eb147c52388a3fd1d9b94572ca79798f64b780f80c291c18ee0e0d7773717,2025-01-09T16:15:36.360000 +CVE-2024-12717,0,0,dc87f3e814dbdbf42528ec2ee5e8db114bcd113c684e4f914eb9ed63e22a8b11,2025-01-09T15:15:14.493000 CVE-2024-12719,0,0,f1c1e2dd855d248bd97d2bae5f7baeccac20810feec3cd62c70cf667fd59aed5,2025-01-07T10:15:07.323000 CVE-2024-1272,0,0,6fe2ae3dbf4ac28af0ee3734ec3f1128a5e90306284fb984019a39811655512d,2024-11-21T08:50:12.417000 CVE-2024-12721,0,0,602b63fd821f3e12d745be832faac963714770e5a5cf419d7f91dc50f0276cf3,2024-12-21T07:15:09.793000 @@ -245396,8 +245396,8 @@ CVE-2024-12727,0,0,b783145694badccf248249bee0c82f1aff0f923b8a3e56851318776364e6e CVE-2024-12728,0,0,917e9cd9de621c11266a9c64ec7f57ccf5bdf0122fd22a40a0ec7d20acff7a35,2024-12-19T21:15:07.863000 CVE-2024-12729,0,0,48b3a23ce4e01eb74edff0cd115d9897f3f81428607bbc5ad97846c1af686c7b,2024-12-19T22:15:05.087000 CVE-2024-1273,0,0,e8464b176bd39036e0f45e4b49d8110f84d3d3960c826bc9710c36200b4f5e6c,2024-11-21T08:50:12.557000 -CVE-2024-12731,0,1,54ffc20cc243aeb989caa9a92eb0970db4b69a2d13c34e42d169f7c7a20d8cbe,2025-01-09T16:15:36.527000 -CVE-2024-12736,0,1,8c600c7fd532f1c330f00b0c64b0cdfeba7b17914bc8469dc5aa854aced939bc,2025-01-09T16:15:36.680000 +CVE-2024-12731,0,0,54ffc20cc243aeb989caa9a92eb0970db4b69a2d13c34e42d169f7c7a20d8cbe,2025-01-09T16:15:36.527000 +CVE-2024-12736,0,0,8c600c7fd532f1c330f00b0c64b0cdfeba7b17914bc8469dc5aa854aced939bc,2025-01-09T16:15:36.680000 CVE-2024-12738,0,0,62b9ca699b87e6b4afa6aacb7bdfd82cc9a3781e94484aea8f243a786784d89c,2025-01-07T13:15:07.357000 CVE-2024-1274,0,0,8b1ee7c9f6e7817a23a525a715cd0c1ef18c567c26c711e49e1e872df04cda9a,2024-11-21T08:50:12.730000 CVE-2024-12741,0,0,c9f183fb88063863d511dd9a34a59e6fd50d2f3a53a8fd3b665d83eeabe6e5e3,2024-12-18T20:15:22.390000 @@ -245430,9 +245430,9 @@ CVE-2024-12793,0,0,2902a16bfecddc21a8d8d04e8f0997250ef373c3635003ef32f9127592c72 CVE-2024-12794,0,0,1f45437b8b28f90cd480ff6b28049ee2f0d50b6e09b9de7825840b2430eeb83b,2025-01-06T14:40:23.127000 CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000 CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000 -CVE-2024-12802,0,1,c6256d947670fd12880358f3327a0b462c9f571382d3a9eedac3119eb7bc5ac8,2025-01-09T15:15:14.683000 -CVE-2024-12803,0,1,b21222b09c6f8ae2c228a40a8137070d1d7549a26d3620f71de6631b2524cc7c,2025-01-09T15:15:14.877000 -CVE-2024-12805,0,1,8cb023efd7567284214df56cf99d8f77ae7a99dabd105b3dc8e0b3cb51ad9c6b,2025-01-09T15:15:15.060000 +CVE-2024-12802,0,0,c6256d947670fd12880358f3327a0b462c9f571382d3a9eedac3119eb7bc5ac8,2025-01-09T15:15:14.683000 +CVE-2024-12803,0,0,b21222b09c6f8ae2c228a40a8137070d1d7549a26d3620f71de6631b2524cc7c,2025-01-09T15:15:14.877000 +CVE-2024-12805,0,0,8cb023efd7567284214df56cf99d8f77ae7a99dabd105b3dc8e0b3cb51ad9c6b,2025-01-09T15:15:15.060000 CVE-2024-12806,0,0,9ca03f14d28b1eb09c39d6105bff209df4089157e217b8603b11751d7e40ad7a,2025-01-09T08:15:26.417000 CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000 CVE-2024-12819,0,0,d2bcfc7e7b1d427da08a10d74e72152ade55c9e09e00d5003c319f78e194c4b8,2025-01-09T11:15:15.657000 @@ -245474,7 +245474,7 @@ CVE-2024-1288,0,0,395f2de724425f73212a7bc39e91c09ee4289c7b4882341dd1ed370b6c884f CVE-2024-12881,0,0,ca1a79d9bb91f6e4db066c4e6e2534703ac042b68f8ca082fdad0b99821d0028,2024-12-24T10:15:06.240000 CVE-2024-12883,0,0,0bf0bf880b43f2c020abd90d085e9b9d5a11ae03a3f46d1db6bb2e2224d99f41,2024-12-21T13:15:05.613000 CVE-2024-12884,0,0,d18bebc7e8ea4bb9dd78f55d85cf8532a09a6c1829256ff8629fe588f67e9ce5,2024-12-21T14:15:21.063000 -CVE-2024-1289,0,0,e65e8e4dfe8200c9b56fed0852a43d923fc5ad73370ce2516cb730a4df84b5f1,2024-11-21T08:50:14.563000 +CVE-2024-1289,0,1,f8c8a55f2a440d9e8129941363295ecfe343266b0f62bd6ed92e6812c890397f,2025-01-09T17:41:10.137000 CVE-2024-12890,0,0,610f0274b7ac3cad611dadc6fdaf386b425b77c844fa5525b1ada89ec1adcd36,2024-12-25T03:15:19.153000 CVE-2024-12891,0,0,cced707e3b2e51a766f709eaf2966827636b579e141e7587a71bc5464135ca83,2024-12-25T03:15:19.417000 CVE-2024-12892,0,0,eaa75b8a8cde0bc0db421dbeac542a3185f54a8e10b31f0b31e75b3bfd692ca9,2024-12-25T03:15:19.537000 @@ -245691,20 +245691,20 @@ CVE-2024-13188,0,0,cc95bf1d824c3b6096fc692ac535848a10cbc0f564544683f2277bd18e0fa CVE-2024-13189,0,0,03a8ad20b4285eaac39004c7eb28ba111ec68af46d0e0b846ef6e6119fec9713,2025-01-08T21:15:12.157000 CVE-2024-1319,0,0,e6fca38f8817c3f0a93cd5d73a5a9417a178ac65495356d684dc26f204fa5765,2024-11-21T08:50:19.530000 CVE-2024-13190,0,0,b6c3d265062c184bd417077d9b801b1b02f71d26f94736dd2a2e2e78d84e35b3,2025-01-08T21:15:12.303000 -CVE-2024-13191,0,0,a61879c5c77d0ec26445e0fe493dea3f65b6134f3d70df5e8f7ad8ab74189109,2025-01-08T23:15:08.807000 -CVE-2024-13192,0,0,0943b246ac765267ce645935c73543fba2fcd76abf8765332a5eabde47876f4b,2025-01-08T23:15:09.017000 -CVE-2024-13193,0,0,877580d9e6aa9359fcd90e9d795228d41ec726c255969d0321b31c619e987334,2025-01-08T23:15:09.220000 -CVE-2024-13194,0,0,2a7c6431ba7750707b490e0e8411f67ee26bccfd5cf0a2cbbd7c5b0abb3975ff,2025-01-09T00:15:25.357000 -CVE-2024-13195,0,0,5639a83d0501cc605465f7b64f0801b5442c153e6f6a4f96ce5d46cba8fbd274,2025-01-09T00:15:25.570000 -CVE-2024-13196,0,0,76108c70179f729ed3fdffba7e6e0647713f92c1e300a80b4d66476a546ce611,2025-01-09T00:15:25.760000 +CVE-2024-13191,0,1,acf48138d6f10b5ad792d98ea4234cf17f1a67d948d65a6cf617827e1a2497f6,2025-01-09T17:15:11.267000 +CVE-2024-13192,0,1,e60f95922c3aa1971207a21d39eaa051a48c816a3b8670f8f58232779772f9b7,2025-01-09T17:15:11.420000 +CVE-2024-13193,0,1,c717570d1de8a588005559d5f3413cb5d4e9b8ede95aff5f3aed1419254b9ed5,2025-01-09T17:15:11.553000 +CVE-2024-13194,0,1,11e2a2e8c4cc0ffb69f3c39f1fc80fb9211cf61f4ac8662c031e19a5df18a666,2025-01-09T17:15:11.690000 +CVE-2024-13195,0,1,edc056ffba3fa8234e3e803f085bac395a07db6dd9597d6a293bb2b8c96d2d0d,2025-01-09T17:15:11.827000 +CVE-2024-13196,0,1,1a221c779c5ec970f9284e25c7922a23733aa4e6f0efbd0d1f31eb314a0fbe2d,2025-01-09T17:15:11.957000 CVE-2024-13197,0,0,9d5153b5ece20b4134fcd83d45bfb87bfa57926a52f471a54f4b78f71b505855,2025-01-09T00:15:25.973000 CVE-2024-13198,0,0,fb551fc384ea0792648d5bb66449568fc33fc94e148fe1e77af2f5295ee93a0d,2025-01-09T01:15:07.970000 CVE-2024-13199,0,0,74cca34a7d6812099d39c24587e1ca3fb7095e9d4c634b9fd2572aab9ae8a82e,2025-01-09T01:15:08.170000 CVE-2024-1320,0,0,80370b3cf95d31a327dfcead0766151687bef5425baa11f9a4606b327981e1e5,2024-11-21T08:50:19.647000 CVE-2024-13200,0,0,23aa3e94582350485df0ae1018ff31c7a2c62819baa08903df7e716f12383814,2025-01-09T03:15:23.820000 CVE-2024-13201,0,0,98f9e9029ecdad1b3085258c9d21a620f38d90ac00edbfea61330f3072ab29fb,2025-01-09T03:15:24.020000 -CVE-2024-13202,0,0,fcc0d41315cbf872ad3f8ed3c4bf434e97528b65abb99250267aa9cd85514824,2025-01-09T03:15:24.220000 -CVE-2024-13203,0,0,819c261d60fcd7e19a6b1cc262670172b97a373b3e5bcd2e58b29355523bf351,2025-01-09T03:15:24.410000 +CVE-2024-13202,0,1,669843cd2767e1362c6888d90dc9775472fa50b6493947d53887c22e9cf3d3bf,2025-01-09T17:15:12.110000 +CVE-2024-13203,0,1,c75812e8b13f4399ae4b97d3cdeab90eed4085ec212b5b871ccc90cb2595bb55,2025-01-09T17:15:12.280000 CVE-2024-13204,0,0,29b356ed8e68b4bf4c454a187403ce827799c9b4a8c71e1fb3c28ca6727e9acb,2025-01-09T03:15:24.603000 CVE-2024-13205,0,0,eab2280f118cc878917b605ffe82a4e3281effe9ad63660bef82b0a134012d58,2025-01-09T09:15:07.417000 CVE-2024-13206,0,0,3592680ac4f9d21850041d74074be88a605be70d439b1229b27538d812be260a,2025-01-09T04:15:10.990000 @@ -245853,7 +245853,7 @@ CVE-2024-1459,0,0,9213d5c5950fb349885acd6f33d7518e8e2bb30c455edfe98d707606280d04 CVE-2024-1460,0,0,f3508d6268168ff51da7bae2a13425bf7bbfb604f01657b6170165d3f033d6f0,2024-11-21T08:50:37.957000 CVE-2024-1461,0,0,f584e3dbeb8031a8d480cb017e172e2d88e2d972ca75e28d7328042b55e0ef9c,2024-11-21T08:50:38.083000 CVE-2024-1462,0,0,22404aaf8a49dc841b4dfb8015ef3d92bcfb9afb2b174c3158b4a5b6857e5937,2024-11-21T08:50:38.210000 -CVE-2024-1463,0,0,ecd8b6de389c5b6db83589e3c921e1b2eafcc5bf590be4fce0fdd0ed01dbffe8,2024-11-21T08:50:38.330000 +CVE-2024-1463,0,1,402ad10a9076e0d12b27e422fbf08211b1e50d8b2cda28da6995c2d0d67aa49b,2025-01-09T17:37:21.223000 CVE-2024-1464,0,0,774ba0954367abdcfc9850ebba4296f304d8bfcdbba1a93325f46f442fb6af2e,2024-11-21T08:50:38.453000 CVE-2024-1465,0,0,5ee667cd15d63ff1bbe794bed1e8ceb6109854a7af40827b767f317b47dc50fd,2024-11-21T08:50:38.583000 CVE-2024-1466,0,0,8462e6000ae5180e55e19d0c1e3e4e7bfb5efcb71a99f4875c7c2804764d132a,2024-11-21T08:50:38.723000 @@ -247840,14 +247840,14 @@ CVE-2024-21649,0,0,54d488167d1d0975c8b342047705765dfc3151cb90c0a55a8000cc54daaf3 CVE-2024-2165,0,0,4a31a6d91d3242051dcbc1617fbdf3ba15ae28351822c1fc41a20ca844201063,2024-11-21T09:09:09.983000 CVE-2024-21650,0,0,f658c0fb39e15b30e400a38390c76ca7a9a77dcaa8567d83c48a76ae5c14887e,2024-11-21T08:54:48.160000 CVE-2024-21651,0,0,16b0c06a04aeba8e56815db97190d0590ae7ef0906bf36b0aa5628fe6ff0e1be,2024-11-21T08:54:48.300000 -CVE-2024-21652,0,0,da1a6247259ba31245ca4fba6d84d8fccfc58c7dd9638d8167d3dc411a6f0605,2024-11-21T08:54:48.430000 +CVE-2024-21652,0,1,d07be696d5bb52beaa1c1e151c4cefaa921251ff1ccc2c3cd5f5566075400da0,2025-01-09T17:07:47.467000 CVE-2024-21653,0,0,169e104a462b299b24d5281eb2347f8bf28cce300608ff9eafc090b5fe658c8f,2024-11-21T08:54:48.557000 CVE-2024-21654,0,0,0432652f215b67605b7c479a49468ecf13be6bcc9b063e26538c3e8ad7f4fea9,2024-11-21T08:54:48.690000 CVE-2024-21655,0,0,4c9848ede5c5a5e4d8af6b99836034ed474c8bc1fe055a3d683588be9026972a,2024-11-21T08:54:48.830000 CVE-2024-21658,0,0,9d3fa73b71342af89bdceb8694a88e289f27b58a2e1ff3862bf598918c053308,2024-09-05T14:39:07.033000 CVE-2024-2166,0,0,0e1e1919501a3519ec6ba2cd34aa411b1b1638d368e58b2ec943ec508b97cdfb,2024-09-12T17:19:43.607000 -CVE-2024-21661,0,0,aa979c08cbb27c69b82baa4abe705839637d9512c2aff1c4fed49d5c80679e3a,2024-11-21T08:54:49.030000 -CVE-2024-21662,0,0,5d98713a8e8dda8fb6a1feb975acc4d03b52a62cb18ebe49e040b71446f75234,2024-11-21T08:54:49.157000 +CVE-2024-21661,0,1,d0029b0881b1ad1d364c3e642429bd8ab18383218b309f924f71241c67a43ec2,2025-01-09T17:09:38.313000 +CVE-2024-21662,0,1,e2f55f8062f320299a8dc0a1abfa1eb618d6dd5d2b86435af3b6436f2ea31ad4,2025-01-09T17:13:17.787000 CVE-2024-21663,0,0,eb06b721660c36b99c73f3d2df924d2a24661f0b38a294d250853c9f1ee8351b,2024-11-21T08:54:49.297000 CVE-2024-21664,0,0,71fc319be96e43f0d1e43ac61ee090ff4bb4971930079a7a94d5e1a0a71fbf40,2024-11-21T08:54:49.440000 CVE-2024-21665,0,0,9ba5d92ac742af8bd13743254a09c8b040b29cb921e9da46042fd29d4798c4d4,2024-11-21T08:54:49.570000 @@ -247992,7 +247992,7 @@ CVE-2024-21806,0,0,76d4e18b277b03f4ae237a28217dbc1a6a11559f17846f037fef87ba1a7f8 CVE-2024-21807,0,0,529e9675184111d1bad446f22de504075505951db4aacf2389a43e129efb9085,2024-08-14T17:49:14.177000 CVE-2024-21808,0,0,99c06a6ac8aafd8cfc1be0a3ffe3830fb507906fc97acb50afd6274df8d9a629,2024-11-15T14:00:09.720000 CVE-2024-21809,0,0,24fcee3a7e40290eb2f587b80df25e5c28865632e60a847cb4975adc8cd09ccc,2024-11-21T08:55:02.570000 -CVE-2024-2181,0,0,34077ca1daf1d680c49eedbbfc400ebeb38a0a6baeaa651472e8cea093c3ade4,2024-11-21T09:09:12.207000 +CVE-2024-2181,0,1,bc2ca43c87e79a2ce51f96614a32ea2ecec3c3ecdc0cc0dd84d4621bf4f6ed8d,2025-01-09T17:23:38.353000 CVE-2024-21810,0,0,4ec81a42073da00ef760857683f4253a4873020979c4273351a33968fe90eb90,2024-08-14T17:49:14.177000 CVE-2024-21812,0,0,9bd251e219bdd80ec43de87b0d9c078ead05f7995c400e0007210d917d930bdb,2024-11-21T08:55:02.837000 CVE-2024-21813,0,0,b1fc9b3e97ad72485455a9afd1ff849eaab839871473b3dbd01f9dd0eb9be42d,2024-11-21T08:55:02.970000 @@ -248010,7 +248010,7 @@ CVE-2024-21826,0,0,b0efc7f5a4c22e53138a44b26d2cc499c807e8e037949a506587f328c4cca CVE-2024-21827,0,0,c36386bd432c8750e8234f9244bc193acdc52668f3a181b754e89d9943e1c8e0,2024-11-21T08:55:04.703000 CVE-2024-21828,0,0,b164b76bc7cd799a77840173af04b2a57766f14977ac417f1dd4a3e0cffb84c1,2024-11-21T08:55:04.850000 CVE-2024-21829,0,0,a3890329332bbdcce67fee09f03e9c5301416e681ea55a6663f4bd36bb9063a7,2024-09-16T18:03:16.707000 -CVE-2024-2183,0,0,b741820dca83053cb9b1332f763430220c317024d62d5a41ead850161797a4a8,2024-11-21T09:09:12.500000 +CVE-2024-2183,0,1,c646a897725dabe5bcb9009da3bad9a6c059b95445a34a278392561629394b06,2025-01-09T17:18:25.953000 CVE-2024-21831,0,0,ffab4fc0733292e4ab0051dfbbe5d66d4a29c6dfbff84c323978b1e919252979,2024-11-21T08:55:05.050000 CVE-2024-21832,0,0,a543193ce14a2f6105c329e10215b4a1a984fbb7cf333eb98ef6c70d95fdbee0,2024-11-21T08:55:05.190000 CVE-2024-21833,0,0,5474c8e97495795e56bb5529245d9c4477df95df31071d5afcbaf12bbac86e23,2024-11-21T08:55:05.320000 @@ -248044,7 +248044,7 @@ CVE-2024-21864,0,0,1ad6c5ce84b48a780ceb370fb663156ccd2e7fcace23a3692a69ffb642270 CVE-2024-21865,0,0,583fd7dd0aa12097e737a2985a06d8c2e10647eb7bd05007cef306e8670a0ed2,2024-11-21T08:55:08.667000 CVE-2024-21866,0,0,877a22cac4a3ed4e6886e06de6323d143f73ef29c73f7754337e7d90afe1e6da,2024-11-21T08:55:08.893000 CVE-2024-21869,0,0,e37c8a4889f9eaef99aadb2f6512dc2821c59f5e354397dfc83a1050590fa73d,2024-11-21T08:55:09.050000 -CVE-2024-2187,0,0,ad19ce20397ce1b683708391b3e198a433a208280b0c63b29c05cfe94225cdcd,2024-11-21T09:09:13.087000 +CVE-2024-2187,0,1,1103ee7372c5ea9ac3f366f5b222f200117c18c2fbd61f44534e2c7446ae9f16,2025-01-09T17:06:43.647000 CVE-2024-21870,0,0,badf69f6043aace3f7b6a967da51f0af6e837826e42326a804de4aa7dc210c5b,2024-11-21T08:55:09.200000 CVE-2024-21871,0,0,f8a7e9cf5225fbb0e781f6412f0aa5db749ca95cdb4723dd70ba04d75dc30359,2024-09-16T18:03:16.707000 CVE-2024-21872,0,0,4b0c6cee8b302b028ef21a0a92094f117e39cced90a58681537b45b6634a2770,2024-11-21T08:55:09.673000 @@ -248133,7 +248133,7 @@ CVE-2024-22006,0,0,827e1b4346c7d2f63a3b17949a7dfae8b21e0e402307dde51aec9cb10e443 CVE-2024-22007,0,0,e31d3bf903eccbdc7068cd7cf56113078f2c9796101f0ece8b3c3b8558989512,2024-11-21T08:55:21.843000 CVE-2024-22008,0,0,aa29cf9cc02bfddd9d70a5ca3303a493c82c32aece5905ff426753d2df23c115,2024-11-21T08:55:22.030000 CVE-2024-22009,0,0,356c7b90ddcb01019496a7866c880a1ee380480011d91dbf0c14c877bad8c3ed,2024-11-21T08:55:22.223000 -CVE-2024-2201,0,0,6c8d6864410beb86b9b3555cdbd4907c04e94f1afffb003c9417c0027c16a172,2024-12-19T21:15:08.103000 +CVE-2024-2201,0,1,26eadb7aa2f5722f347c0f2e386bd97079dbdb8be46da7a582f3531a892ffe48,2025-01-09T17:15:12.423000 CVE-2024-22010,0,0,24c05b548507772309ac4d10c2109cc2ada2f5baf0cb1151b04e10f65fa40a11,2024-11-21T08:55:22.450000 CVE-2024-22011,0,0,d82bce95d9a57da4eb5cf6d66a8bf1abb544ebef2a691e896b0fec8f38f6dcb4,2024-11-21T08:55:23.190000 CVE-2024-22012,0,0,7eaf97c43b8b09cc15e070e27a86dff00382532a39ca334b0b4081cfb62c637a,2024-11-21T08:55:23.300000 @@ -250173,7 +250173,7 @@ CVE-2024-24910,0,0,6b331799a881a5d956a87c006abe5e882f01b24bf255742ad3b49c624db6b CVE-2024-24912,0,0,7e4db9efaf9ed4fd90c3653c0c141095d6d30e8a8ae2098e663586572a626f62,2024-11-21T08:59:57.947000 CVE-2024-24914,0,0,6a184fa1912b50a75a0f68f12ef7de42e993a65d0e5eee8a5ac41cb6b37ddf0c,2024-11-08T19:01:03.880000 CVE-2024-24919,0,0,9aadd2e9c854a8a67a60668d9c22590b064c978b0416a05db6ed866127604e0a,2024-11-21T08:59:58.267000 -CVE-2024-2492,0,0,95ebc3066586de0b2b3250e3d1c321ebbed907937cc3b9badae99f9a20cce089,2024-11-21T09:09:52.440000 +CVE-2024-2492,0,1,a9b15c0f5d53de03b8229afca1c8a7b4e7a78c54ba58e9584411863892de05ef,2025-01-09T17:01:54.423000 CVE-2024-24920,0,0,dc0bb25ed0284e07ee39402f3b0f41ee21d4b48f63522bd3cf324ad5fae05c1c,2024-11-21T08:59:58.420000 CVE-2024-24921,0,0,8f706e27290a72f00e99beb011183b58fc2c1911b4de017a35ddd13c318006b9,2024-11-21T08:59:58.550000 CVE-2024-24922,0,0,1b5ddc6cc839e27c9fa6c23a962d4940d592e545aa73ef4f333480bcc9de46ef,2024-11-21T08:59:58.677000 @@ -250886,27 +250886,27 @@ CVE-2024-25948,0,0,3dce46aa39975178fddf2f1499955eaa59d14ddc83f92eed1d083c1eaf07a CVE-2024-25949,0,0,b4cae26e43ac9afebfb2aae74bb0e791eb94f9a31f707dadf31aad37faeac575,2024-11-21T09:01:37.970000 CVE-2024-2595,0,0,46225ec19f3bb57bfc3790d4b09b773678ab84017e18184dbeca566602d22176,2024-11-21T09:10:05.273000 CVE-2024-25951,0,0,845f3a25f4d5deaa4c7992e41dd58c42c41d0dc2b905d2280e33de75cb4b2000,2024-11-21T09:01:38.103000 -CVE-2024-25952,0,1,8b4dc52fef57d8fbb31cf0abecc11b9407a392d8739ad988ca812690eccbf4cc,2025-01-09T16:48:58.557000 -CVE-2024-25953,0,1,74ac51aa7b4ec3952ee05415e1fa81324d23d22db93c284a18c79c7efa39180c,2025-01-09T16:50:14.040000 -CVE-2024-25954,0,1,5d01606b94c030f235ff4e0c4da0130514bf93e9c2f019089ce1ed2db6bae818,2025-01-09T16:08:40.410000 +CVE-2024-25952,0,0,8b4dc52fef57d8fbb31cf0abecc11b9407a392d8739ad988ca812690eccbf4cc,2025-01-09T16:48:58.557000 +CVE-2024-25953,0,0,74ac51aa7b4ec3952ee05415e1fa81324d23d22db93c284a18c79c7efa39180c,2025-01-09T16:50:14.040000 +CVE-2024-25954,0,0,5d01606b94c030f235ff4e0c4da0130514bf93e9c2f019089ce1ed2db6bae818,2025-01-09T16:08:40.410000 CVE-2024-25955,0,0,d6c74835b55489dfcd880f39eac6d7d84269d8fc1adcdf99e69b16447d966a36,2024-11-21T09:01:38.580000 CVE-2024-25956,0,0,759bea1765763a3632028c707bbc3ddd03b1520ccfb9eb0fbccf9d7e79a1833d,2024-11-21T09:01:38.703000 CVE-2024-25957,0,0,8b2d7c938864ca7cbfb1113d0d31a721d692979c77ab0a39f8fd66b6f9c12416,2024-11-21T09:01:38.817000 CVE-2024-25958,0,0,6baea78c795c928ab01131e7a84770784beea196cdb63c32e6fb5fbdbbd2a0b3,2024-11-21T09:01:38.930000 -CVE-2024-25959,0,1,eeae5a284a4ab1415fc3493674e6d3373472ea1d7e22b72b0b2c652574d3cffa,2025-01-09T16:45:52.213000 +CVE-2024-25959,0,0,eeae5a284a4ab1415fc3493674e6d3373472ea1d7e22b72b0b2c652574d3cffa,2025-01-09T16:45:52.213000 CVE-2024-2596,0,0,6dae988370d6f22930ca41007288616d27291686c0799763d555ed4df2872133,2024-11-21T09:10:05.403000 -CVE-2024-25960,0,1,f38ab1330997f4540b80aaede2ea75ba850d5750f8beec406ca741c932d2b424,2025-01-09T16:24:23.357000 -CVE-2024-25961,0,1,29b890f356bf7ac64312af353b2e03345318684d64a96bf6eceadc52768a0c28,2025-01-09T16:48:12.033000 +CVE-2024-25960,0,0,f38ab1330997f4540b80aaede2ea75ba850d5750f8beec406ca741c932d2b424,2025-01-09T16:24:23.357000 +CVE-2024-25961,0,0,29b890f356bf7ac64312af353b2e03345318684d64a96bf6eceadc52768a0c28,2025-01-09T16:48:12.033000 CVE-2024-25962,0,0,7b866daca3dd48bb6834774905f9d5c147eadab236f932077b0d39f55c394d90,2024-11-21T09:01:39.420000 -CVE-2024-25963,0,1,55fd859077dae39a86a32c5c77a28b3577d5b4f4d96d0903b9bd6f018ae9069e,2025-01-09T16:39:54.173000 -CVE-2024-25964,0,1,3764efeb8c8e0b62c6b081fdaaa5a3bf3bc8f0a0ad347ed98fc853921ba33307,2025-01-09T16:44:51.983000 -CVE-2024-25965,0,1,107bd6e82d1ce0bcc13e7dc9edc522431fd55397802e60806e92ba102bd7f0e3,2025-01-09T16:42:17.140000 -CVE-2024-25966,0,1,b9509e5584a073030b112e8b6d5dfd9a8e232a1967a3519475ac0e53c60951e1,2025-01-09T16:43:32.690000 -CVE-2024-25967,0,1,61ed76cf8a811353744409f74ecf3925b18be5554eeb985891006f864710b286,2025-01-09T15:51:08.507000 -CVE-2024-25968,0,1,c59aa9f29fec7723028a9d8cf51b0760dbfbb963c0749af8defb3e2c05671a8c,2025-01-09T15:55:34.587000 -CVE-2024-25969,0,1,0dff94871ead40cb1a89df0bd8187eedadf4b13affc46d9dbab446d588f7c407,2025-01-09T15:57:34.430000 +CVE-2024-25963,0,0,55fd859077dae39a86a32c5c77a28b3577d5b4f4d96d0903b9bd6f018ae9069e,2025-01-09T16:39:54.173000 +CVE-2024-25964,0,0,3764efeb8c8e0b62c6b081fdaaa5a3bf3bc8f0a0ad347ed98fc853921ba33307,2025-01-09T16:44:51.983000 +CVE-2024-25965,0,0,107bd6e82d1ce0bcc13e7dc9edc522431fd55397802e60806e92ba102bd7f0e3,2025-01-09T16:42:17.140000 +CVE-2024-25966,0,0,b9509e5584a073030b112e8b6d5dfd9a8e232a1967a3519475ac0e53c60951e1,2025-01-09T16:43:32.690000 +CVE-2024-25967,0,0,61ed76cf8a811353744409f74ecf3925b18be5554eeb985891006f864710b286,2025-01-09T15:51:08.507000 +CVE-2024-25968,0,0,c59aa9f29fec7723028a9d8cf51b0760dbfbb963c0749af8defb3e2c05671a8c,2025-01-09T15:55:34.587000 +CVE-2024-25969,0,0,0dff94871ead40cb1a89df0bd8187eedadf4b13affc46d9dbab446d588f7c407,2025-01-09T15:57:34.430000 CVE-2024-2597,0,0,12819aacd06167f31ba85b0d4a34b39aec569fa6ce913a831ae88cc462980442,2024-11-21T09:10:05.537000 -CVE-2024-25970,0,1,ebf60a3ad2d3e6b65a7a9f52e6917b310ffa65f405eac59713b95729b171f87b,2025-01-09T15:59:09.817000 +CVE-2024-25970,0,0,ebf60a3ad2d3e6b65a7a9f52e6917b310ffa65f405eac59713b95729b171f87b,2025-01-09T15:59:09.817000 CVE-2024-25971,0,0,9cfe0b8a8788af7c6997c5891287b0e4dced9a5d2f18b186e82a53b8284f4a71,2024-11-21T09:01:40.500000 CVE-2024-25972,0,0,543cca97c7af8256686918a28901f39a26e893c97637fc882b573eae8fe693c7,2024-11-21T09:01:40.610000 CVE-2024-25973,0,0,92921a8dafff904fc569ae8f889b79524526f977774b8eabb79a6657a833a77a,2024-11-21T09:01:40.783000 @@ -251369,7 +251369,7 @@ CVE-2024-26603,0,0,a3fa3320a573c2011faeaebf9728a198b69d2b895370e36c201c3d2a8a23c CVE-2024-26604,0,0,7409e071aa88e33581cd1b7649a76f472d8b1c31f642b0d2f13d37184166a8a4,2024-11-21T09:02:38.577000 CVE-2024-26605,0,0,0d8cfe0ccf092f9623626fbefe256c2ff2667a64eb2efd71fe85835c49920ef6,2024-11-21T09:02:38.697000 CVE-2024-26606,0,0,0e4d7b2eace919ea42369e8c68142b0d68bc06d92b21771415d4d2c6d489159e,2024-11-21T09:02:38.833000 -CVE-2024-26607,0,1,130f502686141d3064fa775282d6cc6984ef1ee620b13b9440ed4a98f96cd667,2025-01-09T15:27:20.860000 +CVE-2024-26607,0,0,130f502686141d3064fa775282d6cc6984ef1ee620b13b9440ed4a98f96cd667,2025-01-09T15:27:20.860000 CVE-2024-26608,0,0,29efe420d2ccbb71d5866748d78b9497b2910cf165d9326b588b4947e20371ac,2024-11-21T09:02:39.107000 CVE-2024-26609,0,0,bb896216d73c7b31d6903ef4a1df35e3e4fcec2e096dd8b8ec48bcb68cced2e1,2024-03-12T14:15:07.133000 CVE-2024-2661,0,0,2ec4911b192aa1630daf76b1acce06b7079a2f63ea678aac997612936adcd3cb,2024-11-21T09:10:14.127000 @@ -251662,7 +251662,7 @@ CVE-2024-2687,0,0,f3005cbf6cb1868a431d78446860642964c1a1aa641da1c01d62b7f2a08b72 CVE-2024-26870,0,0,2bd6a183ad1975d0b6c0de2939cb199738c8340cd55c7843614845b5df49e754,2024-11-21T09:03:15.490000 CVE-2024-26871,0,0,64b5d5a81109d5902e56c2f78cef2a8344b94c0325e98bc7087e8715476a105f,2024-11-21T09:03:15.620000 CVE-2024-26872,0,0,773bd0049df3a502bc881bea139866eb1ac745c3ead80bada6bc450bdf539b7a,2024-11-21T09:03:15.740000 -CVE-2024-26873,0,1,d9997d44928d095e4b76a9ef309128b853b0c916c99041756364d25e8e2d61fb,2025-01-09T16:15:37.910000 +CVE-2024-26873,0,0,d9997d44928d095e4b76a9ef309128b853b0c916c99041756364d25e8e2d61fb,2025-01-09T16:15:37.910000 CVE-2024-26874,0,0,b0997e2574bc5dea0efb25a69db38ec2a1c52a8e5820fc2c5eef17510669d092,2024-11-21T09:03:16.010000 CVE-2024-26875,0,0,94239f41f42b905c954bc6edc97b0cf15f6dec0d8fdfb2fd1b19e8e24e9c863c,2024-11-21T09:03:16.137000 CVE-2024-26876,0,0,cae97524862d4115e788a327d03cf0da2acf0edba8249dc998aedc8a21a3f2d4,2024-11-21T09:03:16.380000 @@ -252098,9 +252098,9 @@ CVE-2024-27295,0,0,62b63c8181e69fdf30bf5e9ea58e339ce340673603d1ccec39c0824328ff8 CVE-2024-27296,0,0,bc7f110c759f40dab70b917dec22fad4a370b676b33c49ffc610915e7181e1a5,2025-01-03T16:14:03.593000 CVE-2024-27297,0,0,0f08fd661388c47fad3b951d015108d74fd35f9d302b8c4a28976eae1f793c8b,2024-11-21T09:04:16.323000 CVE-2024-27298,0,0,fec5a39b802dd251f2972424edfe42a5be7f6a4ad28011a2651a8684a41ac677,2024-11-21T09:04:16.450000 -CVE-2024-27299,0,0,58b851c72842f2e8403fc03c6554402704bf7407ab46f5c07daac470110fd702,2024-11-21T09:04:16.593000 +CVE-2024-27299,0,1,029c976c3a15e4a9e0fa1ae958d30182e2a2f2bc16237dfb8bd97dafa3f1d373,2025-01-09T17:27:11.167000 CVE-2024-2730,0,0,df1b973ea168bd529abdfe561b63ebe22b42d0397347bc19dfec242d8ab4a455,2024-11-21T09:10:23.560000 -CVE-2024-27300,0,0,620feaafc226ed0f9cfe55295dbe8717f7b2086f8dd8caab0d6453ba7b8d65a1,2024-11-21T09:04:16.727000 +CVE-2024-27300,0,1,9e706642da1bd8e241f0137aa604c7d67cff1fad8aea0794834e32177af2ce2f,2025-01-09T17:16:12.273000 CVE-2024-27301,0,0,0dc0e7fcca77305d1b07d51dc5d6e87edec76f4b67ea0b4c91144191fc73c057,2024-11-21T09:04:16.860000 CVE-2024-27302,0,0,1126d35a4a36c0394d9e8298833cf3f9ca789e1f50e656755905c9a44280507f,2024-11-21T09:04:16.990000 CVE-2024-27303,0,0,446eb07103109107a6b5cb1a7ac6ddf2d6869e3efe4680886a25ae0d19a80f11,2024-11-21T09:04:17.120000 @@ -252726,10 +252726,10 @@ CVE-2024-28100,0,0,980f955c88bfadf6275346988b59f10331a2302846e8287402fe5dd637f02 CVE-2024-28101,0,0,d3e24250225aa03a59bada2716112342deb809a80686ab91bce6842f3db99a5d,2024-11-21T09:05:49.057000 CVE-2024-28102,0,0,682da8e2849dc300773abf6a2f9cef874ff737bc0ed2a603e2a929ee0c916d46,2024-11-21T09:05:49.187000 CVE-2024-28103,0,0,26a1df0a97af3e8bf340a44226684b9b3738afd934bc956d23ac51b24faba65f,2024-12-06T14:15:20.130000 -CVE-2024-28105,0,0,35604e79f1662915ab9483008684f7d94762d589a064986cc6d15ee9a9fa0b5a,2024-11-21T09:05:49.490000 -CVE-2024-28106,0,0,f50a4191542544fe738fb9d0f79f5ab97054df90891139b118b0e17b73767d59,2024-11-21T09:05:49.623000 -CVE-2024-28107,0,0,3e496515e1f33e4b3743c67f840dfcf903c04f928b5d35bb0c67174ed6ae90d1,2024-11-21T09:05:49.743000 -CVE-2024-28108,0,0,52668b50e09d0ecd3624a64ea912c7dc87ccc8fb3bfe4fc32d23799dd41b1083,2024-11-21T09:05:49.880000 +CVE-2024-28105,0,1,3d7f0801a14e97fd74c347cae6238482a850b73dbf921951bb6366754e4020c4,2025-01-09T17:14:59.820000 +CVE-2024-28106,0,1,c9c892ed3a63d3c501fdcf3427f58cec3ebcabe7ce215ddbab386dc4cc952f4e,2025-01-09T17:30:11.107000 +CVE-2024-28107,0,1,7c6301cd2def445412732372afe9db36c233a5f087a5c44bd12888a8d3a36ad1,2025-01-09T17:01:02.587000 +CVE-2024-28108,0,1,e40afdb5e8255dc79035044413036428adbd5d85ab1882d8c65ceebee6cd45aa,2025-01-09T17:00:12.770000 CVE-2024-28109,0,0,1eccc18b2c79a7ac7c54d045aea775d6dfc7e6339edc2544d6cfaee6e307e069,2024-11-21T09:05:50.020000 CVE-2024-2811,0,0,7ca649efe599a5e9071e040230504b89a79c0c012685e27d28102b0fe39088dd,2024-11-21T09:10:34.833000 CVE-2024-28110,0,0,02bed29e56bb2de858376e909bccd6140b6410e0e47c817033bde5090de34af9,2024-11-21T09:05:50.160000 @@ -252800,7 +252800,7 @@ CVE-2024-28171,0,0,b5eb85b06e2fe7be5f52608a9079412a2fea6983ee47a02bf32589033a759 CVE-2024-28172,0,0,ba5b0fee0a00ad08e11b31067bab56fedfbf935900fad85372a5827fc2a22a1a,2024-09-06T18:36:10.863000 CVE-2024-28173,0,0,ea128472b844ae9d393924075ea3785042942393668417797d1acc5674d32bd2,2024-12-16T15:11:43.620000 CVE-2024-28174,0,0,6dfd63f7b3e20facd0f59fc87c055b11b6d81d8ff8cd2c3f65e9da350b856bce,2024-12-16T15:07:02.497000 -CVE-2024-28175,0,0,e087eebed5bd58bda38ce437722ee7ea87ef4699a4adfb43cfdaf8a3b6195511,2024-11-21T09:05:57.817000 +CVE-2024-28175,0,1,4e11aa87236922581b63e066b241a3364104fbe40e76d7a6ad650937e71103fd,2025-01-09T17:05:59.063000 CVE-2024-28176,0,0,8e2712bfe1ea7116f11f8ad9a2861387b20c6463817c56944eede5e5ddf4bb41,2024-11-21T09:05:57.947000 CVE-2024-28179,0,0,7f82026281e2dd9f15927caa04d85bc2295c5beb1cf03576e742ef34b4c15043,2024-11-21T09:05:58.083000 CVE-2024-2818,0,0,0911c1acc4d9c090902c611e6719e3f0aa3c0379c78a97d42dc069d2ec5f6dee,2024-12-11T20:25:14.693000 @@ -252861,10 +252861,10 @@ CVE-2024-28244,0,0,dedba752fa91b7fe63dbe866e98f75611f56d3a17dd8a8846be2998cb889f CVE-2024-28245,0,0,ac71bef22e7fa1310f963202f919297b8bc282198feb781ae8bc7d6c14ff9628,2024-11-21T09:06:05.163000 CVE-2024-28246,0,0,d150bf3a9a20fbc6106c2e4a8e22cd83c298134785f987b4e5dc72ca0506a613,2024-11-21T09:06:05.307000 CVE-2024-28247,0,0,01cff04972e7325e94afa5a8b1a1b5dfd7ab52f31af8c42a0f184a08fe8eaf2e,2024-11-21T09:06:05.440000 -CVE-2024-28248,0,1,ea41c4a30d7438235b37a2d241543fbcd11db27970401f5d6092b4a00663d027,2025-01-09T16:40:56.910000 -CVE-2024-28249,0,1,96ddf6407cbbf5f18443acc060b2452b8de6b28e1ee9b9a5db1fd82515688e78,2025-01-09T16:46:53.507000 +CVE-2024-28248,0,0,ea41c4a30d7438235b37a2d241543fbcd11db27970401f5d6092b4a00663d027,2025-01-09T16:40:56.910000 +CVE-2024-28249,0,0,96ddf6407cbbf5f18443acc060b2452b8de6b28e1ee9b9a5db1fd82515688e78,2025-01-09T16:46:53.507000 CVE-2024-2825,0,0,27733f299dc2977efbf3c74cefb341d65bdb37f20706988c7a984de53302dd53,2024-11-21T09:10:37.060000 -CVE-2024-28250,0,1,86951e82eaaa77eddb34e91ed7dcbdcadc02bc0487bbfbc44e1b9e26cfab6354,2025-01-09T16:47:40.047000 +CVE-2024-28250,0,0,86951e82eaaa77eddb34e91ed7dcbdcadc02bc0487bbfbc44e1b9e26cfab6354,2025-01-09T16:47:40.047000 CVE-2024-28251,0,0,1a50adb72a141f8119191556cfee195e66f2bdda71e21d6a940aa65734ec90e1,2024-11-21T09:06:05.963000 CVE-2024-28252,0,0,170b527f8206d1fe4662f5e8e4d1ec9e52ea6fcb47dd79a8e28fea6b38820298,2024-11-21T09:06:06.117000 CVE-2024-28253,0,0,71132a9c3b9839593183169aeca403a12e500bf57f136ead84f655293394b759,2024-11-21T09:06:06.263000 @@ -253318,11 +253318,11 @@ CVE-2024-29015,0,0,06c1b838b075a1a879d4d8d54604d2734c08c138ce56929733b0da42db823 CVE-2024-29018,0,0,dd2b327b1b89a160d0dcc0d1fd9caced193b0522fafea0be7b407f44deca809c,2024-11-21T09:07:22.967000 CVE-2024-29019,0,0,026ec98dc834f6d523b465baf78adf168519514bfb3421c37e8d04ec7939a04a,2024-11-21T09:07:23.103000 CVE-2024-2902,0,0,5a92101f6c46f7f827b30d4ea7de164ba2c47bb156416817b124bdaa60186338,2024-11-21T09:10:47.757000 -CVE-2024-29020,0,0,899d4df2ee7711505b0dcc2c3451711800ae36d98e552c9095a0f82f850f9f0e,2024-11-21T09:07:23.237000 +CVE-2024-29020,0,1,8f90e1cb77a1ceaa84ea4cf6d4be9c75bb14a140b161deca4c41951dcb67026b,2025-01-09T17:20:18.197000 CVE-2024-29021,0,0,9e8341fdbb48e58f80e64f4861525263812a0ee45b37f3a746ea08f58df39b3d,2024-11-21T09:07:23.363000 CVE-2024-29022,0,0,86f895eb5a53cafa1adfaf8cde76caee125e12a3ff10e40b6057327fa22e9146,2024-11-21T09:07:23.490000 CVE-2024-29023,0,0,0c820b82d2ed5532f56e9a9348cb517ea9c0268e38bf40413c10e5efe36e1813,2024-11-21T09:07:23.633000 -CVE-2024-29024,0,0,08962f20ca1634c45ae9049ca9015bce3e6f62cd0a702e9f4a8b481e7e524c0a,2024-11-21T09:07:23.763000 +CVE-2024-29024,0,1,ce8b2e2cde3c04ad42badb051c3fc6cc3386c5bde2b110813cdb51094ac68b8b,2025-01-09T17:32:54.613000 CVE-2024-29025,0,0,826ab2dee9dbde3794adb211f664391825224c08f96b9e8c5616c8f0479d1cc6,2024-11-21T09:07:23.890000 CVE-2024-29026,0,0,de9ec356ac90fd02f902d916cd7e0bc293b4028e1231d8a4fe9b0d606b6adad1,2024-11-21T09:07:24.033000 CVE-2024-29027,0,0,cad2c3e3075aa793ecd13d5a6db3c7104155fc1583df44e70e041ebc7f10c285,2024-11-21T09:07:24.170000 @@ -253477,7 +253477,7 @@ CVE-2024-29175,0,0,1a7114481e9b20c8eff6bf81f7575050706de007b87f7c2ddbf4ca9624c9a CVE-2024-29176,0,0,10c519a58243fa60d8cb12375f6db3b7c0c78f193cb795fac43f3b2804858606,2024-11-21T09:07:43.800000 CVE-2024-29177,0,0,989bb0df1643b9a7b89e37a8003e76b7f921fc34121bcb1e8d027d237205360d,2024-11-21T09:07:43.943000 CVE-2024-29178,0,0,830ca9c91eda46ffc6a49e6208cbc03c1dca6d9176bff9617bf81feb935b8f50,2024-11-21T09:07:44.080000 -CVE-2024-29179,0,1,a03213dd44931706586fdbc3bca5ca0578ffb309b141b195bed3df3b6ff74c9d,2025-01-09T16:59:41.167000 +CVE-2024-29179,0,0,a03213dd44931706586fdbc3bca5ca0578ffb309b141b195bed3df3b6ff74c9d,2025-01-09T16:59:41.167000 CVE-2024-2918,0,0,4b176845f014bb23abda3ba74984151a83286559b65ff253d8f5f37f236b6815,2024-11-21T09:10:50.213000 CVE-2024-29180,0,0,116b696fe96a4565704c86f1098f1218e060f9688c96251259ff2087a89c91b1,2024-11-21T09:07:44.450000 CVE-2024-29181,0,0,787534a49fdc63ee4e12d4639da0074229100df572eea4d1a3a06db8df3f16a1,2024-11-21T09:07:44.597000 @@ -253496,13 +253496,13 @@ CVE-2024-29192,0,0,9aa8e97c204acd8eccd883edbba65840093e1aa579b19b67e2e4659663722 CVE-2024-29193,0,0,71ea974326805809d8895e1220dd00c76ce223d8ca55068a927090518b96580b,2024-11-21T09:07:46.183000 CVE-2024-29194,0,0,7e86f1d7dfe4f15cacbcce8cad9be7cfe38c260357c2c48fb92d5a54745ceec1,2024-11-21T09:07:46.310000 CVE-2024-29195,0,0,5c94b16253f400ba6bb0ef665df6bebbf3188de73ab0df2806b5c2180f298084,2024-11-21T09:07:46.467000 -CVE-2024-29196,0,1,5729f56924a65c817283601b77538f4530c180646008ccfbce73c06b0974e2f9,2025-01-09T16:58:38.057000 +CVE-2024-29196,0,0,5729f56924a65c817283601b77538f4530c180646008ccfbce73c06b0974e2f9,2025-01-09T16:58:38.057000 CVE-2024-29197,0,0,d61f8497bf6f8a1e63c46af3032bfe6193f99315ea572729f627ecd15c5269ab,2024-11-21T09:07:46.843000 CVE-2024-29199,0,0,09cc6e473adce584cd4120ccee4d6a5ea4bdb7bdd90b7f55d43dc2af16f0e4db,2024-11-21T09:07:47.030000 CVE-2024-2920,0,0,ef6630752834056fa8cc7ab93e97b2cf76454bf49c9150c8d1ff05dd4741ce0a,2024-11-21T09:10:50.530000 CVE-2024-29200,0,0,1a038098db45714aeb3be524d0e7d08f9c875e1682a6c96908006240e85006ba,2024-11-21T09:07:47.207000 -CVE-2024-29201,0,0,cacee6155a7c22ebeb4f79c12ff07c3bc7eb224598d479607a6c3dc2c3e5c3b5,2024-11-21T09:07:47.373000 -CVE-2024-29202,0,0,1151e04a4bde73980f8f61254cea56a66fbce5df4907acf877e63b5eb4cc7de9,2024-11-21T09:07:48.547000 +CVE-2024-29201,0,1,d4f88cbc449ca32f4337d3d80ac3afcfd9e94a086c4cac851e06f523ee1720b5,2025-01-09T17:27:57.507000 +CVE-2024-29202,0,1,f93edfef63733e54099856ce56ee5acae774a78dfee515517f6737409555dad7,2025-01-09T17:25:13.830000 CVE-2024-29203,0,0,1813e8028b7bc0528c264a6e32a5d135654cfcb37e81a5dc4f057d752095c16e,2024-11-21T09:07:48.683000 CVE-2024-29204,0,0,00ab4b14adeca5f5d21e564917bd6d569b919569639aefece1994d91ecb896c1,2024-11-21T09:07:48.817000 CVE-2024-29205,0,0,53ef7c3ad26899633cde74e815973ca9a9cd71e820133eb69be79ba5edce9e7d,2024-11-21T09:07:48.940000 @@ -253875,8 +253875,8 @@ CVE-2024-29898,0,0,84b205e5e4b5bf213e39cc5cd1bfa8d5ce4e60aa7f9ce5d58aba0650000e2 CVE-2024-2990,0,0,eb909476b701d7bfdcb2556adc3d295030c4f1602ce77e7673088204c71faecd,2024-11-21T09:11:00.143000 CVE-2024-29900,0,0,c88ed220be55a35825e92189fbf5e6557c944ae7707bdfb5c92d76f293d87187,2024-11-21T09:08:34.647000 CVE-2024-29901,0,0,f8dc7b4be2ff3573ff1b561a4e4e2c6a0e8be4e3fd123e69abb492b89a4a2669,2024-11-21T09:08:34.770000 -CVE-2024-29902,0,1,dbc994511c59992d8f4890edc9b93c133835d42175a447af75cdc90341d56e9b,2025-01-09T15:56:50.707000 -CVE-2024-29903,0,1,4e75979640c0d3550a542c64c0c85b4d0b0d5b2e2a4cb658db8ff5ee25fbba55,2025-01-09T15:40:24.663000 +CVE-2024-29902,0,0,dbc994511c59992d8f4890edc9b93c133835d42175a447af75cdc90341d56e9b,2025-01-09T15:56:50.707000 +CVE-2024-29903,0,0,4e75979640c0d3550a542c64c0c85b4d0b0d5b2e2a4cb658db8ff5ee25fbba55,2025-01-09T15:40:24.663000 CVE-2024-29904,0,0,3b82461af54de981422dbcb971e4a30989613a212e17414bf835e8e7a446b2d0,2024-11-21T09:08:35.173000 CVE-2024-29905,0,0,e28529c4ebb79bb595d0286c5983b5ff8d1ee69e2915406ae352c6ef9363fb2c,2024-11-21T09:08:35.300000 CVE-2024-29906,0,0,fc1e1d7bc1a280d50b9cbddd32252e5bdb3a644c28a879459cc87af91c93ec3b,2024-11-21T09:08:35.427000 @@ -254230,7 +254230,7 @@ CVE-2024-30259,0,0,e42f82650b326544824a7942dea3e4f1bca864483558e162f4766cf418ecb CVE-2024-3026,0,0,0265c65c29e3faf9e14ce421339b75d0c49c5a9b120df592e573d13166cf7114,2024-11-21T09:28:42.743000 CVE-2024-30260,0,0,cc9a5cb035977000add1b98317d4f5265395260876a998a92778c07dd57d0ebc,2024-12-18T19:19:52.700000 CVE-2024-30261,0,0,53f3e7a25054b613c460b461d895e55f8582a30f659005a13e118177da8af8f7,2024-12-18T19:21:11.997000 -CVE-2024-30262,0,0,20e1c4720b9eafe180b98859a65e1d5d95ee519230c627ab0d5c7c6374facef7,2024-11-21T09:11:34.673000 +CVE-2024-30262,0,1,c75418623ce4282aaea732f91535af2ee5258f551665cf707bc7609117f015b6,2025-01-09T17:51:27.337000 CVE-2024-30263,0,0,676cd87ad67fe0e3fa9353437e108815e1ea9f247524858608284a2f789b9b6e,2024-11-21T09:11:34.797000 CVE-2024-30264,0,0,14d2ca971995eba71386004463a81219c2276b3f7a585e4633a736eb9ec97e79,2024-11-21T09:11:34.930000 CVE-2024-30265,0,0,d4abcb1516125280d237f8b0221ea0c7b8b27200e1515d4ab137a5bf465457cc,2024-11-21T09:11:35.073000 @@ -254346,7 +254346,7 @@ CVE-2024-30372,0,0,cc111a41a90afb5fb01651ed5cface3e07f85983fe25bdcc33097ca3684ea CVE-2024-30373,0,0,9aa804b663226d2c5c0255450ac5233ace75b175ef0ffbf44c9face8120c6703,2024-11-21T09:11:48.073000 CVE-2024-30374,0,0,5750c84f0dfce3e388704bb4ab938fe04de20050b059190da07191e8eeb9bf3e,2024-11-21T09:11:48.220000 CVE-2024-30375,0,0,cb0368348c49f86546e5f7857b0c0a61bb5922fbcf3db6a88e5f77172355ae24,2024-11-21T09:11:48.357000 -CVE-2024-30376,0,1,2248943ee02f5c871a122c8a9507747e520818300358783dbb175412597e8e17,2025-01-09T16:08:38.383000 +CVE-2024-30376,0,0,2248943ee02f5c871a122c8a9507747e520818300358783dbb175412597e8e17,2025-01-09T16:08:38.383000 CVE-2024-30377,0,0,c1637b0bb9b02bf842bc41c511caa3392e14bbac51b8d2b26a6fe7be7336a1d3,2025-01-03T20:46:41.177000 CVE-2024-30378,0,0,d71d4638dbc6eba8bae8051ca94bfce66728e9312382c0209d27d8a1be3871f7,2024-11-21T09:11:48.497000 CVE-2024-30380,0,0,2611db369fb1a4933375909a458b47d2fdc6172e2784489f3b06efa4c4c70424,2024-11-21T09:11:48.667000 @@ -254727,7 +254727,7 @@ CVE-2024-30896,0,0,0330d890e180a2ac4abf50a1066f9a03357f57b7d30c34d26b5fa3e5eb33b CVE-2024-3090,0,0,4a3aeaa97615334634fffcd103a3fe864eece4109e8e0625965f670073f75d0b,2024-11-21T09:28:52.707000 CVE-2024-3091,0,0,e0eeef129ce9a44d0ebea4d97f92b821262466eaf3a38a727585606639517199,2024-11-21T09:28:52.837000 CVE-2024-30915,0,0,955c73c260c7bf6c12b9e7af49211a242d1f4ff7118c7fbceeab57178f5aebab,2024-11-21T09:12:33.743000 -CVE-2024-30916,0,1,f09315f6420121aa3ebddb3022dc0f2c6b7b9274c670e2f21a7e6b17dda5ecec,2025-01-09T15:24:19.053000 +CVE-2024-30916,0,0,f09315f6420121aa3ebddb3022dc0f2c6b7b9274c670e2f21a7e6b17dda5ecec,2025-01-09T15:24:19.053000 CVE-2024-30917,0,0,1db8ecc4f84bdb53bb46c092c6af560f66ec5de557a1924722b14e3fcd15eded,2024-11-21T09:12:34.190000 CVE-2024-3092,0,0,91b6db3015b37d065cd77564396003fe4e7ebc37c5fe361994ab7567d49e61c6,2024-12-11T19:19:05.273000 CVE-2024-30920,0,0,31223b0c711bda40c144eb0e5090c9e613dff648aec6b9f6f4db7b5e0ea61799,2024-11-21T09:12:34.407000 @@ -254754,7 +254754,7 @@ CVE-2024-30952,0,0,72d1dfe3307157cf0218b430325d0f7f356225adeed2af6cfa844ec593d2a CVE-2024-30953,0,0,4a7e5400b8e5906b881b330f0b9fbeb133d6bed4fdcdd7823e19f9c53d690e4e,2024-11-21T09:12:38.263000 CVE-2024-3096,0,0,7d886574e1f435839864ee0eb7de15ccf0552c995885a07fa07c1a8c596cb5c2,2024-11-21T09:28:53.520000 CVE-2024-30961,0,0,4221b589f508fe85a62a1249a5989843b3524e92e94cb70b49e4fc5b77a8008c,2024-12-18T17:18:39.090000 -CVE-2024-30962,0,0,edc8f32780926ad7f4e813e886912e88d3a73e458dae4a36d63c2f131cffa695,2024-12-18T17:44:24.507000 +CVE-2024-30962,0,1,838f4eabd8279fa5458ee1cdf30504168223102a09ffc0612d19ab09174233b7,2025-01-09T17:15:12.600000 CVE-2024-30963,0,0,0a75db7f7140274e974f16bb11e9295573007a72d0cf023f502e16f4d5e423fc,2024-12-06T20:15:24.757000 CVE-2024-30964,0,0,70b1ad6232e9bcc29f545cfae5ea320dd34fa9d64843f8665c751a120b917aba,2024-12-06T20:15:24.937000 CVE-2024-30965,0,0,d35880fd6e81f76629097cb2da19773a7bb8ced66853b42b46c70ca93712c8c2,2024-11-21T09:12:38.480000 @@ -254944,7 +254944,7 @@ CVE-2024-31210,0,0,5008ad2113becfc8ee6f2bf6f277367261557ccf68f08e5be60b517029d8e CVE-2024-31211,0,0,b7d6cae430ae2c21b4a87c8fd3584dde22a5acb6365806be375b09667059220c,2024-11-21T09:13:03.010000 CVE-2024-31212,0,0,6b30734e3aaa21a3cf27334b58a7d404ecc2a231fb8ed80bb9d8c2bead9ac141,2024-11-21T09:13:03.147000 CVE-2024-31213,0,0,cb4202c51fb9fd1a2f76ed42df3ed1424cd1e9c70598287c4939e841926b83c4,2024-11-21T09:13:03.280000 -CVE-2024-31214,0,1,1bf03ca1d8362529a52d88b56af4b23a213c307992fc15aab8ede63c73536bbc,2025-01-09T16:14:43.407000 +CVE-2024-31214,0,0,1bf03ca1d8362529a52d88b56af4b23a213c307992fc15aab8ede63c73536bbc,2025-01-09T16:14:43.407000 CVE-2024-31215,0,0,fc289b0a2b57b8bcffd9003ef97816b8f21286b1138d788f86835fc40dafff84,2024-11-21T09:13:03.530000 CVE-2024-31216,0,0,1d322eec5a84d897191f5f8ea76b27fece48d1c12a74650a531250b7cfec1ebe,2024-11-21T09:13:03.663000 CVE-2024-31217,0,0,0a9320849294581c6774022af63500cf2e906c0775de93080d1e2f0499f3293c,2024-11-21T09:13:03.783000 @@ -255013,7 +255013,7 @@ CVE-2024-31274,0,0,a1886f2ec6183d543c9f6ae1c792852b3955820cb630506d01416d21e8f77 CVE-2024-31275,0,0,64c5847544bfef68b988e8973d60bc83b81e6499be9e4263ff343c14971e8ebc,2024-11-21T09:13:10.620000 CVE-2024-31276,0,0,57c75c9a0099c3119fb793282264d2d8cd693684c6d6d2adaaebad94e49fd129,2024-11-21T09:13:10.737000 CVE-2024-31277,0,0,c259796459f53a356f921a0ab1a9759674927569494b4d04d2698de492882dc3,2024-11-21T09:13:10.860000 -CVE-2024-31278,0,0,6a390e782998d93b07271e34a8f0cf429b73fc886809f466f1ca9af42d059ae3,2024-11-21T09:13:10.977000 +CVE-2024-31278,0,1,b493d289a595c7fe90e0e71cbf6c86edf8bc4944e4c9aa5881bcced81b0ad50a,2025-01-09T17:15:33.957000 CVE-2024-31279,0,0,16a55e529ed250ac76d344173827479c8f2cac77638f8283079e02fa4fe06630,2024-11-21T09:13:11.093000 CVE-2024-3128,0,0,58bab748f584a7d6c461ab73d6cf985fa2d5c45b73f524ac3a2bb4970a0a0478,2024-11-21T09:28:57.730000 CVE-2024-31280,0,0,c712c230f8566109c39c7508bcc86d7852e7811ab184534606df9f66377cdc9c,2024-11-21T09:13:11.217000 @@ -255203,8 +255203,8 @@ CVE-2024-31460,0,0,b9934b072ac66945304827f83f7b2bda8dee0da8dd2c2b6a6c3bae4ec565a CVE-2024-31461,0,0,28f7ac7b0f0a2b34006cae07511455110ed8191241b65d0b128bf1e4dfe31b2b,2024-11-21T09:13:34.140000 CVE-2024-31462,0,0,bbdaea048a51f3c126c667e1d3e5774acc38646198fa6cb8c22f9abc61955e58,2024-11-21T09:13:34.613000 CVE-2024-31463,0,0,26ca00465ac7eea9efa430d39b49d5b9c095417e201ba4f536ee5bd2f4aa91e6,2024-11-21T09:13:34.760000 -CVE-2024-31464,0,1,2aff95efb02225e512749b94dd2eb5cb78fcf1102b1f5bd56245998c2fb6fbd6,2025-01-09T16:41:19.137000 -CVE-2024-31465,0,1,e870b5dcffa11d9984c4d6e02dbbf16b70609426e8951357040ed6405a384cce,2025-01-09T16:49:22.867000 +CVE-2024-31464,0,0,2aff95efb02225e512749b94dd2eb5cb78fcf1102b1f5bd56245998c2fb6fbd6,2025-01-09T16:41:19.137000 +CVE-2024-31465,0,0,e870b5dcffa11d9984c4d6e02dbbf16b70609426e8951357040ed6405a384cce,2025-01-09T16:49:22.867000 CVE-2024-31466,0,0,e8e32a4dffc665a7e100b67cd977c3da98af3bd419dc5108da353bf9e71c6b4f,2024-11-21T09:13:35.127000 CVE-2024-31467,0,0,da0fcb2a3bb49b071fbd85d5a7933c2aff565de443665d021699aebb5a4cc6e3,2024-11-21T09:13:35.267000 CVE-2024-31468,0,0,706573435a2db5cec48062ff22358d5ae94484507b7ce4a604910cd19d71a945,2024-11-21T09:13:35.400000 @@ -255519,16 +255519,16 @@ CVE-2024-31984,0,0,b4bce1cccec417df8c488a6c8ea406f24f03544b0961f6f609e32071b4544 CVE-2024-31985,0,0,10e30f55960ede6bbacbe03ee0c88306214bebaea3201825e6868c6625029fe3,2024-11-21T09:14:17.007000 CVE-2024-31986,0,0,1b2d2f1f4cbe5034b9e36e52f0f7d71b37d4498b2ce5c76d82bf880e08c5e2f5,2024-11-21T09:14:17.133000 CVE-2024-31987,0,0,abe9dd8f42bb86acd3cf6dee2fdd2a5b29c54d5566717eab7f11f7cd41a46abb,2024-11-21T09:14:17.267000 -CVE-2024-31988,0,0,c0ff03b9f75accbf0dd5a6205b2aadd570f5035152591d4f5560b922bf3994a7,2024-11-21T09:14:17.400000 -CVE-2024-31989,0,1,36cdf7afb424d91302a92c3464338da9f6357aa9b905adc4be0eba8e4665664b,2025-01-09T16:56:47.220000 +CVE-2024-31988,0,1,e1f6fe0e57c15ec80e26442fc27a73e4d01b1cd5c9eee218db1d87a564cae068,2025-01-09T18:54:53.390000 +CVE-2024-31989,0,0,36cdf7afb424d91302a92c3464338da9f6357aa9b905adc4be0eba8e4665664b,2025-01-09T16:56:47.220000 CVE-2024-3199,0,0,f1dcc8fa9251a13b6d2329d451b94b037b8df3eb36a8c0ed1aff5360e1397f65,2024-11-21T09:29:08.080000 -CVE-2024-31990,0,0,42c063f8e8e19962ba050b143dfd861d4f3be848ef9cdaba0502078fa04c3b27,2024-11-21T09:14:17.697000 +CVE-2024-31990,0,1,4ffcd4cb931fab7999e9eb8c0fc52e9e3272d1dca2a60d8c32eb43175564f375,2025-01-09T17:04:35.590000 CVE-2024-31991,0,0,7132990e3ccaac0b0b4c4387127e74fed9a9b88698bbb13243710b1c6f82cdf3,2024-11-21T09:14:17.827000 CVE-2024-31992,0,0,5bed648fa01ba4454ee23bd04fdfe08449c13d9c9222e0b542f88edea3bcd509,2024-11-21T09:14:17.957000 CVE-2024-31993,0,0,99d6ea45a744da20d074affde12e43167c28e7e6358931aae79747bdd8b822f4,2024-11-21T09:14:18.083000 CVE-2024-31994,0,0,bfe6e4352560c2047425e44009e084be345bb6ee469af26d50d0326874d8858e,2024-11-21T09:14:18.210000 CVE-2024-31995,0,0,ba7074e8dce6574a8d648fc9b6c6b4c7092258a8c2104dfa1559335c4b2ef3ed,2024-11-21T09:14:18.343000 -CVE-2024-31996,0,0,1feed9ec001ca199be9a10f2ec61894e281a5c710607c1b2828d53a622c4fd69,2024-11-21T09:14:18.477000 +CVE-2024-31996,0,1,326190cdadf52514c522ae263564f81a122a5335079c21dd2577b2ce188f0ce2,2025-01-09T18:50:19.793000 CVE-2024-31997,0,0,2d79437a7f85d6113220833ba8d803f6fa7739c826e3740200055bcecb5b8fba,2024-11-21T09:14:18.613000 CVE-2024-31998,0,0,d6ea95431b77b27fb07c01029a2d52fc33a512ac243c748203b016a09c699234,2024-11-06T14:31:46.643000 CVE-2024-31999,0,0,206a0c6cf1f93e8f6a3dac28701082c070f928d2338babff4675ddf36251eca7,2024-11-21T09:14:18.877000 @@ -255559,9 +255559,9 @@ CVE-2024-32029,0,0,ec00582208fdbdbc31ad232b1ff8828b057f2b25e4f7f9338f4ce73ccf6c8 CVE-2024-3203,0,0,3920aec1a426ba484de5f6e1eaf612bb0e337a4eaf196d4d4fa8f02933d17cd9,2024-11-21T09:29:08.600000 CVE-2024-32030,0,0,7ab346951e5746ec7b6e6b83b5d2265e2532974224b95f7d8430a7ce3990347b,2024-11-21T09:14:21.720000 CVE-2024-32034,0,0,f9fc59a803fb9008f0d41053bab6a9b99be261b72e8c5e005adea690eeecf65a,2024-09-29T00:14:35.067000 -CVE-2024-32035,0,0,70021f5318da166d3acb989d3baada842582c3c6710afe3e598e9e7800732a23,2024-11-21T09:14:21.920000 -CVE-2024-32036,0,0,70c8a92516a474bef1ac8f9f8902d26e4131bb94ba433aa15c66fda4ea27be5f,2024-11-21T09:14:22.033000 -CVE-2024-32038,0,0,04a0c445aefe4843176e9ebc0cc6d1f2209de66f691ee68ec0e9793fd96f8794,2024-11-21T09:14:22.157000 +CVE-2024-32035,0,1,6aeed2ead32f8adfb0b64fd6ab5bcc5fc1dd7fc2e6fffe8e5f59626195350f6b,2025-01-09T18:35:14.097000 +CVE-2024-32036,0,1,b7bb0a68606be3a71619970156645c1c4a4fce8cd747e622f28c6010c1597a6b,2025-01-09T18:14:46.097000 +CVE-2024-32038,0,1,34cde6bba7f174368a97eb36a04d03123d5b022d383c07dafde4c8aa5c18b781,2025-01-09T17:38:55.253000 CVE-2024-32039,0,0,172b56fd288615c495ce99e51746c3a0de4706d145dd4567480a61ff31cee532,2024-11-21T09:14:22.277000 CVE-2024-3204,0,0,f13d158bcc7e48b79878b6554bb4571b63a14430974be7abf4a50cd3a1dd815f,2024-11-21T09:29:08.737000 CVE-2024-32040,0,0,d492b81106c6beb3267701281662c07f0d6ebc5408a1c9d5f35e402821136610,2024-11-21T09:14:22.423000 @@ -255831,7 +255831,7 @@ CVE-2024-32472,0,0,fe2a0a9caa78755d6a0487539bfa91fc972eb527d0e5f5a15cd8a2d8c4ddc CVE-2024-32473,0,0,b03152f2151b4db5bf049f6d89cf2b5a88ab97629da9e9673297ad34089b6039,2024-11-21T09:14:59.013000 CVE-2024-32474,0,0,0dfaf241a49d4fa0a75b2e3ccd8dd84700900543dd8707743550faee71d8d299,2024-11-21T09:14:59.143000 CVE-2024-32475,0,0,98b24b67a42171c9b7f67640218dc2fe0a16a02548f04fab67fc893398ba95fb,2024-11-21T09:14:59.277000 -CVE-2024-32476,0,1,60005a329fdea1342eb55360614b11da6900c705219ea8f8af40586fd6b3407e,2025-01-09T16:59:02.680000 +CVE-2024-32476,0,0,60005a329fdea1342eb55360614b11da6900c705219ea8f8af40586fd6b3407e,2025-01-09T16:59:02.680000 CVE-2024-32477,0,0,494d7aa505c03a502fe674596e2b08451f2479b6f416fe22566baafa6e7d8a9e,2024-11-21T09:14:59.523000 CVE-2024-32478,0,0,4a0ba2a83afa6519a783dca6fc4358d1834574a4640a413c698e36240b9618b0,2024-11-21T09:14:59.640000 CVE-2024-32479,0,0,9b7bdf880dcb0a194868d6600b4a7208b0b85f04828886eb5935f050e1e08162,2025-01-02T21:32:19.123000 @@ -258007,7 +258007,7 @@ CVE-2024-3531,0,0,23d0c7b1a7166f5e65dfceeb34a70c85de4a9a0ce8abcdd8fab845b5d07656 CVE-2024-35311,0,0,0a9884447508a8c4b5592bff8eaf170276b9abc20917003a90825427562ba7db,2024-11-21T17:15:13.347000 CVE-2024-35312,0,0,0e9eeec1fafa09527089df577b5dc429dcf629272eec2813de46dea048c289da,2024-11-21T09:20:07.750000 CVE-2024-35313,0,0,8893e6908e4186de2d99c10c154748b3e72a88437d81190adf4426acc4abc986,2024-11-21T09:20:07.963000 -CVE-2024-35314,0,0,9194f8d6b91325fae3eed68d636d02e76b9c6e667aef03e0b14e2380ae42a0e5,2024-11-08T18:15:16.867000 +CVE-2024-35314,0,1,f131d7bf0129777c4cbeaaa4d92a02a05a4a9539f308c388d7a6659c3458726b,2025-01-09T18:15:27.657000 CVE-2024-35315,0,0,6b8b33bec8168042b2265685b6d8b17b6670b86b9f4170cd40449344d6e5a775,2024-10-23T21:35:04.820000 CVE-2024-3532,0,0,9029770965e23bed98a8e6fcbf7a8189b5f3660760b8414c96e71f43d05f80f8,2024-11-21T09:29:47.743000 CVE-2024-35324,0,0,d40878d0b364ff2aa3f9da2dd5b26959dab2d764b95186a59898f7ec71a304d2,2024-11-21T09:20:08.497000 @@ -259585,7 +259585,7 @@ CVE-2024-37303,0,0,1ed8d2ad1f2dd92fb980e7bdc674a897b0f3990ef68322b3545d546e64461 CVE-2024-37304,0,0,6307e8f3bc4f4e405a01c7d132b2a513cf70abd2036ef845d48214be90db7ce7,2024-11-21T09:23:34.190000 CVE-2024-37305,0,0,9cb1a7cf11c00f6f8cc7665d08ed5000fe651732cdfc6cd15d0110ee1e55f780,2024-11-21T09:23:34.327000 CVE-2024-37306,0,0,bccd0ec3cdcf7817826427d2b5ae4284e0e53b93191282bcbaa2870ab7207eb0,2024-11-21T09:23:34.460000 -CVE-2024-37307,0,1,c6d6b3e27dc302f4fb9b6f4e161309d2177d99d50abbf818405d4f5a2a3b0fee,2025-01-09T16:37:54.713000 +CVE-2024-37307,0,0,c6d6b3e27dc302f4fb9b6f4e161309d2177d99d50abbf818405d4f5a2a3b0fee,2025-01-09T16:37:54.713000 CVE-2024-37308,0,0,87901e5dece65b55bc0478cbd7b3500ac458fa8af24bdf0b127494e96ab19183,2024-11-21T09:23:34.740000 CVE-2024-37309,0,0,652dd2bd4841d83ef4fb1bd11f09f90c6e3c31e57e961190e557cd8d6dd5b073,2024-11-21T09:23:34.867000 CVE-2024-3731,0,0,c74c44caf30a144ce293ae27c8035fb439c7004b319f3315399b568ddf64642f,2024-11-21T09:30:16.003000 @@ -259665,7 +259665,7 @@ CVE-2024-37388,0,0,57cf4af147a424250df7b46d4b3e45c17f1c85f1e3b7be38767484284423b CVE-2024-37389,0,0,1489604a1203f3e496edb5968007e7712bc53e8ecdd5d37a8fdbbb54a5a6e772,2024-11-21T09:23:46.127000 CVE-2024-3739,0,0,e485b7726bfb9c0e0538daf95db79a608df3dc6996a1c1fff88cd1b1e128d791,2024-11-21T09:30:17.087000 CVE-2024-37391,0,0,ca3da23ae64c68bb02a011ee1a09d0615672daad59ca1c5693578476561d5c24,2024-11-21T09:23:46.287000 -CVE-2024-37392,0,0,c57b6d8b0609fcac8ed55e1412ac991415047b97cf80e90c77ce6d1c31b26603,2024-12-03T18:15:13.410000 +CVE-2024-37392,0,1,68322f4c961f1aabf72adbea5d801fad10c749a00a1f8ab2d2555d5ef58cceb8,2025-01-09T18:15:27.790000 CVE-2024-37393,0,0,59f9709c253a77f24571bf0211deb5a06ff1bfae384e16dec166534c4a1c2a5e,2024-11-21T09:23:46.627000 CVE-2024-37397,0,0,645394d57366af4d14bd72b0f709a5f25542d1f984f3b92daf1f425614dbe561,2024-09-13T16:35:09.630000 CVE-2024-37398,0,0,0f42760c0326cdea8f98f78b855bbf63b71770b97a72517371b459e84e271523,2024-11-18T15:23:23.543000 @@ -261163,7 +261163,7 @@ CVE-2024-39324,0,0,5b58097cc0f94f554b16fabf13a1485b606607c6996b61ebbc380a66c6ed8 CVE-2024-39325,0,0,2d63785eb179762c856eea2ec86fc3efa2f2c067bbb8d9d3b6088dc568ae60e3,2024-11-21T09:27:28 CVE-2024-39326,0,0,36a1fd07341b99cf706e1069ff0c3c0b0e50f721ea59b85388d56c1cba535054,2024-11-21T09:27:28.167000 CVE-2024-39329,0,0,7ff8e254c337ee0bc8d4995df77a5971be90342987fb55e2cc6c6590b4df097e,2024-11-21T09:27:28.300000 -CVE-2024-3933,0,0,2fc073ed3b4fbb0de24555b9ae33f6af971796455d56add687535d7be0cc61e6,2024-11-21T09:30:43.833000 +CVE-2024-3933,0,1,df64f87f68ad2e15d5453047c42e0ed6cb0fa7b8af24502bdac6a78fb0f454aa,2025-01-09T18:00:53.140000 CVE-2024-39330,0,0,fbd31b5b3e2b3f2feac33fefc5ce863bbb8e247faa0695e58548f2d114ee1657,2024-11-21T09:27:28.523000 CVE-2024-39331,0,0,c3218ef0cc2065ce6a6b0d43e13fb5d22e0ea291a080f467587332028f9c9ea9,2024-11-21T09:27:28.767000 CVE-2024-39332,0,0,1f97303c758e324e488ed758e883e305ce844aaff7524d06547eb074ededefc3,2024-11-01T16:35:21.290000 @@ -261181,7 +261181,7 @@ CVE-2024-39345,0,0,288dda536354f2e2e51f07fe958b1f6cd5d729852cd898f4d9311bc6a8a95 CVE-2024-39347,0,0,c33e3d2207c9e4923512f386e77a574814cecd46daea64fc6a6dda15f247c205,2024-11-21T09:27:31.230000 CVE-2024-39348,0,0,428b8c1972131c0ce55ff4a36c1ce6fb48467e1060389452ae0ca9873e8c2719,2024-11-21T09:27:31.367000 CVE-2024-39349,0,0,8aa5bd0949ee78c8eb55113896c0d7ce5fea62e907b46fd618316727ce5ef924,2024-11-21T09:27:31.493000 -CVE-2024-3935,0,0,d53186b594e5aa0f02a8dabd192924fee014e566d326d0a883eb3ea4d2728beb,2024-11-01T12:57:03.417000 +CVE-2024-3935,0,1,d0e8d28c71d917000fc24bed27b0727131e3b1924e46201d86ddecb3dcbe292d,2025-01-09T18:15:28.337000 CVE-2024-39350,0,0,fdb3462066732470a235bff29ba1732fe017e30a0d02a9750d159a0498864ed1,2024-11-21T09:27:31.610000 CVE-2024-39351,0,0,327607e1cddd67f4054754427f899db1dcdfcaad597984bb096ea9ebdc5a5b10,2024-11-21T09:27:31.737000 CVE-2024-39352,0,0,aa50c4c28f76901b5df9c043ad69006e02bf1ae5bd879b2160fb058e608db73a,2024-11-21T09:27:31.870000 @@ -261680,9 +261680,9 @@ CVE-2024-3992,0,0,9d0a83526969939eed159f705c3b354746b7a8d83202b0515f7bb495c21d5f CVE-2024-39920,0,0,2d0ffc6668fc09328c8963241ae091338acc28267b723bf4cce9dfe8a3e96d31,2024-11-21T09:28:34.183000 CVE-2024-39921,0,0,49001a97f0278f0e14d4db5d71b44e1a5319db15e20eb6a78c34ca1772d90358,2024-09-19T14:59:49.977000 CVE-2024-39922,0,0,a8dc02e2a842a455f004dd0b5df1804610e84cea12e85fbed80aea363d932723,2024-08-13T12:58:25.437000 -CVE-2024-39924,0,0,102ab4c2d72fd90bf468993095173f09e80c81cc20195b4770fbb66c174ee769,2024-11-11T21:15:06.150000 -CVE-2024-39925,0,0,6ee623a15fe25db891a25a24089334f66a49da8d54d953c74ee64217800e1d55,2024-11-11T21:15:06.237000 -CVE-2024-39926,0,0,6b5cd074cb2caaf5fd2361fc12bb01e221ddf6c6f848aac4ec944eddddf150da,2024-11-11T21:15:06.297000 +CVE-2024-39924,0,1,2a4f84bdece5ebd1f422a2fb884bfc5842ec713ad0f1b7b8cbc33e507dfb0a33,2025-01-09T18:15:27.987000 +CVE-2024-39925,0,1,9746dcc58fb8cecc9e1d89cf824e88cac8bc60fdcab25d7646a74784aca525c7,2025-01-09T18:15:28.117000 +CVE-2024-39926,0,1,4b5ea093d7330777157039117017f850139879a4c317f29d3725d66f7904f02a,2025-01-09T18:15:28.220000 CVE-2024-39927,0,0,d102506d349c6cd661c84f9625100fb5afa84e23351ca69840c038d426e26cb0,2024-11-21T09:28:35.253000 CVE-2024-39928,0,0,36746816d5a179f8dacaec6e67ea9b447cd0145aa354104fbfbe630b6bc05ce0,2024-11-21T09:28:35.457000 CVE-2024-39929,0,0,04314018109d25707b696ce9116201fdf7383da3c0539980ecfd791403ce71c1,2024-11-21T09:28:35.660000 @@ -261930,7 +261930,7 @@ CVE-2024-40630,0,0,fc4d1f6b390bed0ae4dbd1a20a13a6c90a35b0df9c5e9a28f173ae366e52a CVE-2024-40631,0,0,c878dd486bebaf471924f3f7d67c445c05bb05b52c42477332cc37ff34fcfaee,2024-11-21T09:31:23.870000 CVE-2024-40632,0,0,a305cb53b51960d8972c1302582edace86cbc3773cb67297101d0c562a6333e4,2024-11-21T09:31:23.980000 CVE-2024-40633,0,0,4fa593509649cd3c4c16dde8cff5c35196bde41064f00bcb05030ba573fcbc7f,2024-11-21T09:31:24.107000 -CVE-2024-40634,0,1,57101b76dff87915534d3346ab1eb60cc995c8f4f28da52243841791bac8435e,2025-01-09T16:55:20.183000 +CVE-2024-40634,0,0,57101b76dff87915534d3346ab1eb60cc995c8f4f28da52243841791bac8435e,2025-01-09T16:55:20.183000 CVE-2024-40636,0,0,dd66fe6861164d4a296e8e0c669d696148e94f69e4967ded6581c3eff7851266,2024-11-21T09:31:24.340000 CVE-2024-40637,0,0,0e78c74d636aff4401930bab6753186bb249828b976fb63a23598de7dd495008,2024-11-21T09:31:24.457000 CVE-2024-40638,0,0,607d13a6d5e05300f5970a3973c842a17786a4de2592bc19f98b03c563472665,2024-11-20T15:30:37.387000 @@ -262023,10 +262023,10 @@ CVE-2024-40750,0,0,c491090d917045d507fa28976c97558943f972457181ebb36c0ba9aa25c97 CVE-2024-40754,0,0,bd9d6903684af54e3d4f528bdae88b70db33043ddc74f4404f7d893dbc9cb397,2024-09-10T14:35:04.833000 CVE-2024-4076,0,0,6f41301410bb850ac724eb349beb08670550e5e1ae7ac3c04b8cf5e2d874d5bd,2024-11-21T09:42:08.807000 CVE-2024-40761,0,0,98df27f9ab08289b73f70adffa16577ee132bdfd9b5e346e5d494328018c9b31,2024-11-21T09:31:34.510000 -CVE-2024-40762,0,1,8a56af673927e464b8e82c3ce2395cd64e30d0026c7b26b3771e9d5e252d36b4,2025-01-09T15:15:15.370000 +CVE-2024-40762,0,0,8a56af673927e464b8e82c3ce2395cd64e30d0026c7b26b3771e9d5e252d36b4,2025-01-09T15:15:15.370000 CVE-2024-40763,0,0,03a98910bacc7a91881ba5927386bf799784ceed39e50818d2356358d82576a8,2024-12-05T17:15:11.720000 CVE-2024-40764,0,0,716c9029e61b77a0d9603bd5e4ce9d607d5f6a696fe7c8edc6ff51f3b795b731,2024-11-21T09:31:34.703000 -CVE-2024-40765,0,1,28388782e8548bb50b4a4dfab0451398700b29af44485d3f5ef816850b1bf8a2,2025-01-09T15:15:15.560000 +CVE-2024-40765,0,0,28388782e8548bb50b4a4dfab0451398700b29af44485d3f5ef816850b1bf8a2,2025-01-09T15:15:15.560000 CVE-2024-40766,0,0,245a65896d5e59cbc106ef8982774d28e0903e2f3e66c1e0224a1b4643d1a16a,2024-09-16T19:48:30.827000 CVE-2024-40767,0,0,d8daa36a05263c3ffe16e1b113badcb7ade4182a8a1be061cbdf839ea5fdacae,2024-11-21T09:31:35.113000 CVE-2024-4077,0,0,8de588b7fa8bc539a1390a30d26ffec16c49968012710ff1d0939c2fbeb8f325,2024-11-21T09:42:08.940000 @@ -262653,7 +262653,7 @@ CVE-2024-41662,0,0,dc3e227528839622e3f52103be234a8b480e9e6cbb7ce29d523b189f23f32 CVE-2024-41663,0,0,4272efe11b637ca338f352a090a10e21c504674c8bd38289acc8c80d573bfd76,2024-11-21T09:32:55.830000 CVE-2024-41664,0,0,c6b2b3d8ebcb7bed9c21e6d6e3056aff15e6ffbc100af4d66d09f067c2129410,2024-11-21T09:32:55.953000 CVE-2024-41665,0,0,e6f91f4f05c676fd24f905b82a0b17d1cfdbcffb309baae66be86134c57ec4f4,2024-11-21T09:32:56.073000 -CVE-2024-41666,0,1,d1f92fab5beee45ff4388efe5ddd44e33f7a0f850b5bbacae429ee6a186a4dbe,2025-01-09T16:54:08.037000 +CVE-2024-41666,0,0,d1f92fab5beee45ff4388efe5ddd44e33f7a0f850b5bbacae429ee6a186a4dbe,2025-01-09T16:54:08.037000 CVE-2024-41667,0,0,1521e864f3422c9bb00179574d7279d1ebaa600c95bdd96efe9cb514a68f8910,2024-11-21T09:32:56.327000 CVE-2024-41668,0,0,dc859c8887bac12a38e68f1ba130799ac5f5864a2aafd455bb306c37815db92b,2024-11-21T09:32:56.450000 CVE-2024-4167,0,0,d22d20db5f1aaa247cb65ba71df4cdba88f48d96dcd102d6e40984303654b000,2024-11-21T09:42:19.103000 @@ -263790,7 +263790,7 @@ CVE-2024-43167,0,0,1f0299dd298e58ae7d0320a556b5cc8080d25729e8c4fc9c4051248a2f05c CVE-2024-43168,0,0,a00133049ed1a922ca0a7599f98603d24e2d8039ab92bf6ffa7a406368253241,2024-10-21T12:15:04.327000 CVE-2024-4317,0,0,5b5e9e74799ba1a2d6d19fd0e10c6f6a1617c77f3e3ad0fc8833212ed75eb508,2024-11-21T09:42:36.813000 CVE-2024-43173,0,0,d8d2ac885c1902e546063772016f5d0005860b114ffe9d7489140ac6cd8bfc67,2024-10-25T15:40:19.977000 -CVE-2024-43176,0,1,e634111fb95958c65ab4c650c2bc5f19d4f57284f67064d5081a279583a5a080,2025-01-09T15:15:15.737000 +CVE-2024-43176,0,0,e634111fb95958c65ab4c650c2bc5f19d4f57284f67064d5081a279583a5a080,2025-01-09T15:15:15.737000 CVE-2024-43177,0,0,0d4884cc3bb5ef316ac2268cbd50954452c99cbd34944a23e957f2b36af6ec01,2024-10-25T16:05:15.777000 CVE-2024-4318,0,0,a12361d5cb010c311b3bf395a08dfcb81ce6f85546e2f7bb87325d1512cf68cc,2024-11-21T09:42:36.927000 CVE-2024-43180,0,0,6670a14096e07d80379b771c9a47c08fb6325e7824dc7bd81cd7b9a209c280c1,2024-09-20T17:28:06.617000 @@ -264249,24 +264249,24 @@ CVE-2024-43644,0,0,d7ae81dc39a8d80999b28a10bf2b9f4f3ec0b06b97a543b1aa4024a754a61 CVE-2024-43645,0,0,3483c2f4a4e8d8673a85c08c57279dcaf2dcabe54994c554778de6585015f0e0,2024-11-18T22:17:01.340000 CVE-2024-43646,0,0,e44ad8cceba821cb635623bea36106bdbc329e7b38ada87c67235302b176e252,2024-11-18T22:17:53.577000 CVE-2024-43647,0,0,8afbf70ad2cef6fb4b1caf7e1a2477d89764414a1ebb1b6c70d7bf7b3d2442bb,2024-09-10T12:09:50.377000 -CVE-2024-43648,0,1,bde2221ccc3b52f0ae5a3b05355aa2bc5f4598ee725ec189d4e8596bee83b033,2025-01-09T15:15:15.977000 -CVE-2024-43649,0,1,560060abc23fbd63ad6d0d1d06cb5f5cc3d24b9c8e26d4d015cbb232289cbc13,2025-01-09T15:15:16.173000 +CVE-2024-43648,0,0,bde2221ccc3b52f0ae5a3b05355aa2bc5f4598ee725ec189d4e8596bee83b033,2025-01-09T15:15:15.977000 +CVE-2024-43649,0,0,560060abc23fbd63ad6d0d1d06cb5f5cc3d24b9c8e26d4d015cbb232289cbc13,2025-01-09T15:15:16.173000 CVE-2024-4365,0,0,8395a37d6a53a1070a3da8569444b421529dea178299a0f784e109ce6848c89d,2024-11-21T09:42:42.317000 CVE-2024-43650,0,0,f57c4c703d40cb1b16da32a6f9b05bb372c49445a1b082beac328b32d9fb70c1,2025-01-09T08:15:27.417000 CVE-2024-43651,0,0,ae6190c0fb2ef2abff378edd3f5ffc36d80bfaea3861050b603b76d43f4960d1,2025-01-09T08:15:27.590000 -CVE-2024-43652,0,1,ec5308dd1f6f098e3ee4aae35f54d41325b706f17b43844c4f9f2b2560b4bf0f,2025-01-09T15:15:16.410000 -CVE-2024-43653,0,1,b2e8ee2cfc385db1630c2e64dc783ab9ab98c663237611281865e5f2df7d4ade,2025-01-09T15:15:16.627000 -CVE-2024-43654,0,1,cece469995fbc11327863c7c6c65a5202f2355e53830841234c124d507cd84eb,2025-01-09T15:15:16.837000 +CVE-2024-43652,0,0,ec5308dd1f6f098e3ee4aae35f54d41325b706f17b43844c4f9f2b2560b4bf0f,2025-01-09T15:15:16.410000 +CVE-2024-43653,0,0,b2e8ee2cfc385db1630c2e64dc783ab9ab98c663237611281865e5f2df7d4ade,2025-01-09T15:15:16.627000 +CVE-2024-43654,0,0,cece469995fbc11327863c7c6c65a5202f2355e53830841234c124d507cd84eb,2025-01-09T15:15:16.837000 CVE-2024-43655,0,0,84a84cb9f2f0c9c81851b45f6751858fb461708f35ee0b7196880e2f47bce0d5,2025-01-09T08:15:28.300000 -CVE-2024-43656,0,1,4cbbf796d97dec391ba537e53605fb94c330271b006bdccac6b42cb3d393a929,2025-01-09T15:15:17.090000 -CVE-2024-43657,0,1,085803f36d5893d44b31afc938df3b4f5c290f94c59253f3f02018476365e3e0,2025-01-09T15:15:17.303000 +CVE-2024-43656,0,0,4cbbf796d97dec391ba537e53605fb94c330271b006bdccac6b42cb3d393a929,2025-01-09T15:15:17.090000 +CVE-2024-43657,0,0,085803f36d5893d44b31afc938df3b4f5c290f94c59253f3f02018476365e3e0,2025-01-09T15:15:17.303000 CVE-2024-43658,0,0,03812cbdc33c23bf8bd0a3a9e1d82b30062ca72f54383da1609f5ac33cd77109,2025-01-09T08:15:28.867000 -CVE-2024-43659,0,1,8bcb4593473145e6e6ee0d5a400ac85e28dcac60a0ab4a1a48139e6d6313a32a,2025-01-09T15:15:17.523000 +CVE-2024-43659,0,0,8bcb4593473145e6e6ee0d5a400ac85e28dcac60a0ab4a1a48139e6d6313a32a,2025-01-09T15:15:17.523000 CVE-2024-4366,0,0,3c382e606a72e58f20f6afa38987a3fb436df349cdb6108f029876febf16f59e,2024-11-21T09:42:42.433000 -CVE-2024-43660,0,1,b9e1c5753cc7e5c8abcae50151d70f5f517757bde30a39a6080ee10adacf268a,2025-01-09T15:15:17.750000 -CVE-2024-43661,0,1,f4dfa4f7658b52a8a77fcfbb3eae6949ea19515d5043ab5b1cd464974db887f2,2025-01-09T15:15:17.937000 +CVE-2024-43660,0,0,b9e1c5753cc7e5c8abcae50151d70f5f517757bde30a39a6080ee10adacf268a,2025-01-09T15:15:17.750000 +CVE-2024-43661,0,0,f4dfa4f7658b52a8a77fcfbb3eae6949ea19515d5043ab5b1cd464974db887f2,2025-01-09T15:15:17.937000 CVE-2024-43662,0,0,8b0996f37d4d356a300c8703334b6df6e707291e0e0de56d34e4f561f2e110de,2025-01-09T08:15:29.637000 -CVE-2024-43663,0,1,72db2907cca35299b830e0500b9d3be9c12c6a839a8339eeaa6da1e357cb492f,2025-01-09T15:15:18.173000 +CVE-2024-43663,0,0,72db2907cca35299b830e0500b9d3be9c12c6a839a8339eeaa6da1e357cb492f,2025-01-09T15:15:18.173000 CVE-2024-4367,0,0,06d0056dd66ff219c5446225478001d7ace4cdfa0f0e8d7454a5c61b93b71c50,2024-11-21T09:42:42.537000 CVE-2024-4368,0,0,3d10c8e78c29700111196d36c50b5f085edebb06975b60275c2b591108b23a7b,2024-12-20T17:23:03.420000 CVE-2024-43683,0,0,df9b098d0d10bbc57333de3cddd48795135c3c7c667cdc231a2f356001c571ba,2024-11-01T16:15:08.930000 @@ -264925,7 +264925,7 @@ CVE-2024-4448,0,0,356f34c44ac1109ec5528b933202fba5dcdfacf158a90e9f78c9882d9c4396 CVE-2024-4449,0,0,e0f013aaee4b2f3a95f1ce013908a251c37d824202f60baaf056feb992729f5c,2024-11-21T09:42:51.207000 CVE-2024-4450,0,0,02e484232dba5ed729e6871e0f75add019f9f5e1494153f0f3ce664a865195ee,2024-11-21T09:42:51.320000 CVE-2024-4451,0,0,faf07e9f83c53ae5ef942ca91b86c49b80b994759e8a08c8a30c23242182311a,2024-11-21T09:42:51.450000 -CVE-2024-4452,0,0,7ac79a1b071d6231e0bdf29c8f5e66e503d378dc5f4dbb0050814e5fd0879653,2024-11-21T09:42:51.580000 +CVE-2024-4452,0,1,31e0967488cd58f7aa1b5a425ccebf2e29782f1d55559ce85e4cf68972ed27f9,2025-01-09T17:46:34.190000 CVE-2024-4453,0,0,4b6d5e2b75a7f55cb1a08aaeb38fe98756bad9bb2af40909de7772f9630d03c8,2024-12-17T16:05:41.267000 CVE-2024-4454,0,0,1e6371293057edf678c7077995a2115f685fb23dd798633163e8fe89ef2481d3,2024-11-21T09:42:51.820000 CVE-2024-44540,0,0,a3ed3256f272f75cb9da6472ccef92e78443ceab0d9d284cfb0ef32a1d8d4528,2024-09-26T13:32:55.343000 @@ -265137,7 +265137,7 @@ CVE-2024-44981,0,0,e68c0d244da797845a719da94f33a7f4ecc3006a97c7d0f8555e0e46ddcf0 CVE-2024-44982,0,0,f87495281a2132ff2a8d8eaf7734a1f988ff3d5f5a78ef81ff3eae8734c465e9,2024-10-10T17:09:54.350000 CVE-2024-44983,0,0,34d3ec39bd00bbd553adb950f597deb35f3e0f5d608abe41fbec6fcb2bea32eb,2024-09-10T16:57:55.110000 CVE-2024-44984,0,0,c85367946c1565669a209215b63a059ef16738e2e0ba08c9476d8702234c25e5,2024-10-10T16:48:56.167000 -CVE-2024-44985,0,1,138c52e10cad5d777cb0be7fd16064184765ca7c12d480cd18b72dc3301ef628,2025-01-09T16:15:38.177000 +CVE-2024-44985,0,0,138c52e10cad5d777cb0be7fd16064184765ca7c12d480cd18b72dc3301ef628,2025-01-09T16:15:38.177000 CVE-2024-44986,0,0,c78e53917ae1235e071ec02d4dc4a8321f82bcfb51c5d03594c49ca289e7d5c5,2024-09-05T17:54:04.127000 CVE-2024-44987,0,0,f5849af2ab6016002a7352b8cfbaee70975ff3191755f8faf5f7e0b7e5e30c59,2024-09-05T17:53:54.687000 CVE-2024-44988,0,0,7f66acc0e7504037249d166706610a6e5403ef03dd6b43ab4c8cc112efca22dc,2024-11-08T16:15:22.920000 @@ -265460,7 +265460,7 @@ CVE-2024-45342,0,0,a4a31e9769756ae24649b74b18bd2d95ae5ebb0482440ad62570ce13c5ec4 CVE-2024-45343,0,0,318ff9ada4e764bd6c635c00720e7b9030062bb890baf82a7e3f16a4a83b72fb,2025-01-08T20:15:27.690000 CVE-2024-45344,0,0,af604bd20c17ff15fecd0779ea006a02560ba533390f654e0b99f1b752eeb5b0,2025-01-08T20:15:27.753000 CVE-2024-45345,0,0,4e5002e5dc81035c1af4e238f5f319df35e1e7454ff3bb9f51dea50624303a65,2025-01-08T20:15:27.843000 -CVE-2024-45346,0,0,42bcf491a94494c9433ce7696078ac7ab2eca46d8c28dcac4158f4b2b20fa4a5,2024-08-29T03:15:05.247000 +CVE-2024-45346,0,1,7e5d27b5e0bb35d703afc2aa4711ce7de5023d11e83b251a6cc5a4802c05e84f,2025-01-09T18:15:28.703000 CVE-2024-45348,0,0,1e1db77a5a16312aa537fb47b5ac485ad4a9ec1edf7b08e9d1addf2cc98471e9,2024-11-25T17:14:11.713000 CVE-2024-4535,0,0,09bcb906ab5065886bd16710eccdce15006e447ef07dbc5cac7e797ac8618de8,2024-11-21T09:43:03.457000 CVE-2024-4536,0,0,4b3bb059b8c4b443afb737a7d17afc4c59a3d98104768be082395fc2da2d1c1f,2024-11-21T09:43:03.563000 @@ -266083,9 +266083,9 @@ CVE-2024-46597,0,0,c52dc232c382bb8b06d8853357df9fa3c69df01498ea057ff4e6221b106d8 CVE-2024-46598,0,0,cc14f076324de01fb0aedc665220d3a3ce311adfb4ca6be3700a7951d6f4c5a6,2024-09-24T16:37:39.833000 CVE-2024-4660,0,0,61cefac851d738e6211130f613c3c24b72cb5a59425ed2099eb13a6958c5f9b7,2024-11-21T09:43:19.410000 CVE-2024-46600,0,0,a2edf2944e549d9be47dd52eb91fd1fdfd1682be8e1c383075c7935775b4a0c4,2024-09-26T13:32:02.803000 -CVE-2024-46601,0,1,e633f457fab116df7b96ddb36b709936b4c5bb4b333367ed75c1316bcee3af28,2025-01-09T16:15:38.330000 -CVE-2024-46602,0,1,ce36547dbc25671213e0393ea48ea32a00c358bbb820bad773abec6d18bb6093,2025-01-09T16:15:38.547000 -CVE-2024-46603,0,1,8e8c03bb08e42b6214746772998c20cc911cf4853d68170ab014b5efdaa986b3,2025-01-09T16:15:38.730000 +CVE-2024-46601,0,0,e633f457fab116df7b96ddb36b709936b4c5bb4b333367ed75c1316bcee3af28,2025-01-09T16:15:38.330000 +CVE-2024-46602,0,0,ce36547dbc25671213e0393ea48ea32a00c358bbb820bad773abec6d18bb6093,2025-01-09T16:15:38.547000 +CVE-2024-46603,0,0,8e8c03bb08e42b6214746772998c20cc911cf4853d68170ab014b5efdaa986b3,2025-01-09T16:15:38.730000 CVE-2024-46605,0,0,1055d0ef26a73f5e645f2fdb8709387122d75ec2801b9b56966b3a9b26aba333,2024-10-18T12:53:04.627000 CVE-2024-46606,0,0,28b5ab017aae3b940eef21410c789c635db9a13916d1c5cd18485d534534131f,2024-10-18T12:53:04.627000 CVE-2024-46607,0,0,60627a32f7e8fcaeaabd9ac6ff6cf0f372f36d39c465be7eb007e5b08e6157e9,2024-09-26T13:32:02.803000 @@ -266212,9 +266212,9 @@ CVE-2024-46752,0,0,a6e483848fd846991fe052cf397d8e3748be44625f58093adb7b1755e086f CVE-2024-46753,0,0,3d7493508cc733effcafdd7d2b06bc7d70b1185c0794738e42492fc29ea4f135,2024-09-20T12:30:51.220000 CVE-2024-46754,0,0,d335bc48b5fc1eebe1a7eef0e7eae5f8d2c1b537f7a261d71a0e5ceb10c05e28,2024-09-20T12:30:51.220000 CVE-2024-46755,0,0,ff39e2d7270afa31e804d067bcf588e5bcd9fa15f72d201b0ea3c2f5600330d8,2024-09-26T13:25:54.593000 -CVE-2024-46756,0,1,a89b5439fb318adbc366507eac3f81bb2badc1e135f1a0072eb73274f7c98f29,2025-01-09T16:15:38.913000 -CVE-2024-46757,0,1,4a49c457dc638add042608ed43f1910857941df8108c2d4dd291c0c7c94db4a8,2025-01-09T16:16:01.010000 -CVE-2024-46758,0,1,9b5cc870f1110f5b6b879a69254b8d8da658f010c2305e5d6cb1d962ef81a5f1,2025-01-09T16:16:11.213000 +CVE-2024-46756,0,0,a89b5439fb318adbc366507eac3f81bb2badc1e135f1a0072eb73274f7c98f29,2025-01-09T16:15:38.913000 +CVE-2024-46757,0,0,4a49c457dc638add042608ed43f1910857941df8108c2d4dd291c0c7c94db4a8,2025-01-09T16:16:01.010000 +CVE-2024-46758,0,0,9b5cc870f1110f5b6b879a69254b8d8da658f010c2305e5d6cb1d962ef81a5f1,2025-01-09T16:16:11.213000 CVE-2024-46759,0,0,1ef58b52acb3dbbc32d299c5f6fdb2b941961437abee4fba83d8e34849913d61,2024-09-23T16:28:53.257000 CVE-2024-4676,0,0,00c4235ec965f57b28cd6b1fb7351599482bab2fc601eb44eeee7e4f50b1acbb,2024-11-21T09:43:21.457000 CVE-2024-46760,0,0,d67068bccd927df5b9a8bab6999db76b55f7a84ac41e2e0a8837c2e79709e6fc,2024-09-23T16:18:28.870000 @@ -266401,7 +266401,7 @@ CVE-2024-46966,0,0,9cdd2da38a787da29e0b07f0d6dcd10da33561e25fc912ee27f59b8909bf7 CVE-2024-4697,0,0,6e9eec3fc18bbe27148fb3ae709181d18ecd5466c486132eee5af6541f60f69a,2024-11-21T09:43:23.923000 CVE-2024-46970,0,0,47f126874782e42ba0255278170be39f81b73559fd27fec798ec0eacead9eab6,2024-09-20T13:23:29.700000 CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d2585bf,2024-12-16T17:15:09.957000 -CVE-2024-46972,0,0,892efdf1b54b18ba044bddaf82e0e999462224667522d2c76940fad9f524d41d,2024-12-28T05:15:08.497000 +CVE-2024-46972,0,1,e19d7ffbd835a75458fdf16b6890ed1469688eeb0b4a5070c87028b8ff0ad2ab,2025-01-09T17:15:15.030000 CVE-2024-46973,0,0,0437a0b4f343551c70c990e4fd559a1c21cac753a3df1f8e90ebfba823ecbaf4,2024-12-28T17:15:07.420000 CVE-2024-46976,0,0,4b4725b042b8e303031ca8672630aa4c44d9489240e1be2826c29862d55b367d,2025-01-03T14:52:32.863000 CVE-2024-46977,0,0,fa1cd1ba8936d67d5921849fcc8f3d7b6f2a4d12d9e5b79d9c6367bb65d4c705,2024-10-31T14:15:05.870000 @@ -266605,7 +266605,7 @@ CVE-2024-47211,0,0,7cfbe4caeb9c6d5ba2e34fa790cad31c3986781c114cbdc021a3c5c02b889 CVE-2024-47218,0,0,db03414a0794c64478156435016e14cfdd9450c8bd09172385f11c2f30d16310,2024-09-26T13:32:55.343000 CVE-2024-47219,0,0,a066954bcdf131c2608027bab8859b20b54f044bb76995c0988c392d4a5406dc,2024-09-26T13:32:55.343000 CVE-2024-4722,0,0,96582af672d613cfa9970b043f1eac8395cd5d640cf951f3f6b3e11b7d203b4f,2024-11-21T09:43:27.247000 -CVE-2024-47220,0,0,adfe4ff503e5b27b434e3e60f640bb1d3c8c866bbae2a88a52a6e06af4b5df3f,2024-09-26T13:32:55.343000 +CVE-2024-47220,0,1,f3ac3c597af9e4605453ec7e5003d51d9fc5b1c12997e286134131bb5771e3d4,2025-01-09T18:15:28.837000 CVE-2024-47221,0,0,6586d4b6a5f70567bb6f944b6ad5719be99d34fce6bc621a87ed63336d72d9c7,2024-09-29T00:45:21.857000 CVE-2024-47222,0,0,80460d9e41d9d1f0107c02303de9aee8a6c8c1b10aac319fd663ff09822e6371,2024-09-30T14:02:23.007000 CVE-2024-47223,0,0,793e25c409356d9e47267c562ba592bb3512ca8ad2a6d2411ca48d0873dfd90f,2024-10-23T15:12:34.673000 @@ -266814,7 +266814,7 @@ CVE-2024-47462,0,0,733badf1a086ff6535251759c6386ebde7b21a1293700259b2c8966da7dc2 CVE-2024-47463,0,0,0dac3d7125bccc1a673d468378cc81c511268e1f45f55b3574b748f788c1fae0,2024-11-06T18:17:17.287000 CVE-2024-47464,0,0,547614204d1f6cfc29d3faea8ceb0db89983ab29949fcfd3f158bcfa0ee8d9ec,2024-11-06T18:17:17.287000 CVE-2024-4747,0,0,dc86c3306ee43b541fd6b01412a7d057d47b79f0d0be13cb5d0ca8e311f58a48,2024-11-21T09:43:30.670000 -CVE-2024-47475,0,1,bf0f8358bb387d27925e7e2bcc11679964bf5b3a92ce72f7eb49a3a11a0c2668,2025-01-09T16:04:01.680000 +CVE-2024-47475,0,0,bf0f8358bb387d27925e7e2bcc11679964bf5b3a92ce72f7eb49a3a11a0c2668,2025-01-09T16:04:01.680000 CVE-2024-47476,0,0,7fbeddc8b679c54b9a8d16b073a75eec4d455c0be7f1e02e1d7d8aa5633f37d1,2024-12-03T10:15:05.883000 CVE-2024-4748,0,0,0e1bf604cc16c6bb1a8683ee11cfaa8201b2be0b492e06be1984933dd6cedb52,2024-11-21T09:43:30.787000 CVE-2024-47480,0,0,7bbfcef6bab888f4fa8746c2bd3a01695eae5e5613d22823da6ce5d7f52af5e3,2024-12-18T03:15:26.583000 @@ -267052,7 +267052,7 @@ CVE-2024-47722,0,0,68c8d2f090df61a9f49a1f01f75a7ac8cda9d407591cfa0dc0a92c1e0656c CVE-2024-47723,0,0,2615dd343a0a50695d7cb54b27f624a56434cf3fe3c0a19e9e56f98b0a895f62,2024-11-08T16:15:26.743000 CVE-2024-47724,0,0,6e995ffaad9caecd5173ad07f7bdfa1a2a66ca7e7da8057509e45779502e9778,2024-10-23T21:41:13.390000 CVE-2024-47725,0,0,8d79cfc5f420589203ee56c1d45c4e18a5d4c2e87a501b10347996e89a7f75b1,2024-10-23T06:15:05.200000 -CVE-2024-47726,0,1,6675858c08d5de08cfc66de2d774d1bde415cea5f17aba7737d5f56d886dcbcd,2025-01-09T16:16:20.367000 +CVE-2024-47726,0,0,6675858c08d5de08cfc66de2d774d1bde415cea5f17aba7737d5f56d886dcbcd,2025-01-09T16:16:20.367000 CVE-2024-47727,0,0,3196861812a33ff4255dd1448fcb4aa149876dd4b4c056bd70146e25a6f1734c,2024-10-23T20:32:53.743000 CVE-2024-47728,0,0,7cb3d81e3c38eaa169308dc5b0c05b8df992b74b7ca28b8189228d77e1f616a4,2024-10-23T20:36:52.367000 CVE-2024-47729,0,0,fb9a3faae532a190b209638889d4832a1d191c04842bce7afb041141eec369cb,2024-10-23T20:40:24.640000 @@ -267313,7 +267313,7 @@ CVE-2024-48057,0,0,854d29e18299ec9a1432f3ae60c1d2f8a2a34c19fade5fa224384e18ef65d CVE-2024-48059,0,0,e3f8f61737f0f9774697a61977452d4dae1cbee369a51fc5b18151dbe27d571a,2024-11-05T22:35:11.853000 CVE-2024-4806,0,0,ea496445e8906e3cada79f16e1d81111de69a431eec4fc799e3d8f629850f684,2024-11-21T09:43:39.443000 CVE-2024-48061,0,0,c3afd0be420d46b48a1d04be347f8e2033ef28ce6389eb40de53225f069aad4f,2024-11-06T20:35:30.633000 -CVE-2024-48063,0,0,4edb34f4453da7df625601f554fef681339e4e16418ca8e2ec044ac8a232bc05,2024-11-01T13:15:12.020000 +CVE-2024-48063,0,1,1d03a7efb1a1db2536eca44b92894033a1489c5fbb298c8e426e8e37701b1e05,2025-01-09T18:15:29.013000 CVE-2024-48068,0,0,bb6dc3535d4672a7bcb126cd1559794d6c1e87939838408c4a28db34964048a0,2024-11-21T19:15:10.450000 CVE-2024-48069,0,0,25f7c3d129df2700b13d73f848ad60548a82ca182f5e27ecad466fc9255b912f,2024-11-21T17:15:18.473000 CVE-2024-4807,0,0,46c92bf5ec52610bda8bdc7f7e863c92a19dcdac9694e247c9c9c199c9338db4,2024-11-21T09:43:39.597000 @@ -267695,7 +267695,7 @@ CVE-2024-48951,0,0,9955e0a528c62a806e0f9a01557426333b92f2f1c309f49ea9b5a584817df CVE-2024-48952,0,0,63abb6d7c6cbe19516ecef34081aac5ecb1d40c537dba83cb235852186459c78,2024-11-08T19:01:03.880000 CVE-2024-48953,0,0,ac3302a48298a2fa902983e4973a1540afc2a7d3db14674d5f84dd13d808f0eb,2024-11-08T19:01:03.880000 CVE-2024-48954,0,0,ff9a31bf4829bfeb29bee0e4bfc2eb280078b0d07e27c4d23a3f5a4e5e4b0bcb,2024-11-08T19:01:03.880000 -CVE-2024-48955,0,0,c71d9316ab4da42302cd757b5402e5c5359560ccca727e8b578e5a7a2f7946aa,2024-11-01T12:57:35.843000 +CVE-2024-48955,0,1,a3108d376c8b903d220cbce5e7e8e91e6b2d3c44a8e39acb1ba1f4a9e9beae2b,2025-01-09T18:15:29.147000 CVE-2024-48956,0,0,9a1115047fe5f91c0b35a738e9d434eb676aac44fa3639e4e54df697b71fe710,2025-01-06T21:15:14.573000 CVE-2024-48957,0,0,5fcdfcbeaa463107575a01d5356d8785a9ae755870410379189773fce30e9e71,2024-12-02T14:58:55.063000 CVE-2024-48958,0,0,4bd7d702f5c7b44ad567fb715dd16e3f71bc515beb7581dcafc207e9d8028dfc,2024-12-02T14:58:37.067000 @@ -268161,8 +268161,8 @@ CVE-2024-49596,0,0,c44795f05db0c2cd91772588b447c01a2c3f26201ecef137956772ef71be6 CVE-2024-49597,0,0,c7a0a5f566843e9934d19b1faec35a3f6bb311d359ef0fb8d2db7b87219648cc,2024-11-26T03:15:06.940000 CVE-2024-4960,0,0,cb9d437153604ad93bb6e00104a9b56bfe5e254dbc3e337bc4ad4c4807dc6043,2024-11-21T09:43:57.130000 CVE-2024-49600,0,0,7dd36af0562a7a3e2c947fbaeecc47c0db101134aaed1a6fcda1c993abd4a7f3,2024-12-09T15:15:17.387000 -CVE-2024-49602,0,1,ce2881877ef434cea49676d9552515f35e1e7fab160d8c28c4447d4378779323,2025-01-09T15:43:39.177000 -CVE-2024-49603,0,1,a4bfea8d6205a36c6ccbfdcc6517bedb6fb1c64a34415f1f1c91481a5593a5b2,2025-01-09T15:46:25.277000 +CVE-2024-49602,0,0,ce2881877ef434cea49676d9552515f35e1e7fab160d8c28c4447d4378779323,2025-01-09T15:43:39.177000 +CVE-2024-49603,0,0,a4bfea8d6205a36c6ccbfdcc6517bedb6fb1c64a34415f1f1c91481a5593a5b2,2025-01-09T15:46:25.277000 CVE-2024-49604,0,0,52d4bcd33cef053b3c621fc8feb1ba701ad78ff56ae956fe76566248ea674eb4,2024-10-23T15:49:25.567000 CVE-2024-49605,0,0,c5c91e50be8f675ec1bfe66aed3cbc7c47404b7d2ed5357f11297356ab5a4c72,2024-10-24T14:57:49.617000 CVE-2024-49606,0,0,42b54ac4e7546cc8b8ce7868fc7b245847f6d4297f62239bfc9200943bc3aaab,2024-10-23T15:49:41.503000 @@ -268476,7 +268476,7 @@ CVE-2024-49994,0,0,bd5ece539c4c70d50b2b94c50aa06933293ef8a0f2980c4b6bfba48cd9b39 CVE-2024-49995,0,0,3877f9a28065b96c64ec153f776c17ecc3c93ce61f02fc2e1ae2722eb6c2f871,2024-11-08T16:15:40.100000 CVE-2024-49996,0,0,2e596136551ee162d9b4c3dd499bd1803eb713c20e72068f46dcd3517d0733d5,2024-12-14T21:15:32.953000 CVE-2024-49997,0,0,ed3cbf05e18c7551254e4312562bce3fcea9902a79c4044561b726b19cba749a,2024-11-08T16:15:40.220000 -CVE-2024-49998,0,1,ea0e73de6128613874cd50e82f22aaa4c4ab04d6c67ef55ebb424c508fd10bfa,2025-01-09T16:16:20.520000 +CVE-2024-49998,0,0,ea0e73de6128613874cd50e82f22aaa4c4ab04d6c67ef55ebb424c508fd10bfa,2025-01-09T16:16:20.520000 CVE-2024-49999,0,0,290b9a34a054b14727922de26a3df99c6e01d7b3b9ed896d12ada93c6ce3374e,2024-10-29T18:03:40.857000 CVE-2024-5000,0,0,807b09bf4e3ec563f1788cfe5540f489ff165d90c56109f47d19dbee2e772d44,2024-11-21T09:46:44.830000 CVE-2024-50000,0,0,f51280ad418117c3eb704554b75232162b05a5c01e352d4a99b4510de3854f9f,2024-10-25T19:55:55.357000 @@ -268609,7 +268609,7 @@ CVE-2024-50118,0,0,90c06df65888bc4320b61b70dd8c403e4ebb4507f5baf8ec007a28456491a CVE-2024-50119,0,0,36e112b3e81c6f6f664c93cced8bbdc6bf05e605675df1b39ca83fc21a537aeb,2024-11-08T18:03:02.373000 CVE-2024-5012,0,0,b4c3893f8cffde4b811b88a9f5393c374b70816266debdc0796dd984b92ac84a,2024-11-21T09:46:46.790000 CVE-2024-50120,0,0,ae3f03a5810cf8d927ff9f4a3af4da74c840501453c52361ae36a4edfecf32cd,2024-11-08T18:04:08.080000 -CVE-2024-50121,0,1,af773d0b5fce568f667138bca454bf2d2b88d1fd15519740052bd2eb5edeb052,2025-01-09T16:16:20.687000 +CVE-2024-50121,0,0,af773d0b5fce568f667138bca454bf2d2b88d1fd15519740052bd2eb5edeb052,2025-01-09T16:16:20.687000 CVE-2024-50122,0,0,d20f7d56dcb90ef30135ad7b5672bb2fcc11bf21d931498054f170b462b6969c,2024-11-13T01:06:36.360000 CVE-2024-50123,0,0,d85b80df46d8dda5ed2c804443f7128f609aba0f1d127d9d4a8faeb76a12b423,2024-11-08T20:03:49.163000 CVE-2024-50124,0,0,e7a92ba697c5b5b7b448249ce1d4a60b0d2e51a468a0dca8482a7413da6391ce,2024-12-11T15:15:12.437000 @@ -270015,7 +270015,7 @@ CVE-2024-52277,0,0,da81f79b972940081351d531e52543cb52fd6bec896724669f05118d7a978 CVE-2024-52278,0,0,f6727d2bf49859f0724c1a39e0d775cbd477e6bb49e30b91be3cb4bcf4a7b7c5,2024-12-04T12:15:19.763000 CVE-2024-5228,0,0,e8458dad36641e2f49e283982ba062ff04983c91d94764c17964f8325e9d26d2,2024-11-21T09:47:13.693000 CVE-2024-52283,0,0,3766c385ef525dc9f708fd0304ec8c93e9eca4cea1f5c1432eedd3e4fefe5e8c,2024-11-28T10:15:08.543000 -CVE-2024-52286,0,1,0ca513b5395897253445f2d093cbe06dac94f6ccfe812ca5a516385fd21b1130,2025-01-09T15:15:18.347000 +CVE-2024-52286,0,0,0ca513b5395897253445f2d093cbe06dac94f6ccfe812ca5a516385fd21b1130,2025-01-09T15:15:18.347000 CVE-2024-52287,0,0,b5b5d8c72e503e7e924cad1ca17bb3cf03dcfb953708dec5bad33982c7cea683,2024-11-21T18:15:11.570000 CVE-2024-52288,0,0,8d525251961ea21fa1c11c629cd4e1986e4f5cf4d8798e7e276f2d30c27f2922,2024-11-12T13:55:21.227000 CVE-2024-52289,0,0,289ca51c36082edff70b81a6c87a004f1a7ebc73bbc0a077bb726bb4807ad4f3,2024-11-21T18:15:12.060000 @@ -270056,7 +270056,7 @@ CVE-2024-52324,0,0,1b82757393c4b121efeb2aca56c501ac2b568f66f0e838324b89dea8626b5 CVE-2024-5233,0,0,f7aceb9f589abd3e3127e7bdc682ef20b7c3a1e0d748898af38a399a8a8c2229,2024-11-21T09:47:14.357000 CVE-2024-52335,0,0,e1e5dff8245ade7d0df486779ba826bca2b65cb6a4f443a05cb574ac0185e48c,2024-12-06T14:15:21.230000 CVE-2024-52336,0,0,160e4fdf3c9ddd8c08bcb01e538c5c08889e84ce5825eea53a2a7d6fc852d283,2024-12-05T14:15:21.663000 -CVE-2024-52337,0,1,2f176d611c76ed2c70dfbd95e56604f633499376027c37a803684cca5d8e25a6,2025-01-09T15:15:18.487000 +CVE-2024-52337,0,0,2f176d611c76ed2c70dfbd95e56604f633499376027c37a803684cca5d8e25a6,2025-01-09T15:15:18.487000 CVE-2024-52338,0,0,9bcca0f5584def2789a1613da17d1dfa11f003cf9877e634fced8f070cd4a571,2024-11-29T15:15:17.550000 CVE-2024-52339,0,0,8c254a85b0cc7761c2c8f8cf7f1a34f104621eefc5d8f80c80f60233cb82f4fd,2024-11-19T21:57:32.967000 CVE-2024-5234,0,0,3621dd7a9355ab69fb44113adac5d6db321db5bd9e4f974601bbdcdbc1644b98,2024-11-21T09:47:14.493000 @@ -270587,7 +270587,7 @@ CVE-2024-53095,0,0,4e724c82098942c519f58d8d0672f065c3504379b32765b65ae8d7e7c202a CVE-2024-53096,0,0,dcefc8c8d5e883d6b19cbf59b746dea2614648687427eb8d2bd5cd72eef79062,2025-01-07T15:42:04.183000 CVE-2024-53097,0,0,c8b4e0e4b2cea4326a95fc9929fae4823328f4bcb85dc78d93b5c59fcdd291d7,2024-12-24T15:44:19.850000 CVE-2024-53098,0,0,e841aa1c52390814ec8cb3f228cfb4a113b5a3d775d80a08f6be6b8c677914fc,2024-12-24T15:48:21.330000 -CVE-2024-53099,0,1,21fc8f6970d19c211e48f798953b4b6f52215aa0958a3f3e17a0eea947d63def,2025-01-09T16:16:20.940000 +CVE-2024-53099,0,0,21fc8f6970d19c211e48f798953b4b6f52215aa0958a3f3e17a0eea947d63def,2025-01-09T16:16:20.940000 CVE-2024-5310,0,0,2f7fe56905fa71b6c5244c78a7d9d6396f207d8efd7d5fc87cedf378b01f9572,2024-11-21T09:47:24.280000 CVE-2024-53100,0,0,c9b76774e7fbb3d37345443f9fcb41fcc27f64217f335d86b9b5ba659a640559,2024-12-24T15:52:44.583000 CVE-2024-53101,0,0,c425bb46b3515da57dc87974bd0976857d07567982d62109b13f805737e7ca08,2024-12-19T18:08:23.857000 @@ -270642,7 +270642,7 @@ CVE-2024-53145,0,0,845c82eecd5000228acfbd771e22e0fcec976590e482e5c078720e730bd42 CVE-2024-53146,0,0,143a6857f7adc5fe799b8f016794e004afe724691ccaf56befb27f641c543479,2025-01-07T17:15:25.477000 CVE-2024-53147,0,0,a5545dbb75e1ea0355592ea9c5cbed6b78973df74296885178a65e66e3108898,2024-12-24T12:15:22.777000 CVE-2024-53148,0,0,4b9d4dc07b7bfc2792b42b5f67199b390604698146ea12cfd91f1c4f238361d1,2024-12-24T12:15:22.887000 -CVE-2024-53149,0,1,871a7de0af2c5f9581bb879b9201e108fc0359e1ac44fcd43474c16daa7bbc52,2025-01-09T16:16:21.097000 +CVE-2024-53149,0,0,871a7de0af2c5f9581bb879b9201e108fc0359e1ac44fcd43474c16daa7bbc52,2025-01-09T16:16:21.097000 CVE-2024-5315,0,0,cfc4383f1c53119936ccfb248038372daec91d7a497e742b345000be072ec700,2024-11-21T09:47:24.927000 CVE-2024-53150,0,0,42062accc76561f05b3a37cb4c8683d4a5bafa996981cf7fbbd661e8aa552bdd,2025-01-07T16:38:32.010000 CVE-2024-53151,0,0,9bcf302f86c516b6c3a19dba6dc2acf65ba01a50be814d57fdb94bd0b36b3601,2025-01-07T16:41:42.637000 @@ -270653,12 +270653,12 @@ CVE-2024-53155,0,0,337c9592c2cd07cacfbc5cc85e02055aa42cacc6a208444c3dff71eb8a386 CVE-2024-53156,0,0,aac424b44518844505e5ed4113e6ba71250434f5c6b683b2c4a41bab7ca199a1,2025-01-07T16:02:00.303000 CVE-2024-53157,0,0,740c4e38854260229fa4eb1ce5949dd5a376a90942ced861f2cd242a3bcc0508,2025-01-07T16:02:21.087000 CVE-2024-53158,0,0,e531f3eba6de342b83e364b8771c46bf2c1c9fd8d80363877d69a71c57f42b0f,2024-12-24T12:15:24.097000 -CVE-2024-53159,0,1,0efe60c571308791e08c5af46e2d936d40b42d7671e5dc75fbe9400ec226f8d4,2025-01-09T16:16:21.233000 +CVE-2024-53159,0,0,0efe60c571308791e08c5af46e2d936d40b42d7671e5dc75fbe9400ec226f8d4,2025-01-09T16:16:21.233000 CVE-2024-53160,0,0,4057796bb00f7bfb6f732886520cc805fa7c46e82813820ad292c8bad3293b53,2024-12-24T12:15:24.340000 CVE-2024-53161,0,0,496a29d38dca8fc4a0c4db9b85b97c97bde569f214008aac2f16d6a0701fd94f,2024-12-24T12:15:24.453000 CVE-2024-53162,0,0,0b78b6007d139b11ecc836b6ff1b71be5bb131848854d4ea532a04007a3e73c9,2024-12-24T12:15:24.567000 CVE-2024-53163,0,0,2d7b0ced3ccddc7c37dde293df99fb4af798fe72968dd76c7ff711baacfc61b5,2024-12-24T12:15:24.670000 -CVE-2024-53164,0,1,ae2c77989297659bea888fe0f75049cc76e1ff4e5da327a92f529457a5afac7f,2025-01-09T16:16:21.297000 +CVE-2024-53164,0,0,ae2c77989297659bea888fe0f75049cc76e1ff4e5da327a92f529457a5afac7f,2025-01-09T16:16:21.297000 CVE-2024-53165,0,0,0e9c4ced051d58599256fce5cd34ba3df024303ea0387370a48f25466bb92ff1,2024-12-27T14:15:23.583000 CVE-2024-53166,0,0,6369240927602b727b37db00a085178ec3b29ff0d3946046726872169e4edda3,2024-12-27T14:15:23.703000 CVE-2024-53167,0,0,cb8147677dfafa0aff01cf4cd8a22b9d4f82e5ca11b808b017228795731965bc,2024-12-27T14:15:23.820000 @@ -270674,7 +270674,7 @@ CVE-2024-53175,0,0,8442e0cb3c6575762a0afcf2f42e8cb0ec5bafe58e054fa6dace9b304bab7 CVE-2024-53176,0,0,a9ef2655bd82481455868392f2ed222883ff60b62d1eb9eb18c1813c8a099dc4,2024-12-27T14:15:24.947000 CVE-2024-53177,0,0,6e4eb608d541c1324f87a43e140e2b82d6924d66d6a13e425b7b12cb70c0a368,2024-12-27T14:15:25.067000 CVE-2024-53178,0,0,e85a20e9deaaca3fba597183ded50fa4eeb1ee318b030a9e6028781d792bddb2,2024-12-27T14:15:25.183000 -CVE-2024-53179,0,1,ce16594d497d478a69665d6f44dc3dc8a2bc449fcb80177963ad4b77c9a467f4,2025-01-09T16:16:21.440000 +CVE-2024-53179,0,0,ce16594d497d478a69665d6f44dc3dc8a2bc449fcb80177963ad4b77c9a467f4,2025-01-09T16:16:21.440000 CVE-2024-5318,0,0,87e97b53a33051fc1fa3c078212ad6afb68bf37151bd321e62e233d7b2989703,2024-12-13T17:04:31.133000 CVE-2024-53180,0,0,b6b06c3d1f43c27f0e44a74a522719556265102130aa9b5248c73fb6799cb529,2024-12-27T14:15:25.410000 CVE-2024-53181,0,0,75b064e17895b9f277789ad64fcd6ed5a3980c88dfbac5e82d8241bbd1116758,2024-12-27T14:15:25.530000 @@ -270841,7 +270841,7 @@ CVE-2024-53506,0,0,9dfa3208f902ab3513f3502d8928ce98e8eedec2f27ad06842644780d149d CVE-2024-53507,0,0,12d141a23906013906618b23cee234cf31c91fd8e1e8d9da3760596286952af5,2024-12-02T17:15:13.707000 CVE-2024-5351,0,0,a2df3cc9be27d64a2cd3dc5a2f1d5f6a44f6e98794670e6c0c19928c9af58ef2,2024-11-21T09:47:28.610000 CVE-2024-5352,0,0,afede3a744404a4b63e0d831a5ec0e86e744b459100c94c26c1030a6d60025a6,2024-11-21T09:47:28.743000 -CVE-2024-53522,0,1,4cf27771a36f742e1b4b9b4ff1149b39f782c38d11efa74f0ad2b7f1066f5059,2025-01-09T16:16:21.560000 +CVE-2024-53522,0,0,4cf27771a36f742e1b4b9b4ff1149b39f782c38d11efa74f0ad2b7f1066f5059,2025-01-09T16:16:21.560000 CVE-2024-53523,0,0,62264463ec7bd597c8cd954da8d0baf08b58aa4c7ac24397d44469055812e6bd,2024-12-11T17:15:20.073000 CVE-2024-53526,0,0,ede57fae3431829224893dc09bc40f4c776204f72e0aae08407837c7556dcee5,2025-01-08T19:15:37.753000 CVE-2024-5353,0,0,797e03a5615e2bede928ac816012d8783c471de5bd74a0480881887afd7a657a,2024-11-21T09:47:28.863000 @@ -270852,7 +270852,7 @@ CVE-2024-53554,0,0,21a54d7bc341c058102c672add5c6a39faba0998e6b5d3050bab27868ab59 CVE-2024-53555,0,0,98c9cd71300d5c5a0ee8cfe56c2efb641372e5ee4508b44193ca67680ed7c7bd,2024-11-26T21:15:08.560000 CVE-2024-53556,0,0,197a1e9e5d0cdfa43597989d9978403511315370ea045225b596c7a587a5fd41,2024-11-27T17:15:14.917000 CVE-2024-5356,0,0,8f1946b6e2ffce8dd75d8f13404335223fd7f289a256fdd41018e919f0c821b6,2024-11-21T09:47:29.267000 -CVE-2024-53564,0,0,088356e947b4dc3fae4f93133474dcecee5055d22bb16791bf202333b2575126,2025-01-09T01:15:08.627000 +CVE-2024-53564,0,1,9ab937f1953e956617795aaf18dddda75dd03cf95a1ae2a6d6ee23cedb4ba889,2025-01-09T17:15:15.423000 CVE-2024-53566,0,0,fc369a1b56664965996271c6928e1c8e2a064ca2d4eb527d8b2effd8b48ca032,2024-12-02T18:15:11.500000 CVE-2024-5357,0,0,9057606a4938c9bbcd6685626eec47e410331b31cc1665fb8c9e75b9a990e3a5,2024-11-21T09:47:29.400000 CVE-2024-5358,0,0,ba9d3d6f584bd09e4f2a4dbb07d0235a0771fbffd077ecd2b7b801a3c6466c2b,2024-11-21T09:47:29.543000 @@ -270893,9 +270893,9 @@ CVE-2024-5370,0,0,118bbc3bfc68a5a364fa8038fafc7682a10bb0308a5e5da229e35dbd880721 CVE-2024-53701,0,0,1a2bc4566eec18c70c1090c86f62c17b18dd370d9f36bbeea87f735f0b867519,2024-11-29T06:15:07.327000 CVE-2024-53702,0,0,df4acdecd1eceade8b04c1e8f2d0208a2fb87f2140d6e9f86d0b91986c09f3f5,2024-12-05T16:15:26.077000 CVE-2024-53703,0,0,fb9cc5fb637d3f614eb88b1748740fd2dceb8edefd36486bf6555b6ace1738fb,2024-12-05T15:15:11.270000 -CVE-2024-53704,0,1,d49fd357f3205883b22738c32faf9b3d49bd53f54add3fc543066caf4851d6a8,2025-01-09T15:15:18.640000 -CVE-2024-53705,0,1,18d40557ccc60a94091918bbd91ac2dee93bbebeee5f1f1de3e7850089809f28,2025-01-09T15:15:18.800000 -CVE-2024-53706,0,1,df616051264a21a2698b481c8952500c05578cd2c9461313f3029aa0443422e6,2025-01-09T16:16:21.743000 +CVE-2024-53704,0,0,d49fd357f3205883b22738c32faf9b3d49bd53f54add3fc543066caf4851d6a8,2025-01-09T15:15:18.640000 +CVE-2024-53705,0,0,18d40557ccc60a94091918bbd91ac2dee93bbebeee5f1f1de3e7850089809f28,2025-01-09T15:15:18.800000 +CVE-2024-53706,0,0,df616051264a21a2698b481c8952500c05578cd2c9461313f3029aa0443422e6,2025-01-09T16:16:21.743000 CVE-2024-53707,0,0,4163d5321b4bf42492ee17d3e3420b9e06f0f632230aa0e5ae79c446b00e1993,2024-12-02T14:15:13.323000 CVE-2024-53708,0,0,cda0eccc0f844686702a234754606286df02f2b8e9c9d9d81e8fb2842526d6e1,2024-12-02T14:15:13.457000 CVE-2024-53709,0,0,74fcfcd96364eb63a20fac2c34c511b47044ab19669bd7332461d3387afde300,2024-12-02T14:15:13.600000 @@ -271738,7 +271738,7 @@ CVE-2024-5544,0,0,9d691e1e8372bdc434d572825f303cd1b0a2983a0161dea14c330331f38ec0 CVE-2024-5545,0,0,b3cc69efdd158ef8f80171ade54c093cb4f6f75ed2a82ff6b2260af3cf25e4f5,2024-11-21T09:47:53.940000 CVE-2024-55451,0,0,4eb1042aa51ba5a2799fe7ce59f7c5e8943825e1ba0ec7639498dab2444e41a0,2024-12-17T17:15:09.687000 CVE-2024-55452,0,0,681d222c3a1792768b7aa7a338d01a7a3eab54a804f9924046fdaec1682302e7,2024-12-17T15:15:16.287000 -CVE-2024-55459,0,1,aaa3d8d0f713f465a68fbf50795e69a87967113e6513b09fe3014c6150fa903c,2025-01-09T15:15:18.963000 +CVE-2024-55459,0,0,aaa3d8d0f713f465a68fbf50795e69a87967113e6513b09fe3014c6150fa903c,2025-01-09T15:15:18.963000 CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000 CVE-2024-55461,0,0,8a5762fd3b90cc63ffd9ce1bb9331b80ec6ee2b8f4f1ecbac3350d77382b6dcf,2024-12-31T20:16:07.727000 CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000 @@ -271764,7 +271764,7 @@ CVE-2024-5552,0,0,779c8b119b5a7bc042c6e25c9be4959c8015ea49092434c017d15512182ef4 CVE-2024-55529,0,0,59094f574a1ef2f6096a3e5fba1fa56f532a786844da89e23934c518ec5e2e07,2025-01-06T20:15:39.163000 CVE-2024-5553,0,0,c6aeec952a2778be27c1792a1d1c97b8ff8c01ca6ed08226c6b506a6f771b767,2024-11-21T09:47:55.040000 CVE-2024-55538,0,0,67bd56020d7a76419d848694822e6e545c69b0a5adc3b05464d4d5160a8064ea,2025-01-02T15:15:23.933000 -CVE-2024-55539,0,0,816c41315228f637dd0f2249a7a98de8c85476c43762c2881ed185f94995fdb5,2024-12-23T14:15:06.270000 +CVE-2024-55539,0,1,f458db4a5ff47752a8a05ab76298a754be66b6f65eac9c3cadabf0854aa3f5af,2025-01-09T17:15:16.057000 CVE-2024-5554,0,0,3fb8d13bac6e351fa1470fa96b8178263946ef86d2aae872feb00193d95f3ac4,2024-11-21T09:47:55.160000 CVE-2024-55540,0,0,d204904edb4fccfaf3016ffa5e42409a320ac73e8ff7b952fc42dfaaa37df7c2,2025-01-02T16:15:07.847000 CVE-2024-55541,0,0,a2596ad27a39d4519762857435104e268d4f3a7d0c4701f9ce0e61a9ad103da4,2025-01-02T16:15:07.970000 @@ -272300,13 +272300,13 @@ CVE-2024-56579,0,0,ed133437fbec982ed5352c737f5d06af0ae68ef76be424fcabd4fe2113323 CVE-2024-5658,0,0,7e7462fc3515e519516e2f809c98e13e2106352e6aac99c565fb770e189dd063,2024-11-21T09:48:06.413000 CVE-2024-56580,0,0,179f3e1a27c51bf03a0456aee4863f0a350c8b2c58261c2a20019a0968714a4b,2025-01-08T16:43:44.460000 CVE-2024-56581,0,0,6e98b054ab30e9a79a0d35ae442e5a2bf4559a3a6bfbf332b263e41eb8de179b,2024-12-27T15:15:17.207000 -CVE-2024-56582,0,1,90dea02e9f979a41e71cfb5a449e790da921d503d434ba7171d9fe8a71c5f49c,2025-01-09T16:16:21.920000 +CVE-2024-56582,0,0,90dea02e9f979a41e71cfb5a449e790da921d503d434ba7171d9fe8a71c5f49c,2025-01-09T16:16:21.920000 CVE-2024-56583,0,0,0a093de5a3582fcba5319e6417804083fa2f13d21a794dc18a40b22855a6eab7,2024-12-27T15:15:17.453000 CVE-2024-56584,0,0,eeb9dd397f2cf5bbbf04d47a1922c0a5bd55db3b2dd6af42d89d243ed3a0f9b4,2024-12-27T15:15:17.567000 CVE-2024-56585,0,0,877963cf60c4d690af9050e33b1bb1c26f5b0063aaeb8dcda5d72cde5d043865,2024-12-27T15:15:17.677000 CVE-2024-56586,0,0,b0c3a1afa1e35fa2222a1770b2af5fd447e0839a2d0703f1d4ca2d9ff4979c31,2024-12-27T15:15:17.800000 CVE-2024-56587,0,0,597ff3809927035a763007dd1ab65f05cbacc61e0ba8d04e0bc053074806191e,2024-12-27T15:15:17.917000 -CVE-2024-56588,0,1,c5e78c53e10590ee4aa67de98f1e9d7f44e9a534f4ba3ac877ccdc434bc6e47b,2025-01-09T16:16:22.040000 +CVE-2024-56588,0,0,c5e78c53e10590ee4aa67de98f1e9d7f44e9a534f4ba3ac877ccdc434bc6e47b,2025-01-09T16:16:22.040000 CVE-2024-56589,0,0,e669c8f2a28110966f3559dfa46339a87026e650a8eac6b0a3c626f7087ebd28,2024-12-27T15:15:18.150000 CVE-2024-5659,0,0,83e7687f93b86419198f1683634dd14733df87a0c466715b2e7e79370f69ac01,2024-11-21T09:48:06.543000 CVE-2024-56590,0,0,ce1170c24714fa2e0e447addbede8cbfc003003487543f7771793bf3ebdaca04,2024-12-27T15:15:18.263000 @@ -272318,7 +272318,7 @@ CVE-2024-56595,0,0,5c739d39a04368864cbc388d8808a97d325a73a29c39f4cccb5f255c6ed55 CVE-2024-56596,0,0,f9a03aa1aa88f972ffe6a55ad6e165129f456075471da9dcb4076a6e6b502209,2024-12-27T15:15:18.963000 CVE-2024-56597,0,0,347c4891ee178d2857b2a9b9b3a59e9ef73cd9d9644a163cb89f5004d70ba847,2024-12-27T15:15:19.080000 CVE-2024-56598,0,0,a2176885d0091e4f0f4ccf382f6f43c67f59acd5431ed7d070c60a0e375825cf,2024-12-27T15:15:19.200000 -CVE-2024-56599,0,1,a95a82bdcf63c0a92d2e3c23853bd64450d2915701e7e1da99973a296313b4a3,2025-01-09T16:16:22.167000 +CVE-2024-56599,0,0,a95a82bdcf63c0a92d2e3c23853bd64450d2915701e7e1da99973a296313b4a3,2025-01-09T16:16:22.167000 CVE-2024-5660,0,0,185ada92ecf12140397c738113ef0443174eeeea8f301748716001f7b999562c,2024-12-16T14:15:05.123000 CVE-2024-56600,0,0,52d580d322cdc56209d742bf1001e48cf3d43006079a875fc418ff12bed23270,2024-12-27T15:15:19.410000 CVE-2024-56601,0,0,637410ffb911b579d9118778643db5f364036159a7ab02ab9694514f07f24700,2024-12-27T15:15:19.527000 @@ -272327,9 +272327,9 @@ CVE-2024-56603,0,0,44c1fc20c2507a1b0892802648f891a340c404613043cf4a963b0efbbafa0 CVE-2024-56604,0,0,565ab9d0b315999a07c7d4356116cd8598a6b3b07028c5fa8b14764daf5f90b9,2024-12-27T15:15:19.887000 CVE-2024-56605,0,0,b64b4a627bbf95f44fe3405d04872bb763af58a6067e54da35f3e7f7c0ee5116,2024-12-27T15:15:19.980000 CVE-2024-56606,0,0,ac0f83cc7a214072e6406d51e213fc315d5a502091a812f3bcbef5315f50bb3e,2025-01-08T21:46:59.767000 -CVE-2024-56607,0,1,e563af3645703f9b9553a96385d656f3bc2fe49e78b5d85c2c1b6bbd37a859e0,2025-01-09T16:16:22.327000 +CVE-2024-56607,0,0,e563af3645703f9b9553a96385d656f3bc2fe49e78b5d85c2c1b6bbd37a859e0,2025-01-09T16:16:22.327000 CVE-2024-56608,0,0,0d4d7a76c820d078ab63176c92aa3cecb2c95ef837fece154b0757799d40a37f,2025-01-08T17:10:01.233000 -CVE-2024-56609,0,1,c1d1f9f0b8d9bf267ee9ad8809efd411fccec1fbfc6fb3d39848a68ade2ca699,2025-01-09T16:16:22.443000 +CVE-2024-56609,0,0,c1d1f9f0b8d9bf267ee9ad8809efd411fccec1fbfc6fb3d39848a68ade2ca699,2025-01-09T16:16:22.443000 CVE-2024-5661,0,0,7d090de96660a134ff2e3cb7262fde0b3d927ce5a88611486b37761a6a2d78a0,2024-11-21T09:48:06.673000 CVE-2024-56610,0,0,3616430b001245a9667a9f4aa45a5afeac5c8dd0cb6af7e882645d533e24c8ba,2024-12-27T15:15:20.490000 CVE-2024-56611,0,0,0d93be71bfd72357cc54d7ccd72b59dc3ffef4c2b81f6098928deb94ac964bb5,2025-01-06T17:22:48.560000 @@ -272337,7 +272337,7 @@ CVE-2024-56612,0,0,f02cb9a5a497bab1cc02d2af39cd52bf8fd6d5468613153d1da2ffcfc44c1 CVE-2024-56613,0,0,bcdd018642860eac1962ebef4d87191542f737182e11f4fd8fcddbe437261a94,2025-01-08T16:51:18.680000 CVE-2024-56614,0,0,68b560d72c5c168c49969c3f70ee5419af628f3dbaae23240c69a99286fc507a,2025-01-08T17:10:39.210000 CVE-2024-56615,0,0,873a568be01f0549a53bba8981a0b7f3ac107b358e5772ad839fb2e60aa2aabc,2024-12-27T15:15:21.013000 -CVE-2024-56616,0,1,795b955d0869309f1344b85e20fb6f6e035fcf5ca884f2b0d2da2f827cdb4744,2025-01-09T16:16:22.620000 +CVE-2024-56616,0,0,795b955d0869309f1344b85e20fb6f6e035fcf5ca884f2b0d2da2f827cdb4744,2025-01-09T16:16:22.620000 CVE-2024-56617,0,0,fc087c687b8dff99b58f2939f77fa49bf48a0eeffb6a09b1ad34eb87c4b55aa7,2024-12-27T15:15:21.227000 CVE-2024-56618,0,0,27c2363f772214d155c7ea30b1bb342f6bb2eb036ac771b2dd810e31d927c144,2024-12-27T15:15:21.337000 CVE-2024-56619,0,0,b0c2a960644b177041a995fd8f73f350348bd550dc63bd05c80f5fc52f6df6b2,2024-12-27T15:15:21.437000 @@ -272348,8 +272348,8 @@ CVE-2024-56622,0,0,57f9032cf59eb1768889e07334129fae85d94e8871f8d41026f335ec621b8 CVE-2024-56623,0,0,0e93d745489795428a20c54b35ad52e910e61dcb2158be56884d826399a6b1a3,2025-01-08T21:41:01.397000 CVE-2024-56624,0,0,88799a063f0b005c3843d9067ee2b8e4d19fb1fd500724d525e887a886596206,2024-12-27T15:15:21.933000 CVE-2024-56625,0,0,01037372e944818596a9b7f73f6b5c3b9ecad55d8f3378e4d833626252bed489,2024-12-27T15:15:22.033000 -CVE-2024-56626,0,1,0c0fd28fcd34d77d00913b19bdbc85f3f571ce5fc13addf9633f2b54a392192b,2025-01-09T16:16:22.770000 -CVE-2024-56627,0,1,06de92e0b7d50e2cbff9389c0c16e9faaeba64c052d9dee12d2e94a5e4352eed,2025-01-09T16:16:22.907000 +CVE-2024-56626,0,0,0c0fd28fcd34d77d00913b19bdbc85f3f571ce5fc13addf9633f2b54a392192b,2025-01-09T16:16:22.770000 +CVE-2024-56627,0,0,06de92e0b7d50e2cbff9389c0c16e9faaeba64c052d9dee12d2e94a5e4352eed,2025-01-09T16:16:22.907000 CVE-2024-56628,0,0,d4522d2b8c88fd491d5e221aac0e8a6cb75c6500e0513d30049fbc40976e5500,2024-12-27T15:15:22.357000 CVE-2024-56629,0,0,c3ac49cfdd551a12a574df602f16819cd69e62bdcda6ce31db194f87ddd1b77f,2024-12-27T15:15:22.463000 CVE-2024-5663,0,0,3d93cfa6260123c05a0fe5dd837778ab353045f85b9b96941dd647b061b7390d,2024-11-21T09:48:06.970000 @@ -272422,7 +272422,7 @@ CVE-2024-56690,0,0,2a72c8e6571a5a1d0298311d84636f71e3ae4d29693e80187270d779ac92c CVE-2024-56691,0,0,62c59d5d1a3d371802a9cee1fb0752a9e914735965be638d034aafb90a06960b,2024-12-28T10:15:14.027000 CVE-2024-56692,0,0,5c33e737c3bcad090ff32f8b13c5bd44758834f65a74f4fa5cab1bf99e0f55b2,2024-12-28T10:15:14.490000 CVE-2024-56693,0,0,5d463ee65304d8347500c614a6927974a7b867229756c573966b39df25e26e7c,2024-12-28T10:15:14.833000 -CVE-2024-56694,0,1,e02696a2af0f8832f551be07eb9f65e5e2b65973a286b33cb8ac8725e89835c5,2025-01-09T16:16:23.053000 +CVE-2024-56694,0,0,e02696a2af0f8832f551be07eb9f65e5e2b65973a286b33cb8ac8725e89835c5,2025-01-09T16:16:23.053000 CVE-2024-56695,0,0,1049a7ea492b9a468c5631b60a8b10497c8017b3b7122fffb0b919ea0dbcafe0,2024-12-28T10:15:15.533000 CVE-2024-56696,0,0,e7ff58f277f582521235fb4a39dccc778e70841711b02192c9e97fdaa9f8f3ce,2025-01-08T16:45:40.197000 CVE-2024-56697,0,0,415312cd2de09e121d8f6863f3f85137f2ef58c344d43a9b863b32cfd98dbc09,2025-01-08T16:45:54.327000 @@ -272445,8 +272445,8 @@ CVE-2024-56711,0,0,8eddbbeefa112ed89f1c54ad9c0be9219e878580c5285b1d97e53e72270a6 CVE-2024-56712,0,0,5b4b2cfbf10a7f1957aa2405de52e1416f37c32b46cc4476328392ec38eda5bb,2025-01-06T17:11:48.987000 CVE-2024-56713,0,0,5020834a260519e2be6a95e6f4f1901adc3b751bc54eb22b967ecc861237a872,2024-12-29T09:15:06.377000 CVE-2024-56714,0,0,b3ce9d06b99ca38b43d3fc7ca241e57e4a1bb78055defdbd69f868bbfc41abea,2024-12-29T09:15:06.510000 -CVE-2024-56715,0,1,c871af568cc13cfc36043e505f66a67055fb99524fa956bab4dbade56d02ea8c,2025-01-09T16:16:23.240000 -CVE-2024-56716,0,1,6aa674312318253ed698928dc2c776b98db2725ca8b37ba053438507cc25eeed,2025-01-09T16:16:23.387000 +CVE-2024-56715,0,0,c871af568cc13cfc36043e505f66a67055fb99524fa956bab4dbade56d02ea8c,2025-01-09T16:16:23.240000 +CVE-2024-56716,0,0,6aa674312318253ed698928dc2c776b98db2725ca8b37ba053438507cc25eeed,2025-01-09T16:16:23.387000 CVE-2024-56717,0,0,6f99c7e7110cdf00a886c02bba11dfcfd51ee3613588581ce948a32c1d2c0844,2024-12-29T09:15:06.907000 CVE-2024-56718,0,0,79ded20f7b176b2dcc95a692c7af31bc57850e5b2bca5f3ea071c18aa952ec66,2024-12-29T09:15:07.040000 CVE-2024-56719,0,0,a6791b71c9fe2c2a4367a8ec97965265ce00a3f428bca5f378d8f47e797e7c75,2024-12-29T09:15:07.187000 @@ -272490,18 +272490,18 @@ CVE-2024-56755,0,0,205ce7afe96425c287c52b7a72e2ff26171d854700f3cf3d8f25e737abb82 CVE-2024-56756,0,0,bd03068cc43b4cd3609b9bb8866c84806441d6e0d20095ddeda56dff7ba7d05a,2025-01-06T20:33:10.813000 CVE-2024-56757,0,0,46c6c9ed6516d3e8d957dd15e681278f460a9b87f55fe95de169dcd9aa1996fa,2025-01-07T22:46:35.897000 CVE-2024-56758,0,0,2c55925c10785ee32a5bb0aa9138d84e7f9119c83900c2491032df52cfe48084,2025-01-07T22:43:35.403000 -CVE-2024-56759,0,1,6cca29a52de819d2e9bdfc2f5da80a7a2f8b9f14088d1f6a2f717c62628f21e1,2025-01-09T16:16:23.547000 +CVE-2024-56759,0,0,6cca29a52de819d2e9bdfc2f5da80a7a2f8b9f14088d1f6a2f717c62628f21e1,2025-01-09T16:16:23.547000 CVE-2024-5676,0,0,42e21ca7cdab0bdccf25cf6637d45fef7f036494b6d014c88b5835e6e4847379,2024-11-21T09:48:08.420000 CVE-2024-56760,0,0,72c66a1e53e88062831a1e2948e1690ade890c97f5a8aca9793bb4f74cd3b40e,2025-01-07T23:06:22.637000 -CVE-2024-56761,0,1,50cdec2eb0ac44f5b4bf3ee27d9bf4283f3aa1e5e4a6c8551c767a8281df1506,2025-01-09T16:16:23.667000 +CVE-2024-56761,0,0,50cdec2eb0ac44f5b4bf3ee27d9bf4283f3aa1e5e4a6c8551c767a8281df1506,2025-01-09T16:16:23.667000 CVE-2024-56762,0,0,60cbcc45f06c16ba0161fce9430eab44b47458e705e9b29759993ec95842a560,2025-01-07T09:15:16.973000 -CVE-2024-56763,0,1,b39292b686e9471eec590980b78b2a363be23c62abe7afa434eea1401b525135,2025-01-09T16:16:23.780000 +CVE-2024-56763,0,0,b39292b686e9471eec590980b78b2a363be23c62abe7afa434eea1401b525135,2025-01-09T16:16:23.780000 CVE-2024-56764,0,0,a18be7db9078eff097e17bb07b5a1daeec28cb01cde7f65d9d3ba2bd38bd850e,2025-01-07T23:04:29.780000 CVE-2024-56765,0,0,71917408c8c13ef040ede0707bb147f5bfdf9a3d2f43d54208cbfff7de842620,2025-01-07T23:00:53.973000 -CVE-2024-56766,0,1,bce49344e22f2bb3806268a0257273103e66d2578fa423683880a7c80182d04d,2025-01-09T16:16:23.913000 -CVE-2024-56767,0,1,ec44d992537d8dabb3d619cb50ee92ccb66f80ed282e5005cbd7f3c03d352a0f,2025-01-09T16:16:24.063000 +CVE-2024-56766,0,0,bce49344e22f2bb3806268a0257273103e66d2578fa423683880a7c80182d04d,2025-01-09T16:16:23.913000 +CVE-2024-56767,0,0,ec44d992537d8dabb3d619cb50ee92ccb66f80ed282e5005cbd7f3c03d352a0f,2025-01-09T16:16:24.063000 CVE-2024-56768,0,0,d8373e0dbf214f4feec34d3f904be6536bfb761175850928b1ed7e4f24a9c3b7,2025-01-07T22:50:43.207000 -CVE-2024-56769,0,1,9afe24f702f08d9e4e1e481a58433d2a2d8f571a11e5ae36fd93a1a46116404c,2025-01-09T16:16:24.203000 +CVE-2024-56769,0,0,9afe24f702f08d9e4e1e481a58433d2a2d8f571a11e5ae36fd93a1a46116404c,2025-01-09T16:16:24.203000 CVE-2024-5677,0,0,1c94c489b32a2f3740f8b8867e0aff380d1e56445098bb97785a4bdba0037977,2024-11-21T09:48:08.540000 CVE-2024-56770,0,0,5854677383e6e820e5cdee945ad65b74d897b00edb04a3c6bca2e9d3611a9af1,2025-01-08T17:15:15.957000 CVE-2024-56771,0,0,16debccc3dc015a954cd6ee94102c2e7557ae015b0ea137433964de6f0cf971b,2025-01-08T18:15:17.777000 @@ -274129,7 +274129,7 @@ CVE-2024-7469,0,0,bb75caf7cb65c45c8dba86f795cbaa04e526b6e4e89be055fefe937e458a8d CVE-2024-7470,0,0,03f483b2cf92aebe2ccf72a1e355fb62429e8a567a66341b73a9acc14d8a17db,2024-08-06T17:37:07.923000 CVE-2024-7472,0,0,de0c1c1a6d606e95989fe7fe23b929a31aec4fa2eabaf43817b16d022442051b,2024-10-31T18:46:32.497000 CVE-2024-7473,0,0,b8dc981d2d85278013abb8b222f018481282dc1a8b74ff93c8c1b319e96a9851,2024-11-03T17:15:15.493000 -CVE-2024-7474,0,0,4a99dafdec2ed34c4f4618fbad3a6d20488fa56b492b0baa3d1ea30190ea3635,2024-11-14T14:15:19.373000 +CVE-2024-7474,0,1,e7381da2ea17372bd3b4b7483233e7d6adb698842bf2e26af5a04b1b55bee22c,2025-01-09T18:15:29.380000 CVE-2024-7475,0,0,7bbd1b2dc6caeee9f6f7cf58e1447eb5146831b0c5f989701c0b6c3d0833ecff,2024-11-04T13:55:37.233000 CVE-2024-7477,0,0,6c6434fc676e81002c750c9627714098eaf963ca81b6eff0a8aeb3b62c2e1988,2024-09-11T15:03:06.637000 CVE-2024-7479,0,0,2ea71efff98f3f4975f4e7b351509dce6668cdd1c5b196a9e030ff840526ff07,2024-09-26T13:32:02.803000 @@ -274414,7 +274414,7 @@ CVE-2024-7799,0,0,ae93761b2febde8a3d4f3898ed454dbc28a7b3cf13c8abaaf207206a701f33 CVE-2024-7800,0,0,c36121d111b485122618523d29ece4f8f3e97c88204ba9e525313dd56916742b,2024-08-19T16:50:39.993000 CVE-2024-7801,0,0,de1c174e4d255134bca63a0c587454638d0b42c255fffd4a5f0594c369c20f8e,2024-10-17T15:19:27.053000 CVE-2024-7805,0,0,135d6da17dfa4c84aefd569e9d92e16548bde418c54a07f703c8b45a0b8c6cd9,2024-09-11T14:15:13.560000 -CVE-2024-7807,0,0,99d1d82840b6a57c629384259f5f48cb9c063fa899da33196cf9609e039f9a2e,2024-11-14T14:15:19.500000 +CVE-2024-7807,0,1,2f79e8d22e5d6ed09b318ab38ea343291c76b7890ace2830ff2b3c8694390017,2025-01-09T18:15:29.543000 CVE-2024-7808,0,0,7ac11306e30eff8e50a7b86f7aac8fe9c520c3fd210bead54deae1abf746387a,2024-08-19T18:07:44.270000 CVE-2024-7809,0,0,954ad4e20519f99939aae234167e2e1a513a575114d1fd0d8c005f141a3c37b6,2024-08-19T18:11:18.537000 CVE-2024-7810,0,0,048c5f698b16572eb13dbdde0a6f3f441c9e5f84a2c20bd6d58d137b28d8cf16,2024-08-19T18:12:14.090000 @@ -275245,7 +275245,7 @@ CVE-2024-8805,0,0,dcb9955ad68abfddebfd4e5bbca8162f29f9659b32eab2eee4abd640abddb9 CVE-2024-8806,0,0,4b9ed01ad6f672a2c6917fa3d7270b3791ade8f8d7c799fd1977d8d49125e25d,2024-12-20T17:56:56.057000 CVE-2024-8807,0,0,a3194d6f7254173351134c6667ba0ab69ff4954825d1b3258d592d08d98a976b,2024-12-20T17:56:46.357000 CVE-2024-8808,0,0,97dc891df3d9a3e3e84cc6d2301fb4dbe91fc0ade39658278ca48e61412ce9b9,2024-12-20T17:46:19.670000 -CVE-2024-8809,0,1,2853294a93443c963cab4b883bfed43b8244a681241e18acbdf96048099030f0,2025-01-09T16:11:32.663000 +CVE-2024-8809,0,0,2853294a93443c963cab4b883bfed43b8244a681241e18acbdf96048099030f0,2025-01-09T16:11:32.663000 CVE-2024-8810,0,0,4054bd11d0a58049adbca132e9cb8f89aa5e0709e583c7f8d6f2e3c10841c942,2024-11-08T19:01:03.880000 CVE-2024-8811,0,0,efd1e1c7a12a1d68e4b8fbca926671ec65f16d85c01df729a2e729ed2aa509eb,2025-01-03T22:49:49.463000 CVE-2024-8812,0,0,b302d09d72bb26c6b8a77cc5743f5dc39c42e30907950ec8ee651ff959fb9767,2024-12-04T14:56:07.463000 @@ -275557,7 +275557,7 @@ CVE-2024-9198,0,0,641d70ca97204854d04cbb4e4de612cfeb0ea4b8a4de965802073ac66a64a6 CVE-2024-9199,0,0,f7f1a8a24bf77060d991f64fa7f7c0b4d559bd9f8178b591e0115e53c808ca9b,2024-10-02T14:33:54.607000 CVE-2024-9200,0,0,268033b29e5d5ec23682d3c2261f73c93d30dbc35f0494171f700f2cf700f3f2,2024-12-03T02:15:17.913000 CVE-2024-9201,0,0,a603a5f3c75637d1be95df4b70d6e145f324aff77ebb4cdfe846a3ab7d10d550,2024-10-16T16:55:44.817000 -CVE-2024-9202,0,0,8fb9b896826ac26885a7a2801f851da6f9ad97aa2fdf824cbec58c4cb03677fc,2024-09-30T12:46:20.237000 +CVE-2024-9202,0,1,9bec358a87a528c01972a943c5055d439c78f9ca4e83bdd54a6636d2aa789bdb,2025-01-09T18:07:29.847000 CVE-2024-9203,0,0,4e20a4fb9410ceed746d6ea9a7aaaba3d229704545b019ce0319b7b1b02a3f4c,2024-09-30T12:46:20.237000 CVE-2024-9204,0,0,a5160d78b40684d13a0abe78f0110c3f251288d3f2bddb167ad6ebb658dbfbfc,2024-10-16T14:26:41.423000 CVE-2024-9205,0,0,5ae9601368f3bcca980df59978014460b19f7164118a2dcd7e7fa2f27092d41f,2024-10-15T14:16:53.337000 @@ -275857,7 +275857,7 @@ CVE-2024-9571,0,0,a31a4b971a17ba063b7e695e5ff5e7f74d34f79c0a71c27999cdaf9c9e34b6 CVE-2024-9572,0,0,0c000f870df1b4dfe4767576eb0b04ae65b10dc9ed03c6ad1f54fea004037a15,2024-10-08T18:45:03.117000 CVE-2024-9573,0,0,896c9b96b3ee6f06964287ac30a7aab9f8a0342e9079034b52b5cb43f27d5120,2024-10-08T18:45:09.057000 CVE-2024-9574,0,0,36d06474ebb9a7a11deab9285a868e6ee3306f993dd2f673b63881253e71b3b6,2024-10-08T18:45:13.147000 -CVE-2024-9575,0,0,154d73161475387f5a1fdfc42969dbe3610f8d9079045bdf96897cf4699c5970,2024-10-14T08:15:02.970000 +CVE-2024-9575,0,1,99a3fca3901d3328d83c2282ab301542da23b187bbb75a369a1d634547d143ca,2025-01-09T18:15:29.763000 CVE-2024-9576,0,0,f8df6627dc8e668a24b77e8b044c7a10ae532dbc042e210d713186b99b0fb9e1,2024-11-12T19:34:37.910000 CVE-2024-9578,0,0,9ac6a0f631f50f5201c328a5712a4c754e59a6b507571c157dd5bee87bb7472e,2024-11-13T17:01:16.850000 CVE-2024-9579,0,0,9b5787a1e02c2c45dc866f289e070dd790e24d1ae554f06594bb1b24c390d960,2024-11-08T18:08:02.683000 @@ -276282,9 +276282,9 @@ CVE-2025-0299,0,0,46c993a70c9dd5843cd4dc3486123b8f79f076cb607c745df442454088b3fb CVE-2025-0300,0,0,6462b093b202cdda5c643638789beb08104cb14d8ff95eb1f2f740fecb0f8630,2025-01-07T17:15:32.090000 CVE-2025-0301,0,0,db7e09db06a3c89075ef99c6e0773ce8d9b6391802870d788b13b4dc1d994dbc,2025-01-07T18:15:21.460000 CVE-2025-0306,0,0,b68f04c884b94c2988081809303425e8fc9d9a1826584b2811a6c0892a02e108,2025-01-09T04:15:13 -CVE-2025-0328,0,0,3392df3a5ba9990f086e698e74404cadf8dede3f30f53b6a63cec684ef4d43e1,2025-01-09T05:15:07.997000 -CVE-2025-0331,0,0,9958f914d08798c9884ab9acadc5485c8bf3fa51831a1e1c33c7f651b2407526,2025-01-09T05:15:08.237000 -CVE-2025-0333,0,0,a8ab0819172da3f9274aae888663ae5efdae6b85957b7e6ef6d1d8934c8d1070,2025-01-09T05:15:08.453000 +CVE-2025-0328,0,1,511489195998b544d95e473f59edc225df3f03b898b8949ae54b7be85757b835,2025-01-09T17:15:17.330000 +CVE-2025-0331,0,1,5d1653aab10b087569df4f8a29838e92935196f68c8f8116069a88ef7b3aacf8,2025-01-09T17:15:17.933000 +CVE-2025-0333,0,1,2629a2f610016a17e720ebc1880354665b0ae5926a217965d584deca7c3f405b,2025-01-09T17:15:18.077000 CVE-2025-0334,0,0,d7673bbf36f717e1769977669c1cac432662eda5ad40e6c872bcf27cf1dda6d8,2025-01-09T06:15:15.610000 CVE-2025-0335,0,0,d042e6fe1c6117fe3f290f44401326a621378ac168f8b7424ff902d7e887bcca,2025-01-09T06:15:15.850000 CVE-2025-0336,0,0,04ee389408992b67dce77194d9c70ae97feea3babbe755fc187c92619ca0ff05,2025-01-09T07:15:27.860000 @@ -276306,6 +276306,12 @@ CVE-2025-20167,0,0,e3874d78f816684b3ad3095069171d70c3e3e27074d9afdb1ef0c33897812 CVE-2025-20168,0,0,1b582f0e103ddf474141bdcff2b1873e77789f263e13a1a2b55771b742e937b2,2025-01-08T17:15:17.323000 CVE-2025-21102,0,0,2ea9dc2a8684b7cddaddfe4341f8f27d4b76937cd9aabee635ab02b83d4b3e6e,2025-01-08T12:15:22.850000 CVE-2025-21111,0,0,16b52f24c4b80d09f6e5e5284496a40288893ce98ea4f8b371a26cbe1749320e,2025-01-08T18:15:20.157000 +CVE-2025-21592,1,1,420ea0357519c97bb443c83d434ce75fef006838355a5cfc7efd4bb0d1a7dc02,2025-01-09T17:15:18.203000 +CVE-2025-21593,1,1,4dbaba2a09f0994c55b5dc730e2f276bd7aac9a71124da84296dbc403f23c4f4,2025-01-09T17:15:18.380000 +CVE-2025-21596,1,1,9a75e60c3ead434f8b8a3542517340d5e3a9bd680918fd469939b623e972c30a,2025-01-09T17:15:18.593000 +CVE-2025-21599,1,1,dfe924a6beede2a0be26145087727f05b25454a9c78c252d17fd0faaf3a7f14f,2025-01-09T17:15:18.770000 +CVE-2025-21600,1,1,140812af79b18904ac79e570bbd2620febb11bd34d2f9630802e89bffc9ff590,2025-01-09T17:15:18.960000 +CVE-2025-21602,1,1,e4e54ceafea22832f83c53a482244e16581b39f02a4fa54b2d294a7f322a8ac7,2025-01-09T17:15:19.150000 CVE-2025-21603,0,0,b5e381674b14c0da15b91edbb6dfa15bbf2e7ab847df89260480b3be932a728c,2025-01-08T15:15:21.320000 CVE-2025-21604,0,0,ec728601eba6bd539d6daf316c2c18ea930a896bd5f0099ef67fb1e9d57f3d64,2025-01-06T16:15:30.927000 CVE-2025-21609,0,0,46e3af17bfffe98fbaec33d01272d23877fbd06c6cc0e4a79625fd3beabb7e1e,2025-01-03T17:15:09.147000 @@ -276322,6 +276328,7 @@ CVE-2025-21620,0,0,66289b3b3f28df54a495a49470b309f007a7b7fd72e39a3c6fd58a9e688ab CVE-2025-21622,0,0,6c5785ebf77d1798b874aaffe451a58c4a37257af0382e9b593172ad9a04e2cc,2025-01-07T18:15:21.703000 CVE-2025-21623,0,0,6087933d996aad8edaafac7f0dbca82dce0a66add1f565d4e48b576d3a77cbb8,2025-01-07T17:15:32.313000 CVE-2025-21624,0,0,48317da35eed5453ecdf02e6a373b353bc1bb2bc0793e255b08a0ed1235e3ac9,2025-01-07T17:15:32.417000 +CVE-2025-21628,1,1,9b45b82bc1cf7798fc9034c809b7aea070f1557febc397cdd0479edbf659b70e,2025-01-09T18:15:30.070000 CVE-2025-22130,0,0,1c04fe501f2c52c223532c188d73e6b294c7cd14c808267f30384be4f18c686f,2025-01-08T16:15:38.543000 CVE-2025-22132,0,0,68d348d844ec3947f7795605dbc0f9b5ea1e9ec0bb464d07ae2fd1571ba27a37,2025-01-07T22:15:31.590000 CVE-2025-22133,0,0,fbcb8ce624ceed57d4b59a3f2fe5dc11cb74a45b756ff7cc7f2369bba16ab526,2025-01-08T15:15:21.727000 @@ -276332,13 +276339,14 @@ CVE-2025-22140,0,0,270f2879e8de65b243beb9d7f4b67eed45df0b791563d9a26d7b732c538b2 CVE-2025-22141,0,0,2044a7b2e6c78c72031cb6881e193da3e0a629d8a5ed02e93c39455436172a69,2025-01-08T20:15:29.897000 CVE-2025-22143,0,0,379ec5cc1d9ddc4be571cdbe4ab10dde3e7605621fcd6681c8378b70a5e0e0ce,2025-01-08T20:15:30.003000 CVE-2025-22145,0,0,a3e7e33eb43759950c0b6a9c304c03ed60cf76009fe03502e9b6e5d41248cec1,2025-01-08T21:15:13.480000 +CVE-2025-22149,1,1,285a83f8462ddbb51760ea9329a665e948c6fc32ae5305a1fdb62a7b29cc1268,2025-01-09T18:15:30.233000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 CVE-2025-22215,0,0,67b181a6458a232e8ac5c80f2cba09df8333cbef01abc4197cfb8a002eebc845,2025-01-08T15:15:21.927000 CVE-2025-22261,0,0,b64f32ab7c14edb8b70371073baa276f94f41977fffad6128d5b8c7f32ae4fb7,2025-01-07T11:15:13.290000 CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000 CVE-2025-22293,0,0,bd03641f797a3639dbea19e70261d5f3ef47716330e1253c8622562a786a5f2c,2025-01-07T11:15:13.473000 CVE-2025-22294,0,0,a0564480f329fcd7c0e66762a6817c8b66e311ef88bcaa9ea4b0a25b2b9b8c80,2025-01-07T16:15:41.137000 -CVE-2025-22295,1,1,2f74c7006b214a8375d66474756104bda3998e6bd4d66e5157cf783534e4f73b,2025-01-09T16:16:25.140000 +CVE-2025-22295,0,0,2f74c7006b214a8375d66474756104bda3998e6bd4d66e5157cf783534e4f73b,2025-01-09T16:16:25.140000 CVE-2025-22296,0,0,759024dc281b7a918cf27de1ec3629f142320bc454cf6ef32a8190d71b2c339f,2025-01-07T17:15:32.520000 CVE-2025-22297,0,0,9977305a0d6e75d824a101b4298426a66f5e4c76cfe0c4871bbf38350398707d,2025-01-07T11:15:13.630000 CVE-2025-22298,0,0,8bc5151a6942224b93d58d09b54219f124b26cf650100c5c624298b6e94661bd,2025-01-07T11:15:13.783000 @@ -276350,12 +276358,12 @@ CVE-2025-22303,0,0,7f3990123a03c4c027b93344f96b18488d25683c34566288a5ac2e49799c5 CVE-2025-22304,0,0,dc86decb897d8dcb17d6736b8050d3d147c3f346bb65a4bf4381bfc3ce627059,2025-01-07T11:15:14.740000 CVE-2025-22305,0,0,f80b09c32552f5e5a6f1c3abe88e565f14882f9a6fcd2231897d49d487ea9c83,2025-01-07T11:15:14.907000 CVE-2025-22306,0,0,ae136ad221e1043a964eff9f5b0e44c3146bac4ea56d0d79bbdbf2a5266a8985,2025-01-07T17:15:32.663000 -CVE-2025-22307,1,1,af185d3d1a7ef0a56a3554c175b23ae02cba28f88cbc84f5d857038d6526f0e1,2025-01-09T16:16:25.347000 +CVE-2025-22307,0,0,af185d3d1a7ef0a56a3554c175b23ae02cba28f88cbc84f5d857038d6526f0e1,2025-01-09T16:16:25.347000 CVE-2025-22308,0,0,3082a330a5c2f55a8195387df80671bf625d85613ddf1f7720a63d796beb37c1,2025-01-07T11:15:15.043000 CVE-2025-22309,0,0,1d83d809e311c9f86146142b11ab3c2ee137d4e51c296bdf1e9908e49bfd5e64,2025-01-07T11:15:15.190000 CVE-2025-22310,0,0,611b8cef352c958ab385e33339cb21ae50588ba907bd8686700e8a0f08828219,2025-01-07T11:15:15.320000 CVE-2025-22312,0,0,864b53e49a0caf0c7477fbc1a622314be233df9866c8bc743a5d17b3ab7c6f47,2025-01-07T11:15:15.480000 -CVE-2025-22313,1,1,054311c3b83fe853773d650a6f19b786dd8082621b60fa7dab47a2a10a601037,2025-01-09T16:16:25.653000 +CVE-2025-22313,0,0,054311c3b83fe853773d650a6f19b786dd8082621b60fa7dab47a2a10a601037,2025-01-09T16:16:25.653000 CVE-2025-22315,0,0,88d7cb14e835cbfb35184951d4d2a01276f091d2cdaf1e147fca6e420a388c7e,2025-01-07T11:15:15.627000 CVE-2025-22316,0,0,1d4f03291501adc4e7db2e57a09c519ced1e62121cc59f1dd048002a13f21c3d,2025-01-07T11:15:15.763000 CVE-2025-22319,0,0,8dd7b737df78f4bf7802f660e60b5c48ed6d3989c739f6f6a383e6a420d195cf,2025-01-07T17:15:32.810000 @@ -276367,8 +276375,8 @@ CVE-2025-22325,0,0,a26ebf3d09a104491cb845816a20513441b646d7a59c3b551b7343f54bb7e CVE-2025-22326,0,0,55fcc2ec90ca2a48f1ecf2e7ef15d685d0e234288e1450bdf5945ada1cab975d,2025-01-07T11:15:16.730000 CVE-2025-22327,0,0,94ae0a0af4015641e039cb88bbf4a5342f924e137904074a584ea13bae54ad53,2025-01-07T11:15:16.870000 CVE-2025-22328,0,0,85e6710d10db6ae0f5bd4808efdfb16540414aacd5b21f737702fea8c3f3f3b6,2025-01-07T11:15:17.020000 -CVE-2025-22330,1,1,e2716bb603e7891158b8b3424f2395c22c8aae15da9af7a8d6b40b95d3b60449,2025-01-09T16:16:25.840000 -CVE-2025-22331,1,1,dd73fba29d20341bc312a2fcd14ef26ae7bd43959dbfaff7f18211ecd5554732,2025-01-09T16:16:26.180000 +CVE-2025-22330,0,0,e2716bb603e7891158b8b3424f2395c22c8aae15da9af7a8d6b40b95d3b60449,2025-01-09T16:16:25.840000 +CVE-2025-22331,0,0,dd73fba29d20341bc312a2fcd14ef26ae7bd43959dbfaff7f18211ecd5554732,2025-01-09T16:16:26.180000 CVE-2025-22333,0,0,9076c8d41b6efd0e0fd9421ac7e36825af266ebb1d92a228e7e9cdde0a09d000,2025-01-07T11:15:17.160000 CVE-2025-22334,0,0,8e60bcaee158fd51d60c9a3859250bdbfa79c9dcca3ca723d148b2a899a99369,2025-01-07T17:15:32.953000 CVE-2025-22335,0,0,7b6c88c7f724973f8b5d10f9481d7ef4194a9913c64a19757342a49b449698c6,2025-01-07T16:15:42.703000 @@ -276377,7 +276385,7 @@ CVE-2025-22338,0,0,7386260298494eb42e950f1f880bf8ae70e10350f68ba2f5b8af057495330 CVE-2025-22339,0,0,771cfd61a8b5d752aa38f63f03d13ecf4a4d9126ac8095ef4007c48756aefabd,2025-01-07T11:15:17.463000 CVE-2025-22342,0,0,063a12927989c01da7ad06ed778a17254bdc2f246dbbcfb9d1a331dab7385b47,2025-01-07T11:15:17.610000 CVE-2025-22343,0,0,a01cb6c83acf422bb85038c7e3d12905550105cbaa3bde139d47adcc60f7e94e,2025-01-07T11:15:17.743000 -CVE-2025-22345,1,1,731fa8014510c52b78674ab1d585a04dc5afe96c720e1a306885c7ebf0a29f5d,2025-01-09T16:16:26.620000 +CVE-2025-22345,0,0,731fa8014510c52b78674ab1d585a04dc5afe96c720e1a306885c7ebf0a29f5d,2025-01-09T16:16:26.620000 CVE-2025-22347,0,0,b23f9601774be508b95375b043d031713941d78a35e42f0b11cd23293672f811,2025-01-07T11:15:17.897000 CVE-2025-22348,0,0,86e2244a5ffc25b4844fe28b25003a18e5b493a92b7075a4184650958446241b,2025-01-07T11:15:18.037000 CVE-2025-22349,0,0,1aac443b538c01953d14a1490dcb4b090d3357b772a15bb29d022c3f9880c993,2025-01-07T11:15:18.183000 @@ -276390,7 +276398,7 @@ CVE-2025-22355,0,0,7fb49003033f48622ee177ed3064a841afeb8f3b7923595e3ceb552e3c719 CVE-2025-22357,0,0,147c0fa518b43fbbeedf81bdce042c347d77b134bf6606621324ad2a82888239,2025-01-07T11:15:19.013000 CVE-2025-22358,0,0,dc1be20fb09e74a2611eb7051b2d21fd1f1d91ae5c82de9f69ea7f312ec9287e,2025-01-07T11:15:19.167000 CVE-2025-22359,0,0,11db53ae6023dbca41854e1a04c18ab114bd8d0c5c79981bba4090ad1735197c,2025-01-07T11:15:19.310000 -CVE-2025-22361,1,1,b2614e4ce373aa49ac1d587cc870c34ef6218e82cf9b65329754cc851905a787,2025-01-09T16:16:26.830000 +CVE-2025-22361,0,0,b2614e4ce373aa49ac1d587cc870c34ef6218e82cf9b65329754cc851905a787,2025-01-09T16:16:26.830000 CVE-2025-22362,0,0,f2c1c84b7d03553f8071ba09037dd1ff504eab870b6dc98d49037cbeeba451a7,2025-01-07T11:15:19.453000 CVE-2025-22363,0,0,9f7b898386cda8ee09a75c7b5770220c6d443164e4a4258e07c36b540b5d907e,2025-01-07T17:15:33.377000 CVE-2025-22364,0,0,30da29bd1c8315e53dffcf2832952f80fef5aba5790c2ba343b9edf8659a4437,2025-01-07T11:15:19.600000 @@ -276410,11 +276418,11 @@ CVE-2025-22449,0,0,94a3675582914b0870c0eee39028c6e7cffbb606301205022783a128835fd CVE-2025-22500,0,0,8aa8d02f24b4f8f19adb445be3e34cd476c909361320155120249ca356361cc0,2025-01-07T17:15:33.657000 CVE-2025-22502,0,0,e47e75d81258d25ae0eee9a569a8a8d8f361d17aa85c464ced2971eda4004a93,2025-01-07T16:15:45.717000 CVE-2025-22503,0,0,402bf3ce290423b600660d8b85d86d2013a2c04e54ea441b78372503a408f2f7,2025-01-07T16:15:45.877000 -CVE-2025-22504,1,1,90b638e88168d2406c5368298dd08d8d50ce89f618ebca66a2c405c5ff8c1c12,2025-01-09T16:16:27.110000 -CVE-2025-22505,1,1,227562933da5f0af10b16ca5892eb48796c322953626efe8c759a27f14f2c2e3,2025-01-09T16:16:27.280000 +CVE-2025-22504,0,0,90b638e88168d2406c5368298dd08d8d50ce89f618ebca66a2c405c5ff8c1c12,2025-01-09T16:16:27.110000 +CVE-2025-22505,0,0,227562933da5f0af10b16ca5892eb48796c322953626efe8c759a27f14f2c2e3,2025-01-09T16:16:27.280000 CVE-2025-22507,0,0,2cff9b71c5a8e1294ee0ea1c856dbc50719946a9ec91412f79300cad5de53356,2025-01-07T16:15:46.040000 -CVE-2025-22508,1,1,384c415000a41c423cd3fd31c0f5924e8012dec3715b3e9b5226289291503b63,2025-01-09T16:16:27.433000 -CVE-2025-22510,1,1,fe48b46471704afa68c8928af8fd51180257ff81d98404b8b9464bf5379c6bdb,2025-01-09T16:16:27.590000 +CVE-2025-22508,0,0,384c415000a41c423cd3fd31c0f5924e8012dec3715b3e9b5226289291503b63,2025-01-09T16:16:27.433000 +CVE-2025-22510,0,0,fe48b46471704afa68c8928af8fd51180257ff81d98404b8b9464bf5379c6bdb,2025-01-09T16:16:27.590000 CVE-2025-22511,0,0,28a656f74d0a00f1dcd5f2d1fb8e8415e8bf825a558b6f9a2f3991d9b3896e4c,2025-01-07T16:15:46.180000 CVE-2025-22512,0,0,d0e0480ae125953d948bdeebc4960963d65049146d2d6560308d96f549fba6a9,2025-01-07T16:15:46.320000 CVE-2025-22515,0,0,dc88383ea73e68ad51939744f6cae290bf90cb256d13103188ae9c7665a86c51,2025-01-07T16:15:46.497000 @@ -276423,11 +276431,11 @@ CVE-2025-22517,0,0,9fc983ded78103459897537381d1a380b232ba76124ae4a3d3794ebc5a224 CVE-2025-22518,0,0,a864a2676a4bdff938f1d9f28be32f463fce1aeb40c710954302551237bb9be6,2025-01-07T16:15:46.990000 CVE-2025-22519,0,0,b03dc852be0c8215b11d4c8de5b1d47c9bad810d10f80dfb0ef73517ae023738,2025-01-07T16:15:47.140000 CVE-2025-22520,0,0,edfead18f9eeda03c8cc00cb5e0cacef67069ec050ab27b8d11f83a53b1efbea,2025-01-07T16:15:47.310000 -CVE-2025-22521,1,1,72b48c3d39c0bace8209eb6225c8d6cfd624ca6576ba275fea49e5af036f6cc7,2025-01-09T16:16:27.743000 +CVE-2025-22521,0,0,72b48c3d39c0bace8209eb6225c8d6cfd624ca6576ba275fea49e5af036f6cc7,2025-01-09T16:16:27.743000 CVE-2025-22522,0,0,024f0bd031ecc70bb9629fcbe159baf4796426c2b85db8fc05b2bf93b91b9c2b,2025-01-07T16:15:47.513000 CVE-2025-22524,0,0,84de273bb5783bbeb6318c5154a0cd9ff47d207b84705cc5b1c22760470cbf7f,2025-01-07T16:15:47.680000 CVE-2025-22525,0,0,c96a8d63c38ef7bfc31d30f88b9939fae4e7eb77a1967169714468d86712f834,2025-01-07T16:15:47.830000 -CVE-2025-22527,1,1,cf2d94f1fd831b4d1a833ea665e3a5e35157418ace65ba74df743363291cf741,2025-01-09T16:16:27.890000 +CVE-2025-22527,0,0,cf2d94f1fd831b4d1a833ea665e3a5e35157418ace65ba74df743363291cf741,2025-01-09T16:16:27.890000 CVE-2025-22528,0,0,3e1473c212cdf502c2941e4cf89839c1aa0ab52527e07c4b7914a485feb0efdf,2025-01-07T16:15:47.987000 CVE-2025-22529,0,0,872768ac8fbd7b67a82b204961d3b56dea5a0864471f1d1cdb5936b86e5a73fd,2025-01-07T16:15:48.180000 CVE-2025-22530,0,0,31f07343a8cb5d2166ec46b0ca399cb71cd94cb7ab1ef67d619b834824c1b425,2025-01-07T16:15:48.350000 @@ -276435,14 +276443,14 @@ CVE-2025-22531,0,0,9c8dd36d7210e53ba214e8f3cc09f5da41541d942c153faebf89f5d129cdc CVE-2025-22532,0,0,b809c5252350cda430ceffeda6049dcb96cccaa25d66b8277bb5a0735d1322f9,2025-01-07T16:15:48.747000 CVE-2025-22533,0,0,25b61589f30ce3deeecfd9c254fce95888fe59e98c0f7f43787108cd88655b60,2025-01-07T16:15:48.980000 CVE-2025-22534,0,0,2b1b89b97d9c480a79a27ab2e9768d7914cb2fe9f00d99eb04c1e686e9999643,2025-01-07T16:15:49.130000 -CVE-2025-22535,1,1,290fd01b1e1298ac4f5ff4b1da39b2ea0c013cb19143ad29b15b7a5b0c7b1b90,2025-01-09T16:16:28.047000 +CVE-2025-22535,0,0,290fd01b1e1298ac4f5ff4b1da39b2ea0c013cb19143ad29b15b7a5b0c7b1b90,2025-01-09T16:16:28.047000 CVE-2025-22536,0,0,d7d3b86b0fd1337cd788f34b766b814fcb4ee3ac1850fff21c34eb096ed2c876,2025-01-07T16:15:49.293000 -CVE-2025-22537,1,1,d7f5f598196c1650aa70b0a9d4bf3644597491174c4570a951d3e433dcfafb57,2025-01-09T16:16:28.210000 +CVE-2025-22537,0,0,d7f5f598196c1650aa70b0a9d4bf3644597491174c4570a951d3e433dcfafb57,2025-01-09T16:16:28.210000 CVE-2025-22538,0,0,12a6fca46dfb6875c8a21107d2505a7d5354a155e2258b9de3a7a1adb40ca128,2025-01-07T16:15:49.460000 -CVE-2025-22539,1,1,2aabdd6de645db62e7fdf2ec26bb2dd4cb1f19629999a6a141c8b0b3ca8db5e0,2025-01-09T16:16:28.350000 -CVE-2025-22540,1,1,1c1247d27b9b515b2d53e1355dfa1d8cdea653cdb609a07577ffab189b7ae7de,2025-01-09T16:16:28.503000 +CVE-2025-22539,0,0,2aabdd6de645db62e7fdf2ec26bb2dd4cb1f19629999a6a141c8b0b3ca8db5e0,2025-01-09T16:16:28.350000 +CVE-2025-22540,0,0,1c1247d27b9b515b2d53e1355dfa1d8cdea653cdb609a07577ffab189b7ae7de,2025-01-09T16:16:28.503000 CVE-2025-22541,0,0,b6c1d2a08ee9cabe1f5ee57bf104d9edc96473b54fda84b7fdacf8ea8bb547e8,2025-01-07T16:15:49.670000 -CVE-2025-22542,1,1,6a62d53564cd40f1caf7a166c2b05e9c874da8af52cd421b03367bbe77dbc957,2025-01-09T16:16:28.670000 +CVE-2025-22542,0,0,6a62d53564cd40f1caf7a166c2b05e9c874da8af52cd421b03367bbe77dbc957,2025-01-09T16:16:28.670000 CVE-2025-22543,0,0,bb92465369b746da5e3aad33249c8aa0381b90e534dfbb0263a00bbb5c76fd92,2025-01-07T16:15:49.830000 CVE-2025-22544,0,0,b86adfc3c97a7b5d0d3070401eb2342efddf9d1d837dd854681a3c6a418665ab,2025-01-07T16:15:50.003000 CVE-2025-22545,0,0,93ce509499b8aeceaabee7fe6f1d969e7f54041fc7dce1a116d7d372e009170a,2025-01-07T16:15:50.140000 @@ -276460,7 +276468,7 @@ CVE-2025-22557,0,0,554688a370f3db327fa06284ca2f5bc0989345f9c179b0129147bfc3c998d CVE-2025-22558,0,0,02538728dcbe28f9141d88cc5f37cf5e77cdba128b736b8999068fb514290b69,2025-01-07T16:15:52.080000 CVE-2025-22559,0,0,f5edeba6ab7d923752b407ae8aab3700703d56d33a7f7999527accd4fd6d59de,2025-01-07T16:15:52.243000 CVE-2025-22560,0,0,b722a48c52ac2270e574d7f5e02e3277d49a8fd1223636c766a0dea93a013371,2025-01-07T16:15:52.380000 -CVE-2025-22561,1,1,6df9a24ef0a95058a2f735724f029210a7a58ae54131e26756e9785914470ef9,2025-01-09T16:16:28.827000 +CVE-2025-22561,0,0,6df9a24ef0a95058a2f735724f029210a7a58ae54131e26756e9785914470ef9,2025-01-09T16:16:28.827000 CVE-2025-22562,0,0,7160616e3f1e58346b09b1df777bd943bb4feb68c941a8f3be9d3e61e578fef3,2025-01-07T16:15:52.540000 CVE-2025-22563,0,0,8f83fd6b5a5ec2381366f243f66907385b1669b6fef4670423d5257df7197ee1,2025-01-07T16:15:52.940000 CVE-2025-22571,0,0,1b4f24da1a6f1bb7f346661376dfe49926d420862ecc376c082a8f78051bb43a,2025-01-07T16:15:53.187000 @@ -276480,31 +276488,31 @@ CVE-2025-22590,0,0,b614c7d50ccfeb50c3e47048ce19c3611ad36ac118669e3c81ea441e322bc CVE-2025-22591,0,0,357b853ebe55eb932f399d326d5cfd3cf40fa62ab1a4f95d6fbcdc2774241b5d,2025-01-07T16:15:55.337000 CVE-2025-22592,0,0,ff5fac2b9bc94ed835e8f9addacdb39fda9bbbe54c2e47c1826c43b63204eab4,2025-01-07T16:15:55.470000 CVE-2025-22593,0,0,2e2b9b257210673d1959179ba19f9ddffb24fc86c8f15dcc25f3759c772c6b90,2025-01-07T16:15:55.627000 -CVE-2025-22594,1,1,b59b67bd9bb85bd779f5fd0d6e12fc0eac702434b104751a044120db7329e348,2025-01-09T16:16:28.983000 -CVE-2025-22595,1,1,e3d65ba51248112d76081ce49c46e19c6f28b60b2f8104b6f8dd7cc03abb167b,2025-01-09T16:16:29.160000 +CVE-2025-22594,0,0,b59b67bd9bb85bd779f5fd0d6e12fc0eac702434b104751a044120db7329e348,2025-01-09T16:16:28.983000 +CVE-2025-22595,0,0,e3d65ba51248112d76081ce49c46e19c6f28b60b2f8104b6f8dd7cc03abb167b,2025-01-09T16:16:29.160000 CVE-2025-22621,0,0,f36d0f70806d0c581838cce0fde67d4e521043699061f9e9337c84ae8de6806b,2025-01-07T17:15:35.710000 -CVE-2025-22801,1,1,27b9082ce5d8d4b87ba9b6f23e4e15af84ad2fa4155031ac0ca54e2184d53397,2025-01-09T16:16:29.323000 -CVE-2025-22802,1,1,214d68f351c2898ee2bd148b6eb25ed42195f00e8f204a7b64b1138105ff4132,2025-01-09T16:16:29.470000 -CVE-2025-22803,1,1,441c68f86f6fa67b401f6e5b4a6b1fc9c6900e7fc148128496f3df444b8a01ab,2025-01-09T16:16:29.627000 -CVE-2025-22804,1,1,e71dad2db43c5cbabad0e3beb621e2a007cef31a57cf38ade257fdec89cc161e,2025-01-09T16:16:29.787000 -CVE-2025-22805,1,1,b229f315830b7eaaa841df6ea12b762bfb90afa95cd07e76a4234f59b62562f7,2025-01-09T16:16:29.937000 -CVE-2025-22806,1,1,38d0810175d0d3a7697aade79ef968cdd84fa6558ae654623cb0be83293008d4,2025-01-09T16:16:30.090000 -CVE-2025-22807,1,1,f5c909ddf421ba1b00357b8fc2f752e7ffc3d182794e3a42e7cea43a28dea6d2,2025-01-09T16:16:30.253000 -CVE-2025-22808,1,1,09d71f30a75447a140b0ef80ab74881642fd55f3529374fa370589815754fa9b,2025-01-09T16:16:30.403000 -CVE-2025-22809,1,1,b745aba3f13734d2a8b33b946407c4fb3f4f2c19479935186d7d77532678244a,2025-01-09T16:16:30.557000 -CVE-2025-22810,1,1,052dd8d5e210c128d77b578d21d2084a686d1948a8bf9f2ae2fb9b81177017ef,2025-01-09T16:16:30.713000 -CVE-2025-22811,1,1,b7a6bc514e71becb59b09ecdf27d686eb8febbe0b9ed30d3c4af0e19d02011ec,2025-01-09T16:16:30.880000 -CVE-2025-22812,1,1,737799c11ccfb0e23a9093e1a0d6af05e076a826f1b6bbcb8cde5abc12d8abeb,2025-01-09T16:16:31.047000 -CVE-2025-22813,1,1,69028fd8717a607fdf21189ee2d904c1c751f5821f9fb96455ba4455daf153cb,2025-01-09T16:16:31.200000 -CVE-2025-22814,1,1,65ee901cff435ec6222796cabbfb3d206b86e25fa3089067354180bc5bc92f4a,2025-01-09T16:16:31.370000 -CVE-2025-22815,1,1,19871c307c37b41f3df4e09a30e858c967eb8d21c075becc80c1555787052312,2025-01-09T16:16:31.543000 -CVE-2025-22817,1,1,f408cc27b4c2539e183caf51cda99d9a43172205efacb701c5a5d4ae1effa9c4,2025-01-09T16:16:31.693000 -CVE-2025-22818,1,1,0b340d07d2ece27af91f8b8066e3f629546c22301bcdf28840045a1ee13dbabf,2025-01-09T16:16:31.850000 -CVE-2025-22819,1,1,6b1af1021da82ce22c543b4fc91c71afc7a7509cbe3c2af149c615ab191194c7,2025-01-09T16:16:32 -CVE-2025-22820,1,1,6e607cec0145c583bf7ba939467761d08a822ff9ec808bb492c50cae48dd4f0d,2025-01-09T16:16:32.173000 -CVE-2025-22821,1,1,06e00f48a88390a64873df1624dc52157d3a129e0f312d89e4e3f2a6a6d6fde2,2025-01-09T16:16:32.363000 -CVE-2025-22822,1,1,86fe614175eab12274d995316c7ea6878f9ed293859cb308b757f1d411e4b804,2025-01-09T16:16:32.557000 -CVE-2025-22823,1,1,3cb7eb88e447de51bff31c745363425ef76d647ead034c7dcc7937c26e7a231e,2025-01-09T16:16:32.717000 -CVE-2025-22824,1,1,5fa10c72f2f35c9e6ef05d40ca4cfa4e3b7c835fa36365c8ed7a7e09e9b30683,2025-01-09T16:16:32.893000 -CVE-2025-22826,1,1,332ad518891412cb4c6c16f7ba7d02f766b23d1581d77bb741cc4eabe620f85e,2025-01-09T16:16:33.047000 -CVE-2025-22827,1,1,b5e1199d90422b236ce828e6fe5f814f4ca97d3be889a387ee962fd6e98a8505,2025-01-09T16:16:33.200000 +CVE-2025-22801,0,0,27b9082ce5d8d4b87ba9b6f23e4e15af84ad2fa4155031ac0ca54e2184d53397,2025-01-09T16:16:29.323000 +CVE-2025-22802,0,0,214d68f351c2898ee2bd148b6eb25ed42195f00e8f204a7b64b1138105ff4132,2025-01-09T16:16:29.470000 +CVE-2025-22803,0,0,441c68f86f6fa67b401f6e5b4a6b1fc9c6900e7fc148128496f3df444b8a01ab,2025-01-09T16:16:29.627000 +CVE-2025-22804,0,0,e71dad2db43c5cbabad0e3beb621e2a007cef31a57cf38ade257fdec89cc161e,2025-01-09T16:16:29.787000 +CVE-2025-22805,0,0,b229f315830b7eaaa841df6ea12b762bfb90afa95cd07e76a4234f59b62562f7,2025-01-09T16:16:29.937000 +CVE-2025-22806,0,0,38d0810175d0d3a7697aade79ef968cdd84fa6558ae654623cb0be83293008d4,2025-01-09T16:16:30.090000 +CVE-2025-22807,0,0,f5c909ddf421ba1b00357b8fc2f752e7ffc3d182794e3a42e7cea43a28dea6d2,2025-01-09T16:16:30.253000 +CVE-2025-22808,0,0,09d71f30a75447a140b0ef80ab74881642fd55f3529374fa370589815754fa9b,2025-01-09T16:16:30.403000 +CVE-2025-22809,0,0,b745aba3f13734d2a8b33b946407c4fb3f4f2c19479935186d7d77532678244a,2025-01-09T16:16:30.557000 +CVE-2025-22810,0,0,052dd8d5e210c128d77b578d21d2084a686d1948a8bf9f2ae2fb9b81177017ef,2025-01-09T16:16:30.713000 +CVE-2025-22811,0,0,b7a6bc514e71becb59b09ecdf27d686eb8febbe0b9ed30d3c4af0e19d02011ec,2025-01-09T16:16:30.880000 +CVE-2025-22812,0,0,737799c11ccfb0e23a9093e1a0d6af05e076a826f1b6bbcb8cde5abc12d8abeb,2025-01-09T16:16:31.047000 +CVE-2025-22813,0,0,69028fd8717a607fdf21189ee2d904c1c751f5821f9fb96455ba4455daf153cb,2025-01-09T16:16:31.200000 +CVE-2025-22814,0,0,65ee901cff435ec6222796cabbfb3d206b86e25fa3089067354180bc5bc92f4a,2025-01-09T16:16:31.370000 +CVE-2025-22815,0,0,19871c307c37b41f3df4e09a30e858c967eb8d21c075becc80c1555787052312,2025-01-09T16:16:31.543000 +CVE-2025-22817,0,0,f408cc27b4c2539e183caf51cda99d9a43172205efacb701c5a5d4ae1effa9c4,2025-01-09T16:16:31.693000 +CVE-2025-22818,0,0,0b340d07d2ece27af91f8b8066e3f629546c22301bcdf28840045a1ee13dbabf,2025-01-09T16:16:31.850000 +CVE-2025-22819,0,0,6b1af1021da82ce22c543b4fc91c71afc7a7509cbe3c2af149c615ab191194c7,2025-01-09T16:16:32 +CVE-2025-22820,0,0,6e607cec0145c583bf7ba939467761d08a822ff9ec808bb492c50cae48dd4f0d,2025-01-09T16:16:32.173000 +CVE-2025-22821,0,0,06e00f48a88390a64873df1624dc52157d3a129e0f312d89e4e3f2a6a6d6fde2,2025-01-09T16:16:32.363000 +CVE-2025-22822,0,0,86fe614175eab12274d995316c7ea6878f9ed293859cb308b757f1d411e4b804,2025-01-09T16:16:32.557000 +CVE-2025-22823,0,0,3cb7eb88e447de51bff31c745363425ef76d647ead034c7dcc7937c26e7a231e,2025-01-09T16:16:32.717000 +CVE-2025-22824,0,0,5fa10c72f2f35c9e6ef05d40ca4cfa4e3b7c835fa36365c8ed7a7e09e9b30683,2025-01-09T16:16:32.893000 +CVE-2025-22826,0,0,332ad518891412cb4c6c16f7ba7d02f766b23d1581d77bb741cc4eabe620f85e,2025-01-09T16:16:33.047000 +CVE-2025-22827,0,0,b5e1199d90422b236ce828e6fe5f814f4ca97d3be889a387ee962fd6e98a8505,2025-01-09T16:16:33.200000