From 9b4d46036d7e00ec69be1b83965fc3b0a72e5c30 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 23 Jan 2025 03:03:47 +0000 Subject: [PATCH] Auto-Update: 2025-01-23T03:00:22.414667+00:00 --- CVE-2024/CVE-2024-421xx/CVE-2024-42182.json | 56 +++++++++++++++++++ CVE-2024/CVE-2024-421xx/CVE-2024-42183.json | 56 +++++++++++++++++++ CVE-2024/CVE-2024-554xx/CVE-2024-55410.json | 60 +++------------------ CVE-2024/CVE-2024-555xx/CVE-2024-55591.json | 4 +- CVE-2024/CVE-2024-577xx/CVE-2024-57719.json | 25 +++++++++ CVE-2024/CVE-2024-577xx/CVE-2024-57720.json | 25 +++++++++ CVE-2024/CVE-2024-577xx/CVE-2024-57721.json | 25 +++++++++ CVE-2024/CVE-2024-577xx/CVE-2024-57722.json | 25 +++++++++ CVE-2024/CVE-2024-577xx/CVE-2024-57723.json | 25 +++++++++ CVE-2024/CVE-2024-577xx/CVE-2024-57724.json | 25 +++++++++ README.md | 26 +++++---- _state.csv | 20 ++++--- 12 files changed, 300 insertions(+), 72 deletions(-) create mode 100644 CVE-2024/CVE-2024-421xx/CVE-2024-42182.json create mode 100644 CVE-2024/CVE-2024-421xx/CVE-2024-42183.json create mode 100644 CVE-2024/CVE-2024-577xx/CVE-2024-57719.json create mode 100644 CVE-2024/CVE-2024-577xx/CVE-2024-57720.json create mode 100644 CVE-2024/CVE-2024-577xx/CVE-2024-57721.json create mode 100644 CVE-2024/CVE-2024-577xx/CVE-2024-57722.json create mode 100644 CVE-2024/CVE-2024-577xx/CVE-2024-57723.json create mode 100644 CVE-2024/CVE-2024-577xx/CVE-2024-57724.json diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42182.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42182.json new file mode 100644 index 00000000000..85cc3f803a0 --- /dev/null +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42182.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-42182", + "sourceIdentifier": "psirt@hcl.com", + "published": "2025-01-23T01:15:26.580", + "lastModified": "2025-01-23T01:15:26.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "BigFix Patch Download Plug-ins are affected by Server-Side Request Forgery (SSRF) vulnerability. It may allow the application to download files from an internally hosted server on localhost." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 2.5, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0118565", + "source": "psirt@hcl.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42183.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42183.json new file mode 100644 index 00000000000..52e5254051f --- /dev/null +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42183.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-42183", + "sourceIdentifier": "psirt@hcl.com", + "published": "2025-01-23T02:15:35.933", + "lastModified": "2025-01-23T02:15:35.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "BigFix Patch Download Plug-ins are affected by an arbitrary file download vulnerability. It could allow a malicious operator to download files from arbitrary URLs without any proper validation or allowlist controls." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 2.5, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] + } + ], + "references": [ + { + "url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0118565", + "source": "psirt@hcl.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55410.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55410.json index d2382cde63d..cb95f3ec53e 100644 --- a/CVE-2024/CVE-2024-554xx/CVE-2024-55410.json +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55410.json @@ -1,64 +1,16 @@ { "id": "CVE-2024-55410", - "sourceIdentifier": "cve@mitre.org", + "sourceIdentifier": "54bf65a7-a193-42d2-b1ba-8e150d3c35e1", "published": "2025-01-07T18:15:20.387", - "lastModified": "2025-01-07T22:15:31.423", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T02:15:46.463", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An issue in the 690b33e1-0462-4e84-9bea-c7552b45432a.sys component of Asus GPU Tweak II Program Driver v1.0.0.0 allows attackers to perform arbitrary read and write actions via supplying crafted IOCTL requests." - }, - { - "lang": "es", - "value": "Un problema en el componente 690b33e1-0462-4e84-9bea-c7552b45432a.sys del Asus GPU Tweak II Program Driver v1.0.0.0 permite a los atacantes realizar acciones de lectura y escritura arbitrarias mediante el suministro de solicitudes IOCTL manipuladas." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 7.8, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-1284" - } - ] - } - ], - "references": [ - { - "url": "http://asus.com", - "source": "cve@mitre.org" - }, - { - "url": "https://github.com/heyheysky/vulnerable-driver/blob/master/CVE-2024-55410/CVE-2024-55410_690b33e1-0462-4e84-9bea-c7552b45432a.sys_README.md", - "source": "cve@mitre.org" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55591.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55591.json index a5bcbe8f7c1..4614ba0fe77 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55591.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55591.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55591", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:34.450", - "lastModified": "2025-01-15T20:48:30.333", + "lastModified": "2025-01-23T02:00:02.310", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -62,7 +62,7 @@ "cisaExploitAdd": "2025-01-14", "cisaActionDue": "2025-01-21", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", - "cisaVulnerabilityName": "Fortinet FortiOS Authorization Bypass Vulnerability", + "cisaVulnerabilityName": "Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability", "weaknesses": [ { "source": "psirt@fortinet.com", diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57719.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57719.json new file mode 100644 index 00000000000..f2dd9840151 --- /dev/null +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57719.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57719", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-23T01:15:26.740", + "lastModified": "2025-01-23T01:15:26.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "lunasvg v3.0.0 was discovered to contain a segmentation violation via the component blend_transformed_tiled_argb.isra.0." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/sammycage/lunasvg/issues/209", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57720.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57720.json new file mode 100644 index 00000000000..38384f834e6 --- /dev/null +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57720.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57720", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-23T01:15:26.847", + "lastModified": "2025-01-23T01:15:26.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "lunasvg v3.0.0 was discovered to contain a segmentation violation via the component plutovg_blend." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/sammycage/lunasvg/issues/209", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57721.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57721.json new file mode 100644 index 00000000000..b93e6ea1d56 --- /dev/null +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57721.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57721", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-23T01:15:26.990", + "lastModified": "2025-01-23T01:15:26.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "lunasvg v3.0.0 was discovered to contain a segmentation violation via the component plutovg_path_add_path." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/sammycage/lunasvg/issues/209", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57722.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57722.json new file mode 100644 index 00000000000..7088895dc3d --- /dev/null +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57722.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57722", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-23T01:15:27.137", + "lastModified": "2025-01-23T01:15:27.137", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "lunasvg v3.0.0 was discovered to contain a allocation-size-too-big bug via the component plutovg_surface_create." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/sammycage/lunasvg/issues/209", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57723.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57723.json new file mode 100644 index 00000000000..488a075d2fc --- /dev/null +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57723.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57723", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-23T01:15:27.270", + "lastModified": "2025-01-23T01:15:27.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "lunasvg v3.0.0 was discovered to contain a segmentation violation via the component composition_source_over." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/sammycage/lunasvg/issues/209", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57724.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57724.json new file mode 100644 index 00000000000..4a5c9708be7 --- /dev/null +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57724.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57724", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-23T01:15:27.387", + "lastModified": "2025-01-23T01:15:27.387", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "lunasvg v3.0.0 was discovered to contain a segmentation violation via the component gray_record_cell." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/sammycage/lunasvg/issues/209", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 41ca57040a1..3d17bca1d9b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-23T00:55:23.302680+00:00 +2025-01-23T03:00:22.414667+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-22T23:02:59.383000+00:00 +2025-01-23T02:15:46.463000+00:00 ``` ### Last Data Feed Release @@ -27,29 +27,35 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-01-22T01:00:04.365491+00:00 +2025-01-23T01:00:04.374239+00:00 ``` ### Total Number of included CVEs ```plain -278618 +278626 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `8` +- [CVE-2024-42182](CVE-2024/CVE-2024-421xx/CVE-2024-42182.json) (`2025-01-23T01:15:26.580`) +- [CVE-2024-42183](CVE-2024/CVE-2024-421xx/CVE-2024-42183.json) (`2025-01-23T02:15:35.933`) +- [CVE-2024-57719](CVE-2024/CVE-2024-577xx/CVE-2024-57719.json) (`2025-01-23T01:15:26.740`) +- [CVE-2024-57720](CVE-2024/CVE-2024-577xx/CVE-2024-57720.json) (`2025-01-23T01:15:26.847`) +- [CVE-2024-57721](CVE-2024/CVE-2024-577xx/CVE-2024-57721.json) (`2025-01-23T01:15:26.990`) +- [CVE-2024-57722](CVE-2024/CVE-2024-577xx/CVE-2024-57722.json) (`2025-01-23T01:15:27.137`) +- [CVE-2024-57723](CVE-2024/CVE-2024-577xx/CVE-2024-57723.json) (`2025-01-23T01:15:27.270`) +- [CVE-2024-57724](CVE-2024/CVE-2024-577xx/CVE-2024-57724.json) (`2025-01-23T01:15:27.387`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `2` -- [CVE-2024-57938](CVE-2024/CVE-2024-579xx/CVE-2024-57938.json) (`2025-01-22T23:01:40.253`) -- [CVE-2024-57940](CVE-2024/CVE-2024-579xx/CVE-2024-57940.json) (`2025-01-22T23:02:27.493`) -- [CVE-2024-57944](CVE-2024/CVE-2024-579xx/CVE-2024-57944.json) (`2025-01-22T23:02:41.850`) -- [CVE-2025-21658](CVE-2025/CVE-2025-216xx/CVE-2025-21658.json) (`2025-01-22T23:02:59.383`) +- [CVE-2024-55410](CVE-2024/CVE-2024-554xx/CVE-2024-55410.json) (`2025-01-23T02:15:46.463`) +- [CVE-2024-55591](CVE-2024/CVE-2024-555xx/CVE-2024-55591.json) (`2025-01-23T02:00:02.310`) ## Download and Usage diff --git a/_state.csv b/_state.csv index e3b79a423c4..7312a779d98 100644 --- a/_state.csv +++ b/_state.csv @@ -263639,6 +263639,8 @@ CVE-2024-42179,0,0,196106f2d3fd2b8f10b05ef0357a8e01417f21977d9b370fe7a52116b37eb CVE-2024-4218,0,0,7a0061e75f27495a7259e5a50ce11715685411290c6b771dfa8c54d8a57b046e,2024-11-21T09:42:24.667000 CVE-2024-42180,0,0,e809f9eb7c1490df30221feea0eda948578a27863db7d95ec3363e5547031367,2025-01-12T22:15:06.983000 CVE-2024-42181,0,0,906efc04675e6ba0dfe172b3f945d5b98bb4c6661097a27e747b5cc96fa37cb6,2025-01-12T22:15:07.120000 +CVE-2024-42182,1,1,18224d5ee2ac8fd7b3a22f0639a5bd5f7202412e7b859b5dcd22eb1ddc784400,2025-01-23T01:15:26.580000 +CVE-2024-42183,1,1,2bb39ff2865b68e0a44a69976564b440b6158945315c5c65084cc605c855965a,2025-01-23T02:15:35.933000 CVE-2024-42188,0,0,a8278cfe50e3ca68bde755bed653483d11589c1acd3e94c1e7362476b4ce136e,2024-11-15T13:58:08.913000 CVE-2024-4219,0,0,cd28361343cc861bde40c0bbbee1aabb101ed013946c5589d3ba0dabbead402f,2024-11-21T09:42:24.783000 CVE-2024-42194,0,0,af3a202d05f65dc11d1d1e7b62226f11c65e5914cb08b7ffa3083b3f3386e580,2024-12-17T18:15:23.590000 @@ -272491,7 +272493,7 @@ CVE-2024-5538,0,0,349018b8a831720930f224f86428ace57b32dfb3177832784fb8b5e53a9e59 CVE-2024-55407,0,0,556b85e1087b7070a9c561b1629c1e863de59c432206201377d38b83402acd89,2025-01-07T16:15:36.480000 CVE-2024-55408,0,0,f29d22484915f373690eb82371db4cff76b365f8201325c0d76b3e731d67ff58,2025-01-07T22:15:31.260000 CVE-2024-5541,0,0,f9b4d455e6b62fc87b5177b190c5e5d55cffd60f56e01c7f957c7d36f3e08c46,2024-11-21T09:47:53.453000 -CVE-2024-55410,0,0,71d000e52276290e12865ac7387f5ba02d219f24badb5759737cae3c54cee606,2025-01-07T22:15:31.423000 +CVE-2024-55410,0,1,fedf703c344a48c52d54b8dfaaeb09205cd99df6ecaaec96872b92c1b00a95d8,2025-01-23T02:15:46.463000 CVE-2024-55411,0,0,e79315ed14538192b3442e269ae3df7163b086fe6589e73b0be27cd11820e5cb,2025-01-08T20:15:28.640000 CVE-2024-55412,0,0,6e1875e4d94fbec9f5b13096fd8188b74519aaec7a91136cabb4f52c00245964,2025-01-08T16:15:35.527000 CVE-2024-55413,0,0,eef50e9e636ae6bc827b08d7c7eec17970a99ab50a51fccd44bf2d480fff7156,2025-01-08T16:15:35.717000 @@ -272567,7 +272569,7 @@ CVE-2024-55582,0,0,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3 CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c81a3,2024-12-12T02:08:22.247000 CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000 CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f0186,2024-11-21T09:47:55.840000 -CVE-2024-55591,0,0,a4119c3a900eabf0113ebb321de53b83e488411766eec9c46fb6102609e7a164,2025-01-15T20:48:30.333000 +CVE-2024-55591,0,1,92e19e8d5fbeb8ffc3cb8033dbc9038c812258b0e349023cae68889d8104a7e5,2025-01-23T02:00:02.310000 CVE-2024-55593,0,0,9430bce7692d2c8e6d288cbe72f31d16d74be58a9c07a6a6961fc12e525a7607,2025-01-14T14:15:34.610000 CVE-2024-5560,0,0,201a92ce337d2fd4d85cefc5a8b186dd1f339de19f8ea6d91a69fddcd5fd3ef6,2024-11-21T09:47:55.983000 CVE-2024-55601,0,0,3b6016987278f61ded580e0e03402a0550929e4ad53cc1af6a73ada12213c6f3,2024-12-09T22:15:23.100000 @@ -273567,7 +273569,13 @@ CVE-2024-5770,0,0,918380eecb24f860d41c083e6e9a778682d01ec1efa0eb8b0287a3dccfe91d CVE-2024-57703,0,0,648a1f97a651c02bc9cbd814c3aaa6ce923f775ec3dcd0727ff2f9993e5e0801,2025-01-16T23:15:08.003000 CVE-2024-57704,0,0,5d3ea96b243ef47ad9a653892bd654803ec2d81d9a41451dd6e5053bc648eb08,2025-01-16T23:15:08.113000 CVE-2024-5771,0,0,8829a844c7846b06bb23778fad93312a505e31e0f93087e15ef0b64a0b36f535,2024-11-21T09:48:18.863000 +CVE-2024-57719,1,1,40eeeb4187dd73d2e17f0b62129b8213a398e15b1812919be7d9e297ef23fc35,2025-01-23T01:15:26.740000 CVE-2024-5772,0,0,04004702ec5106d11d8a70be9a1c34eceae4a60526afd5c3eb12e840c71e6683,2024-11-21T09:48:19.003000 +CVE-2024-57720,1,1,17e830ba80fea7ad4816c5bc301b4dbeee72a213a931d20632be2a991ee22f5e,2025-01-23T01:15:26.847000 +CVE-2024-57721,1,1,3ac6bcd94885973e38a9d93efdd5bbffe71782af7fd163d8ba8303c34444f112,2025-01-23T01:15:26.990000 +CVE-2024-57722,1,1,ff99e2ada59b84ddf86c0ec8be18ee23c761364e99c0530741db7fde1655b1e6,2025-01-23T01:15:27.137000 +CVE-2024-57723,1,1,5711ef5bead24e0994f875340e23a0448f27b5751fe953e0a6dd1e695e3e070a,2025-01-23T01:15:27.270000 +CVE-2024-57724,1,1,9a92f9263f2cafd6c63af53a263d35f5aa75f59a0f7a2911772118776c972a25,2025-01-23T01:15:27.387000 CVE-2024-57726,0,0,65fd2cddc719c88ffa0e00b4be18aec8ffa9fb5d459bdfe85cd0cb0d5409aec0,2025-01-22T16:25:12.533000 CVE-2024-57727,0,0,92f5d24a0d77d41fbb6ea3a796a25597f2aecf3a4600a0571ed4ae9364be0356,2025-01-16T21:22:25.317000 CVE-2024-57728,0,0,fb354679bf974c668fb55e36081142c182c86cd0df2050f9f41db6946683897d,2025-01-16T21:24:08.077000 @@ -273702,13 +273710,13 @@ CVE-2024-57934,0,0,43034e503550b569256632c4502d946f08931a3530bd54d0ff9ea3c30d627 CVE-2024-57935,0,0,e6daeb99554ae407cceaff9066c461bc5bc63d681f5adb174db5d16d19702a15,2025-01-21T12:15:27.153000 CVE-2024-57936,0,0,417d6b45a5c6544407230a177f750b81a6fb6c38ea6d13678499dd9c742ed051,2025-01-21T12:15:27.257000 CVE-2024-57937,0,0,f2713cfe55ce0b98723add19c398fbf3ee712c696fe715eebadbe1d21a06c1df,2025-01-22T13:15:20.400000 -CVE-2024-57938,0,1,b46b86ea806e0c459fb1ead615d70e4371d2946e79a6ef81fedd49881f631f14,2025-01-22T23:01:40.253000 +CVE-2024-57938,0,0,b46b86ea806e0c459fb1ead615d70e4371d2946e79a6ef81fedd49881f631f14,2025-01-22T23:01:40.253000 CVE-2024-57939,0,0,d2414769f2e217c395dc0f8aa10fa264b19bc4c515c6ed730880adaf71b9e812,2025-01-21T13:15:07.903000 -CVE-2024-57940,0,1,6dee157c6594e466e3cdfaf38d49c3611c870087b6926a7ee4d1289ec29ef96e,2025-01-22T23:02:27.493000 +CVE-2024-57940,0,0,6dee157c6594e466e3cdfaf38d49c3611c870087b6926a7ee4d1289ec29ef96e,2025-01-22T23:02:27.493000 CVE-2024-57941,0,0,7f374a575eccdb21ec7f9d09d0a4e62f6384f134349957689e6f5a5cb2bb715c,2025-01-21T13:15:08.640000 CVE-2024-57942,0,0,e3741427d2b6e1a9f599b350dcdf4410a474f8e8c65342410e7099c356758a40,2025-01-21T13:15:08.743000 CVE-2024-57943,0,0,dc7e0684b8377f15667d88e1273c5a5004a8c0a280d7d1767bad721d5d8df413,2025-01-21T13:15:08.837000 -CVE-2024-57944,0,1,69f37fc5a40b866c95e7b5f04fa783680bd7856897f3b164ec222c4155dd5693,2025-01-22T23:02:41.850000 +CVE-2024-57944,0,0,69f37fc5a40b866c95e7b5f04fa783680bd7856897f3b164ec222c4155dd5693,2025-01-22T23:02:41.850000 CVE-2024-57945,0,0,8e35c260271a7d05a4130bce464cd053ddcd7430dc8ad698dc9980a797cf9881,2025-01-21T13:15:09.033000 CVE-2024-57946,0,0,c7f36f65d43623d48215412aac78ff97bd2f343757e90cf928c2a23f40930377,2025-01-21T13:15:09.137000 CVE-2024-5795,0,0,8c27870eb8f46b4876cdd6a9335698b3a6adeccd1af066b5f5391281ef70b349,2024-11-21T09:48:20.780000 @@ -277882,7 +277890,7 @@ CVE-2025-21654,0,0,387bd74314e19ea277d2aa993508db4a58606a45347df382e4b9016f897da CVE-2025-21655,0,0,e5a98c6155ef95beaa77c8f70c04ef1a52b9c9b57ffc8aa737b1a8a15dabbd07,2025-01-20T14:15:27.027000 CVE-2025-21656,0,0,e08de214fec57f5455004c22ab31652820945256042ce332af5f60bc4ee6b0eb,2025-01-21T13:15:09.240000 CVE-2025-21657,0,0,58d21ab8ed420cad449dc9439925bd7a4bd93e784737aa1340191a73104f8bd9,2025-01-21T13:15:09.340000 -CVE-2025-21658,0,1,5894a65bd40b58510d3865fd67c42c2240f0de76f9e61b59f9eda7ac84e5b943,2025-01-22T23:02:59.383000 +CVE-2025-21658,0,0,5894a65bd40b58510d3865fd67c42c2240f0de76f9e61b59f9eda7ac84e5b943,2025-01-22T23:02:59.383000 CVE-2025-21659,0,0,a1f4b697b66bab7b57666583da4fd3952bef7152142aae1d092214b71dd2eee4,2025-01-21T13:15:09.540000 CVE-2025-21660,0,0,e8f48b67279b891fc134ba898fd31eb80bfc20852a82499d9e449abaf5daac6f,2025-01-21T13:15:09.643000 CVE-2025-21661,0,0,e7b9e2e7e2e401ac2c3dd32c6ea5cfa7c3b00783dd71307395f255d241abd981,2025-01-21T13:15:09.747000