From 9d3386f54757b0a2caee22ef086332b404c45a6c Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 9 Jan 2025 21:03:50 +0000 Subject: [PATCH] Auto-Update: 2025-01-09T21:00:27.098894+00:00 --- CVE-2016/CVE-2016-104xx/CVE-2016-10408.json | 176 +++++- CVE-2017/CVE-2017-181xx/CVE-2017-18153.json | 168 ++++- CVE-2017/CVE-2017-183xx/CVE-2017-18306.json | 230 ++++++- CVE-2017/CVE-2017-183xx/CVE-2017-18307.json | 230 ++++++- CVE-2018/CVE-2018-119xx/CVE-2018-11922.json | 639 ++++++++++++++++++- CVE-2018/CVE-2018-119xx/CVE-2018-11952.json | 654 ++++++++++++++++++- CVE-2018/CVE-2018-58xx/CVE-2018-5852.json | 662 +++++++++++++++++++- CVE-2021/CVE-2021-470xx/CVE-2021-47016.json | 131 +++- CVE-2021/CVE-2021-470xx/CVE-2021-47037.json | 97 ++- CVE-2021/CVE-2021-470xx/CVE-2021-47056.json | 182 +++++- CVE-2021/CVE-2021-470xx/CVE-2021-47066.json | 114 +++- CVE-2021/CVE-2021-470xx/CVE-2021-47072.json | 90 ++- CVE-2022/CVE-2022-46xx/CVE-2022-4676.json | 22 +- CVE-2022/CVE-2022-490xx/CVE-2022-49035.json | 146 ++++- CVE-2023/CVE-2023-20xx/CVE-2023-2023.json | 22 +- CVE-2023/CVE-2023-239xx/CVE-2023-23952.json | 32 +- CVE-2023/CVE-2023-239xx/CVE-2023-23953.json | 22 +- CVE-2023/CVE-2023-239xx/CVE-2023-23954.json | 32 +- CVE-2023/CVE-2023-239xx/CVE-2023-23955.json | 32 +- CVE-2023/CVE-2023-257xx/CVE-2023-25737.json | 40 +- CVE-2023/CVE-2023-257xx/CVE-2023-25738.json | 40 +- CVE-2023/CVE-2023-257xx/CVE-2023-25739.json | 40 +- CVE-2023/CVE-2023-257xx/CVE-2023-25740.json | 40 +- CVE-2023/CVE-2023-257xx/CVE-2023-25741.json | 32 +- CVE-2023/CVE-2023-257xx/CVE-2023-25745.json | 36 +- CVE-2023/CVE-2023-257xx/CVE-2023-25746.json | 32 +- CVE-2023/CVE-2023-257xx/CVE-2023-25748.json | 41 +- CVE-2023/CVE-2023-257xx/CVE-2023-25749.json | 32 +- CVE-2023/CVE-2023-257xx/CVE-2023-25750.json | 41 +- CVE-2023/CVE-2023-268xx/CVE-2023-26842.json | 32 +- CVE-2023/CVE-2023-276xx/CVE-2023-27639.json | 32 +- CVE-2023/CVE-2023-277xx/CVE-2023-27744.json | 32 +- CVE-2023/CVE-2023-277xx/CVE-2023-27745.json | 32 +- CVE-2023/CVE-2023-281xx/CVE-2023-28147.json | 22 +- CVE-2023/CVE-2023-286xx/CVE-2023-28657.json | 32 +- CVE-2023/CVE-2023-287xx/CVE-2023-28713.json | 32 +- CVE-2023/CVE-2023-288xx/CVE-2023-28824.json | 32 +- CVE-2023/CVE-2023-289xx/CVE-2023-28937.json | 32 +- CVE-2023/CVE-2023-291xx/CVE-2023-29154.json | 32 +- CVE-2023/CVE-2023-291xx/CVE-2023-29159.json | 32 +- CVE-2023/CVE-2023-334xx/CVE-2023-33486.json | 32 +- CVE-2023/CVE-2023-335xx/CVE-2023-33551.json | 32 +- CVE-2023/CVE-2023-363xx/CVE-2023-36361.json | 6 +- CVE-2023/CVE-2023-459xx/CVE-2023-45911.json | 6 +- CVE-2023/CVE-2023-459xx/CVE-2023-45912.json | 6 +- CVE-2023/CVE-2023-524xx/CVE-2023-52485.json | 79 ++- CVE-2023/CVE-2023-524xx/CVE-2023-52497.json | 165 ++++- CVE-2024/CVE-2024-102xx/CVE-2024-10215.json | 60 ++ CVE-2024/CVE-2024-103xx/CVE-2024-10308.json | 54 +- CVE-2024/CVE-2024-116xx/CVE-2024-11614.json | 6 +- CVE-2024/CVE-2024-132xx/CVE-2024-13237.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13238.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13239.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13240.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13241.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13242.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13243.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13244.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13245.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13246.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13247.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13248.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13249.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13250.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13251.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13252.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13253.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13254.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13255.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13256.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13257.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13258.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13259.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13260.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13261.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13262.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13263.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13264.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13265.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13266.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13267.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13268.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13269.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13270.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13271.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13272.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13273.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13274.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13275.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13276.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13277.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13278.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13279.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13280.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13281.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13282.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13283.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13284.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13285.json | 21 + CVE-2024/CVE-2024-132xx/CVE-2024-13286.json | 33 + CVE-2024/CVE-2024-132xx/CVE-2024-13287.json | 33 + CVE-2024/CVE-2024-271xx/CVE-2024-27185.json | 39 +- CVE-2024/CVE-2024-319xx/CVE-2024-31997.json | 120 +++- CVE-2024/CVE-2024-405xx/CVE-2024-40530.json | 39 +- CVE-2024/CVE-2024-428xx/CVE-2024-42898.json | 25 + CVE-2024/CVE-2024-440xx/CVE-2024-44083.json | 32 +- CVE-2024/CVE-2024-465xx/CVE-2024-46505.json | 21 + CVE-2024/CVE-2024-490xx/CVE-2024-49035.json | 56 +- CVE-2024/CVE-2024-490xx/CVE-2024-49038.json | 46 +- CVE-2024/CVE-2024-511xx/CVE-2024-51162.json | 6 +- CVE-2024/CVE-2024-511xx/CVE-2024-51163.json | 6 +- CVE-2024/CVE-2024-547xx/CVE-2024-54724.json | 25 + CVE-2024/CVE-2024-547xx/CVE-2024-54761.json | 21 + CVE-2024/CVE-2024-547xx/CVE-2024-54762.json | 25 + CVE-2024/CVE-2024-548xx/CVE-2024-54887.json | 25 + CVE-2024/CVE-2024-554xx/CVE-2024-55494.json | 60 ++ CVE-2024/CVE-2024-561xx/CVE-2024-56113.json | 25 + CVE-2024/CVE-2024-561xx/CVE-2024-56114.json | 25 + CVE-2024/CVE-2024-567xx/CVE-2024-56719.json | 106 +++- CVE-2024/CVE-2024-567xx/CVE-2024-56720.json | 146 ++++- CVE-2024/CVE-2024-567xx/CVE-2024-56721.json | 82 ++- CVE-2024/CVE-2024-567xx/CVE-2024-56722.json | 106 +++- CVE-2024/CVE-2024-567xx/CVE-2024-56723.json | 142 ++++- CVE-2024/CVE-2024-567xx/CVE-2024-56724.json | 142 ++++- CVE-2024/CVE-2024-567xx/CVE-2024-56725.json | 106 +++- CVE-2024/CVE-2024-567xx/CVE-2024-56772.json | 74 ++- CVE-2024/CVE-2024-567xx/CVE-2024-56773.json | 74 ++- CVE-2024/CVE-2024-88xx/CVE-2024-8899.json | 44 +- CVE-2025/CVE-2025-215xx/CVE-2025-21598.json | 104 +++ CVE-2025/CVE-2025-221xx/CVE-2025-22151.json | 60 ++ README.md | 93 +-- _state.csv | 387 +++++++----- 132 files changed, 8218 insertions(+), 558 deletions(-) create mode 100644 CVE-2024/CVE-2024-102xx/CVE-2024-10215.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13237.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13238.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13239.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13240.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13241.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13242.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13243.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13244.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13245.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13246.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13247.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13248.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13249.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13250.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13251.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13252.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13253.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13254.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13255.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13256.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13257.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13258.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13259.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13260.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13261.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13262.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13263.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13264.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13265.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13266.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13267.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13268.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13269.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13270.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13271.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13272.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13273.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13274.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13275.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13276.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13277.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13278.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13279.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13280.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13281.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13282.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13283.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13284.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13285.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13286.json create mode 100644 CVE-2024/CVE-2024-132xx/CVE-2024-13287.json create mode 100644 CVE-2024/CVE-2024-428xx/CVE-2024-42898.json create mode 100644 CVE-2024/CVE-2024-465xx/CVE-2024-46505.json create mode 100644 CVE-2024/CVE-2024-547xx/CVE-2024-54724.json create mode 100644 CVE-2024/CVE-2024-547xx/CVE-2024-54761.json create mode 100644 CVE-2024/CVE-2024-547xx/CVE-2024-54762.json create mode 100644 CVE-2024/CVE-2024-548xx/CVE-2024-54887.json create mode 100644 CVE-2024/CVE-2024-554xx/CVE-2024-55494.json create mode 100644 CVE-2024/CVE-2024-561xx/CVE-2024-56113.json create mode 100644 CVE-2024/CVE-2024-561xx/CVE-2024-56114.json create mode 100644 CVE-2025/CVE-2025-215xx/CVE-2025-21598.json create mode 100644 CVE-2025/CVE-2025-221xx/CVE-2025-22151.json diff --git a/CVE-2016/CVE-2016-104xx/CVE-2016-10408.json b/CVE-2016/CVE-2016-104xx/CVE-2016-10408.json index ad0ba3f52be..b7377e5d12c 100644 --- a/CVE-2016/CVE-2016-104xx/CVE-2016-10408.json +++ b/CVE-2016/CVE-2016-104xx/CVE-2016-10408.json @@ -2,8 +2,8 @@ "id": "CVE-2016-10408", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-26T14:15:17.053", - "lastModified": "2024-11-26T14:15:17.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:17:41.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,12 +69,162 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:9206_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2C2632A-02F2-4C59-AF96-E2C77940360F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:9206_lte_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D10A104D-951A-4FA9-938A-1324640A998D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:apq8037_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DEE0D211-0EF0-441A-9E10-3DE578811250" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:apq8037:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A594A57E-525C-451C-B3BA-567E0F757968" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd626_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9043720-6B49-4305-BB4F-C88CCB6D89E9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd626:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC8F19D3-F322-4CDC-83C5-A9F7F1777DAD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC508C49-0B76-43A8-B2AF-0F8EB989E238" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9665200-D306-4EEB-9F42-6C5963524179" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd821_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A54F4A3-19E3-4825-98C7-DA632D692A06" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd821:-:*:*:*:*:*:*:*", + "matchCriteriaId": "028CD81A-0D9D-40B0-9E2F-DC8689607B24" + } + ] + } + ] } ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2018-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-181xx/CVE-2017-18153.json b/CVE-2017/CVE-2017-181xx/CVE-2017-18153.json index 732fdeb77e0..0e54dadd684 100644 --- a/CVE-2017/CVE-2017-181xx/CVE-2017-18153.json +++ b/CVE-2017/CVE-2017-181xx/CVE-2017-18153.json @@ -2,8 +2,8 @@ "id": "CVE-2017-18153", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-26T09:15:04.783", - "lastModified": "2024-11-26T09:15:04.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:50:28.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "product-security@qualcomm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -51,10 +71,150 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:9206_lte_modem_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2C2632A-02F2-4C59-AF96-E2C77940360F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:9206_lte_modem:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D10A104D-951A-4FA9-938A-1324640A998D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEDA6CA-A0FD-4A72-B856-C8E65AC86902" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D29295A-7183-46BE-B4EE-F891D1C17ED9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar6003_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D852D3BA-1A2E-4C98-B747-8DA14AC44B1F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar6003:-:*:*:*:*:*:*:*", + "matchCriteriaId": "140FD423-FAC4-4D2D-BCFF-511E0AE8CE95" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_630_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D382DEBB-A358-4EA6-84B9-CB3F9161A1F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_630_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B47A12A6-1DDF-453E-8590-1CA83234DB42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_636_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BA77F18-C031-476E-9552-2BA63152321D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_636_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F59E6158-B097-4209-AE0D-A97A512C0473" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2018-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-183xx/CVE-2017-18306.json b/CVE-2017/CVE-2017-183xx/CVE-2017-18306.json index 28d4211cc99..1451d746ab2 100644 --- a/CVE-2017/CVE-2017-183xx/CVE-2017-18306.json +++ b/CVE-2017/CVE-2017-183xx/CVE-2017-18306.json @@ -2,8 +2,8 @@ "id": "CVE-2017-18306", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-26T14:15:17.430", - "lastModified": "2024-11-26T14:15:17.430", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:16:22.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,12 +69,216 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E07C621F-0BC0-40C1-9678-1AF6498AC487" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C621A62-E346-406B-9D20-8FF6C2B0851F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06E0CC35-AC20-42D7-8FEA-CA4685E33E72" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A2C4DED-2367-4736-A0AF-C8356F1271AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E077FC03-F86F-417A-A3E6-BC88CB85C6F0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E016356C-94ED-4CDD-8351-97D265FE036E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E08016A2-E4FE-4E9C-A915-C66BE157AFB5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "018452D0-007C-4740-B2AF-E5C8BBAC310F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CFF35A3-1472-4665-9DAB-1ABC45C0D5B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F930E9BF-C502-49C6-8BE8-9A711B89FA1B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A2D2B3B-CB28-46AA-9117-A7FA371FDE80" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE18BF66-B0DB-48BB-B43A-56F01821F5A3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C10C7CB-3B66-4F17-8146-6A85611E2BA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9DA765F-53DE-4FB0-B825-6C11B3177641" + } + ] + } + ] } ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2018-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-183xx/CVE-2017-18307.json b/CVE-2017/CVE-2017-183xx/CVE-2017-18307.json index 791b257a23a..32e708560b7 100644 --- a/CVE-2017/CVE-2017-183xx/CVE-2017-18307.json +++ b/CVE-2017/CVE-2017-183xx/CVE-2017-18307.json @@ -2,8 +2,8 @@ "id": "CVE-2017-18307", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-26T14:15:17.573", - "lastModified": "2024-11-26T14:15:17.573", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:14:33.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,12 +69,216 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E07C621F-0BC0-40C1-9678-1AF6498AC487" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C621A62-E346-406B-9D20-8FF6C2B0851F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06E0CC35-AC20-42D7-8FEA-CA4685E33E72" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A2C4DED-2367-4736-A0AF-C8356F1271AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E077FC03-F86F-417A-A3E6-BC88CB85C6F0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E016356C-94ED-4CDD-8351-97D265FE036E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E08016A2-E4FE-4E9C-A915-C66BE157AFB5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "018452D0-007C-4740-B2AF-E5C8BBAC310F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CFF35A3-1472-4665-9DAB-1ABC45C0D5B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F930E9BF-C502-49C6-8BE8-9A711B89FA1B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A2D2B3B-CB28-46AA-9117-A7FA371FDE80" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE18BF66-B0DB-48BB-B43A-56F01821F5A3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C10C7CB-3B66-4F17-8146-6A85611E2BA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9DA765F-53DE-4FB0-B825-6C11B3177641" + } + ] + } + ] } ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2018-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-119xx/CVE-2018-11922.json b/CVE-2018/CVE-2018-119xx/CVE-2018-11922.json index 538d67dbf4e..7da91d997d0 100644 --- a/CVE-2018/CVE-2018-119xx/CVE-2018-11922.json +++ b/CVE-2018/CVE-2018-119xx/CVE-2018-11922.json @@ -2,8 +2,8 @@ "id": "CVE-2018-11922", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-26T09:15:04.927", - "lastModified": "2024-11-26T09:15:04.927", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:43:44.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "product-security@qualcomm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -36,25 +36,654 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "product-security@qualcomm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-16" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D79B8959-3D1E-4B48-9181-D75FE90AAF98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:215_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3667862-8469-4B33-9B2D-939EA07497E6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:215:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8673678-1EAD-421D-8450-3BE522D75A5F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FA80D57-3191-47CF-AD3F-9F2D64E443FE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2AFB212-F01A-4CEB-8DB4-2E0CC2308CB6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0986EF1-0974-488E-84C4-6880F876CE55" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C08BA58-2EBC-4A22-85A4-2ECD54693B9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "27110478-4C08-49E6-BD53-8BAAD9D5BD65" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3664D302-D22A-4B25-B534-3097AE2F8573" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C56BC939-2FE8-4AB4-B638-35C83B224005" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E36C12E2-7064-41E6-B357-3F0E6E6D0A0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8175FC2D-8B9C-4461-BEAE-E9C688E8A63B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92CD09CE-75CC-418F-AB16-4685141BDE36" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE5C66CC-B00C-4581-B8FB-0632232E480D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87F57247-08CD-473E-A517-F9E85BFC7BEA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55604764-FC96-451C-BB9B-9AD72EF5D245" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71CEDACD-D22B-4CCD-93DA-B79CB74BDA22" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DE3EA03-0373-4FEF-B1FC-123A8073520B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64D3E69-0784-4DEA-96C1-2D41EAFA1906" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B11CE0F1-29BD-46E1-ACFE-D076192F138E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D205DB4E-68C2-4B13-8373-128870DF83D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E07C621F-0BC0-40C1-9678-1AF6498AC487" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C621A62-E346-406B-9D20-8FF6C2B0851F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06E0CC35-AC20-42D7-8FEA-CA4685E33E72" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A2C4DED-2367-4736-A0AF-C8356F1271AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2126866-3B02-42B4-A57A-4EFF30848B55" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F832FE19-8D65-4779-B6F5-BD90BD131FD4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A2D2B3B-CB28-46AA-9117-A7FA371FDE80" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE18BF66-B0DB-48BB-B43A-56F01821F5A3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C10C7CB-3B66-4F17-8146-6A85611E2BA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9DA765F-53DE-4FB0-B825-6C11B3177641" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2326BD7-28A5-4244-8501-B109913E7AE6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", + "matchCriteriaId": "532D244B-8B5A-4923-B7F1-9DC0A5FC0E9D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84289E6D-DA2A-4D04-9DDA-E8C46DDDD056" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C0B56360-7AC3-410A-B7F8-1BE8514B3781" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0CE1B23-6FE3-41C4-B264-C7A9E8BDBEC1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "794BA13C-3C63-4695-AA45-676F85D904BE" + } + ] + } + ] } ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2018-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-119xx/CVE-2018-11952.json b/CVE-2018/CVE-2018-119xx/CVE-2018-11952.json index f14c70617a1..a691a915c26 100644 --- a/CVE-2018/CVE-2018-119xx/CVE-2018-11952.json +++ b/CVE-2018/CVE-2018-119xx/CVE-2018-11952.json @@ -2,8 +2,8 @@ "id": "CVE-2018-11952", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-26T09:15:05.073", - "lastModified": "2024-11-26T09:15:05.073", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:39:50.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "product-security@qualcomm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,636 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D79B8959-3D1E-4B48-9181-D75FE90AAF98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE28A59C-7AA6-4B85-84E8-07852B96108E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DEE828B-09A7-4AC1-8134-491A7C87C118" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FA80D57-3191-47CF-AD3F-9F2D64E443FE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2AFB212-F01A-4CEB-8DB4-2E0CC2308CB6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0986EF1-0974-488E-84C4-6880F876CE55" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C08BA58-2EBC-4A22-85A4-2ECD54693B9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "27110478-4C08-49E6-BD53-8BAAD9D5BD65" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3664D302-D22A-4B25-B534-3097AE2F8573" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C56BC939-2FE8-4AB4-B638-35C83B224005" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E36C12E2-7064-41E6-B357-3F0E6E6D0A0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE5C66CC-B00C-4581-B8FB-0632232E480D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87F57247-08CD-473E-A517-F9E85BFC7BEA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E07C621F-0BC0-40C1-9678-1AF6498AC487" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C621A62-E346-406B-9D20-8FF6C2B0851F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "549E6F7E-A54F-423F-BD4A-A8FB97DBD39E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", + "matchCriteriaId": "992C3835-7183-4D96-8647-DD9916880323" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7B95CCC-37F1-4768-8D64-CA2028E93E03" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1426161-4F7C-44B1-AA9E-EA661AA68947" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECF81213-DE2D-4C4B-99E8-71AFD87E92CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95E826EF-343B-47FA-AB54-F13E868CE6A7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D27A1760-8D1B-4172-B6CE-65C72332F103" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC5F96F1-D3FB-482B-A3C8-57BA4DE86D5E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06E0CC35-AC20-42D7-8FEA-CA4685E33E72" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A2C4DED-2367-4736-A0AF-C8356F1271AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC1650DB-FDF8-4BE5-9437-8ADA11A07116" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B51DD51F-4BDE-497B-89E5-551D10CF3442" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0752054B-2C29-4490-ADC8-29F82BAA17E6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", + "matchCriteriaId": "005038B5-BCB7-4A23-8562-ACEF6E156C1F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95B4B4D4-0357-4E1D-9B72-635106D632CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F992088-5E31-4625-8C3B-CE7F946C61F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E077FC03-F86F-417A-A3E6-BC88CB85C6F0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E016356C-94ED-4CDD-8351-97D265FE036E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E08016A2-E4FE-4E9C-A915-C66BE157AFB5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "018452D0-007C-4740-B2AF-E5C8BBAC310F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CFF35A3-1472-4665-9DAB-1ABC45C0D5B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F930E9BF-C502-49C6-8BE8-9A711B89FA1B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A2D2B3B-CB28-46AA-9117-A7FA371FDE80" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE18BF66-B0DB-48BB-B43A-56F01821F5A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2018-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-58xx/CVE-2018-5852.json b/CVE-2018/CVE-2018-58xx/CVE-2018-5852.json index 3c4b067ccb5..a243792931f 100644 --- a/CVE-2018/CVE-2018-58xx/CVE-2018-5852.json +++ b/CVE-2018/CVE-2018-58xx/CVE-2018-5852.json @@ -2,8 +2,8 @@ "id": "CVE-2018-5852", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-11-26T14:15:17.970", - "lastModified": "2024-11-26T14:15:17.970", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T19:53:39.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,12 +69,648 @@ "value": "CWE-126" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D79B8959-3D1E-4B48-9181-D75FE90AAF98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE28A59C-7AA6-4B85-84E8-07852B96108E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DEE828B-09A7-4AC1-8134-491A7C87C118" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FA80D57-3191-47CF-AD3F-9F2D64E443FE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2AFB212-F01A-4CEB-8DB4-2E0CC2308CB6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0986EF1-0974-488E-84C4-6880F876CE55" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8C08BA58-2EBC-4A22-85A4-2ECD54693B9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "27110478-4C08-49E6-BD53-8BAAD9D5BD65" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3664D302-D22A-4B25-B534-3097AE2F8573" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C56BC939-2FE8-4AB4-B638-35C83B224005" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E36C12E2-7064-41E6-B357-3F0E6E6D0A0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE5C66CC-B00C-4581-B8FB-0632232E480D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87F57247-08CD-473E-A517-F9E85BFC7BEA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E07C621F-0BC0-40C1-9678-1AF6498AC487" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C621A62-E346-406B-9D20-8FF6C2B0851F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "549E6F7E-A54F-423F-BD4A-A8FB97DBD39E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", + "matchCriteriaId": "992C3835-7183-4D96-8647-DD9916880323" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7B95CCC-37F1-4768-8D64-CA2028E93E03" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1426161-4F7C-44B1-AA9E-EA661AA68947" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECF81213-DE2D-4C4B-99E8-71AFD87E92CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95E826EF-343B-47FA-AB54-F13E868CE6A7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D27A1760-8D1B-4172-B6CE-65C72332F103" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC5F96F1-D3FB-482B-A3C8-57BA4DE86D5E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06E0CC35-AC20-42D7-8FEA-CA4685E33E72" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A2C4DED-2367-4736-A0AF-C8356F1271AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC1650DB-FDF8-4BE5-9437-8ADA11A07116" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B51DD51F-4BDE-497B-89E5-551D10CF3442" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0752054B-2C29-4490-ADC8-29F82BAA17E6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", + "matchCriteriaId": "005038B5-BCB7-4A23-8562-ACEF6E156C1F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95B4B4D4-0357-4E1D-9B72-635106D632CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F992088-5E31-4625-8C3B-CE7F946C61F2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E077FC03-F86F-417A-A3E6-BC88CB85C6F0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E016356C-94ED-4CDD-8351-97D265FE036E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E08016A2-E4FE-4E9C-A915-C66BE157AFB5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "018452D0-007C-4740-B2AF-E5C8BBAC310F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CFF35A3-1472-4665-9DAB-1ABC45C0D5B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F930E9BF-C502-49C6-8BE8-9A711B89FA1B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A2D2B3B-CB28-46AA-9117-A7FA371FDE80" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE18BF66-B0DB-48BB-B43A-56F01821F5A3" + } + ] + } + ] } ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2018-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47016.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47016.json index 325b7d75ba9..8a5386c33bd 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47016.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47016.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47016", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-29T23:15:07.307", - "lastModified": "2024-11-21T06:35:11.787", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T19:52:27.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,152 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: m68k: mvme147,mvme16x: No borre los bits de configuraci\u00f3n del temporizador PCC. No borre los bits de configuraci\u00f3n del temporizador 1 al borrar el indicador de interrupci\u00f3n y el desbordamiento del contador. Como inform\u00f3 Michael, \"Esto da como resultado que no se entreguen interrupciones del temporizador despu\u00e9s de la primera. Luego, la inicializaci\u00f3n se bloquea en calibrate_delay porque el contador de santiam\u00e9n no se actualiza\". En mvme16x, habilite el temporizador despu\u00e9s de solicitar irq, de acuerdo con mvme147." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.2", + "versionEndExcluding": "5.4.119", + "matchCriteriaId": "459F61B2-E7E5-43BE-8A31-15469C31F827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.37", + "matchCriteriaId": "7A4CF5D6-ACBA-4980-ABFD-3D7A53B5BB4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.21", + "matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.4", + "matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1dfb26df15fc7036a74221d43de7427f74293dae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/43262178c043032e7c42d00de44c818ba05f9967", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5d34225169346cab5145978d153b9ce90e9ace21", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/73fdeb612d25b5e105c219e05434285a45d23576", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f6a90818a32058fca62cda3a2027a6a2364e1878", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1dfb26df15fc7036a74221d43de7427f74293dae", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/43262178c043032e7c42d00de44c818ba05f9967", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5d34225169346cab5145978d153b9ce90e9ace21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/73fdeb612d25b5e105c219e05434285a45d23576", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f6a90818a32058fca62cda3a2027a6a2364e1878", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47037.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47037.json index 80135147ff4..325fd3006ab 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47037.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47037.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47037", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:39.847", - "lastModified": "2024-11-21T06:35:14.347", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T19:47:04.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,110 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: q6afe-clocks: correcci\u00f3n de reprobaci\u00f3n del controlador El controlador Q6afe-clocks puede ser reprobado. Por ejemplo, si los servicios APR se reinician despu\u00e9s de la falla del firmware. Sin embargo, actualmente el controlador Q6afe-clocks fallar\u00e1 porque hw.init se borrar\u00e1 durante la primera llamada a _probe. Vuelva a escribir el controlador para completar los datos del reloj en tiempo de ejecuci\u00f3n en lugar de utilizar una gran variedad de relojes est\u00e1ticos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.11.21", + "matchCriteriaId": "3EB79796-821C-45D2-8CF3-E0C6CF51F586" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.4", + "matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/62413972f5266568848a36fd15160397b211fa74", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6893df3753beafa5f7351228a9dd8157a57d7492", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/96fadf7e8ff49fdb74754801228942b67c3eeebd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/62413972f5266568848a36fd15160397b211fa74", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6893df3753beafa5f7351228a9dd8157a57d7492", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/96fadf7e8ff49fdb74754801228942b67c3eeebd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47056.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47056.json index 771ca728def..08b93f323f8 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47056.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47056.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47056", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-29T23:15:07.530", - "lastModified": "2024-11-21T06:35:16.687", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T19:45:48.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,215 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: qat - ADF_STATUS_PF_RUNNING debe configurarse despu\u00e9s de adf_dev_init ADF_STATUS_PF_RUNNING es (solo) usado y verificado por adf_vf2pf_shutdown() antes de llamar a adf_iov_putmsg()->mutex_lock(vf2pf_lock), sin embargo, vf2pf_lock es inicializado en adf_dev_init(), que puede fallar y cuando falla, vf2pf_lock no se inicializa o se destruye, un uso posterior de vf2pf_lock causar\u00e1 problemas. Para solucionar este problema, establezca este indicador solo si adf_dev_init() devuelve 0. [7.178404] ERROR: KASAN: acceso a memoria de usuario en __mutex_lock.isra.0+0x1ac/0x7c0 [7.180345] Seguimiento de llamadas: [7.182576] mutex_lock+0xc9 /0xd0 [ 7.183257] adf_iov_putmsg+0x118/0x1a0 [intel_qat] [ 7.183541] adf_vf2pf_shutdown+0x4d/0x7b [intel_qat] [ 7.183834] adf_dev_shutdown+0x172/0x2b0 [intel_qat] [7.184127] adf_probe+0x5e9/0x600 [qat_dh895xccvf]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.7", + "versionEndExcluding": "4.9.269", + "matchCriteriaId": "BE2A530A-768D-4D74-B4DB-C76E09C2042F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.233", + "matchCriteriaId": "4836AF17-022D-49D0-9A8A-AF66FE8DCEB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.191", + "matchCriteriaId": "5B6E6817-19A8-4C0A-8807-71DA48CF9191" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.119", + "matchCriteriaId": "E07BA880-1043-4674-AC45-266B3B4A44C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.37", + "matchCriteriaId": "7A4CF5D6-ACBA-4980-ABFD-3D7A53B5BB4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.21", + "matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.4", + "matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/05ec8192ee4bfdf2a8894a68350dac9f1a155fa6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/09d16cee6285d37cc76311c29add6d97a7e4acda", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1ea500ce6f7c9106e4a561d28e69215f3d451818", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1f50392650ae794a1aea41c213c6a3e1c824413c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/20fd40fc6f2c2b41dc6f637f88d494b14e9c21f1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/446045cf682af12d9294765f6c46084b374b5654", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8609f5cfdc872fc3a462efa6a3eca5cb1e2f6446", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f4c4e07140687f42bfa40e091bb4a55d7960ce4d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/05ec8192ee4bfdf2a8894a68350dac9f1a155fa6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/09d16cee6285d37cc76311c29add6d97a7e4acda", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1ea500ce6f7c9106e4a561d28e69215f3d451818", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1f50392650ae794a1aea41c213c6a3e1c824413c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/20fd40fc6f2c2b41dc6f637f88d494b14e9c21f1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/446045cf682af12d9294765f6c46084b374b5654", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8609f5cfdc872fc3a462efa6a3eca5cb1e2f6446", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f4c4e07140687f42bfa40e091bb4a55d7960ce4d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47066.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47066.json index bcf6f35c287..df9c1ee8d8d 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47066.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47066.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47066", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-29T23:15:08.057", - "lastModified": "2024-11-21T06:35:18.120", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T19:44:50.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,131 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: async_xor: aumenta src_offs al eliminar la p\u00e1gina de destino. Ahora admitimos compartir una p\u00e1gina si PAGE_SIZE no tiene el mismo tama\u00f1o de banda. Para respaldar esto, debe admitir el c\u00e1lculo del valor xor con diferentes compensaciones para cada r5dev. Se utiliza una matriz de desplazamiento para registrar esos desplazamientos. En el modo RMW, la p\u00e1gina de paridad se utiliza como p\u00e1gina de origen. Establece ASYNC_TX_XOR_DROP_DST antes de calcular el valor xor en ops_run_prexor5. Por lo tanto, es necesario agregar src_list y src_offs al mismo tiempo. Ahora s\u00f3lo necesita src_list. Entonces el valor xor que se calcula es incorrecto. Puede causar problemas de corrupci\u00f3n de datos. Puedo reproducir este problema al 100% en una m\u00e1quina POWER8. Los pasos son: mdadm -CR /dev/md0 -l5 -n3 /dev/sdb1 /dev/sdc1 /dev/sdd1 --size=3G mkfs.xfs /dev/md0 mount /dev/md0 /mnt/test mount: /mnt/test: la llamada al sistema mount(2) fall\u00f3: la estructura necesita limpieza." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.10.37", + "matchCriteriaId": "4E433B72-3E3A-435E-9A66-80D28868BDF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.21", + "matchCriteriaId": "8CBB94EC-EC33-4464-99C5-03E5542715F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.4", + "matchCriteriaId": "D8C7052F-1B7B-4327-9C2B-84EBF3243838" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/29ffa50f33de824b5491f8239c88c4a0efdd03af", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/53f8208e11abd6dde9480dfcb97fecdb1bc2ac18", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cab2e8e5997b592fdb7d02cf2387b4b8e3057174", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ceaf2966ab082bbc4d26516f97b3ca8a676e2af8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/29ffa50f33de824b5491f8239c88c4a0efdd03af", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/53f8208e11abd6dde9480dfcb97fecdb1bc2ac18", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cab2e8e5997b592fdb7d02cf2387b4b8e3057174", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ceaf2966ab082bbc4d26516f97b3ca8a676e2af8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47072.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47072.json index e8e9da2b604..258daf281d0 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47072.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47072.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47072", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-01T22:15:47.010", - "lastModified": "2024-11-21T06:35:20.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T19:42:34.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,99 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: btrfs: corrige las dentries eliminadas que a\u00fan existen despu\u00e9s de sincronizar el registro. Cuando movemos un inodo de un directorio a otro y tanto el inodo como su directorio principal anterior se registraron antes, se supone que no tener la dentry del padre anterior si tenemos un corte de energ\u00eda despu\u00e9s de sincronizar el registro. Se supone que s\u00f3lo existe el nuevo dentry. En general, esto funciona correctamente, sin embargo, hay un escenario en el que esto no funciona actualmente, porque el padre antiguo del archivo/directorio que se movi\u00f3 no tiene autoridad para un rango que incluye el \u00edndice de directorio y las claves de elemento de directorio del dentry anterior. Este caso se explica mejor con el siguiente ejemplo y reproductor: # La prueba requiere un dise\u00f1o muy espec\u00edfico de claves y elementos en el \u00e1rbol # fs/subvolume para activar el error. Por eso queremos asegurarnos de que # en cualquier plataforma en la que estemos, tengamos el mismo tama\u00f1o de hoja/nodo. # # Actualmente en btrfs el tama\u00f1o del nodo/hoja no puede ser menor que el tama\u00f1o de la p\u00e1gina # (pero puede ser mayor que el tama\u00f1o de la p\u00e1gina). Por lo tanto, utilice el mayor tama\u00f1o de nodo/hoja admitido (64K). $ mkfs.btrfs -f -n 65536 /dev/sdc $ mount /dev/sdc /mnt # \"testdir\" is inode 257. $ mkdir /mnt/testdir $ chmod 755 /mnt/testdir # Create several empty files to have the directory \"testdir\" with its # items spread over several leaves (7 in this case). $ for ((i = 1; i <= 1200; i++)); do echo -n > /mnt/testdir/file$i done # Create our test directory \"dira\", inode number 1458, which gets all # its items in leaf 7. # # The BTRFS_DIR_ITEM_KEY item for inode 257 (\"testdir\") that points to # the entry named \"dira\" is in leaf 2, while the BTRFS_DIR_INDEX_KEY # item that points to that entry is in leaf 3. # # For this particular filesystem node size (64K), file count and file # names, we endup with the directory entry items from inode 257 in # leaves 2 and 3, as previously mentioned - what matters for triggering # the bug exercised by this test case is that those items are not placed # in leaf 1, they must be placed in a leaf different from the one # containing the inode item for inode 257. # # The corresponding BTRFS_DIR_ITEM_KEY and BTRFS_DIR_INDEX_KEY items for # the parent inode (257) are the following: # # item 460 key (257 DIR_ITEM 3724298081) itemoff 48344 itemsize 34 # location key (1458 INODE_ITEM 0) type DIR # transid 6 data_len 0 name_len 4 # name: dira # # and: # # item 771 key (257 DIR_INDEX 1202) itemoff 36673 itemsize 34 # location key (1458 INODE_ITEM 0) type DIR # transid 6 data_len 0 name_len 4 # name: dira $ mkdir /mnt/testdir/dira # Make sure everything done so far is durably persisted. $ sync # Now do a change to inode 257 (\"testdir\") that does not result in # COWing leaves 2 and 3 - the leaves that contain the directory items # pointing to inode 1458 (directory \"dira\"). # # Changing permissions, the owner/group, updating or adding a xattr, # etc, will not change (COW) leaves 2 and 3. So for the sake of # simplicity change the permissions of inode 257, which results in # updating its inode item and therefore change (COW) only leaf 1. $ chmod 700 /mnt/testdir # Now fsync directory inode 257. # # Since only the first leaf was changed/COWed, we log the inode item of # inode 257 and only the dentries found in the first leaf, all have a # key type of BTRFS_DIR_ITEM_KEY, and no keys of type # BTRFS_DIR_INDEX_KEY, because they sort after the former type and none # exist in the first leaf. # # We also log 3 items that represent ranges for dir items and dir # indexes for which the log is authoritative: # # 1) a key of type BTRFS_DIR_LOG_ITEM_KEY, which indicates the log is # authoritative for all BTRFS_DIR_ITEM_KEY keys that have an offset # in the range [0, 2285968570] (the offset here is th ---truncated--- " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.7", + "matchCriteriaId": "13460FFE-8AA9-4F1C-963C-30982D8858D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/54a40fc3a1da21b52dbf19f72fdc27a2ec740760", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6d0924c5b742036b4f20a0ffdf2b6cf3f963f5f6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/54a40fc3a1da21b52dbf19f72fdc27a2ec740760", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6d0924c5b742036b4f20a0ffdf2b6cf3f963f5f6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4676.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4676.json index dd18e348e7b..d7bea476e2d 100644 --- a/CVE-2022/CVE-2022-46xx/CVE-2022-4676.json +++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4676.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4676", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-30T08:15:09.307", - "lastModified": "2024-11-21T07:35:42.953", + "lastModified": "2025-01-09T20:15:28.163", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49035.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49035.json index bac4ed3a851..c4aaa8d5ee2 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49035.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49035.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49035", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-02T15:15:18.807", - "lastModified": "2025-01-02T15:15:18.807", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:22:11.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,163 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: s5p_cec: limit msg.len a CEC_MAX_MSG_SIZE Espero que el hardware haya limitado esto a 16, pero en caso de que no sea as\u00ed, verifique este caso especial." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.333", + "matchCriteriaId": "BD342BE3-BDB3-4031-9F0B-DE4F90246387" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.299", + "matchCriteriaId": "2FE9A829-20E8-4929-AE9B-02761322A926" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.265", + "matchCriteriaId": "ABED5D97-9B16-4CF6-86E3-D5F5C4358E35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.224", + "matchCriteriaId": "1D67A077-EB45-4ADE-94CD-F9A76F6C319C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.154", + "matchCriteriaId": "475D097C-AB5A-4CF5-899F-413077854ABD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.78", + "matchCriteriaId": "AB8B27B9-B41B-42D5-AE67-0A89A8A8EEB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.8", + "matchCriteriaId": "EC9A754E-625D-42F3-87A7-960D643E2867" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1609231f86760c1f6a429de7913dd795b9faa08c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2654e785bd4aa2439cdffbe7dc1ea30a0eddbfe4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4a449430ecfb199b99ba58af63c467eb53500b39", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7ccb40f26cbefa1c6dfd3418bea54c9518cdbd8a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/93f65ce036863893c164ca410938e0968964b26c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a2728bf9b6c65e46468c763e3dab7e04839d4e11", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cbfa26936f318b16ccf9ca31b8e8b30c0dc087bd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fc0f76dd5f116fa9291327024dda392f8b4e849c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2023.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2023.json index 383071cae15..7365013dbf4 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2023.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2023.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2023", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-30T08:15:09.787", - "lastModified": "2024-11-21T07:57:46.780", + "lastModified": "2025-01-09T19:15:16.547", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-239xx/CVE-2023-23952.json b/CVE-2023/CVE-2023-239xx/CVE-2023-23952.json index 7caa42a16b5..f4031388630 100644 --- a/CVE-2023/CVE-2023-239xx/CVE-2023-23952.json +++ b/CVE-2023/CVE-2023-239xx/CVE-2023-23952.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23952", "sourceIdentifier": "secure@symantec.com", "published": "2023-06-01T01:15:17.687", - "lastModified": "2024-11-21T07:47:10.047", + "lastModified": "2025-01-09T20:15:29.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-239xx/CVE-2023-23953.json b/CVE-2023/CVE-2023-239xx/CVE-2023-23953.json index 45f37570aed..eac90f72816 100644 --- a/CVE-2023/CVE-2023-239xx/CVE-2023-23953.json +++ b/CVE-2023/CVE-2023-239xx/CVE-2023-23953.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23953", "sourceIdentifier": "secure@symantec.com", "published": "2023-06-01T01:15:17.747", - "lastModified": "2024-11-21T07:47:10.157", + "lastModified": "2025-01-09T20:15:29.363", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-239xx/CVE-2023-23954.json b/CVE-2023/CVE-2023-239xx/CVE-2023-23954.json index 0352df16b87..58fce5a1995 100644 --- a/CVE-2023/CVE-2023-239xx/CVE-2023-23954.json +++ b/CVE-2023/CVE-2023-239xx/CVE-2023-23954.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23954", "sourceIdentifier": "secure@symantec.com", "published": "2023-06-01T01:15:17.783", - "lastModified": "2024-11-21T07:47:10.267", + "lastModified": "2025-01-09T20:15:29.527", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-239xx/CVE-2023-23955.json b/CVE-2023/CVE-2023-239xx/CVE-2023-23955.json index 4ae54a89fa3..6fdb2ff3161 100644 --- a/CVE-2023/CVE-2023-239xx/CVE-2023-23955.json +++ b/CVE-2023/CVE-2023-239xx/CVE-2023-23955.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23955", "sourceIdentifier": "secure@symantec.com", "published": "2023-06-01T01:15:17.820", - "lastModified": "2024-11-21T07:47:10.373", + "lastModified": "2025-01-09T20:15:29.697", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25737.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25737.json index d04bcba6c56..5c739564524 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25737.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25737.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25737", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:11.323", - "lastModified": "2024-11-21T07:50:02.873", + "lastModified": "2025-01-09T20:15:30.067", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-704" + } + ] } ], "configurations": [ @@ -135,6 +165,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811464", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25738.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25738.json index 1430b596d72..51df59542ed 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25738.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25738.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25738", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:11.367", - "lastModified": "2024-11-21T07:50:03.007", + "lastModified": "2025-01-09T20:15:30.277", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ @@ -147,6 +177,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811852", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25739.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25739.json index e385fc57f7c..8b90ec3e6df 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25739.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25739.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25739", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:11.417", - "lastModified": "2024-11-21T07:50:03.150", + "lastModified": "2025-01-09T20:15:30.483", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ @@ -135,6 +165,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811939", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25740.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25740.json index 43360b5e6e3..0132790282b 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25740.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25740.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25740", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:11.480", - "lastModified": "2024-11-21T07:50:03.283", + "lastModified": "2025-01-09T20:15:30.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] } ], "configurations": [ @@ -95,6 +125,14 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1812354", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25741.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25741.json index 90c796383e2..734a5cfaa1a 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25741.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25741.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25741", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:11.537", - "lastModified": "2024-11-21T07:50:03.403", + "lastModified": "2025-01-09T20:15:30.880", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25745.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25745.json index 73d8e5332fc..1c8f3e4b47a 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25745.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25745.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25745", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:11.723", - "lastModified": "2024-11-21T07:50:03.910", + "lastModified": "2025-01-09T20:15:31.067", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ @@ -95,6 +125,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1804998", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25746.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25746.json index d6c8b8f7f22..093e7c7af93 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25746.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25746.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25746", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:11.767", - "lastModified": "2024-11-21T07:50:04.013", + "lastModified": "2025-01-09T20:15:31.250", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25748.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25748.json index f3e1b6edc20..e2bcc7c2ca4 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25748.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25748.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25748", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:11.817", - "lastModified": "2024-11-21T07:50:04.250", + "lastModified": "2025-01-09T19:15:14.810", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] } ], "configurations": [ @@ -97,6 +127,15 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1798798", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking", + "Permissions Required", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25749.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25749.json index 63771a1dfcf..d2c44ce79ce 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25749.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25749.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25749", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:11.860", - "lastModified": "2024-11-21T07:50:04.370", + "lastModified": "2025-01-09T19:15:15.763", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25750.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25750.json index d51bc9b7de1..40bff8d0cfb 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25750.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25750.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25750", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:11.903", - "lastModified": "2024-11-21T07:50:04.483", + "lastModified": "2025-01-09T19:15:15.930", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-668" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ @@ -97,6 +127,15 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1814733", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking", + "Permissions Required", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-268xx/CVE-2023-26842.json b/CVE-2023/CVE-2023-268xx/CVE-2023-26842.json index 45ee41137a1..0fac392b40c 100644 --- a/CVE-2023/CVE-2023-268xx/CVE-2023-26842.json +++ b/CVE-2023/CVE-2023-268xx/CVE-2023-26842.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26842", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T14:15:10.067", - "lastModified": "2024-11-21T07:51:59.560", + "lastModified": "2025-01-09T20:15:31.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-276xx/CVE-2023-27639.json b/CVE-2023/CVE-2023-276xx/CVE-2023-27639.json index 7db352c0fc9..70dcb916941 100644 --- a/CVE-2023/CVE-2023-276xx/CVE-2023-27639.json +++ b/CVE-2023/CVE-2023-276xx/CVE-2023-27639.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27639", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T21:15:09.260", - "lastModified": "2024-11-21T07:53:19.347", + "lastModified": "2025-01-09T20:15:31.873", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-277xx/CVE-2023-27744.json b/CVE-2023/CVE-2023-277xx/CVE-2023-27744.json index fa2be905a52..1904cd65f9f 100644 --- a/CVE-2023/CVE-2023-277xx/CVE-2023-27744.json +++ b/CVE-2023/CVE-2023-277xx/CVE-2023-27744.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27744", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-02T04:15:49.577", - "lastModified": "2024-11-21T07:53:24.807", + "lastModified": "2025-01-09T19:15:16.110", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-277xx/CVE-2023-27745.json b/CVE-2023/CVE-2023-277xx/CVE-2023-27745.json index 2baff7d3da0..0d315dec58d 100644 --- a/CVE-2023/CVE-2023-277xx/CVE-2023-27745.json +++ b/CVE-2023/CVE-2023-277xx/CVE-2023-27745.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27745", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-02T04:15:49.687", - "lastModified": "2024-11-21T07:53:24.970", + "lastModified": "2025-01-09T19:15:16.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28147.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28147.json index 52000edd89b..dd0e99763e0 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28147.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28147.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28147", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-02T00:15:09.620", - "lastModified": "2024-11-21T07:54:29.153", + "lastModified": "2025-01-09T20:15:32.090", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28657.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28657.json index 85e2448adee..9909700cf35 100644 --- a/CVE-2023/CVE-2023-286xx/CVE-2023-28657.json +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28657.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28657", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-01T02:15:09.597", - "lastModified": "2024-11-21T07:55:45.217", + "lastModified": "2025-01-09T20:15:32.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28713.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28713.json index 97b975585a5..782a447d97a 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28713.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28713.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28713", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-01T02:15:09.637", - "lastModified": "2024-11-21T07:55:51.570", + "lastModified": "2025-01-09T20:15:32.550", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-312" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28824.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28824.json index 60798e5da71..fea2806d0a4 100644 --- a/CVE-2023/CVE-2023-288xx/CVE-2023-28824.json +++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28824.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28824", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-01T02:15:09.673", - "lastModified": "2024-11-21T07:56:05.187", + "lastModified": "2025-01-09T20:15:32.740", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-289xx/CVE-2023-28937.json b/CVE-2023/CVE-2023-289xx/CVE-2023-28937.json index 3efea374575..a0cbb5f4534 100644 --- a/CVE-2023/CVE-2023-289xx/CVE-2023-28937.json +++ b/CVE-2023/CVE-2023-289xx/CVE-2023-28937.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28937", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-01T02:15:09.717", - "lastModified": "2024-11-21T07:56:16.013", + "lastModified": "2025-01-09T20:15:32.920", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29154.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29154.json index efc4db83d2a..a28301051e0 100644 --- a/CVE-2023/CVE-2023-291xx/CVE-2023-29154.json +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29154.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29154", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-01T02:15:09.760", - "lastModified": "2024-11-21T07:56:37.563", + "lastModified": "2025-01-09T20:15:33.140", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29159.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29159.json index b9e90e29be0..061934d28b1 100644 --- a/CVE-2023/CVE-2023-291xx/CVE-2023-29159.json +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29159.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29159", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-06-01T02:15:09.803", - "lastModified": "2024-11-21T07:56:38.187", + "lastModified": "2025-01-09T20:15:33.313", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-334xx/CVE-2023-33486.json b/CVE-2023/CVE-2023-334xx/CVE-2023-33486.json index 8416432ff25..8d28d06982d 100644 --- a/CVE-2023/CVE-2023-334xx/CVE-2023-33486.json +++ b/CVE-2023/CVE-2023-334xx/CVE-2023-33486.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33486", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T13:15:09.697", - "lastModified": "2024-11-21T08:05:38.160", + "lastModified": "2025-01-09T19:15:16.783", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33551.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33551.json index 41e5b9ca9f0..8a9f39b2e51 100644 --- a/CVE-2023/CVE-2023-335xx/CVE-2023-33551.json +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33551.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33551", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T15:15:09.050", - "lastModified": "2024-11-21T08:05:42.157", + "lastModified": "2025-01-09T19:15:16.993", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36361.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36361.json index 6454b1b920a..d0cbe0caf13 100644 --- a/CVE-2023/CVE-2023-363xx/CVE-2023-36361.json +++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36361.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36361", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-05T16:15:07.567", - "lastModified": "2024-11-21T08:09:35.950", + "lastModified": "2025-01-09T20:15:33.733", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -90,6 +90,10 @@ "Third Party Advisory" ] }, + { + "url": "https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2023-36361", + "source": "cve@mitre.org" + }, { "url": "http://audimex.com", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45911.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45911.json index 6e48c3d8a9d..13e17a085a3 100644 --- a/CVE-2023/CVE-2023-459xx/CVE-2023-45911.json +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45911.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45911", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-18T18:15:09.107", - "lastModified": "2024-11-21T08:27:36.763", + "lastModified": "2025-01-09T20:15:34.043", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -104,6 +104,10 @@ } ], "references": [ + { + "url": "https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2023-45911", + "source": "cve@mitre.org" + }, { "url": "https://github.com/PostalBlab/Vulnerabilities/blob/main/ComScale/auth_bypass.txt", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45912.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45912.json index df7d44fe2bd..478aa4e4422 100644 --- a/CVE-2023/CVE-2023-459xx/CVE-2023-45912.json +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45912.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45912", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-18T18:15:09.153", - "lastModified": "2024-11-21T08:27:36.980", + "lastModified": "2025-01-09T20:15:34.257", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -74,6 +74,10 @@ } ], "references": [ + { + "url": "https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2023-45912", + "source": "cve@mitre.org" + }, { "url": "https://github.com/PostalBlab/Vulnerabilities/blob/main/ComScale/file_access.txt", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52485.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52485.json index a0eaf57faef..a28b245f6d7 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52485.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52485.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52485", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-29T15:15:07.397", - "lastModified": "2024-11-21T08:39:52.737", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:20:59.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,88 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: activa DMCUB antes de enviar un comando [Por qu\u00e9] Podemos quedarnos quietos intentando enviar comandos cuando DMCUB no est\u00e1 encendido. [C\u00f3mo] Para funciones que se ejecutan dentro de un contexto de DC o bloqueo de DC, podemos ajustar las llamadas directas a dm_execute_dmub_cmd/list con c\u00f3digo que salga de las optimizaciones de energ\u00eda inactivas y se vuelva a permitir una vez que hayamos terminado con el env\u00edo del comando en caso de \u00e9xito. Para env\u00edos directos de DM, el DM deber\u00e1 gestionar la secuencia de entrada/salida manualmente. No podemos invocar un comando DMCUB directamente dentro del asistente de ejecuci\u00f3n de DM o podemos bloquearnos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.7.3", + "matchCriteriaId": "F13B1885-F67C-4943-BD88-9B68D2C3FF83" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/303197775a97416b62d4da69280d0c120a20e009", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8892780834ae294bc3697c7d0e056d7743900b39", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/303197775a97416b62d4da69280d0c120a20e009", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8892780834ae294bc3697c7d0e056d7743900b39", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52497.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52497.json index a69bdb8e44e..000372bea45 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52497.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52497.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52497", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-01T14:15:53.273", - "lastModified": "2024-11-21T08:39:54.233", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:20:02.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,63 +15,194 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: erofs: corrige la descompresi\u00f3n in situ de lz4 Actualmente, EROFS puede asignar otro b\u00fafer comprimido para la descompresi\u00f3n in situ, que se utiliz\u00f3 para manejar los casos en que algunas p\u00e1ginas de datos comprimidos en realidad no est\u00e1n in situ I/ o. Sin embargo, como la mayor\u00eda de los algoritmos LZ77 simples, LZ4 espera que los datos comprimidos est\u00e9n organizados al final del buffer descomprimido y usa expl\u00edcitamente memmove() para manejar la superposici\u00f3n: ________________________________________________________ |_ direcci\u00f3n de descompresi\u00f3n --> ____ |_ datos comprimidos _| Aunque EROFS organiza los datos comprimidos de esta manera, normalmente asigna dos buffers virtuales individuales, por lo que el orden relativo es incierto. Anteriormente, apenas se observaba ya que LZ4 solo usa memmove() para literales cortos superpuestos y las implementaciones de memmove x86/arm64 parecen cubrirlo por completo y no tienen este problema. Juhyung inform\u00f3 que se pueden encontrar da\u00f1os en los datos EROFS en un nuevo procesador Intel x86. Despu\u00e9s de algunos an\u00e1lisis, parece que los procesadores x86 recientes con la nueva caracter\u00edstica FSRM exponen este problema con \"rep movsb\". Por ahora, usemos estrictamente el b\u00fafer descomprimido para la descompresi\u00f3n in situ de lz4. M\u00e1s adelante, como mejora \u00fatil, podr\u00edamos intentar unir estos dos buffers en el orden correcto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3", + "versionEndExcluding": "5.4.285", + "matchCriteriaId": "6B9DFA1E-13AA-4825-AB77-27381BDF4E28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.211", + "matchCriteriaId": "7DDA4DCF-671D-415D-94DF-6E3C77DF0704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.150", + "matchCriteriaId": "CB6C60DE-9E0C-46C5-904D-D4F4031F8E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.76", + "matchCriteriaId": "32F0FEB3-5FE1-4400-A56D-886F09BE872E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.15", + "matchCriteriaId": "87C718CB-AE3D-4B07-B4D9-BFF64183C468" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.3", + "matchCriteriaId": "58FD5308-148A-40D3-B36A-0CA6B434A8BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/33bf23c9940dbd3a22aad7f0cda4c84ed5701847", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3c12466b6b7bf1e56f9b32c366a3d83d87afb4de", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/77cbc04a1a8610e303a0e0d74f2676667876a184", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9ff2d260b25df6fe1341a79113d88fecf6bd553e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a0180e940cf1aefa7d516e20b259ad34f7a8b379", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bffc4cc334c5bb31ded54bc3cfd651735a3cb79e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f36d200a80a3ca025532ed60dd1ac21b620e14ae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/33bf23c9940dbd3a22aad7f0cda4c84ed5701847", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3c12466b6b7bf1e56f9b32c366a3d83d87afb4de", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/77cbc04a1a8610e303a0e0d74f2676667876a184", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a0180e940cf1aefa7d516e20b259ad34f7a8b379", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bffc4cc334c5bb31ded54bc3cfd651735a3cb79e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f36d200a80a3ca025532ed60dd1ac21b620e14ae", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10215.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10215.json new file mode 100644 index 00000000000..3d3df1f6ea2 --- /dev/null +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10215.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-10215", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-01-09T20:15:34.410", + "lastModified": "2025-01-09T20:15:34.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WPBookit plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 1.6.4. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.iqonic.design/wpbookit/versions/change-log", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d23a2b9-8476-4564-a5de-5e6cfc38ce68?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10308.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10308.json index f2396b39326..4b44e1b518d 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10308.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10308.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10308", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-26T11:15:16.920", - "lastModified": "2024-11-26T11:15:16.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:30:43.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jegtheme:jeg_elementor_kit:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.10", + "matchCriteriaId": "12FCEC0D-1905-44CB-8B66-A6EBCAD42E15" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3193980/jeg-elementor-kit", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/98aed079-672c-43bb-a5eb-faf8ffc04b71?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11614.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11614.json index 80d7bb39e83..d7426ea3190 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11614.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11614.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11614", "sourceIdentifier": "secalert@redhat.com", "published": "2024-12-18T09:15:06.660", - "lastModified": "2025-01-09T17:15:10.980", + "lastModified": "2025-01-09T19:15:17.283", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -64,6 +64,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:0210", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:0211", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2025:0220", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13237.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13237.json new file mode 100644 index 00000000000..9daa8e62505 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13237.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13237", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:17.437", + "lastModified": "2025-01-09T19:15:17.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal File Entity (fieldable files) allows Cross-Site Scripting (XSS).This issue affects File Entity (fieldable files): from 7.X-* before 7.X-2.38." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-001", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13238.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13238.json new file mode 100644 index 00000000000..a1387726e43 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13238.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13238", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:17.557", + "lastModified": "2025-01-09T19:15:17.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Typogrify allows Cross-Site Scripting (XSS).This issue affects Typogrify: from 0.0.0 before 1.3.0." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-002", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13239.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13239.json new file mode 100644 index 00000000000..7edba12e0a2 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13239.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13239", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:17.663", + "lastModified": "2025-01-09T19:15:17.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Weak Authentication vulnerability in Drupal Two-factor Authentication (TFA) allows Authentication Abuse.This issue affects Two-factor Authentication (TFA): from 0.0.0 before 1.5.0." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1390" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-003", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13240.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13240.json new file mode 100644 index 00000000000..2224238de1b --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13240.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13240", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:17.780", + "lastModified": "2025-01-09T19:15:17.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Access Control vulnerability in Drupal Open Social allows Collect Data from Common Resource Locations.This issue affects Open Social: from 0.0.0 before 12.05." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-004", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13241.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13241.json new file mode 100644 index 00000000000..505a933b7ba --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13241.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13241", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:17.910", + "lastModified": "2025-01-09T19:15:17.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Authorization vulnerability in Drupal Open Social allows Collect Data from Common Resource Locations.This issue affects Open Social: from 0.0.0 before 12.0.5." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-005", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13242.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13242.json new file mode 100644 index 00000000000..0113c438f66 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13242.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13242", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:18.033", + "lastModified": "2025-01-09T19:15:18.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Exposed Dangerous Method or Function vulnerability in Drupal Swift Mailer allows Resource Location Spoofing.This issue affects Swift Mailer: *.*." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-749" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-006", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13243.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13243.json new file mode 100644 index 00000000000..8adf7690940 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13243.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13243", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:18.140", + "lastModified": "2025-01-09T19:15:18.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Drupal Entity Delete Log allows Forceful Browsing.This issue affects Entity Delete Log: from 0.0.0 before 1.1.1." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-007", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13244.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13244.json new file mode 100644 index 00000000000..35f02d9b68f --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13244.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13244", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:18.250", + "lastModified": "2025-01-09T19:15:18.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Drupal Migrate Tools allows Cross Site Request Forgery.This issue affects Migrate Tools: from 0.0.0 before 6.0.3." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-008", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13245.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13245.json new file mode 100644 index 00000000000..a2c04057167 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13245.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13245", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:18.370", + "lastModified": "2025-01-09T19:15:18.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal CKEditor 4 LTS - WYSIWYG HTML editor allows Cross-Site Scripting (XSS).This issue affects CKEditor 4 LTS - WYSIWYG HTML editor: from 1.0.0 before 1.0.1." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-009", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13246.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13246.json new file mode 100644 index 00000000000..e8c9a25884a --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13246.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13246", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:18.497", + "lastModified": "2025-01-09T19:15:18.497", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Ownership Management vulnerability in Drupal Node Access Rebuild Progressive allows Target Influence via Framing.This issue affects Node Access Rebuild Progressive: from 0.0.0 before 2.0.2." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-282" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-010", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13247.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13247.json new file mode 100644 index 00000000000..bb8239d9b1c --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13247.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13247", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:18.610", + "lastModified": "2025-01-09T19:15:18.610", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Coffee allows Cross-Site Scripting (XSS).This issue affects Coffee: from 0.0.0 before 1.4.0." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-011", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13248.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13248.json new file mode 100644 index 00000000000..4c0e0df9358 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13248.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13248", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:18.730", + "lastModified": "2025-01-09T19:15:18.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Privilege Assignment vulnerability in Drupal Private content allows Target Influence via Framing.This issue affects Private content: from 0.0.0 before 2.1.0." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-012", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13249.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13249.json new file mode 100644 index 00000000000..6cb2716961b --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13249.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13249", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:18.857", + "lastModified": "2025-01-09T19:15:18.857", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Ownership Management vulnerability in Drupal Node Access Rebuild Progressive allows Target Influence via Framing.This issue affects Node Access Rebuild Progressive: from 7.X-1.0 before 7.X-1.2." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-282" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-013", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13250.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13250.json new file mode 100644 index 00000000000..8daa5cb4ab0 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13250.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13250", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:18.980", + "lastModified": "2025-01-09T19:15:18.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Drupal Drupal Symfony Mailer Lite allows Cross Site Request Forgery.This issue affects Drupal Symfony Mailer Lite: from 0.0.0 before 1.0.6." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-014", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13251.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13251.json new file mode 100644 index 00000000000..38ac2e38429 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13251.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13251", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:19.093", + "lastModified": "2025-01-09T19:15:19.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Privilege Assignment vulnerability in Drupal Registration role allows Privilege Escalation.This issue affects Registration role: from 0.0.0 before 2.0.1." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-015", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13252.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13252.json new file mode 100644 index 00000000000..4b08fc360ab --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13252.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13252", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:19.207", + "lastModified": "2025-01-09T19:15:19.207", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal TacJS allows Cross-Site Scripting (XSS).This issue affects TacJS: from 0.0.0 before 6.5.0." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-016", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13253.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13253.json new file mode 100644 index 00000000000..a7c2ea60830 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13253.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13253", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:19.317", + "lastModified": "2025-01-09T19:15:19.317", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Authorization vulnerability in Drupal Advanced PWA inc Push Notifications allows Forceful Browsing.This issue affects Advanced PWA inc Push Notifications: from 0.0.0 before 1.5.0." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-017", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13254.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13254.json new file mode 100644 index 00000000000..090b117b258 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13254.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13254", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:19.437", + "lastModified": "2025-01-09T19:15:19.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insertion of Sensitive Information Into Sent Data vulnerability in Drupal REST Views allows Forceful Browsing.This issue affects REST Views: from 0.0.0 before 3.0.1." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-201" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-018", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13255.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13255.json new file mode 100644 index 00000000000..2c4c19e2405 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13255.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13255", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:19.540", + "lastModified": "2025-01-09T19:15:19.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive Information Through Data Queries vulnerability in Drupal RESTful Web Services allows Forceful Browsing.This issue affects RESTful Web Services: from 7.X-2.0 before 7.X-2.10." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-202" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-019", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13256.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13256.json new file mode 100644 index 00000000000..5c4fcee5d97 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13256.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13256", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:19.660", + "lastModified": "2025-01-09T19:15:19.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient Granularity of Access Control vulnerability in Drupal Email Contact allows Forceful Browsing.This issue affects Email Contact: from 0.0.0 before 2.0.4." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1220" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-020", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13257.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13257.json new file mode 100644 index 00000000000..c07e304282f --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13257.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13257", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:19.773", + "lastModified": "2025-01-09T19:15:19.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Authorization vulnerability in Drupal Commerce View Receipt allows Forceful Browsing.This issue affects Commerce View Receipt: from 0.0.0 before 1.0.3." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-021", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13258.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13258.json new file mode 100644 index 00000000000..bcabbf0f708 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13258.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13258", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:19.887", + "lastModified": "2025-01-09T19:15:19.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Authorization vulnerability in Drupal Drupal REST & JSON API Authentication allows Forceful Browsing.This issue affects Drupal REST & JSON API Authentication: from 0.0.0 before 2.0.13." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-022", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13259.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13259.json new file mode 100644 index 00000000000..1b28b871a34 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13259.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13259", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T19:15:19.997", + "lastModified": "2025-01-09T19:15:19.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insertion of Sensitive Information Into Sent Data vulnerability in Drupal Image Sizes allows Forceful Browsing.This issue affects Image Sizes: from 0.0.0 before 3.0.2." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-201" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-023", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13260.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13260.json new file mode 100644 index 00000000000..e5c215008be --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13260.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13260", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:34.650", + "lastModified": "2025-01-09T20:15:34.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Drupal Migrate queue importer allows Cross Site Request Forgery.This issue affects Migrate queue importer: from 0.0.0 before 2.1.1." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-024", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13261.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13261.json new file mode 100644 index 00000000000..e4ec3bc12c8 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13261.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13261", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:34.763", + "lastModified": "2025-01-09T20:15:34.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia DAM allows Cross Site Request Forgery.This issue affects Acquia DAM: from 0.0.0 before 1.0.13, from 1.1.0 before 1.1.0-beta3." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-025", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13262.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13262.json new file mode 100644 index 00000000000..5e64b278941 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13262.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13262", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:34.890", + "lastModified": "2025-01-09T20:15:34.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal View Password allows Cross-Site Scripting (XSS).This issue affects View Password: from 0.0.0 before 6.0.4." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-026", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13263.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13263.json new file mode 100644 index 00000000000..e2ac10d4d34 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13263.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13263", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:35.007", + "lastModified": "2025-01-09T20:15:35.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') vulnerability in Drupal Opigno group manager allows PHP Local File Inclusion.This issue affects Opigno group manager: from 0.0.0 before 3.1.1." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-96" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-027", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13264.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13264.json new file mode 100644 index 00000000000..7bd2cea6bcc --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13264.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13264", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:35.117", + "lastModified": "2025-01-09T20:15:35.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') vulnerability in Drupal Opigno module allows PHP Local File Inclusion.This issue affects Opigno module: from 0.0.0 before 3.1.2." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-96" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-028", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13265.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13265.json new file mode 100644 index 00000000000..cb0a8603304 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13265.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13265", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:35.230", + "lastModified": "2025-01-09T20:15:35.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') vulnerability in Drupal Opigno Learning path allows PHP Local File Inclusion.This issue affects Opigno Learning path: from 0.0.0 before 3.1.2." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-96" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-029", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13266.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13266.json new file mode 100644 index 00000000000..c04701d5997 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13266.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13266", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:35.350", + "lastModified": "2025-01-09T20:15:35.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Authorization vulnerability in Drupal Responsive and off-canvas menu allows Forceful Browsing.This issue affects Responsive and off-canvas menu: from 0.0.0 before 4.4.4." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-030", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13267.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13267.json new file mode 100644 index 00000000000..52c37436cc5 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13267.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13267", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:35.470", + "lastModified": "2025-01-09T20:15:35.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') vulnerability in Drupal Opigno TinCan Question Type allows PHP Local File Inclusion.This issue affects Opigno TinCan Question Type: from 7.X-1.0 before 7.X-1.3." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-96" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-031", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13268.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13268.json new file mode 100644 index 00000000000..1f0a1781b59 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13268.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13268", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:35.577", + "lastModified": "2025-01-09T20:15:35.577", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') vulnerability in Drupal Opigno allows PHP Local File Inclusion.This issue affects Opigno: from 7.X-1.0 before 7.X-1.23." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-96" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-032", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13269.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13269.json new file mode 100644 index 00000000000..d857f45222a --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13269.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13269", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:35.687", + "lastModified": "2025-01-09T20:15:35.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insertion of Sensitive Information Into Sent Data vulnerability in Drupal Advanced Varnish allows Forceful Browsing.This issue affects Advanced Varnish: from 0.0.0 before 4.0.11." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-201" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-033", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13270.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13270.json new file mode 100644 index 00000000000..35fe22eaad3 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13270.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13270", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:35.790", + "lastModified": "2025-01-09T20:15:35.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Authorization vulnerability in Drupal Freelinking allows Forceful Browsing.This issue affects Freelinking: from 0.0.0 before 4.0.1." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-034", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13271.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13271.json new file mode 100644 index 00000000000..7364b408b20 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13271.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13271", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:35.910", + "lastModified": "2025-01-09T20:15:35.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Authorization vulnerability in Drupal Content Entity Clone allows Forceful Browsing.This issue affects Content Entity Clone: from 0.0.0 before 1.0.4." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-035", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13272.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13272.json new file mode 100644 index 00000000000..fc5aeacf858 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13272.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13272", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:36.027", + "lastModified": "2025-01-09T20:15:36.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient Granularity of Access Control vulnerability in Drupal Paragraphs table allows Content Spoofing.This issue affects Paragraphs table: from 0.0.0 before 1.23.0, from 2.0.0 before 2.0.2." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1220" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-036", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13273.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13273.json new file mode 100644 index 00000000000..65bef9901fe --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13273.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13273", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:36.137", + "lastModified": "2025-01-09T20:15:36.137", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Open Social allows Cross-Site Scripting (XSS).This issue affects Open Social: from 0.0.0 before 12.3.8, from 12.4.0 before 12.4.5, from 13.0.0 before 13.0.0-alpha11." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-037", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13274.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13274.json new file mode 100644 index 00000000000..1de92def70f --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13274.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13274", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:36.250", + "lastModified": "2025-01-09T20:15:36.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Interaction Frequency vulnerability in Drupal Open Social allows Functionality Misuse.This issue affects Open Social: from 0.0.0 before 12.3.8, from 12.4.0 before 12.4.5." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-799" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-038", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13275.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13275.json new file mode 100644 index 00000000000..5afd706a050 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13275.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13275", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:36.367", + "lastModified": "2025-01-09T20:15:36.367", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in Drupal Security Kit allows HTTP DoS.This issue affects Security Kit: from 0.0.0 before 2.0.3." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-039", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13276.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13276.json new file mode 100644 index 00000000000..f276da5a37c --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13276.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13276", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:36.487", + "lastModified": "2025-01-09T20:15:36.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insertion of Sensitive Information Into Sent Data vulnerability in Drupal File Entity (fieldable files) allows Forceful Browsing.This issue affects File Entity (fieldable files): from 7.X-* before 7.X-2.39." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-201" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-040", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13277.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13277.json new file mode 100644 index 00000000000..f1da77bc8e9 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13277.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13277", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:36.593", + "lastModified": "2025-01-09T20:15:36.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Authorization vulnerability in Drupal Smart IP Ban allows Forceful Browsing.This issue affects Smart IP Ban: from 7.X-1.0 before 7.X-1.1." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-041", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13278.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13278.json new file mode 100644 index 00000000000..c9fc7f868a4 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13278.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13278", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:36.697", + "lastModified": "2025-01-09T20:15:36.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Authorization vulnerability in Drupal Diff allows Functionality Misuse.This issue affects Diff: from 0.0.0 before 1.8.0." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-042", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13279.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13279.json new file mode 100644 index 00000000000..3e55d77f75d --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13279.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13279", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:36.803", + "lastModified": "2025-01-09T20:15:36.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Session Fixation vulnerability in Drupal Two-factor Authentication (TFA) allows Session Fixation.This issue affects Two-factor Authentication (TFA): from 0.0.0 before 1.8.0." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-043", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13280.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13280.json new file mode 100644 index 00000000000..e9be22815f3 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13280.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13280", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:36.913", + "lastModified": "2025-01-09T20:15:36.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient Session Expiration vulnerability in Drupal Persistent Login allows Forceful Browsing.This issue affects Persistent Login: from 0.0.0 before 1.8.0, from 2.0.* before 2.2.2." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-044", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13281.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13281.json new file mode 100644 index 00000000000..86db45d073d --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13281.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13281", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:37.017", + "lastModified": "2025-01-09T20:15:37.017", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Authorization vulnerability in Drupal Monster Menus allows Forceful Browsing.This issue affects Monster Menus: from 0.0.0 before 9.3.2." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-045", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13282.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13282.json new file mode 100644 index 00000000000..8283db5e32b --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13282.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13282", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:37.133", + "lastModified": "2025-01-09T20:15:37.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Authorization vulnerability in Drupal Block permissions allows Forceful Browsing.This issue affects Block permissions: from 1.0.0 before 1.2.0." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-046", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13283.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13283.json new file mode 100644 index 00000000000..44b16b3390c --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13283.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13283", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:37.230", + "lastModified": "2025-01-09T20:15:37.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Facets allows Cross-Site Scripting (XSS).This issue affects Facets: from 0.0.0 before 2.0.9." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-047", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13284.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13284.json new file mode 100644 index 00000000000..7480346e5d7 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13284.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13284", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:37.343", + "lastModified": "2025-01-09T20:15:37.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Drupal Gutenberg allows Cross Site Request Forgery.This issue affects Gutenberg: from 0.0.0 before 2.13.0, from 3.0.0 before 3.0.5." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-048", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13285.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13285.json new file mode 100644 index 00000000000..80612f7b234 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13285.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-13285", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:37.470", + "lastModified": "2025-01-09T20:15:37.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in Drupal wkhtmltopdf.This issue affects wkhtmltopdf: *.*." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-049", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13286.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13286.json new file mode 100644 index 00000000000..726c24b8fe3 --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13286.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13286", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:37.563", + "lastModified": "2025-01-09T20:15:37.563", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal SVG Embed allows Cross-Site Scripting (XSS).This issue affects SVG Embed: from 0.0.0 before 2.1.2." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-050", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13287.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13287.json new file mode 100644 index 00000000000..ae573dda74b --- /dev/null +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13287.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-13287", + "sourceIdentifier": "mlhess@drupal.org", + "published": "2025-01-09T20:15:37.687", + "lastModified": "2025-01-09T20:15:37.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Views SVG Animation allows Cross-Site Scripting (XSS).This issue affects Views SVG Animation: from 0.0.0 before 1.0.1." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "mlhess@drupal.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.drupal.org/sa-contrib-2024-051", + "source": "mlhess@drupal.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27185.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27185.json index ed05aef0cc6..c00067cfc97 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27185.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27185.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27185", "sourceIdentifier": "security@joomla.org", "published": "2024-08-20T16:15:10.840", - "lastModified": "2024-09-22T05:15:11.530", + "lastModified": "2025-01-09T20:15:37.793", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,42 +15,7 @@ "value": "La clase de paginaci\u00f3n incluye par\u00e1metros arbitrarios en los enlaces, lo que genera vectores de ataque de envenenamiento de cach\u00e9." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", - "baseScore": 9.1, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.2 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-349" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://developer.joomla.org/security-centre/942-20240802-core-cache-poisoning-in-pagination.html", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31997.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31997.json index 9c8ddc4bae9..acaf1354fd0 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31997.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31997.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31997", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T22:15:07.527", - "lastModified": "2024-11-21T09:14:18.613", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T19:02:51.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,48 +69,124 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.10.19", + "matchCriteriaId": "77F7026A-AE0D-4962-A75D-57E86DDFBD0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.5.4", + "matchCriteriaId": "C15AC764-BCCE-4AF3-98F5-28EC637500A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.6", + "versionEndExcluding": "15.9", + "matchCriteriaId": "3E8A87CB-01A7-4C55-99FF-93FAAC70532B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/xwiki/xwiki-platform/commit/171e7c7d0e56deaa7b3678657ae26ef95379b1ea", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/1b2574eb966457ca4ef34e557376b8751d1be90d", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/56748e154a9011f0d6239bec0823eaaeab6ec3f7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c2gg-4gq4-jv5j", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-21335", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/171e7c7d0e56deaa7b3678657ae26ef95379b1ea", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/1b2574eb966457ca4ef34e557376b8751d1be90d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/56748e154a9011f0d6239bec0823eaaeab6ec3f7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c2gg-4gq4-jv5j", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-21335", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40530.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40530.json index d51e12d83ad..6e1d9a97110 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40530.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40530.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40530", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-05T16:15:36.750", - "lastModified": "2024-08-28T19:15:08.717", + "lastModified": "2025-01-09T20:15:37.910", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,42 +15,7 @@ "value": "Vulnerabilidad de permisos inseguros en UAB Lexita PanteraCRM CMS v.401.152 y Patera CRM CMS v.402.072 permite a un atacante remoto ejecutar c\u00f3digo arbitrario mediante la modificaci\u00f3n del componente de encabezado X-Forwarded-For." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-94" - } - ] - } - ], + "metrics": {}, "references": [ { "url": "https://critical.lt/blog/authorization-bypass-and-mass-assignment-in-pantera-crm/", diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42898.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42898.json new file mode 100644 index 00000000000..6db80f56fb3 --- /dev/null +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42898.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42898", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-09T20:15:38.093", + "lastModified": "2025-01-09T20:15:38.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in Nagios XI 2024R1.1.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter in the Account Settings page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/simalamuel/Research/tree/main/CVE-2024-42898", + "source": "cve@mitre.org" + }, + { + "url": "https://www.nagios.com/products/security/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44083.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44083.json index 107a69e891b..2752629a1b0 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44083.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44083.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44083", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T04:15:04.760", - "lastModified": "2024-08-28T15:15:17.050", + "lastModified": "2025-01-09T20:15:38.220", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,26 +36,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 } ] }, @@ -69,16 +49,6 @@ "value": "CWE-770" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-400" - } - ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46505.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46505.json new file mode 100644 index 00000000000..cb0bc9173c1 --- /dev/null +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46505.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-46505", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-09T20:15:38.377", + "lastModified": "2025-01-09T20:15:38.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Infoblox BloxOne v2.4 was discovered to contain a business logic flaw due to thick client vulnerabilities." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jayaramyalla.medium.com/bloxone-business-logic-flaw-due-to-thick-client-vulnerabilities-cve-2024-46505-04a4f1966f4b", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49035.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49035.json index 02176af1d4c..9f0a13bea5d 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49035.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49035.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49035", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-26T20:15:31.763", - "lastModified": "2024-11-26T20:15:31.763", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-09T19:33:26.117", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", @@ -43,6 +43,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -56,12 +76,42 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:partner_center:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A400A527-15CD-4F9D-A42D-A453ABE04769" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49035", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49038.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49038.json index 66470dc6062..1b7f5de6a37 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49038.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49038.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49038", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-26T20:15:31.943", - "lastModified": "2024-11-26T20:15:31.943", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-09T19:30:34.403", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", @@ -43,6 +43,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 } ] }, @@ -58,10 +78,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:copilot_studio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7859CFCD-C125-4992-9DCD-A843175DF9BE" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49038", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51162.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51162.json index a6c654d5120..6c46223fd6b 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51162.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51162.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51162", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-20T17:15:18.120", - "lastModified": "2024-11-22T17:15:09.353", + "lastModified": "2025-01-09T20:15:38.510", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,10 @@ { "url": "https://github.com/Cameleon037/CVEs/blob/main/CVE-2024-51162/README.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2024-51162", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51163.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51163.json index d65cd4740f8..5aaae6371cc 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51163.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51163.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51163", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-20T17:15:18.417", - "lastModified": "2024-11-27T18:15:17.760", + "lastModified": "2025-01-09T20:15:38.690", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2024-51163", + "source": "cve@mitre.org" + }, { "url": "https://github.com/rahulkadavil/CVEs/tree/main/CVE-2024-51163", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54724.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54724.json new file mode 100644 index 00000000000..323b3d8f344 --- /dev/null +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54724.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-54724", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-09T20:15:38.863", + "lastModified": "2025-01-09T20:15:38.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPYun before 7.0.2 is vulnerable to code execution through backdoor-restricted arbitrary file writing and file inclusion." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://phpyun.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/la12138la/detail/blob/main/1.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54761.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54761.json new file mode 100644 index 00000000000..9618c2b6b87 --- /dev/null +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54761.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-54761", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-09T20:15:38.990", + "lastModified": "2025-01-09T20:15:38.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "BigAnt Office Messenger 5.6.06 is vulnerable to SQL Injection via the 'dev_code' parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/nscan9/BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54762.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54762.json new file mode 100644 index 00000000000..84cacf927a7 --- /dev/null +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54762.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-54762", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-09T20:15:39.140", + "lastModified": "2025-01-09T20:15:39.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Ruoyi v.4.7.9 and before contains an authenticated SQL injection vulnerability. This is because the filterKeyword method does not completely filter SQL injection keywords, resulting in the risk of SQL injection." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/yangzongzhuan/RuoYi/", + "source": "cve@mitre.org" + }, + { + "url": "https://locrian-lightning-dc7.notion.site/CVE-2024-54762-1748e5e2b1a280b4a549dcce2c4823e8", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54887.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54887.json new file mode 100644 index 00000000000..01449d4e3e6 --- /dev/null +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54887.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-54887", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-09T20:15:39.277", + "lastModified": "2025-01-09T20:15:39.277", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TP-Link TL-WR940N V3 and V4 with firmware 3.16.9 and earlier contain a buffer overflow via the dnsserver1 and dnsserver2 parameters at /userRpm/Wan6to4TunnelCfgRpm.htm. This vulnerability allows an authenticated attacker to execute arbitrary code on the remote device in the context of the root user." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://tp-link.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/JBince/vulnerability-research/tree/main/CVE-2024-54887", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55494.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55494.json new file mode 100644 index 00000000000..63afae55d09 --- /dev/null +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55494.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-55494", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-09T20:15:39.400", + "lastModified": "2025-01-09T20:15:39.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in Opencode Mobile Collect Call v5.4.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the op_func parameter at /occontrolpanel/index.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/hassan-mohammed/security-findings/tree/main/CVEs/CVE-2024-55494", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/hassan-mohammed/security-findings/tree/main/CVEs/CVE-2024-55494", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56113.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56113.json new file mode 100644 index 00000000000..4ce2fb6019a --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56113.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-56113", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-09T20:15:39.603", + "lastModified": "2025-01-09T20:15:39.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Smart Toilet Lab - Motius 1.3.11 is running with debug mode turned on (DEBUG = True) and exposing sensitive information defined in Django settings file through verbose error page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2024-56113", + "source": "cve@mitre.org" + }, + { + "url": "https://smarttoilet.pratt.duke.edu", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56114.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56114.json new file mode 100644 index 00000000000..b92239785a0 --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56114.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-56114", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-09T20:15:39.730", + "lastModified": "2025-01-09T20:15:39.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Canlineapp Online 1.1 is vulnerable to Broken Access Control and allows users with the Auditor role to create an audit template as a result of improper authorization checks. This feature is designated for supervisor role, but auditors have been able to successfully create audit templates from their account." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2024-56114", + "source": "cve@mitre.org" + }, + { + "url": "https://www.e-connectsolutions.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56719.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56719.json index 7ffa9059c7d..389710ea4a5 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56719.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56719.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56719", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T09:15:07.187", - "lastModified": "2024-12-29T09:15:07.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:10:50.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,113 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: stmmac: fix TSO DMA API usage burning cause oops Commit 66600fac7a98 (\"net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data\") movi\u00f3 la asignaci\u00f3n de los miembros de tx_skbuff_dma[] para que sea posterior en stmmac_tso_xmit(). El buf (dma cookie) y len almacenados en esta estructura se pasan a dma_unmap_single() por stmmac_tx_clean(). La DMA API requiere que la dma cookie pasada a dma_unmap_single() sea la misma que el valor devuelto desde dma_map_single(). Sin embargo, al mover la asignaci\u00f3n m\u00e1s tarde, este no es el caso cuando priv->dma_cap.addr64 > 32 como \"des\" es desplazado por proto_hdr_len. Esto causa problemas como: dwc-eth-dwmac 2490000.ethernet eth0: el mapa DMA de transmisi\u00f3n fall\u00f3 y con DMA_API_DEBUG habilitado: DMA-API: dwc-eth-dwmac 2490000.ethernet: el controlador del dispositivo intenta +liberar memoria DMA que no ha asignado [direcci\u00f3n del dispositivo=0x000000ffffcf65c0] [tama\u00f1o=66 bytes] Solucione esto manteniendo \"des\" como la cookie DMA original y use tso_des para pasar la cookie DMA de desplazamiento a stmmac_tso_allocator(). Los detalles completos de los fallos se pueden encontrar en: https://lore.kernel.org/all/d8112193-0386-4e14-b516-37c2d838171a@nvidia.com/ https://lore.kernel.org/all/klkzp5yn5kq5efgtrow6wbvnc46bcqfxs65nz3qy77ujr5turc@bwwhelz2l4dw/" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.171", + "versionEndExcluding": "5.16", + "matchCriteriaId": "8FA383FE-32A6-400A-B7BA-ECFA9FEEF84B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.116", + "versionEndExcluding": "6.2", + "matchCriteriaId": "51279A02-DDC8-4302-8F88-6925DDDF4C99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.60", + "versionEndExcluding": "6.6.68", + "matchCriteriaId": "C18D359D-A98F-430F-85A0-CE282256CE09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11.7", + "versionEndExcluding": "6.12.7", + "matchCriteriaId": "958DC81D-98A5-4983-AF0B-9002CA50EA07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4c49f38e20a57f8abaebdf95b369295b153d1f8e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9d5dd7ccea1b46a9a7c6b3c2b9e5ed8864e185e2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/db3667c9bbfbbf5de98e6c9542f7e03fb5243286", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56720.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56720.json index 50e512202cd..5268e35ae36 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56720.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56720.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56720", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:06.037", - "lastModified": "2024-12-29T12:15:06.037", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:06:46.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,163 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf, sockmap: Varias correcciones para bpf_msg_pop_data Varias correcciones para bpf_msg_pop_data, 1. En sk_msg_shift_left, deber\u00edamos put_page 2. si (len == 0), es mejor regresar antes 3. Deber\u00eda ser compatible con la extracci\u00f3n de todo el sk_msg (last == msg->sg.size) 4. Correcci\u00f3n para el valor de la variable \"a\" 5. En sk_msg_shift_left, despu\u00e9s de cambiar, i ya ha apuntado al siguiente elemento. La adici\u00f3n de sk_msg_iter_var_next puede provocar un ERROR." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-193" + }, + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndExcluding": "5.4.287", + "matchCriteriaId": "03386EEC-BB89-4FD6-A10A-3326F073C415" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.231", + "matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/275a9f3ef8fabb0cb282a62b9e164dedba7284c5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5d609ba262475db450ba69b8e8a557bd768ac07a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/785180bed9879680d8e5c5e1b54c8ae8d948f4c8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/98c7ea7d11f2588e8197db042e0291e4ac8f8346", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d26d977633d1d0b8bf9407278189bd0a8d973323", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d3f5763b3062514a234114e97bbde74d8d702449", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e1f54c61c4c9a5244eb8159dce60d248f7d97b32", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f58d3aa457e77a3d9b3df2ab081dcf9950f6029f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56721.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56721.json index 2482385e345..0dcdfe6df43 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56721.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56721.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56721", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:06.173", - "lastModified": "2024-12-29T12:15:06.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:33:31.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/CPU/AMD: Terminar la matriz erratum_1386_microcode La matriz erratum_1386_microcode requiere una entrada vac\u00eda al final. De lo contrario, x86_match_cpu_with_stepping() continuar\u00e1 iterando la matriz despu\u00e9s de que finalice. Agregue una entrada vac\u00eda a erratum_1386_microcode al final." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "158A6B22-9260-41D7-965A-A81798A5A969" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/82d6b82cf89d950982ac240ba068c3a7e1f23b0a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ccfee14f08b8699132b87bc6d78e0fa75bf094dd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ff6cdc407f4179748f4673c39b0921503199a0ad", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56722.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56722.json index 410d3572c6c..c502bac928b 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56722.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56722.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56722", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:06.283", - "lastModified": "2024-12-29T12:15:06.283", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:27:20.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/hns: Se solucion\u00f3 el bloqueo de la CPU causado por las impresiones durante el reinicio. Durante el reinicio, el comando para destruir recursos como qp, cq y mr puede fallar y se imprimir\u00e1n registros de errores. Cuando se destruye una gran cantidad de recursos, habr\u00e1 muchas impresiones y esto puede provocar que la CPU se bloquee. Elimine algunas impresiones innecesarias y reemplace otras funciones de impresi\u00f3n en estas rutas con la versi\u00f3n de velocidad limitada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "170CE181-04FD-471C-B2DC-3AAB0E1175D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/31c6fe9b79ed42440094f2367897aea0c0ce96ec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/323275ac2ff15b2b7b3eac391ae5d8c5a3c3a999", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a0e4c78770faa0d56d47391476fe1d827e72eded", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b4ba31e5aaffbda9b22d9a35c40b16dc39e475a6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e2e64f9c42c717beb459ab209ec1c4baa73d3760", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56723.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56723.json index d7d3d94ea3b..5f036fe6865 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56723.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56723.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56723", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:06.390", - "lastModified": "2024-12-29T12:15:06.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:25:59.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,159 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mfd: intel_soc_pmic_bxtwc: Utilizar dominio IRQ para dispositivos PMIC Si bien en cuanto al dise\u00f1o la idea de convertir el controlador para utilizar la jerarqu\u00eda de los chips IRQ es correcta, la implementaci\u00f3n tiene fallas (heredadas). Esto se revel\u00f3 cuando platform_get_irq() hab\u00eda iniciado WARN() en IRQ 0 que se supone que es un n\u00famero IRQ de Linux (tambi\u00e9n conocido como vIRQ). Reelabore el controlador para respetar el dominio IRQ al crear cada dispositivo MFD por separado, ya que el dominio no es el mismo para todos ellos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.13", + "versionEndExcluding": "5.4.287", + "matchCriteriaId": "B3FC0E85-A276-4943-A145-65EB84DFBC0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.231", + "matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0350d783ab888cb1cb48ced36cc28b372723f1a4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/61d590d7076b50b6ebdea1f3b83bb041c01fc482", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6ea17c03edc7ed0aabb1431eb26e2f94849af68a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7ba45b8bc62e64da524d45532107ae93eb33c93c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/897713c9d24f6ec394585abfcf259a6e5cad22c8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b3d45c19bcffb9a9a821df759f60be39d88c19f4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bb6642d4b3136359b5b620049f76515876e6127e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d4cc78bd6a25accb7ae2ac9fc445d1e1deda4a62", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56724.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56724.json index ac8d0404ec2..8cdd12f2036 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56724.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56724.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56724", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:06.490", - "lastModified": "2024-12-29T12:15:06.490", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:25:25.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,159 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device Si bien en t\u00e9rminos de dise\u00f1o la idea de convertir el controlador para usar la jerarqu\u00eda de los chips IRQ es correcta, la implementaci\u00f3n tiene fallas (heredadas). Esto se revel\u00f3 cuando platform_get_irq() hab\u00eda iniciado WARN() en IRQ 0, que se supone que es un n\u00famero IRQ de Linux (tambi\u00e9n conocido como vIRQ). Reelabore el controlador para respetar el dominio IRQ al crear cada dispositivo MFD por separado, ya que el dominio no es el mismo para todos ellos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "5.4.287", + "matchCriteriaId": "C90873CE-F6F9-43EE-AD2F-ECA089BAC640" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.231", + "matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1b734ad0e33648c3988c6a37c2ac16c2d63eda06", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2310f5336f32eac9ada2d59b965d578efe25c4bf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/56acf415772ee7e10e448b371f52b249aa2d0f7b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5bc6d0da4a32fe34a9960de577e0b7de3454de0c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9b79d59e6b2b515eb9a22bc469ef7b8f0904fc73", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b7c7c400de85d915e0da7c2c363553a801c47349", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c472b55cc0bc3df805db6a14f50a084884cf18ee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/da498e02c92e6d82df8001438dd583b90c570815", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56725.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56725.json index 107b805f6e0..a14bbdded5e 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56725.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56725.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56725", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:06.607", - "lastModified": "2024-12-29T12:15:06.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:24:34.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: octeontx2-pf: gestionar errores otx2_mbox_get_rsp en otx2_dcbnl.c. Agregar verificaci\u00f3n de puntero de error despu\u00e9s de llamar a otx2_mbox_get_rsp()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "4EB97A09-F7D3-4B32-8BA0-E85161566B20" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/54e8b501b3ea9371e4a9aa639c75b681fa5680f0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/69297b0d3369488af259e3a7cf53d69157938ea1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6ee6cf42dc5230425cfce1ffefa5a8d8a99e6fce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b94052830e3cd3be7141789a5ce6e62cf9f620a4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b99db02209ca4c2e2f53b82049ea3cbc82b54895", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56772.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56772.json index 3b0c38d3a6c..a736286ff51 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56772.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56772.json @@ -2,24 +2,88 @@ "id": "CVE-2024-56772", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-08T18:15:17.897", - "lastModified": "2025-01-08T18:15:17.897", - "vulnStatus": "Received", + "lastModified": "2025-01-09T20:57:26.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nkunit: string-stream: Fix a UAF bug in kunit_init_suite()\n\nIn kunit_debugfs_create_suite(), if alloc_string_stream() fails in the\nkunit_suite_for_each_test_case() loop, the \"suite->log = stream\"\nhas assigned before, and the error path only free the suite->log's stream\nmemory but not set it to NULL, so the later string_stream_clear() of\nsuite->log in kunit_init_suite() will cause below UAF bug.\n\nSet stream pointer to NULL after free to fix it.\n\n\tUnable to handle kernel paging request at virtual address 006440150000030d\n\tMem abort info:\n\t ESR = 0x0000000096000004\n\t EC = 0x25: DABT (current EL), IL = 32 bits\n\t SET = 0, FnV = 0\n\t EA = 0, S1PTW = 0\n\t FSC = 0x04: level 0 translation fault\n\tData abort info:\n\t ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n\t CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n\t GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\t[006440150000030d] address between user and kernel address ranges\n\tInternal error: Oops: 0000000096000004 [#1] PREEMPT SMP\n\tDumping ftrace buffer:\n\t (ftrace buffer empty)\n\tModules linked in: iio_test_gts industrialio_gts_helper cfg80211 rfkill ipv6 [last unloaded: iio_test_gts]\n\tCPU: 5 UID: 0 PID: 6253 Comm: modprobe Tainted: G B W N 6.12.0-rc4+ #458\n\tTainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST\n\tHardware name: linux,dummy-virt (DT)\n\tpstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n\tpc : string_stream_clear+0x54/0x1ac\n\tlr : string_stream_clear+0x1a8/0x1ac\n\tsp : ffffffc080b47410\n\tx29: ffffffc080b47410 x28: 006440550000030d x27: ffffff80c96b5e98\n\tx26: ffffff80c96b5e80 x25: ffffffe461b3f6c0 x24: 0000000000000003\n\tx23: ffffff80c96b5e88 x22: 1ffffff019cdf4fc x21: dfffffc000000000\n\tx20: ffffff80ce6fa7e0 x19: 032202a80000186d x18: 0000000000001840\n\tx17: 0000000000000000 x16: 0000000000000000 x15: ffffffe45c355cb4\n\tx14: ffffffe45c35589c x13: ffffffe45c03da78 x12: ffffffb810168e75\n\tx11: 1ffffff810168e74 x10: ffffffb810168e74 x9 : dfffffc000000000\n\tx8 : 0000000000000004 x7 : 0000000000000003 x6 : 0000000000000001\n\tx5 : ffffffc080b473a0 x4 : 0000000000000000 x3 : 0000000000000000\n\tx2 : 0000000000000001 x1 : ffffffe462fbf620 x0 : dfffffc000000000\n\tCall trace:\n\t string_stream_clear+0x54/0x1ac\n\t __kunit_test_suites_init+0x108/0x1d8\n\t kunit_exec_run_tests+0xb8/0x100\n\t kunit_module_notify+0x400/0x55c\n\t notifier_call_chain+0xfc/0x3b4\n\t blocking_notifier_call_chain+0x68/0x9c\n\t do_init_module+0x24c/0x5c8\n\t load_module+0x4acc/0x4e90\n\t init_module_from_file+0xd4/0x128\n\t idempotent_init_module+0x2d4/0x57c\n\t __arm64_sys_finit_module+0xac/0x100\n\t invoke_syscall+0x6c/0x258\n\t el0_svc_common.constprop.0+0x160/0x22c\n\t do_el0_svc+0x44/0x5c\n\t el0_svc+0x48/0xb8\n\t el0t_64_sync_handler+0x13c/0x158\n\t el0t_64_sync+0x190/0x194\n\tCode: f9400753 d2dff800 f2fbffe0 d343fe7c (38e06b80)\n\t---[ end trace 0000000000000000 ]---\n\tKernel panic - not syncing: Oops: Fatal exception" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: kunit: string-stream: Corrige un error de UAF en kunit_init_suite() En kunit_debugfs_create_suite(), si alloc_string_stream() falla en el bucle kunit_suite_for_each_test_case(), \"suite->log = stream\" se ha asignado antes, y la ruta de error solo libera la memoria de flujo de suite->log pero no la establece en NULL, por lo que el posterior string_stream_clear() de suite->log en kunit_init_suite() provocar\u00e1 el siguiente error de UAF. Establezca el puntero de flujo en NULL despu\u00e9s de liberarlo para solucionarlo. No se puede gestionar la solicitud de paginaci\u00f3n del n\u00facleo en la direcci\u00f3n virtual 006440150000030d Informaci\u00f3n de aborto de memoria: ESR = 0x0000000096000004 EC = 0x25: DABT (EL actual), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: error de traducci\u00f3n de nivel 0 Informaci\u00f3n de aborto de datos: ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [006440150000030d] direcci\u00f3n entre los rangos de direcciones del usuario y del n\u00facleo Error interno: Oops: 0000000096000004 [#1] PREEMPT SMP Volcado de b\u00fafer ftrace: (b\u00fafer ftrace vac\u00edo) M\u00f3dulos vinculados en: iio_test_gts industrialio_gts_helper cfg80211 rfkill ipv6 [\u00faltima descarga: iio_test_gts] CPU: 5 UID: 0 PID: 6253 Comm: modprobe Contaminado: GBWN 6.12.0-rc4+ #458 Contaminado: [B]=BAD_PAGE, [W]=WARN, [N]=TEST Nombre del hardware: linux,dummy-virt (DT) pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : string_stream_clear+0x54/0x1ac lr : cadena_flujo_limpio+0x1a8/0x1ac sp : ffffffc080b47410 x29: ffffffc080b47410 x28: 006440550000030d x27: ffffff80c96b5e98 x26: ffffff80c96b5e80 x25: ffffffe461b3f6c0 x24: 0000000000000003 x23: ffffff80c96b5e88 x22: 1ffffff019cdf4fc x21: dfffffc000000000 x20: ffffff80ce6fa7e0 x19: 032202a80000186d x18: 00000000000001840 x17: 0000000000000000 x16: 00000000000000000 x15: ffffffe45c355cb4 x14: ffffffe45c35589c x13: ffffffe45c03da78 x12: ffffffb810168e75 x11: 1ffffff810168e74 x10: ffffffb810168e74 x9: dfffffc000000000 x8: 000000000000004 x7: 0000000000000003 x6: 0000000000000001 x5: ffffffc080b473a0 x4 : 0000000000000000 x3 : 0000000000000000 x2 : 00000000000000001 x1 : ffffffe462fbf620 x0 : dfffffc000000000 Rastreo de llamadas: string_stream_clear+0x54/0x1ac __kunit_test_suites_init+0x108/0x1d8 kunit_exec_run_tests+0xb8/0x100 kunit_module_notify+0x400/0x55c cadena_de_llamadas_de_notificador+0xfc/0x3b4 cadena_de_llamadas_de_notificador_de_bloqueo+0x68/0x9c do_init_module+0x24c/0x5c8 m\u00f3dulo_carga+0x4acc/0x4e90 m\u00f3dulo_init_desde_archivo+0xd4/0x128 m\u00f3dulo_init_idempotente+0x2d4/0x57c m\u00f3dulo_finit_sys_arm64+0xac/0x100 llamada_al_sistema_invocada+0x6c/0x258 el0_svc_common.constprop.0+0x160/0x22c do_el0_svc+0x44/0x5c el0_svc+0x48/0xb8 controlador_sincronizaci\u00f3n_el0t_64+0x13c/0x158 el0t_64_sync+0x190/0x194 C\u00f3digo: f9400753 d2dff800 f2fbffe0 d343fe7c (38e06b80) ---[ fin del seguimiento 0000000000000000 ]--- P\u00e1nico del kernel: no se sincroniza: Vaya: Excepci\u00f3n fatal" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.4", + "matchCriteriaId": "04756810-D093-4B43-B1D9-CF5035968061" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/3213b92754b94dec6836e8b4d6ec7d224a805b61", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/39e21403c978862846fa68b7f6d06f9cca235194", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56773.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56773.json index 9ed3146dbca..68035673d4c 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56773.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56773.json @@ -2,24 +2,88 @@ "id": "CVE-2024-56773", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-08T18:15:18.087", - "lastModified": "2025-01-08T18:15:18.087", - "vulnStatus": "Received", + "lastModified": "2025-01-09T20:59:54.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nkunit: Fix potential null dereference in kunit_device_driver_test()\n\nkunit_kzalloc() may return a NULL pointer, dereferencing it without\nNULL check may lead to NULL dereference.\nAdd a NULL check for test_state." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: kunit: Se ha corregido una posible desreferencia nula en kunit_device_driver_test(). kunit_kzalloc() puede devolver un puntero NULL. Si se desreferencia sin una comprobaci\u00f3n NULL, se puede generar una desreferencia NULL. Se ha a\u00f1adido una comprobaci\u00f3n NULL para test_state." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.12.4", + "matchCriteriaId": "21856C26-95A5-464A-B4C0-CFBF485C6080" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/435c20eed572a95709b1536ff78832836b2f91b1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5d28fac59369b5d3c48cdf09e50275a61ff91202", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8899.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8899.json index f22089f7ec1..056f4dc135e 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8899.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8899.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8899", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-26T11:22:09.257", - "lastModified": "2024-11-26T11:22:09.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-09T20:28:09.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,23 +42,57 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jegtheme:jeg_elementor_kit:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.10", + "matchCriteriaId": "12FCEC0D-1905-44CB-8B66-A6EBCAD42E15" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3193980/jeg-elementor-kit", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4efc9c47-321a-4635-943f-785ffc34d851?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21598.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21598.json new file mode 100644 index 00000000000..ade655edb57 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21598.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-21598", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-01-09T19:15:20.123", + "lastModified": "2025-01-09T19:15:20.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An\u00a0Out-of-bounds Read vulnerability in Juniper Networks Junos OS and Junos OS Evolved's routing protocol daemon (rpd) allows an unauthenticated, network-based attacker to send\u00a0malformed BGP packets to a device configured with packet receive trace options enabled to crash rpd.\nThis issue affects:\n\nJunos OS:\u00a0\n\n\n\n * from 21.2R3-S8 before 21.2R3-S9,\u00a0\n * from 21.4R3-S7 before 21.4R3-S9,\u00a0\n * from 22.2R3-S4 before 22.2R3-S5,\u00a0\n * from 22.3R3-S2 before 22.3R3-S4,\u00a0\n * from 22.4R3 before 22.4R3-S5,\u00a0\n * from 23.2R2 before 23.2R2-S2,\u00a0\n * from 23.4R1 before 23.4R2-S1,\u00a0\n * from 24.2R1 before 24.2R1-S1, 24.2R2.\n\n\nJunos OS Evolved:\n * from 21.4R3-S7-EVO before 21.4R3-S9-EVO,\u00a0\n * from 22.2R3-S4-EVO before 22.2R3-S5-EVO,\u00a0\n * from 22.3R3-S2-EVO before 22.3R3-S4-EVO,\u00a0\n * from 22.4R3-EVO before 22.4R3-S5-EVO,\u00a0\n * from 23.2R2-EVO before 23.2R2-S2-EVO,\u00a0\n * from 23.4R1-EVO before 23.4R2-S1-EVO,\u00a0\n * from 24.2R1-EVO before 24.2R1-S2-EVO, 24.2R2-EVO.\n\n\nThis issue requires a BGP session to be established.\n\nThis issue can propagate and multiply through multiple ASes until reaching vulnerable devices.\n\nThis issue affects iBGP and eBGP.\n\nThis issue affects IPv4 and IPv6.\n\nAn indicator of compromise may be the presence of malformed update messages in a neighboring AS which is unaffected by this issue:\n\nFor example, by issuing the command on the neighboring device:\n\u00a0show log messages\n\nReviewing for similar messages from devices within proximity to each other may indicate this malformed packet is propagating:\n\u00a0 rpd[]: Received malformed update from (External AS )\nand\n\u00a0 rpd[]: Malformed Attribute" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:C/RE:M/U:Amber", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "YES", + "recovery": "AUTOMATIC", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA92867", + "source": "sirt@juniper.net" + }, + { + "url": "https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/traceoptions-edit-protocols-bgp.html", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22151.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22151.json new file mode 100644 index 00000000000..74108506856 --- /dev/null +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22151.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-22151", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-09T19:15:20.410", + "lastModified": "2025-01-09T19:15:20.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Strawberry GraphQL is a library for creating GraphQL APIs. Starting in 0.182.0 and prior to version 0.257.0, a type confusion vulnerability exists in Strawberry GraphQL's relay integration that affects multiple ORM integrations (Django, SQLAlchemy, Pydantic). The vulnerability occurs when multiple GraphQL types are mapped to the same underlying model while using the relay node interface. When querying for a specific type using the global node field (e.g., FruitType:some-id), the resolver may incorrectly return an instance of a different type mapped to the same model (e.g., SpecialFruitType). This can lead to information disclosure if the alternate type exposes sensitive fields and potential privilege escalation if the alternate type contains data intended for restricted access. This vulnerability is fixed in 0.257.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/strawberry-graphql/strawberry/commit/526eb82b70451c0e59d5a71ae9b7396f59974bd8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/strawberry-graphql/strawberry/security/advisories/GHSA-5xh2-23cc-5jc6", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 9332584703d..1125eba57d6 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-09T19:00:29.420592+00:00 +2025-01-09T21:00:27.098894+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-09T18:54:53.390000+00:00 +2025-01-09T20:59:54.917000+00:00 ``` ### Last Data Feed Release @@ -33,52 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -276517 +276580 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `63` -- [CVE-2025-21592](CVE-2025/CVE-2025-215xx/CVE-2025-21592.json) (`2025-01-09T17:15:18.203`) -- [CVE-2025-21593](CVE-2025/CVE-2025-215xx/CVE-2025-21593.json) (`2025-01-09T17:15:18.380`) -- [CVE-2025-21596](CVE-2025/CVE-2025-215xx/CVE-2025-21596.json) (`2025-01-09T17:15:18.593`) -- [CVE-2025-21599](CVE-2025/CVE-2025-215xx/CVE-2025-21599.json) (`2025-01-09T17:15:18.770`) -- [CVE-2025-21600](CVE-2025/CVE-2025-216xx/CVE-2025-21600.json) (`2025-01-09T17:15:18.960`) -- [CVE-2025-21602](CVE-2025/CVE-2025-216xx/CVE-2025-21602.json) (`2025-01-09T17:15:19.150`) -- [CVE-2025-21628](CVE-2025/CVE-2025-216xx/CVE-2025-21628.json) (`2025-01-09T18:15:30.070`) -- [CVE-2025-22149](CVE-2025/CVE-2025-221xx/CVE-2025-22149.json) (`2025-01-09T18:15:30.233`) +- [CVE-2024-13274](CVE-2024/CVE-2024-132xx/CVE-2024-13274.json) (`2025-01-09T20:15:36.250`) +- [CVE-2024-13275](CVE-2024/CVE-2024-132xx/CVE-2024-13275.json) (`2025-01-09T20:15:36.367`) +- [CVE-2024-13276](CVE-2024/CVE-2024-132xx/CVE-2024-13276.json) (`2025-01-09T20:15:36.487`) +- [CVE-2024-13277](CVE-2024/CVE-2024-132xx/CVE-2024-13277.json) (`2025-01-09T20:15:36.593`) +- [CVE-2024-13278](CVE-2024/CVE-2024-132xx/CVE-2024-13278.json) (`2025-01-09T20:15:36.697`) +- [CVE-2024-13279](CVE-2024/CVE-2024-132xx/CVE-2024-13279.json) (`2025-01-09T20:15:36.803`) +- [CVE-2024-13280](CVE-2024/CVE-2024-132xx/CVE-2024-13280.json) (`2025-01-09T20:15:36.913`) +- [CVE-2024-13281](CVE-2024/CVE-2024-132xx/CVE-2024-13281.json) (`2025-01-09T20:15:37.017`) +- [CVE-2024-13282](CVE-2024/CVE-2024-132xx/CVE-2024-13282.json) (`2025-01-09T20:15:37.133`) +- [CVE-2024-13283](CVE-2024/CVE-2024-132xx/CVE-2024-13283.json) (`2025-01-09T20:15:37.230`) +- [CVE-2024-13284](CVE-2024/CVE-2024-132xx/CVE-2024-13284.json) (`2025-01-09T20:15:37.343`) +- [CVE-2024-13285](CVE-2024/CVE-2024-132xx/CVE-2024-13285.json) (`2025-01-09T20:15:37.470`) +- [CVE-2024-13286](CVE-2024/CVE-2024-132xx/CVE-2024-13286.json) (`2025-01-09T20:15:37.563`) +- [CVE-2024-13287](CVE-2024/CVE-2024-132xx/CVE-2024-13287.json) (`2025-01-09T20:15:37.687`) +- [CVE-2024-42898](CVE-2024/CVE-2024-428xx/CVE-2024-42898.json) (`2025-01-09T20:15:38.093`) +- [CVE-2024-46505](CVE-2024/CVE-2024-465xx/CVE-2024-46505.json) (`2025-01-09T20:15:38.377`) +- [CVE-2024-54724](CVE-2024/CVE-2024-547xx/CVE-2024-54724.json) (`2025-01-09T20:15:38.863`) +- [CVE-2024-54761](CVE-2024/CVE-2024-547xx/CVE-2024-54761.json) (`2025-01-09T20:15:38.990`) +- [CVE-2024-54762](CVE-2024/CVE-2024-547xx/CVE-2024-54762.json) (`2025-01-09T20:15:39.140`) +- [CVE-2024-54887](CVE-2024/CVE-2024-548xx/CVE-2024-54887.json) (`2025-01-09T20:15:39.277`) +- [CVE-2024-55494](CVE-2024/CVE-2024-554xx/CVE-2024-55494.json) (`2025-01-09T20:15:39.400`) +- [CVE-2024-56113](CVE-2024/CVE-2024-561xx/CVE-2024-56113.json) (`2025-01-09T20:15:39.603`) +- [CVE-2024-56114](CVE-2024/CVE-2024-561xx/CVE-2024-56114.json) (`2025-01-09T20:15:39.730`) +- [CVE-2025-21598](CVE-2025/CVE-2025-215xx/CVE-2025-21598.json) (`2025-01-09T19:15:20.123`) +- [CVE-2025-22151](CVE-2025/CVE-2025-221xx/CVE-2025-22151.json) (`2025-01-09T19:15:20.410`) ### CVEs modified in the last Commit -Recently modified CVEs: `88` +Recently modified CVEs: `67` -- [CVE-2024-32035](CVE-2024/CVE-2024-320xx/CVE-2024-32035.json) (`2025-01-09T18:35:14.097`) -- [CVE-2024-32036](CVE-2024/CVE-2024-320xx/CVE-2024-32036.json) (`2025-01-09T18:14:46.097`) -- [CVE-2024-32038](CVE-2024/CVE-2024-320xx/CVE-2024-32038.json) (`2025-01-09T17:38:55.253`) -- [CVE-2024-35314](CVE-2024/CVE-2024-353xx/CVE-2024-35314.json) (`2025-01-09T18:15:27.657`) -- [CVE-2024-37392](CVE-2024/CVE-2024-373xx/CVE-2024-37392.json) (`2025-01-09T18:15:27.790`) -- [CVE-2024-3933](CVE-2024/CVE-2024-39xx/CVE-2024-3933.json) (`2025-01-09T18:00:53.140`) -- [CVE-2024-3935](CVE-2024/CVE-2024-39xx/CVE-2024-3935.json) (`2025-01-09T18:15:28.337`) -- [CVE-2024-39924](CVE-2024/CVE-2024-399xx/CVE-2024-39924.json) (`2025-01-09T18:15:27.987`) -- [CVE-2024-39925](CVE-2024/CVE-2024-399xx/CVE-2024-39925.json) (`2025-01-09T18:15:28.117`) -- [CVE-2024-39926](CVE-2024/CVE-2024-399xx/CVE-2024-39926.json) (`2025-01-09T18:15:28.220`) -- [CVE-2024-4452](CVE-2024/CVE-2024-44xx/CVE-2024-4452.json) (`2025-01-09T17:46:34.190`) -- [CVE-2024-45346](CVE-2024/CVE-2024-453xx/CVE-2024-45346.json) (`2025-01-09T18:15:28.703`) -- [CVE-2024-46972](CVE-2024/CVE-2024-469xx/CVE-2024-46972.json) (`2025-01-09T17:15:15.030`) -- [CVE-2024-47220](CVE-2024/CVE-2024-472xx/CVE-2024-47220.json) (`2025-01-09T18:15:28.837`) -- [CVE-2024-48063](CVE-2024/CVE-2024-480xx/CVE-2024-48063.json) (`2025-01-09T18:15:29.013`) -- [CVE-2024-48955](CVE-2024/CVE-2024-489xx/CVE-2024-48955.json) (`2025-01-09T18:15:29.147`) -- [CVE-2024-53564](CVE-2024/CVE-2024-535xx/CVE-2024-53564.json) (`2025-01-09T17:15:15.423`) -- [CVE-2024-55539](CVE-2024/CVE-2024-555xx/CVE-2024-55539.json) (`2025-01-09T17:15:16.057`) -- [CVE-2024-7474](CVE-2024/CVE-2024-74xx/CVE-2024-7474.json) (`2025-01-09T18:15:29.380`) -- [CVE-2024-7807](CVE-2024/CVE-2024-78xx/CVE-2024-7807.json) (`2025-01-09T18:15:29.543`) -- [CVE-2024-9202](CVE-2024/CVE-2024-92xx/CVE-2024-9202.json) (`2025-01-09T18:07:29.847`) -- [CVE-2024-9575](CVE-2024/CVE-2024-95xx/CVE-2024-9575.json) (`2025-01-09T18:15:29.763`) -- [CVE-2025-0328](CVE-2025/CVE-2025-03xx/CVE-2025-0328.json) (`2025-01-09T17:15:17.330`) -- [CVE-2025-0331](CVE-2025/CVE-2025-03xx/CVE-2025-0331.json) (`2025-01-09T17:15:17.933`) -- [CVE-2025-0333](CVE-2025/CVE-2025-03xx/CVE-2025-0333.json) (`2025-01-09T17:15:18.077`) +- [CVE-2023-36361](CVE-2023/CVE-2023-363xx/CVE-2023-36361.json) (`2025-01-09T20:15:33.733`) +- [CVE-2023-45911](CVE-2023/CVE-2023-459xx/CVE-2023-45911.json) (`2025-01-09T20:15:34.043`) +- [CVE-2023-45912](CVE-2023/CVE-2023-459xx/CVE-2023-45912.json) (`2025-01-09T20:15:34.257`) +- [CVE-2023-52485](CVE-2023/CVE-2023-524xx/CVE-2023-52485.json) (`2025-01-09T20:20:59.593`) +- [CVE-2023-52497](CVE-2023/CVE-2023-524xx/CVE-2023-52497.json) (`2025-01-09T20:20:02.167`) +- [CVE-2024-10308](CVE-2024/CVE-2024-103xx/CVE-2024-10308.json) (`2025-01-09T20:30:43.060`) +- [CVE-2024-11614](CVE-2024/CVE-2024-116xx/CVE-2024-11614.json) (`2025-01-09T19:15:17.283`) +- [CVE-2024-27185](CVE-2024/CVE-2024-271xx/CVE-2024-27185.json) (`2025-01-09T20:15:37.793`) +- [CVE-2024-31997](CVE-2024/CVE-2024-319xx/CVE-2024-31997.json) (`2025-01-09T19:02:51.310`) +- [CVE-2024-40530](CVE-2024/CVE-2024-405xx/CVE-2024-40530.json) (`2025-01-09T20:15:37.910`) +- [CVE-2024-44083](CVE-2024/CVE-2024-440xx/CVE-2024-44083.json) (`2025-01-09T20:15:38.220`) +- [CVE-2024-49035](CVE-2024/CVE-2024-490xx/CVE-2024-49035.json) (`2025-01-09T19:33:26.117`) +- [CVE-2024-49038](CVE-2024/CVE-2024-490xx/CVE-2024-49038.json) (`2025-01-09T19:30:34.403`) +- [CVE-2024-51162](CVE-2024/CVE-2024-511xx/CVE-2024-51162.json) (`2025-01-09T20:15:38.510`) +- [CVE-2024-51163](CVE-2024/CVE-2024-511xx/CVE-2024-51163.json) (`2025-01-09T20:15:38.690`) +- [CVE-2024-56719](CVE-2024/CVE-2024-567xx/CVE-2024-56719.json) (`2025-01-09T20:10:50.880`) +- [CVE-2024-56720](CVE-2024/CVE-2024-567xx/CVE-2024-56720.json) (`2025-01-09T20:06:46.267`) +- [CVE-2024-56721](CVE-2024/CVE-2024-567xx/CVE-2024-56721.json) (`2025-01-09T20:33:31.123`) +- [CVE-2024-56722](CVE-2024/CVE-2024-567xx/CVE-2024-56722.json) (`2025-01-09T20:27:20.513`) +- [CVE-2024-56723](CVE-2024/CVE-2024-567xx/CVE-2024-56723.json) (`2025-01-09T20:25:59.000`) +- [CVE-2024-56724](CVE-2024/CVE-2024-567xx/CVE-2024-56724.json) (`2025-01-09T20:25:25.567`) +- [CVE-2024-56725](CVE-2024/CVE-2024-567xx/CVE-2024-56725.json) (`2025-01-09T20:24:34.887`) +- [CVE-2024-56772](CVE-2024/CVE-2024-567xx/CVE-2024-56772.json) (`2025-01-09T20:57:26.077`) +- [CVE-2024-56773](CVE-2024/CVE-2024-567xx/CVE-2024-56773.json) (`2025-01-09T20:59:54.917`) +- [CVE-2024-8899](CVE-2024/CVE-2024-88xx/CVE-2024-8899.json) (`2025-01-09T20:28:09.003`) ## Download and Usage diff --git a/_state.csv b/_state.csv index ea61609fe26..c0fe40d1d78 100644 --- a/_state.csv +++ b/_state.csv @@ -83742,7 +83742,7 @@ CVE-2016-10404,0,0,30bed94f52a4b8938d571558b376139f303e5bcc76d6fad34961508f7c09a CVE-2016-10405,0,0,b9f581ab4af09500c39c5f7d2f0ad4a77976178917038009c0f77496dbaed7fe,2024-11-21T02:43:56.277000 CVE-2016-10406,0,0,38fa4a335a78f7fe96dcf84182a5c7da9ffd1e4e71caa8e65906a36f8199e4df,2024-11-21T02:43:56.420000 CVE-2016-10407,0,0,7191893c9b92a6b56b26832e982fc6b242320e03efcec407d5b2f2280517899f,2024-11-21T02:43:56.563000 -CVE-2016-10408,0,0,eb98f01edae31d9d4576d37ff4d33c1073a362e0778b8ae5348d3abe1d7933a8,2024-11-26T14:15:17.053000 +CVE-2016-10408,0,1,449d9a893748063194e5206ec6ee1cbf5ee8e0c13036e31d6e09ad4e64bd7a9e,2025-01-09T20:17:41.750000 CVE-2016-10409,0,0,91831522c2ed360a67690e11d0aabda5481296e1eccb95baadccddff28a820fa,2024-11-21T02:43:56.703000 CVE-2016-1041,0,0,ca1df666c10d5aaaf1ffd63af1bd86a4848ec37ea50cb7e134319785882303fc,2024-11-21T02:45:39.333000 CVE-2016-10410,0,0,e0ca952b6e9564739748bfdb982ba2a94e6777142dbfe17926d57c6f4f24a5f7,2024-11-21T02:43:56.837000 @@ -101420,7 +101420,7 @@ CVE-2017-18145,0,0,b98b1665f695bb03e701c40f95e4f30ccaa714c0c0a82021cb214d898e4a2 CVE-2017-18146,0,0,db8e84c9adafbabc819ab0dd2b18ad399b7daceb218efb645c3823a60199cefb,2024-11-21T03:19:27.300000 CVE-2017-18147,0,0,ee16364445c96ef1061635220048076e00515a38a57b6b8b7c303b7ed0867c6d,2024-11-21T03:19:27.450000 CVE-2017-1815,0,0,50063e8159f88527c3b48879d4ee9cadd5c4698e088f3b5893a58402c9338f15,2023-11-07T02:42:25.620000 -CVE-2017-18153,0,0,2bb584bc108eeeffee8eb71c19f8b1ea069ddb7c7702d8daa1957d2cc97e8fbb,2024-11-26T09:15:04.783000 +CVE-2017-18153,0,1,7064f0dbd0c5afc708b46a00fd4a97f38a6614fb40931d5676a296cacdd25eba,2025-01-09T20:50:28.223000 CVE-2017-18154,0,0,ac596abd6781c6d8e8ccf0c4347d9111bd4d892ccefcd0f193906d6eb63b3c57,2024-11-21T03:19:27.573000 CVE-2017-18155,0,0,1b2b3c9bcd6ceabf91061f4706f625ce159565831c6b9c65da1ae27edc138920,2024-11-21T03:19:27.690000 CVE-2017-18156,0,0,1a1a2162ab9f6ec58d0666dd507095169efe84d5e1f3955405cc4aa62a3e03d8,2024-11-21T03:19:27.807000 @@ -101577,8 +101577,8 @@ CVE-2017-18302,0,0,3024919da22272abc54c7ede976582584bd02c5286e1f1c86e8109f51c2a5 CVE-2017-18303,0,0,1d503edaf420971cbe94d22d1ef6c1608a2c049b11867b580d6ee004dc367ba5,2024-11-21T03:19:48.877000 CVE-2017-18304,0,0,33456aa884fcb1d8e45883070130e9a75a438d0fabfc3f2c9593529540384a49,2024-11-21T03:19:49.023000 CVE-2017-18305,0,0,00f3f8abed4397a41c6196095981268e7b3e9385a6b0df1847fd47d3634db83f,2024-11-21T03:19:49.173000 -CVE-2017-18306,0,0,17dcbc2ec74758f45060568f408618f954b2a68bf77844eb96b565a1198fed2c,2024-11-26T14:15:17.430000 -CVE-2017-18307,0,0,b47e7b61d8dde77b4b73a7e3281c56214097bb17275040d1cd9b7b8b511d8c2d,2024-11-26T14:15:17.573000 +CVE-2017-18306,0,1,416f24d9d6190148a6dcbf59e637503435ba3af30a5ee9e15f670424df62e0b8,2025-01-09T20:16:22.950000 +CVE-2017-18307,0,1,e733155a268ee7fe2f1e37fd5252b29a808f16095d0da837d7b8b1a25fcd59d9,2025-01-09T20:14:33.500000 CVE-2017-18308,0,0,e60a4e3be111d8c7ff6a7f5eae5df9c5e77ad0309b52e943b4eaac9f5b592291,2024-11-21T03:19:49.303000 CVE-2017-18309,0,0,229ef6c06bea84bdce30274f1423c70e0c76e7b16d6a062552b01d8481be79ff,2024-11-21T03:19:49.440000 CVE-2017-1831,0,0,b23d481a92715747e56d3a2b4521c53c46925504d529872ce48f780473a083d6,2023-11-07T02:42:29.293000 @@ -112949,7 +112949,7 @@ CVE-2018-11918,0,0,e9a4368e09668d33962f27131e87a99f864508fffeb55a78ff66a873f9dd2 CVE-2018-11919,0,0,e0ef822c2a0bcdfaa714e9187648518edf04ec8f70e7052c8e31d79ed22e1c2a,2024-11-21T03:44:15.250000 CVE-2018-1192,0,0,84f088686c6b81e95b567f8e0f210594829a75a4039e1dff311bc36011b688b2,2024-11-21T03:59:22.137000 CVE-2018-11921,0,0,420df942cd727e7bc2d3189923c70bbdd27577b0a8374ae9203931357c56c864,2024-11-21T03:44:15.357000 -CVE-2018-11922,0,0,eb0670500fb572f3f87e1aa2fa1949186315da5157142147db535145c4629932,2024-11-26T09:15:04.927000 +CVE-2018-11922,0,1,bf312f3e3738e26d6b2699e583b49269ec88291bd4d54e4af0f02eb8d84fc1eb,2025-01-09T20:43:44.987000 CVE-2018-11923,0,0,e804377afe5d552aaa53bdd098b696f56f4c09c13115de8a9bee8667d8e4c427,2024-11-21T03:44:15.500000 CVE-2018-11924,0,0,5e927cb8c77e6cdbe6b7cc531a6563730655585ebc3350c7a92c087e44e741d7,2024-11-21T03:44:15.640000 CVE-2018-11925,0,0,cb2676f6f4ca5537d0884ee8fb49b3395fca4c1c7530c93bae83fbf17266c8ad,2024-11-21T03:44:15.783000 @@ -112982,7 +112982,7 @@ CVE-2018-11949,0,0,da86a076bae9e608d99a3ee871ff8b05a8cb3212e7add81ea636acd6add4f CVE-2018-1195,0,0,48dcf04c9950dd742f52b9229ae0e4a12f3d451a8eef35bc0a987c4a729f4071,2024-11-21T03:59:22.380000 CVE-2018-11950,0,0,37d111c9899d2e712c6733885873084c5d7456baab51c2d3be6aae07584774cd,2024-11-21T03:44:18.943000 CVE-2018-11951,0,0,1d3c1b52cbc7b296b6f1fdcd41c837e1b1c836e97315104b35a84d17e6af32b1,2024-11-21T03:44:19.063000 -CVE-2018-11952,0,0,7763b9ad3553d6dfc46771ab0838ac30a6d5c6477cec825dc82cea3bf3578aae,2024-11-26T09:15:05.073000 +CVE-2018-11952,0,1,acf39b7a7216378ff5afe7aa6afc160211d5148b4123a7e4ac191bdb86b62588,2025-01-09T20:39:50.313000 CVE-2018-11953,0,0,c88b910bdaf3210b90b0d6c1fd8de51b15eb0fe8251d63bec0809f30ffdf83ea,2024-11-21T03:44:19.180000 CVE-2018-11954,0,0,d6b8a9241ea3bf8ed4a1977ddef6caf806ceee4b7abd93c014ccec4a47b96791,2023-11-07T02:51:55.057000 CVE-2018-11955,0,0,2dc2c8dd410f237354189b84cfe2a75071d10d4cede1825775eb8f4cd15ca07e,2024-11-21T03:44:19.343000 @@ -124243,7 +124243,7 @@ CVE-2018-5848,0,0,fce4931866a75341f9b8826c622f9f3dfb5fea39e61012087bfcaa96d5abaa CVE-2018-5849,0,0,0296d9bc31bcbba6e8344c4dea54d227bbb6b779bf4db82a515aa65c06414d42,2024-11-21T04:09:32.550000 CVE-2018-5850,0,0,1210f4993ef2634265f3982f970eff5896be825ea2bea665c31434bd495bc30b,2024-11-21T04:09:32.670000 CVE-2018-5851,0,0,77e9c192874c927bdb0a564d22c3a97de9e01e787271b48b3279fb60fe23abf8,2024-11-21T04:09:32.787000 -CVE-2018-5852,0,0,de1b6e8701beaf952542a6975921a1b6b53bc56f75a5585b7e3202069986218f,2024-11-26T14:15:17.970000 +CVE-2018-5852,0,1,4b72bbd112d3816a767454c83dbe0ebadabf795212cc1d168be613d9f261b71b,2025-01-09T19:53:39.003000 CVE-2018-5853,0,0,f69ea0e41b6887891d9d19402409a4aa18a6de12423592f3cb98d2e88f242125,2024-11-21T04:09:32.917000 CVE-2018-5854,0,0,b73e12e68fa0b472fcb821cd75e8053373ac59b818bace90177b6c22ec98ee12,2024-11-21T04:09:33.047000 CVE-2018-5855,0,0,d8fbc50099224202996f1e6b0ad73d6227ce7e453b7d2a8c10a0f5b39c148a06,2024-11-21T04:09:33.167000 @@ -129222,7 +129222,7 @@ CVE-2019-10886,0,0,ddaae779ca882312c5add87ed4862fa7f66bd0fd28489f44793f8d58a7ddb CVE-2019-10887,0,0,01e06e359a228959a59e2c1ac4b13fd0e0fe165a8b08414fc2c26fe4b388e9c1,2024-11-21T04:20:03.337000 CVE-2019-10888,0,0,feee76c67ffdd6ca7f445b77c82bdb35a0e95ffe370d8c4b36c16b5fcacf047b,2024-11-21T04:20:03.500000 CVE-2019-1089,0,0,fe72a4d92999ae0b1e480880bfaa7703302ef038a793508cad76935177755551,2024-11-21T04:35:59.643000 -CVE-2019-10891,0,1,2213dd1ad777f5b3a5ae11d80212cfdaef650479a1cb1f72e3849e003da898af,2025-01-09T18:15:23.760000 +CVE-2019-10891,0,0,2213dd1ad777f5b3a5ae11d80212cfdaef650479a1cb1f72e3849e003da898af,2025-01-09T18:15:23.760000 CVE-2019-10892,0,0,52cb4ec98e5e23db3941a83183cbc75d45e57c7e11fe5b32a20618dce5743311,2024-11-21T04:20:03.790000 CVE-2019-10893,0,0,5f21bdad6dca3236d197222535a6a5359214793124b2165da61fd6011f0db465,2024-11-21T04:20:04 CVE-2019-10894,0,0,48f3061b32b51d7b68c6ed90aec044e2f5b73828788bffa80ab992a8f1ade96c,2024-11-21T04:20:04.160000 @@ -187207,7 +187207,7 @@ CVE-2021-47012,0,0,fba655f6ffef7b71f41f61a977b48443c129f69088c655d479bc638b63d7f CVE-2021-47013,0,0,555035b190f7c450c0069a1d3068ca4aa9da1bda58826deedee5b5b2d27047fa,2024-12-09T17:59:07.173000 CVE-2021-47014,0,0,c3cadc4efa25f8d4ffb825925023e2dedd42437c760103c927cbf06c0e06e30d,2025-01-08T18:08:16.180000 CVE-2021-47015,0,0,0c6c7026744adbfdde0d54d1a712aa8001007dc4d4d956fa887c1c8950b69435,2025-01-08T18:12:23.737000 -CVE-2021-47016,0,0,ef63df8aacfe0aac043235af5f65625db0ccac9f31d3b00ead028b31e2134d28,2024-11-21T06:35:11.787000 +CVE-2021-47016,0,1,1df8f7d26284a4e8e08dccbfa505f92644ac073c96514b31750f655c05b803fa,2025-01-09T19:52:27.117000 CVE-2021-47017,0,0,94509a9e3fc8c3a8d66eaa81dcba64f1b5bfe5be436ea76331be590779455880,2024-12-09T17:59:26.630000 CVE-2021-47018,0,0,9846ebab7979fe712118dcc07a592ff738b61694ac9c16172481ecd4b7f9bccc,2025-01-08T16:53:56.173000 CVE-2021-47019,0,0,acfd5259b4996bcf1ff283c76a685d05e09a6cfbca17e944110d48ff612282c6,2025-01-08T17:01:03.423000 @@ -187228,7 +187228,7 @@ CVE-2021-47033,0,0,0c47657436e397a05f9881d648a026b558b2d013a92d5e54cb5a3af71fee4 CVE-2021-47034,0,0,24c3e8f7c4176b8f22212c00c61bbb11a7d89013e052d0b7d3fa32ebbfb9913f,2024-11-21T06:35:13.940000 CVE-2021-47035,0,0,dc54a11a69ec198dc44eaaf29e9f3953f7aa3a74a57d8fb339dec15690dca7f4,2025-01-09T15:15:16.310000 CVE-2021-47036,0,0,9939d9a1abe4903c9b004e1597837cbf7d4fcfd5ded4c3f1d0e9ce0bb05762a2,2024-11-21T06:35:14.233000 -CVE-2021-47037,0,0,27be04eae6debe1539d842e4e15be2869f9e85bf92ee888f3b701790d705f467,2024-11-21T06:35:14.347000 +CVE-2021-47037,0,1,e2a6224280b33eb3dd7afbe5e80331954cdd908902ccf3c78df2c23afa2e92d0,2025-01-09T19:47:04.127000 CVE-2021-47038,0,0,173970a6c5d44bb723efd6b764e694ea73860ece1a8d9e4523c1041c196f5023,2024-12-06T20:56:10.230000 CVE-2021-47039,0,0,2043692ba0d7056630e43be01a6f62167c27f203a3c1aa6722409f5a759c38a1,2025-01-09T15:31:27.123000 CVE-2021-47040,0,0,9b576377681428ef2e044f0239ba1c5def7ee06eb8f2eff2a663a8d34c9fe0ef,2025-01-09T15:29:49.397000 @@ -187247,7 +187247,7 @@ CVE-2021-47052,0,0,4b71437751e645e347a71b404b8bbc1d6fbfffd8664191ea6db3d12143e01 CVE-2021-47053,0,0,dc67adfebafac048d7b7d3afa8764867a036f33476cae5e9a7fc56793f5b22bb,2024-12-09T18:47:08.947000 CVE-2021-47054,0,0,8728a4aa24aff20c84953ddb1f2d1bf71aa3aa120f6a118d91b33727d9bd2d78,2024-12-10T17:53:39.547000 CVE-2021-47055,0,0,98e911b4c4016e41d93c37555d7abfffd14aa72b6896aaa1f389a8325fb8c67d,2025-01-09T15:34:43.780000 -CVE-2021-47056,0,0,b45b88e369390925ea8cc956d89a8046d78e16e4fea049a22946e0c390cb845b,2024-11-21T06:35:16.687000 +CVE-2021-47056,0,1,3898e09931dd4c82468e78a5a5900a62f3af74c6e42d523259186c3f5e9945ec,2025-01-09T19:45:48.107000 CVE-2021-47057,0,0,a5f7156f2242c8fde6f47e7a17ad9e17535902be6f79887e10dee986d9fb0d57,2024-11-21T06:35:16.827000 CVE-2021-47058,0,0,f68b4024523ee8f9f466f08f30806589b0a7135e0b16ab04a4fee7c86f058115,2024-12-10T17:54:27.030000 CVE-2021-47059,0,0,a664ea42011c0452352bed32e885f8cb9c8cd1afe839c9a6c06920f303467b00,2024-12-10T16:58:51.723000 @@ -187257,13 +187257,13 @@ CVE-2021-47062,0,0,f0b7e311d8422dbd8d0f94c9f5873b7807ac1a99ffea8e65bcb222c05c2cd CVE-2021-47063,0,0,62517a898085ac87c1d4c363ee690679f3fd071c9bad633f6e658828ec25f8ea,2024-12-10T16:43:29.307000 CVE-2021-47064,0,0,3bd6a786c4077808029953bb049a9c471ffa608676a06c39506fb09e61ec99f9,2024-11-21T06:35:17.820000 CVE-2021-47065,0,0,ccbad5bde72572b0cedb79689aa5e03efef443c56720d7aff976c615bc24e71f,2024-12-10T17:54:50.497000 -CVE-2021-47066,0,0,63cb7a656e47c5eb34316a10892fb8a1eafc05b262d1637b4e3dab9d49fc6701,2024-11-21T06:35:18.120000 +CVE-2021-47066,0,1,7787c10d7c1c1dd114bccb842965669a19eb3eccb239caeb8356e230879c15db,2025-01-09T19:44:50.610000 CVE-2021-47067,0,0,9df5b0005af4045c4050adb25d4d0a3c7ed0af17ec105b20f7776b61c08f0157,2024-12-10T19:50:32.683000 CVE-2021-47068,0,0,e902a18ffbe6654398a0348af04e476fbaf331e8e30fa78b6bfe4762a12c956f,2024-12-10T19:50:49.147000 -CVE-2021-47069,0,1,7cca6428a9430485997bd7f087335ca19eb60052d15a49c70984ca79074cbc42,2025-01-09T18:21:01.560000 +CVE-2021-47069,0,0,7cca6428a9430485997bd7f087335ca19eb60052d15a49c70984ca79074cbc42,2025-01-09T18:21:01.560000 CVE-2021-47070,0,0,affc793dd141d8f358bff7bbf0e6544f3d5ab387f0d1d9fdbb175a861def15c6,2024-11-21T06:35:18.633000 CVE-2021-47071,0,0,d800b8ddcd96789ad1c1f5273161686a71669bb9dbf533fd7eca685a04a147dd,2024-12-12T14:43:19.253000 -CVE-2021-47072,0,0,954df5847b9e8b8847398a4fb353515add1c8b9bc355ca2ca788b956a977c290,2024-11-21T06:35:20.567000 +CVE-2021-47072,0,1,b45fac6809bf7a6a5a6da0e9f16d159cb6a43ecc62c155dff7992a472b5bdb53,2025-01-09T19:42:34.897000 CVE-2021-47073,0,0,61fff509ff98c70b9c201e4106ec5100133e4908fe8990fbce9b00b4229f10ed,2025-01-09T15:24:54.467000 CVE-2021-47074,0,0,49866fe835e78e03621976826fedc250f3287bb5acca2d0153d10814806d0b1b,2024-12-12T14:43:36.903000 CVE-2021-47075,0,0,36eeb7f2e930817c1b1fe865ad9fae545910e7fd96de6d94f28c455e8e24109c,2024-11-21T06:35:20.930000 @@ -204245,7 +204245,7 @@ CVE-2022-37051,0,0,f9f5a60e888d559d1ab2bcafe356ee13479584911a3ed3048280916155f38 CVE-2022-37052,0,0,6a394760189288f7574f5b11c869f13acc8631383cdcb25608fb7dbdd19eaa35,2024-11-21T07:14:21.557000 CVE-2022-37053,0,0,dd19473a37f9d32e9ae7d0e20e0e36478a17051ccca407a238ae7c620e86e6e6,2024-11-21T07:14:21.710000 CVE-2022-37055,0,0,99fe1b90a1e738e90e5f6eac83ca05f6974b2b7663ae3f0f9c2eee4610867482,2025-01-06T15:15:09.830000 -CVE-2022-37056,0,1,135fe584c11f6b6a7ccb722620edfd8afcb2bdc67fe1193124d6faf3ffd02e65,2025-01-09T18:15:24.797000 +CVE-2022-37056,0,0,135fe584c11f6b6a7ccb722620edfd8afcb2bdc67fe1193124d6faf3ffd02e65,2025-01-09T18:15:24.797000 CVE-2022-37057,0,0,dd28037e644edafa9fd9e43757050b1d91726f01db98eaf62a98a6312337c549,2025-01-06T15:15:10.147000 CVE-2022-37059,0,0,2eefb354470e4941edf10d216ad1f91f19208928aef8952c5bb7ab53efbd8d1c,2024-11-21T07:14:22.337000 CVE-2022-3706,0,0,e12338ac6ae091430a77dc88b3adb48260db8ec44fe506086ed6dcd27e6a25c4,2024-11-21T07:20:04.717000 @@ -211372,7 +211372,7 @@ CVE-2022-46753,0,0,073de35915d8b1b4ec67415794f25133a55745e1a42b8bfaca43b6128f8f9 CVE-2022-46754,0,0,c5069492f25b19b04c0c48636d836b82d40d554ae4195bd23e390a943ab1d609,2024-11-21T07:31:00.540000 CVE-2022-46755,0,0,fb1ced70bb2992d86d1bb1cb87a5d79fbc812fa4ae11a38bc125c63a548e87aa,2024-11-21T07:31:00.660000 CVE-2022-46756,0,0,507a6cbc9395275d8a2bd477712445229e76f628e8aa646749fc9a1805b3eaa0,2024-11-21T07:31:00.770000 -CVE-2022-4676,0,0,22c8f5cc5229a37bf542faf51b634e7a268579a785aed1d0fbfcaa0e3569191c,2024-11-21T07:35:42.953000 +CVE-2022-4676,0,1,0122dd8105abe151c00e3532031db922c52b9d89e8aee0ef20df9dfcc2e08696,2025-01-09T20:15:28.163000 CVE-2022-46761,0,0,26bbc307ea537ec22bd61f07374fb956795c0c0a1434b282db94bef944971feb,2024-11-21T07:31:00.893000 CVE-2022-46762,0,0,8e67b0260efee0dabe88958b91ab5e558ac3aea7052ca092e4dfa0959e542140,2024-11-21T07:31:01.003000 CVE-2022-46763,0,0,e313242cf62af66c084169c0587fbf2ba6536e3732229a585d50b99557db8196,2024-11-21T07:31:01.117000 @@ -213041,7 +213041,7 @@ CVE-2022-49031,0,0,aa4c0a2c52253ed7dda6fcd2867ecede5eef551e7e278755cebdcb2c013d9 CVE-2022-49032,0,0,86da0aa47c23e92f2087fdf4dca666e785ec273028f1f5de3a039945ae0bd0d5,2024-10-24T16:04:49.880000 CVE-2022-49033,0,0,0e35c3f12a3c9f6c6c0b1536faaccdd26d066a0a34e10136f9bf0dff823dabfd,2024-10-30T21:50:50.007000 CVE-2022-49034,0,0,5bb9e5fcdc24e851a87806a24723f31a5bc0072a0caa97b278af4f8aec701a3c,2024-12-27T14:15:22.533000 -CVE-2022-49035,0,0,97726dc31712270da8ed96e05ccfa8dbe8f4b91bfcb330efcf6c738d05f8b899,2025-01-02T15:15:18.807000 +CVE-2022-49035,0,1,3b62bf4683a993842d7c94f27781e9e1e226c844e7fae8130a5cf6b160350c59,2025-01-09T20:22:11.780000 CVE-2022-49037,0,0,ba8a6a37b29910ba10716c43128f83a823f54e3f8329f435a27f476a76d2be8f,2024-10-08T16:08:55.390000 CVE-2022-49038,0,0,bd146ec9709824bb07837d9135ece055cceab92147c2fea66709fe52142c866d,2024-10-08T16:08:35.743000 CVE-2022-49039,0,0,2e6986860d0713e7ec4c3ad3a55491afee239c111c896c50f17ebb6b95907a37,2024-10-08T16:08:08.507000 @@ -214973,7 +214973,7 @@ CVE-2023-1941,0,0,dd2ee2d8a41982ad3f62b0340e08f23801b2d05e4a5c5a9e095f8862a85ef5 CVE-2023-1942,0,0,8a80f994d955a4aae8819b93e53f9a9b95fed01d83e4c2bb198ef2531a586af4,2024-11-21T07:40:11.683000 CVE-2023-1943,0,0,4a4b6ad156925ea8ff93976ed65f7b12228d9fcd2eb313a8817e804825978fc7,2024-11-21T07:40:11.810000 CVE-2023-1944,0,0,9f184b3e02f0c31aaeb83f9e2bb8508c7ce7afc7c7b54a5f17fd94e1d06d7915,2024-11-21T07:40:11.950000 -CVE-2023-1945,0,1,0f4a95c884d1aa40e59ce218f24d130726e7f218eadf6722d0f6e4c1f7c97cd9,2025-01-09T17:15:08.213000 +CVE-2023-1945,0,0,0f4a95c884d1aa40e59ce218f24d130726e7f218eadf6722d0f6e4c1f7c97cd9,2025-01-09T17:15:08.213000 CVE-2023-1946,0,0,c66bba2b5f0b70d7a5ecfa1e71c9b7784ff978e82c51b8f24ac3b122bca826d7,2024-11-21T07:40:12.180000 CVE-2023-1947,0,0,30ec6c8e60269bd6a69558afe4e6f131605b90751e13689d8c4fc446654c0fe5,2024-11-21T07:40:12.307000 CVE-2023-1948,0,0,9a7b34697bdfca358d90932363e8f0521d6449eff2e9c1b5de0cf11a6e8e065b,2024-11-21T07:40:12.430000 @@ -215270,7 +215270,7 @@ CVE-2023-20226,0,0,1474b979cdd6f6717fc912eee3213884c6124c6466b1b7d90a8b5bcc222dd CVE-2023-20227,0,0,5dadc18e7504c0c1989e98a45007cf2ea4b0bdb5c1b39f9c17ac5278ea86d6b2,2024-11-21T07:40:56.480000 CVE-2023-20228,0,0,bff676f4394aba9a75ec36de299ef3925097307a898dbbdab0ccd1fb30714b36,2024-11-21T07:40:56.623000 CVE-2023-20229,0,0,5720ebfa0ddf39c053aab01d47c2e6a4e439c0e76841155dea1bf372f924164e,2024-11-21T07:40:56.783000 -CVE-2023-2023,0,0,45796357a2011fa64718b7ff1daa4a2e1f39c2bcc14089e6fc7c21cd71aaa52d,2024-11-21T07:57:46.780000 +CVE-2023-2023,0,1,a25f83a78233ed308d8771d38e08b18141a73a4b68ee53366ee9c34e55ae903c,2025-01-09T19:15:16.547000 CVE-2023-20230,0,0,ccd2838b3fed7be14b4c61fa6223f90c300787326a6adb02936af0206bcaccb3,2024-11-21T07:40:56.890000 CVE-2023-20231,0,0,b031a7ac9b47c3a97add8e35b4365c1f212d679c63458d656da258f5d9ce7741,2024-11-21T07:40:57 CVE-2023-20232,0,0,f589b067bff36036bda706e83e7f9a76b04e16be8f1e2f2f03d2c0951ab7316b,2024-11-21T07:40:57.140000 @@ -218378,7 +218378,7 @@ CVE-2023-2391,0,0,842b5ed1e83f3843cc8ff569595999d59ab60a89d681911295b32b17482d8a CVE-2023-23910,0,0,63dd2cbd6ea1319bd3dfbe7034480d2df6c3610536e09ad75b890a6424f8445c,2024-11-21T07:47:04.990000 CVE-2023-23911,0,0,21f6240ed9aeb3ac846a763b503b5b3c1d795b32a63b3bf506eaaf00a1bef61d,2024-11-21T07:47:05.107000 CVE-2023-23912,0,0,161d529023d5efa110c9e01ceedff90a5c8e1f1dbacb3f558d319d2d5b757b61,2024-11-21T07:47:05.220000 -CVE-2023-23913,0,1,9897ef3eb127d3e36d381f562c75b48d2950336d7df095f8384743a3b01afff4,2025-01-09T18:15:24.993000 +CVE-2023-23913,0,0,9897ef3eb127d3e36d381f562c75b48d2950336d7df095f8384743a3b01afff4,2025-01-09T18:15:24.993000 CVE-2023-23914,0,0,121f340e4a39b81a4db03b348db17224f75a3193a520311b64556a5e4bc44031,2024-11-21T07:47:05.357000 CVE-2023-23915,0,0,dcd22de65c54681cbaaa36e8c3304723129cf00bf12179d0d4f5df436b3c2155,2024-11-21T07:47:05.507000 CVE-2023-23916,0,0,50b3eac92c83746250383e0d0c2541bdf9456b5720cc86fdbbe8c6ebf0f59647,2024-11-21T07:47:05.653000 @@ -218420,10 +218420,10 @@ CVE-2023-23949,0,0,43ce657ab20fae6773f1647c88e3cbda5b425dc587356406b840ba7ed7b7d CVE-2023-2395,0,0,b160a31c43df594b550bea6de87dbdef879aad3a6e2b569c4f2e8e17e32f75b9,2024-11-21T07:58:31.950000 CVE-2023-23950,0,0,c71373d06969156d236e3e02fd5d38ba7344724f7c21e5e012568de563616896,2024-11-21T07:47:09.833000 CVE-2023-23951,0,0,e2b9dcd2c7e6962dbe2539aea5ded0f6bc84b3ff7b2ce10c6dd8cfa0e3a71030,2024-11-21T07:47:09.940000 -CVE-2023-23952,0,0,270c6d9107b6a10a53c3f1c0c6bb8787ff9592f1ee2d53eed2dae7fba43e73f9,2024-11-21T07:47:10.047000 -CVE-2023-23953,0,0,a82dac8a412220b8db9a7ad65639ecf2e022ce43133610b723f1cb174d81b436,2024-11-21T07:47:10.157000 -CVE-2023-23954,0,0,95b5907d09d6c2dda9b463c6f2a4c420c9e01bb0c5685220ccecdd6ad7c459fc,2024-11-21T07:47:10.267000 -CVE-2023-23955,0,0,63197f017c8d071da8ae604933eaacb6a8175f412a4a90bf4d4457829d8189af,2024-11-21T07:47:10.373000 +CVE-2023-23952,0,1,e9eb85d742e5c584b9a9362f400b102b5c29325331457211c66b30da2a3e4eff,2025-01-09T20:15:29.153000 +CVE-2023-23953,0,1,4ed4a59a24cb63f8e8fce0fad93318d5197fa6219f36751d43f351683ea9ef59,2025-01-09T20:15:29.363000 +CVE-2023-23954,0,1,3dbc1569ac2d29f2950b4d7a8fba96149b15f93ca6d8353198d504c76f4fad89,2025-01-09T20:15:29.527000 +CVE-2023-23955,0,1,ff57648bc480443b077f8208a28828c6b903b9e9d67932c483483237eef3460e,2025-01-09T20:15:29.697000 CVE-2023-23956,0,0,c70f8d990c32eda6ecb0c57de35e23b1adb6182bfd853393145b1e410fea8c4a,2024-11-21T07:47:10.480000 CVE-2023-23957,0,0,abd016a4ddb424e0aa1e0d10a7e799fc84aacff4c8121e8506a6e9a6e719e057,2024-11-21T07:47:10.590000 CVE-2023-23958,0,0,97df62657ea97f02cdc3a71d61f5f750384e820d3dd71efe5de4e87690815b7a,2024-11-21T07:47:10.707000 @@ -219848,22 +219848,22 @@ CVE-2023-25733,0,0,10a90ae5ad556926804a31843a3012f99b62c69cd2f456be9096450447d05 CVE-2023-25734,0,0,5233edcade88c98d3d87cdff2f784c1367df5b38d54617d59a2edecd505479b6,2024-11-21T07:50:02.470000 CVE-2023-25735,0,0,7f54db20849cf0543cac27806e5b50d084dec588e16c5bba89d212267d0aea14,2024-11-21T07:50:02.613000 CVE-2023-25736,0,0,76f650a4fed8de36a04203b9343e8d99f692c9c436b2bff95df16f6bad103603,2024-12-11T17:15:11.430000 -CVE-2023-25737,0,0,a4ba1ad4a2d37de6cf866b05f3c8dd14acae53d075e4f2529273d8a822f1cd18,2024-11-21T07:50:02.873000 -CVE-2023-25738,0,0,f3d5eed0e5f951142c6a6691439f9be7a3f48664280dacb415bd1d5f992de8d6,2024-11-21T07:50:03.007000 -CVE-2023-25739,0,0,136df5b9574de59efa9de44dbcbd90b6f7e781b2083a51a1b6ecc4d7578c3714,2024-11-21T07:50:03.150000 +CVE-2023-25737,0,1,01324a1bc934de2f964ebf927fd9b66af295b4449d5d868fcd2e2a150cd6f298,2025-01-09T20:15:30.067000 +CVE-2023-25738,0,1,e5ee11a6f004bae745586036d1e6f7306fecf0363efc242089748a367b699080,2025-01-09T20:15:30.277000 +CVE-2023-25739,0,1,db17708f4f9a162daa9155a2c40bb5a245b3e08de066704097f1902120e75336,2025-01-09T20:15:30.483000 CVE-2023-2574,0,0,f7743c70797e2ae3f128fc8154af0f534939f7af099b3a3ca407821b94c4bd51,2024-11-21T07:58:51.623000 -CVE-2023-25740,0,0,3cda44c03579947c22767c78ff5179c007fda427391c0b06818a457c5702bb3f,2024-11-21T07:50:03.283000 -CVE-2023-25741,0,0,2e797a4a4487da39faaec46c30831a7e70ca639867ccc7396d8a3d4dfa787bb2,2024-11-21T07:50:03.403000 +CVE-2023-25740,0,1,ea0e0452d5b16766bbb450bc97c797d8cc89f2c0ec438f702c6f70ab8021ee76,2025-01-09T20:15:30.670000 +CVE-2023-25741,0,1,9672b687f453ed669cf7932aa3160a3904dd9e3991ca029f79141916add4ec17,2025-01-09T20:15:30.880000 CVE-2023-25742,0,0,01338aeb050d0d7e662126bf546281babc53b3cb121cbad1371c5a0cc0e4d6b9,2024-11-21T07:50:03.537000 CVE-2023-25743,0,0,7558e45b87eeaa1ba4d99c425444e815ba925b5bd93e9c29fa81472ea06c49c6,2024-11-21T07:50:03.663000 CVE-2023-25744,0,0,4eae3a90dcdc5d2766e52ae3ae4ee1b6ccfcbae9216b5cd9ae89ac1806098c57,2024-11-21T07:50:03.790000 -CVE-2023-25745,0,0,6102d9fc572324be6644eee9d6fb12de0c6076ae05286509941a0d87d72b34f0,2024-11-21T07:50:03.910000 -CVE-2023-25746,0,0,b2502edecd51f079acd18d979cb6dbb9bb06b6370db89923ba0bbe001131fb22,2024-11-21T07:50:04.013000 +CVE-2023-25745,0,1,769f7a96761f34a07280566a448733b974120331977836b17724e166746ef1f9,2025-01-09T20:15:31.067000 +CVE-2023-25746,0,1,20b769ef47b1a1882eb293e6d3624df20183a2ca49d656c0a0e16663dca51550,2025-01-09T20:15:31.250000 CVE-2023-25747,0,0,d1b74a66095cdc586ebd8ff527eff24f26609d611db061c93a7c6b23284c7a49,2024-12-11T16:15:08.497000 -CVE-2023-25748,0,0,a5f231f6ce1287a57ac3ab5d6b5420c308f9eef1aedbcb2aaa3281b360bb3df2,2024-11-21T07:50:04.250000 -CVE-2023-25749,0,0,7ae7181a544487d53266a67325373d3191b84ef4de82642ad7b49ec70257ad66,2024-11-21T07:50:04.370000 +CVE-2023-25748,0,1,b8d069574f5e5a9c8d6c03439ac15d0d456e957a0d098bd20f5d466809a41a5d,2025-01-09T19:15:14.810000 +CVE-2023-25749,0,1,8ec7aa375c4b5afb16dbfd8503a97e5b6a09b45b891cc4de5b2891b741be82d5,2025-01-09T19:15:15.763000 CVE-2023-2575,0,0,a59971076db19b36a664ea7bce8bdc3b7a1e7cae8e3ea4d3850f7ffa0cfb8a97,2024-11-21T07:58:51.757000 -CVE-2023-25750,0,0,0fa5661e261aef16da9a741636631d384cd2945c2c975c47352a7dca616a2b11,2024-11-21T07:50:04.483000 +CVE-2023-25750,0,1,2a676e260aa082266e4300427aa7fca99cf60cf59b2a2855f7e2707c2ca7af42,2025-01-09T19:15:15.930000 CVE-2023-25751,0,0,2d2a9c6b1a09483fae33b0cc225349f17fa2154a7b6444876b3f5e56ebbf054c,2024-11-21T07:50:04.607000 CVE-2023-25752,0,0,3a583158a0004ad67fa3a2eddbe740c66f0331b07decdf7e1ede43237fe29b22,2024-11-21T07:50:04.787000 CVE-2023-25753,0,0,51bf84e26be5cc571e3218899cf98319d10f1c65192e0add5f7b6f6291679473,2024-11-21T07:50:04.903000 @@ -220731,7 +220731,7 @@ CVE-2023-26839,0,0,2e06e162dd6641d9de27a0ae00ad48d10c52ded486a65242954258790a85b CVE-2023-2684,0,0,d4da490eebef562874c85cc5dae74b568240f925b5edf3f8b53ae8cd615e419e,2024-12-11T17:15:12.467000 CVE-2023-26840,0,0,10050fa474c9498a342f4f18f7f213f12f1c53764b6fe15f92bb7bd024f628fc,2024-11-21T07:51:59.293000 CVE-2023-26841,0,0,cf784a03f1035170d882277f185f72bfa73df1e3de452edb90b82c5e700e3c31,2024-11-21T07:51:59.427000 -CVE-2023-26842,0,0,0b76b30ff46a8c967d9ab802040e37b1a2652269404f1556a38d873bc56b67df,2024-11-21T07:51:59.560000 +CVE-2023-26842,0,1,d39eda28623af714efe7f85aeb376ccc0342f23c9b1231f090e68b81cb28e036,2025-01-09T20:15:31.650000 CVE-2023-26843,0,0,786845edc94077cb46de16ddea7568a47d83125548a040d79aacb36c0f0421db,2024-11-21T07:51:59.693000 CVE-2023-26845,0,0,a2f9c7776186d3df0ceb2e2b27a5bea533a9c3929c9c21044c3c55f1e99de846,2024-11-21T07:51:59.823000 CVE-2023-26846,0,0,4ba659ca1afcfc2f01339e16ad44eeea13b1388f168b2112ee0043c3544e16ea,2024-11-21T07:51:59.967000 @@ -221364,7 +221364,7 @@ CVE-2023-27635,0,0,7570faaf95037e88bbfd243d760e242c5b4e564b313fe143f69cc957bd376 CVE-2023-27636,0,0,6f60f33851fb60ef626e844875511aae7fdfd14f3d9cae98499bd7070ddb60e1,2024-11-21T07:53:18.780000 CVE-2023-27637,0,0,e336980e21c9f457fefe8b00c6dda3939956833d62bee8b874a32a047427487e,2024-11-21T07:53:19.030000 CVE-2023-27638,0,0,f9b8c74c29ed470086db04fe0ea2dc288af15cae523377e09d3050be9363d63c,2024-11-21T07:53:19.187000 -CVE-2023-27639,0,0,b9b7fbcf72b1364d7c314c995a4deac6aab0189112e61f86cad57476b0718b9f,2024-11-21T07:53:19.347000 +CVE-2023-27639,0,1,4e9c0ff551ab50dda013f61fef99e9dd960aea1c6f9e5aefa03c183e7e05a324,2025-01-09T20:15:31.873000 CVE-2023-2764,0,0,b60275bd60dae63771cfc63f6038367441d1d2a394ae81d73e693a63f3a17bc0,2024-11-21T07:59:14.770000 CVE-2023-27640,0,0,942d90eefd00ea0707349532a745b9ab0786557b6735d3ecc97aba150d6ceb39,2025-01-08T21:15:07.413000 CVE-2023-27641,0,0,5df162186f1274a845e27d66cd560b269e038240b9ef162aab5bf59d5bce9e40,2024-11-21T07:53:19.640000 @@ -221412,8 +221412,8 @@ CVE-2023-27734,0,0,01154d8f72fba72ec3cf035fcc1ec3110c93353017e97e9a346b3ac49683c CVE-2023-27739,0,0,4fc8206e922185a194198a67cfda3f0948f74d71cd7be3a4e7cb7cbd8a0dbd45,2024-11-21T07:53:24.487000 CVE-2023-2774,0,0,4242333111818d6e1455249017304bc7c955142266fc9f7abc16cde77a827466,2024-11-21T07:59:16.013000 CVE-2023-27742,0,0,f2ec5865daabd701199ba1cf87754de37d1fd8df6f3617692f0d839bcae04fd0,2024-11-21T07:53:24.640000 -CVE-2023-27744,0,0,54ec8e76912464e1f111a0538e4adba053648abd0b406009857ab478bbc24586,2024-11-21T07:53:24.807000 -CVE-2023-27745,0,0,78bfa508cef72a8372c45b9375d9e43090112961a649e0171411084d23549f7f,2024-11-21T07:53:24.970000 +CVE-2023-27744,0,1,0f356ecbe3f5317e5a9cbeb62c5eec3f8352670ec7a8797db481892c11d6efad,2025-01-09T19:15:16.110000 +CVE-2023-27745,0,1,a387292db3edefa3d3fcb5d34967b85b9216736518e039551cf95ff4aa1767d8,2025-01-09T19:15:16.340000 CVE-2023-27746,0,0,77ab4824ffcc21f8b7ad475117cc3a86ee78f8918c645e95e8f648443a6f76fb,2024-11-21T07:53:25.127000 CVE-2023-27747,0,0,3f0ac51e51450e7e9db28bd6c6b5a9fecbba0f0da47cb2220efb646f649f598f,2024-11-21T07:53:25.297000 CVE-2023-27748,0,0,801bdb8bfc3dcddc7be8c0c38ff748039a1974f2d713fa653fc2c8dfe46c727b,2024-11-21T07:53:25.473000 @@ -221784,7 +221784,7 @@ CVE-2023-28141,0,0,51091879e23c79cbc236a16b2984e2dd44af6d972b83cbe9cb3d897ad4c9b CVE-2023-28142,0,0,bd9825929300d00d5460431b11a1d8581d243cf18cf72f977e5bffa48978cccd,2024-11-21T07:54:28.780000 CVE-2023-28143,0,0,f4bc53a7895bc10a274f857dc90ffe925bdc4ed21c97eed7b01b695eb8524c4f,2024-11-21T07:54:28.893000 CVE-2023-28144,0,0,7b641e2a61d30ee74a394a747cfa58dc7b196df561608c2416ce095c8b0edd10,2024-11-21T07:54:29.017000 -CVE-2023-28147,0,0,ca4c5d7e8c7ff0d59e6a89fecc310be62d6ca0ed5b5df6d9f17ae058e2b2c057,2024-11-21T07:54:29.153000 +CVE-2023-28147,0,1,f30f408b0910c6b0d7ba587f5aad0dba11a6e0e727d207232a331f413e692c42,2025-01-09T20:15:32.090000 CVE-2023-28149,0,0,08c217aea9c71601c56c1c111b48b7078ef7d7590f65ac919a87a2b9b826f62b,2024-11-07T17:35:03.810000 CVE-2023-2815,0,0,3ea6ea96842ec8c8be5ef2cbe7a9dac57e5243b16578e30f83427e5557cedb1d,2024-11-21T07:59:20.597000 CVE-2023-28150,0,0,cc0741d1b13a09d9d5984d0bdd9075801685bcc7cd69357f2b849e15e24e9b94,2024-11-21T07:54:29.440000 @@ -221794,7 +221794,7 @@ CVE-2023-28153,0,0,0f96f112755f13c2f698695666f7ef05307d30a9cdadfed1b836b39db2b20 CVE-2023-28154,0,0,1789c944dd2f50f8e2f8697e5dad5368024e3d322efada71217c4cf620c70f0c,2024-11-21T07:54:30.030000 CVE-2023-28155,0,0,5f10453fafa7e761d33f7605b8a870efa0c943633ed9cc3fbe760cae904558de,2024-11-21T07:54:30.183000 CVE-2023-28158,0,0,b5d20082fb4d70d2147f05630323fcf1dccdac1f8b2eeab559e2a9ecbe9a5fbf,2024-11-21T07:54:30.337000 -CVE-2023-28159,0,1,3a449c52c7ba4013bcdbfcd1295eb1a399ed8fac434b5151137137ea4a69c7ae,2025-01-09T17:15:09.523000 +CVE-2023-28159,0,0,3a449c52c7ba4013bcdbfcd1295eb1a399ed8fac434b5151137137ea4a69c7ae,2025-01-09T17:15:09.523000 CVE-2023-2816,0,0,7c8e31ca0eb32cb0c7207d758c7d7a994717bb8d5393f58b08f93bb8ff77a290,2024-11-21T07:59:20.730000 CVE-2023-28160,0,0,987b29e5210824909becba2f42f3b3a4d8fc4a041123d3cea0a6346a62a1e68c,2025-01-09T16:15:33.733000 CVE-2023-28161,0,0,c890581001185b4c2fefd08567d2a22793be926d3446e92653a664ce14058305,2025-01-09T16:15:33.927000 @@ -222287,7 +222287,7 @@ CVE-2023-28653,0,0,85425f9a644d94dcc88660335cf1fba4048b509d7b414b67f0faa69053553 CVE-2023-28654,0,0,131327885e5fa2643b72e4d86d04cdaa97dcfd352bd1c6dbe7aa3f5c6b65815c,2024-11-21T07:55:44.897000 CVE-2023-28655,0,0,8409128c7a1b366a01a25f870d9615353d35f13c524988216bf809a856adddca,2024-11-21T07:55:45.003000 CVE-2023-28656,0,0,71923347f2d14def6102f4bf85546159cbcf14358f9ea6a41c9c6f7bdf0458ca,2024-11-21T07:55:45.103000 -CVE-2023-28657,0,0,a86154847b60d831bea7eeb21f2a22b46afbeb77d82ce00e9a80a8ed94ded638,2024-11-21T07:55:45.217000 +CVE-2023-28657,0,1,b598ea5dd934ee0fcc5ee876e12d99ee8cec046c6f6f43a4f6bea3784038d2c5,2025-01-09T20:15:32.300000 CVE-2023-28658,0,0,4721cc7813fa8c14291ea10a6bd934084fd896731e35e1047a44b653e020baa0,2024-11-21T07:55:45.320000 CVE-2023-28659,0,0,07f1923c82aad36bebb9713a7dba82b9827617104dbe4541cf3b9670be8529ad,2024-11-21T07:55:45.437000 CVE-2023-2866,0,0,1e173d2f053a92baca91f715b026bc759001206f14560c65e03dce236744b29d,2024-11-21T07:59:27.240000 @@ -222347,7 +222347,7 @@ CVE-2023-2871,0,0,9963d737338d1dcbf342e59567089fa5cad495ca211d1334b518ed637ed186 CVE-2023-28710,0,0,ce34d2d0e8ca43012d88bcf114ec97313ddf643684933f5972ac5e1517b7ef74,2024-11-21T07:55:51.147000 CVE-2023-28711,0,0,a3dd56dc2d31909c1a86c770c19a5dbeeb176e710bbc5734c86e575a8aa2b643,2024-11-21T07:55:51.330000 CVE-2023-28712,0,0,65d46ac765e466c7b19911f8fe09fff905333a780340064cdf6d30726ab5b833,2024-11-21T07:55:51.450000 -CVE-2023-28713,0,0,fe7a1aada06c1e19b09e6517ed21eb1b3160ad00d73be9b01d7a5ea20c9b7626,2024-11-21T07:55:51.570000 +CVE-2023-28713,0,1,0c63ac3fc393e79d8eb979361877f48466e2baf57ce0eccdfd761ffa103b8706,2025-01-09T20:15:32.550000 CVE-2023-28714,0,0,7963e328f5538c35128d9e328b5ad35d468e921ea64ebebd603d2bde06d9db28,2024-11-21T07:55:51.683000 CVE-2023-28715,0,0,639383fbbab5d4f6889d81c843a9748eac9707d5ee8b338fa759de273f23cf9c,2024-11-21T07:55:51.827000 CVE-2023-28716,0,0,b7087015f3c47188165e814a63a01569dc6584313b021a53e9f89c7fb622fab3,2024-11-21T07:55:51.953000 @@ -222456,7 +222456,7 @@ CVE-2023-2882,0,0,547a60c36b1f71c0384a0e2edbdc3677ea8064a56e3eb94f89b4b3f016b807 CVE-2023-28820,0,0,e10d4a00308ba1ab34db498a843935a90acbe0ade20fa15055d9a0ff7f590453,2024-11-21T07:56:04.757000 CVE-2023-28821,0,0,3b23d992637d21ecb74fbbedbe80ce17d8ac3cda960cc9ac7ffb7824e8f934ee,2024-11-21T07:56:04.903000 CVE-2023-28823,0,0,b38855621f61c058dba0e2d9c38b33206b84c1d843699145c318ad3909e98d3c,2024-11-21T07:56:05.053000 -CVE-2023-28824,0,0,4717652e7a590f17e3eab8927d56f9e19eb6043995d6fc66b15276d9d0ffb1e3,2024-11-21T07:56:05.187000 +CVE-2023-28824,0,1,8caf82701251f8229a6994b01253e38294b5b02a55174bcabc24c5ed5118a657,2025-01-09T20:15:32.740000 CVE-2023-28826,0,0,a9e9528aa9c3972fd09362058c3be3f967ed732ddc79dfa5a2473b385e1b19c1,2024-12-20T17:09:10.193000 CVE-2023-28827,0,0,3ac013fe742eba004aa8f5d9fa84d4e0755b6248eb930477c2f597bc870b283a,2024-09-10T12:09:50.377000 CVE-2023-28828,0,0,c8219201f8c82577f62c395dc963be0ff5d9ef990f6cd114e19b9adaad0853b6,2024-11-21T07:56:06.030000 @@ -222538,7 +222538,7 @@ CVE-2023-28933,0,0,519c3190f7a4e37ab2d476d1249fa5078d98a47a265b3b34c7fdb7ed39bcc CVE-2023-28934,0,0,87d1e424c99c01184e00136c35b0766f1f27a6dcae300350fa52e1ab883446aa,2024-11-21T07:56:15.517000 CVE-2023-28935,0,0,f312ed60f7122bfa5577f374d1be8adba097fbdaf7a0ecdba666414ab2493421,2024-11-21T07:56:15.640000 CVE-2023-28936,0,0,50b67a7cfdb572585bf893ea6361f53763e1ab4d2a0adb61f91b2f96abe2f888,2024-11-21T07:56:15.823000 -CVE-2023-28937,0,0,9fa1d4c48aaa2e089c66892a6922a992c1dbcde8364e67b8d8ad9e0b15e0e1be,2024-11-21T07:56:16.013000 +CVE-2023-28937,0,1,32807939e1a369df8c12b11bf4a0bfaa179e8dce8939f891cfc24ea15ea00ff1,2025-01-09T20:15:32.920000 CVE-2023-28938,0,0,8df7b0ae6c55aa64b511e9c4849ee68d15abc2d517f50a3629cec69491227008,2024-11-21T07:56:16.140000 CVE-2023-2894,0,0,e49133c4234db93ec00e796083811bf0248ad4cb3ca587f14a72a4f18b2babf1,2024-11-21T07:59:30.800000 CVE-2023-28949,0,0,8a96a3fc2871e1836493f7683561cc19bbf134583f37ba5e12a3f08a1ddc01c7,2024-11-21T07:56:16.260000 @@ -222739,12 +222739,12 @@ CVE-2023-29150,0,0,53fd9d7666e4c7481ad461d2c290eea5e35316c6b0e762d9d695758c39330 CVE-2023-29151,0,0,727047795af5b498bb8bb582c46dd36be3631963786c95d5e8a4ca6f1c857b84,2024-11-21T07:56:37.237000 CVE-2023-29152,0,0,eceffce06206d987481c535a3ea7c671bd8caa5cd08c017b9a186e3d386a055d,2024-11-21T07:56:37.357000 CVE-2023-29153,0,0,4a8bc2238fb5bbbda2a2410b86d68f6271586134e8d4666b131c2ea851408a47,2024-11-21T07:56:37.470000 -CVE-2023-29154,0,0,e6cd458b47267dc42702955ef224a7bd08d9216c7a99b3f0be1c286b00867bed,2024-11-21T07:56:37.563000 +CVE-2023-29154,0,1,cf9ae4c80230bb48b41f50c6cc8a3150a564f6cf7cd757718626d61ffb027c37,2025-01-09T20:15:33.140000 CVE-2023-29155,0,0,6cf96ff659bed4e04e921236c23b7bb0848da448270667a7977947e0b766632f,2024-11-21T07:56:37.660000 CVE-2023-29156,0,0,b477526ec2f8e6c0d80e19d9e3e128b397ccbb3824fc66c88becca8b6dc263df,2024-11-21T07:56:37.820000 CVE-2023-29157,0,0,e139a470842d9e5b9d6b09da86981de056cc51c8cf1ef74955e9869ec1f8a553,2024-11-21T07:56:37.957000 CVE-2023-29158,0,0,d93e1a8f6332e77a5b3ca2ca77ab8702fcdee0067fa37722a2ec00c716cd850d,2024-11-21T07:56:38.070000 -CVE-2023-29159,0,0,cd911818f734775dab3175db6db6b98b2b6ea2654ed5bee8d236e6c77f00c323,2024-11-21T07:56:38.187000 +CVE-2023-29159,0,1,04cdf36fcbc1e895a1bd5cbeb212fe9aa091d5a62bc6ed3c1a6bed03744011b3,2025-01-09T20:15:33.313000 CVE-2023-2916,0,0,27d1944ec651f5d060d75979b808931283d2f3099341e8c0d7dabfe85c912ba8,2024-11-21T07:59:33.867000 CVE-2023-29160,0,0,90cdb364b9f59b891f577b51f1a47efe44108a1bb1f4b09369f322cf5f660038,2025-01-03T21:15:11.997000 CVE-2023-29161,0,0,5b1e47c04c48e3ea1336e82805801b0c1e10ade49f6d9266884d11fc74b88a63,2024-11-21T07:56:38.390000 @@ -223179,8 +223179,8 @@ CVE-2023-29714,0,0,f64975efb15c581a3eb606f94a31330a7ab5e099f36c5c0db97a36c33a46b CVE-2023-2972,0,0,d5c968d2bb89a1b48ddfc3f682f9483a90bbcddb7cf510116994e76efad62b91,2024-11-21T07:59:40.277000 CVE-2023-29720,0,0,1f61853af6e31b6d17a1f07774bef430ef61e62aac6cb8edc9d923d77020b562,2024-11-21T07:57:24.780000 CVE-2023-29721,0,0,16bc6df95e94fb6a5ef25e342a42709e7a4b72452d3121be94f25487bab35666,2024-11-21T07:57:24.930000 -CVE-2023-29722,0,1,695aadf048ad09ea7d0fa795d1abf3a163d64bc0e0271d705ac95188359d83bb,2025-01-09T18:15:25.153000 -CVE-2023-29723,0,1,303fcea14f09e3d0e64d1a961af341a2b88ba23c47ab885ec21656a91d852499,2025-01-09T18:15:25.333000 +CVE-2023-29722,0,0,695aadf048ad09ea7d0fa795d1abf3a163d64bc0e0271d705ac95188359d83bb,2025-01-09T18:15:25.153000 +CVE-2023-29723,0,0,303fcea14f09e3d0e64d1a961af341a2b88ba23c47ab885ec21656a91d852499,2025-01-09T18:15:25.333000 CVE-2023-29724,0,0,b957a3fcc2f908978b34709bccb4beaef482657df33bc886f526eec59e4351ea,2025-01-08T21:15:08.470000 CVE-2023-29725,0,0,ab64230b18916f62d493ac57f81dd5cd07baf6987ff2e6626d94f28801370f14,2025-01-08T21:15:08.740000 CVE-2023-29726,0,0,5edc83c46b4a4e4c7f7af4e90e64c34e867ab2e973eaa6365edabd0821085e67,2024-11-21T07:57:25.623000 @@ -223192,7 +223192,7 @@ CVE-2023-29732,0,0,f94e9686fbe519a8c495df8ed366b108e9bda254de50a7c6d104ea710cfbd CVE-2023-29733,0,0,c51bea24c064b880a851146bc05b8c6e822c81e733f1c202e53690264330aa3f,2024-11-21T07:57:26.323000 CVE-2023-29734,0,0,d2512d2c554e758ed63e86670d1f9584041b9a42fd646ee9680b58f2d7d670cd,2024-11-21T07:57:26.463000 CVE-2023-29735,0,0,ac0fbbbf4c20aeb8486bb27338eec4c385ff2696249b5748dda15ac99705a956,2024-11-21T07:57:26.597000 -CVE-2023-29736,0,1,009507085341f8bc239b33226ff4a399f9b727c2c45fc6f4758061eff269be18,2025-01-09T18:15:25.493000 +CVE-2023-29736,0,0,009507085341f8bc239b33226ff4a399f9b727c2c45fc6f4758061eff269be18,2025-01-09T18:15:25.493000 CVE-2023-29737,0,0,20ab0f22b4b2ab035f6c6b50227cd9494620ad841b1b1824a90174c2ef52d2ae,2024-11-21T07:57:26.890000 CVE-2023-29738,0,0,5ceb70c7bc783ad5cd61ee05d3116bc2a3c6d05670b1c9a685b4f525e90b05a2,2024-11-21T07:57:27.030000 CVE-2023-29739,0,0,6bdb2a29dbe515525140288cb3b1c706ed59488ca2c6ccc8fee6310c2bb04f85,2024-11-21T07:57:27.173000 @@ -223204,7 +223204,7 @@ CVE-2023-29743,0,0,4e343bfe2c90db6c5c6eae7c79e7bbdbef00ae4d945362466d77b4fdbd049 CVE-2023-29745,0,0,68e3675b29535613bcb2472df3ab338bd82f6db11be2be773fa63d5dc8c2934c,2024-11-21T07:57:27.887000 CVE-2023-29746,0,0,133c031c39348c96f95d9e43b02a0f81b2e172f555bea6970e402c248a23e4a6,2024-11-21T07:57:28.020000 CVE-2023-29747,0,0,136ce121e376918b0a32772053c87673baadc2f913087856d8be12a0c0a8f781,2024-11-21T07:57:28.170000 -CVE-2023-29748,0,1,3bb616611a42918b2d8d55bbdc2fe5b94fea76d10f8313180c5224af166ba7e2,2025-01-09T18:15:25.667000 +CVE-2023-29748,0,0,3bb616611a42918b2d8d55bbdc2fe5b94fea76d10f8313180c5224af166ba7e2,2025-01-09T18:15:25.667000 CVE-2023-29749,0,0,bee435745394068e96f0cb8168118acb0d5340cb0881d4dd204dc44457c341ca,2025-01-06T18:15:13.163000 CVE-2023-2975,0,0,eff2e981c6d761b203377651befd2b307795817f2e933153b4cfe0cdd2ccccca,2024-11-21T07:59:40.690000 CVE-2023-29751,0,0,9e80ee2a4e5e9c03521d242a06ec1b47864e2c325cdbc8b3aaa09507ee90d366,2025-01-06T20:15:26.433000 @@ -223219,7 +223219,7 @@ CVE-2023-2976,0,0,b03475082f280b2feded368efd6f1b9f33545192f289f4208674beed7a69ee CVE-2023-29761,0,0,992d2056506a2987fd7ab2b68c55346a067e713bdeb552e0dc79bfbfccc4af58,2025-01-06T19:15:11.883000 CVE-2023-29766,0,0,e147ab37d4dab4567b8cc411515720d6b96417916c76b495c14d4fdd1a43c279,2025-01-06T19:15:12.067000 CVE-2023-29767,0,0,b68faaf3b45ffb0d2cbc64ebbea41b6a0ffb61e7f1e4d4fda9dfa4cba199dc98,2025-01-06T18:15:13.400000 -CVE-2023-2977,0,1,20bdfa4fe830195862d29d75a36a569d8db13c8694be1f4fd35b646a0f9f4378,2025-01-09T18:15:25.850000 +CVE-2023-2977,0,0,20bdfa4fe830195862d29d75a36a569d8db13c8694be1f4fd35b646a0f9f4378,2025-01-09T18:15:25.850000 CVE-2023-29770,0,0,2194bec03536589ba63983ee5a9fc8756c676ff1e07518ca2875ebc40fa29460,2024-11-21T07:57:30.110000 CVE-2023-29772,0,0,236d384474273915c0e96c3d9fc6b4ea5ae20135fdb39e54b28539475f08e864,2024-11-21T07:57:30.257000 CVE-2023-29774,0,0,3a3d6c78cfec542f798df791970125d5815d94e715fc487a8d0026f4a219bbbc,2024-11-21T07:57:30.403000 @@ -223875,7 +223875,7 @@ CVE-2023-30754,0,0,62c232ba670b05bb9a24d2118264b62e9b1680077a4fd46b96441afdcdc0a CVE-2023-30755,0,0,0da84c32e644b9ff47f71b6aa8c8a3157711a8ff8b1f941b968146b0ed950f89,2024-09-10T12:09:50.377000 CVE-2023-30756,0,0,d3b979c5f0f9ea4ec3f2980feed339808bc75a3762f808c9e1822bd9b96ed90f,2024-09-10T12:09:50.377000 CVE-2023-30757,0,0,7a3139987a120b8bfbcf14769e62683750650826dc18d636318bfee1f5035a8c,2024-12-10T14:30:34.017000 -CVE-2023-30758,0,1,b97068120bc56dd3fd041d56779b7df91fda3520167e13f7c317432382c51c97,2025-01-09T18:15:26.083000 +CVE-2023-30758,0,0,b97068120bc56dd3fd041d56779b7df91fda3520167e13f7c317432382c51c97,2025-01-09T18:15:26.083000 CVE-2023-30759,0,0,e3f6846ace05560f9c09c1d35874a157f57ea7e2bc1faad6b9eb3ea11e876614,2024-12-12T21:15:07.260000 CVE-2023-3076,0,0,d008cda2cdfac6bbdcbeeb6338eac7a719e6e3a4220fd820508d02a6856e7e80,2024-11-21T08:16:23.437000 CVE-2023-30760,0,0,8ce1174080c412d47616cb62cc2689d1ae6e7692c25094a976eaf3d28ddfb223,2024-11-21T08:00:50.987000 @@ -226058,7 +226058,7 @@ CVE-2023-3345,0,0,219d5c772aa02f0c4a4b16b09721d8934adb3c1505c85a870be2fa6ad37ab3 CVE-2023-33457,0,0,7eee79e2e603000fdc9c79d0c7f54a28226aded759ba1bc0cbce35446680feba,2025-01-08T16:15:29.587000 CVE-2023-3346,0,0,09f68a6670d4a69cff8e11fa4ad9eea39d73cc8d7fe0a2dacd2a911bbd61aee1,2024-11-21T08:17:04.037000 CVE-2023-33460,0,0,6e418258c1a2b91b79efff9c4f69791d5894d1876ad79ba0f82b40a9644edd3e,2025-01-08T17:15:12.020000 -CVE-2023-33461,0,1,73789af10b9ae0fd2efb66f1e3bc26a3e0c8473895c51caeef38c98c5b93ea6a,2025-01-09T17:15:09.730000 +CVE-2023-33461,0,0,73789af10b9ae0fd2efb66f1e3bc26a3e0c8473895c51caeef38c98c5b93ea6a,2025-01-09T17:15:09.730000 CVE-2023-33466,0,0,8f3bb95382db1efdd63c10853d2c8cab520a0781d1269adfe6c9d0fc3cdbbf5b,2024-11-26T19:15:20.670000 CVE-2023-33468,0,0,4e03c49a7594212a8b1ff77b489a307327dcf22bee135bc562fbafc7e39748ec,2024-11-21T08:05:36.110000 CVE-2023-33469,0,0,994bea01d55c6edda4d230c6ca8daa28df27e07f5b1b8935938681fe0f2d3bb6,2024-11-21T08:05:36.320000 @@ -226072,7 +226072,7 @@ CVE-2023-3348,0,0,a47af7e02df43ebe845240c1cb93abd580419b490a9612e8ff067366036ee7 CVE-2023-33480,0,0,8735c4ad8b0839589eadd2e75c3be7004d4be924efd7ab1fbdf655275eaee46e,2024-11-21T08:05:37.510000 CVE-2023-33481,0,0,8705d19fdca698a6e5b048becf27a410952af796f4ec27cc89366ac7e25f0de3,2024-11-21T08:05:37.747000 CVE-2023-33485,0,0,770e713888d74e8e5a5c4f1d5966f7ae775a2fd6f4565cb1cf46d11b35253d2f,2024-11-21T08:05:38 -CVE-2023-33486,0,0,9b3bb93b897d362ef0539514d0183fd51ea773dac3286004ecf37ea1cfd7e902,2024-11-21T08:05:38.160000 +CVE-2023-33486,0,1,f78baa6f27f76e35231dbf51622df62a4f581fe3526d2476862b2edfe76e2a2a,2025-01-09T19:15:16.783000 CVE-2023-33487,0,0,1ccdb3165a0d7db63d77a5430681bc84a0b4481215aaad43042de14b31e719d7,2024-11-21T08:05:38.300000 CVE-2023-3349,0,0,198f0750e28fec680b199f31ee62e51097776525e0e38e70fe1488f90730989a,2024-11-21T08:17:04.560000 CVE-2023-33492,0,0,f18ce2f813c3ba55047411a06441328b89b300d96f041da133c6dcfb061e2cf2,2024-11-21T08:05:38.440000 @@ -226101,12 +226101,12 @@ CVE-2023-33536,0,0,4483a4c84bae9df5f08f3544144640e560096a5f4d7b065a9e0bcbbe03247 CVE-2023-33537,0,0,06a836a8ec9a8a82dac73cdff5c990d7b4a0e29c9bc271ecada9cf746e2d2bd8,2025-01-07T16:15:31.423000 CVE-2023-33538,0,0,b3b643fe39302a1c48ae218034aade7823381ded5695561882bb311b6c1280d5,2025-01-07T15:15:08.190000 CVE-2023-3354,0,0,c1971a8d35c84792a7e3b4b69170665e207a3bb365fff75d5a707072047933e4,2024-11-21T08:17:05.117000 -CVE-2023-33544,0,1,ea770ac3095100c0cf3dfef2c91d44acce796d4bc92ed10e70a1e80795446c94,2025-01-09T17:15:09.997000 +CVE-2023-33544,0,0,ea770ac3095100c0cf3dfef2c91d44acce796d4bc92ed10e70a1e80795446c94,2025-01-09T17:15:09.997000 CVE-2023-33546,0,0,9e82aede766f4b9b701714d917a2868af3b3571a49bd4b295d6aba2bb98c278a,2024-11-21T08:05:41.850000 CVE-2023-33548,0,0,b51dc1575c1f7daa608b0b5836c474f314a242a913214763d5debf853883d3e8,2024-11-21T08:05:42.010000 CVE-2023-3355,0,0,66c43df3dd0ee91c832932172c9cb5c8a55655cbcbf5f77d9dc727f70b08e4ec,2024-11-21T08:17:05.290000 -CVE-2023-33551,0,0,15ca22be4f110c38b80ef279ae23e0f0520d88f7835dffae7ff26ecf6ce6cde8,2024-11-21T08:05:42.157000 -CVE-2023-33552,0,1,ee1087ccfd9a3e3baacbad0d60bd717ae7303666f219bedcf581fc6b1a61de5e,2025-01-09T17:15:10.250000 +CVE-2023-33551,0,1,a4dfddb59ce749b636114722bc7e227dadd5beadd604ec4bebffa41debf639f0,2025-01-09T19:15:16.993000 +CVE-2023-33552,0,0,ee1087ccfd9a3e3baacbad0d60bd717ae7303666f219bedcf581fc6b1a61de5e,2025-01-09T17:15:10.250000 CVE-2023-33553,0,0,100e48dbe8dcd919ffada509e862616914253c61bf4e10f091c0f3eae04e1bbc,2025-01-07T15:15:08.367000 CVE-2023-33556,0,0,296f7cfa4be2684388b87c0d047b815a94475706490d2524330b63115be6fe38,2025-01-07T15:15:08.523000 CVE-2023-33557,0,0,cc03734a1aa1840f74f9352ffd50d3d02541603dee095c93032d40edd69bf2c3,2025-01-06T18:15:15.217000 @@ -226199,10 +226199,10 @@ CVE-2023-3370,0,0,9dddf58da1ae42a7566c0b92e84336c0d08e63f3c33e8ad56b0a0ee4f51516 CVE-2023-33706,0,0,fad1968fea65403211fd2c9385b3602092ccc20b01e9d150d57322ea4fc84c68,2024-11-21T08:05:53.283000 CVE-2023-3371,0,0,df34f309dbb56ab4c9e10189049735675c625cabb2e1178e461a2d83b4b45473,2024-11-21T08:17:07.337000 CVE-2023-33715,0,0,70f8ea39909ccc7d7fedfea0a5651610ab41bdd10d186bbb572c059a14a3b869,2023-11-07T04:15:24.220000 -CVE-2023-33716,0,1,4db99c9c1621fc404197baa253ff070fe3c15ce45b5a77db9ce4d83a97546dcc,2025-01-09T18:15:26.273000 +CVE-2023-33716,0,0,4db99c9c1621fc404197baa253ff070fe3c15ce45b5a77db9ce4d83a97546dcc,2025-01-09T18:15:26.273000 CVE-2023-33717,0,0,0cc9e8551affca6d31d9fa047b600ffdb3ddc33ab5b125ddf432d7a93b0fcd71,2025-01-08T21:15:11 CVE-2023-33718,0,0,1586778d15355ffee6648b131924ae371a3d2019604b5073fe93a8180e3a40a7,2024-11-21T08:05:53.770000 -CVE-2023-33719,0,1,d00c5f95efb97cdb3bff500a13a96570ea04e4dcdf87867c9053c065db4b5e7b,2025-01-09T18:15:26.460000 +CVE-2023-33719,0,0,d00c5f95efb97cdb3bff500a13a96570ea04e4dcdf87867c9053c065db4b5e7b,2025-01-09T18:15:26.460000 CVE-2023-3372,0,0,84f21b60d2b56cb6d011b3c76313017d3ef2b1ee20e683414c273e919f5c98c6,2024-11-21T08:17:07.493000 CVE-2023-33720,0,0,49c5977ed0f3bfeda29a066cdc9aaf5213c67aeca9e267720e129fdb485032f6,2024-11-21T08:05:54.077000 CVE-2023-33722,0,0,577f04a66dba80af8edcb620e449171536c8a33547fdb2eb1e16f5993cabc42b,2024-11-21T08:05:54.217000 @@ -226226,7 +226226,7 @@ CVE-2023-33747,0,0,d2699a05616f30c1e7ca483405ca99837def2bbf37b557a89a642263da86f CVE-2023-3375,0,0,ed69dd5f2d60488645045aa54f0e29533bc4472a62197da1d6611e55b211edcc,2024-11-21T08:17:07.917000 CVE-2023-33750,0,0,aed6daf7e716a87fceec1eed9329a12707fd14ed21830eebad1771c0c1c58668,2024-11-21T08:05:56.653000 CVE-2023-33751,0,0,922b1876d9efd9122a1657bd36c006c98332bec0d3fdd66cc5db930306beadd1,2024-11-21T08:05:56.800000 -CVE-2023-33754,0,1,551589754bcad06265eedd49f40286694f147c2d672aaf48d8f22b3c72ff7ad3,2025-01-09T17:15:10.470000 +CVE-2023-33754,0,0,551589754bcad06265eedd49f40286694f147c2d672aaf48d8f22b3c72ff7ad3,2025-01-09T17:15:10.470000 CVE-2023-33756,0,0,93e2630186b706017f2ab92a12986cb000cfda357a93b4031862c9863dcca035,2024-11-21T08:05:57.090000 CVE-2023-33757,0,0,2abe9e84e22c94d2d9937dd6326625a6d4e8b0ac9bdc5c42a38f0cae598eb1a3,2024-11-21T08:05:57.263000 CVE-2023-33758,0,0,6eb30d4e57047cf78716b1a561c980b2c569f119a705cede04e789e29e71fb09,2024-11-21T08:05:57.423000 @@ -226236,11 +226236,11 @@ CVE-2023-33760,0,0,66395363814916b245c0a8e20054660baa6a6c6428560780ce09fd6c751d5 CVE-2023-33761,0,0,57a93ac893ae35326e39c092126e5e13d5e331d3b8372e3a303e80db32ec6902,2025-01-08T20:15:25.050000 CVE-2023-33762,0,0,38f5fcfaba70048850b3e019780dd18dda0074fae37a3f2fe1c49610ea38ff47,2025-01-08T20:15:25.250000 CVE-2023-33763,0,0,4b714c19fd58c23cabcc96b7c2627201896bc29e6a1b69cfe75a61bb1cfa788e,2025-01-08T20:15:26.130000 -CVE-2023-33764,0,1,dc98ceb4eaa4a9b71101129c16945b154bda68892aee5a114fa0c4bdb2b72a2f,2025-01-09T18:15:26.620000 +CVE-2023-33764,0,0,dc98ceb4eaa4a9b71101129c16945b154bda68892aee5a114fa0c4bdb2b72a2f,2025-01-09T18:15:26.620000 CVE-2023-33768,0,0,06ef0c0decf4640dfb51ab40e4d57977e0315f708c6bde014cfbf4d1da8e9b5e,2024-11-21T08:05:58.517000 CVE-2023-3377,0,0,bfef5eba24979a4babeeac5a2ac2afab2bc4aa25a44e9271085be4c4d2c0fcdc,2024-11-21T08:17:08.190000 CVE-2023-33777,0,0,50a5f477c0f4706aa508d2368fc5f7e983bca67878ee542bcc66695b11a8545c,2024-11-21T08:05:58.693000 -CVE-2023-33778,0,1,ec297d113928561e7859958d46d7eccb202240d5061dd5aa70f2fa420f9137e8,2025-01-09T18:15:26.790000 +CVE-2023-33778,0,0,ec297d113928561e7859958d46d7eccb202240d5061dd5aa70f2fa420f9137e8,2025-01-09T18:15:26.790000 CVE-2023-33779,0,0,1eb55c2bfcdb14a79b3fd3b01e17b005110092a805fd4ef937e8dad4263f6c70,2024-11-21T08:05:59.100000 CVE-2023-3378,0,0,b0837eae984d75a22386db3789972e8c74c698027c143f4d7579a37ec8c86ee2,2023-11-07T04:18:37.350000 CVE-2023-33780,0,0,9ae1d559f1968f9d1c9b4ea057170a356d47e42b68a94bb638f2d18fa1a6a09f,2024-11-21T08:05:59.243000 @@ -226751,7 +226751,7 @@ CVE-2023-34309,0,0,a5bcf49901f3cacd43210ceb43a5eb2625a00bc48d4ccf5a5d61e770b756d CVE-2023-3431,0,0,47d5fe33fa45796e2b60627714a7ecf0adb44c979d9a3cab7c6aa40ff24f8ebf,2024-11-21T08:17:15.083000 CVE-2023-34310,0,0,d721df5238a9cfdfe886488fab8e06b0eef6a25c6410bddb9a10e4a475f4ac8e,2024-11-21T08:06:59.090000 CVE-2023-34311,0,0,a93e4a6e12e53e897f90d598b9e7bc481d789fd2af799c57a1445fb0fd449194,2024-11-21T08:06:59.213000 -CVE-2023-34312,0,1,443247c34fb5fdd29ae4e4348cf5ce61af549f386bfc16c3b4b4ef357aec9518,2025-01-09T17:15:10.757000 +CVE-2023-34312,0,0,443247c34fb5fdd29ae4e4348cf5ce61af549f386bfc16c3b4b4ef357aec9518,2025-01-09T17:15:10.757000 CVE-2023-34314,0,0,78e82052be492c6cb71fedd8385b825ffb4f86961fede5bcf9258eaf01737e2b,2024-11-21T08:06:59.533000 CVE-2023-34315,0,0,d7e134dcc60888edf7812914f1fd263be02b8117a702f2bd76c4b4ac691e3cf0,2024-11-21T08:06:59.670000 CVE-2023-34316,0,0,712701f3aa4dd7646f14528468aff56617b664d7bd54156f30fb2658c544a751,2024-11-21T08:06:59.807000 @@ -228020,7 +228020,7 @@ CVE-2023-36358,0,0,ded194e7b200adb441b4fa709d63c99e2eef0e06835442964ff220e3502b3 CVE-2023-36359,0,0,f1cfdda5960f8b568ffa1ef340bf74059ceff420da4bb55dede3794d35432533,2024-12-10T21:15:14.750000 CVE-2023-3636,0,0,f79ef9ecae829c199359798b63f24fb8a51eecaca990fa8998937337744d6ca2,2024-11-21T08:17:43.370000 CVE-2023-36360,0,0,03f8e99b08fd657ff41dfd2813e153f5a284df5fa1c76bf6a8d43cc2dedb5354,2023-11-07T04:16:33.320000 -CVE-2023-36361,0,0,4e0200c7874320e4f073214633a311a386756b789151e899a0bc24bab0baa2b5,2024-11-21T08:09:35.950000 +CVE-2023-36361,0,1,549db09fc10c400be590b6da20d8de1535f8d9fc28aff802e2996a3c6a3cef62,2025-01-09T20:15:33.733000 CVE-2023-36362,0,0,f35c3800a748c3ee5be3b3e58969fbaf55a70542449ac51524b5ca585852fba7,2024-12-02T17:15:06.610000 CVE-2023-36363,0,0,5443faca0d1d39bf7b26b052750b5043f604c34bc823d55c9ec6a30569cc723e,2024-12-02T17:15:06.740000 CVE-2023-36364,0,0,65cecffdfff980a49716cdbcd7c8173de3b98782362afa0be07cc7b2496b5b11,2024-12-02T17:15:06.850000 @@ -235230,8 +235230,8 @@ CVE-2023-45906,0,0,ba094bac8f04accf636c7578f3673b96068dbf1bb023b6132e2deb0116d3c CVE-2023-45907,0,0,a4502038835ae6ef87ed23d836aab387da6b122768f937336ced232f1f36aef9,2024-11-21T08:27:36.457000 CVE-2023-45909,0,0,7a6f6c7ffcc444e3dd0f2d61b446410f185da28b1966be5cf2b89bf9c5b416d3,2024-11-21T08:27:36.603000 CVE-2023-4591,0,0,3d0884727bd3f602eced12e2167bdcf876daa1650bb6cfae9f8cf781bedd9897,2024-11-21T08:35:30.037000 -CVE-2023-45911,0,0,38ab5b44e7d94a39a62b70f0824bcbdcf9fa1ee0876266ee7a9eb9f03f541c98,2024-11-21T08:27:36.763000 -CVE-2023-45912,0,0,131b50bcf15f1435009242496157384b77017bee49a8fe9b3ec64508b18bb4f3,2024-11-21T08:27:36.980000 +CVE-2023-45911,0,1,75d404fefb91546f034b28af5969b087179953c6381cc4805542b308c9e9c3ec,2025-01-09T20:15:34.043000 +CVE-2023-45912,0,1,efe339bb2d2d2d9eb74776207ffe830adbf0bec4baf915f7b7f7712dc6ab22b0,2025-01-09T20:15:34.257000 CVE-2023-45913,0,0,efcee232239288784857f53f534798d91b1fc6fa14b261de8a128f111c19cf8f,2024-11-21T08:27:37.123000 CVE-2023-45916,0,0,834ea3e5a22f0efcea772023be38e172d408424245dbd32ed5dbd163255ec8e0,2024-01-29T09:15:42.327000 CVE-2023-45918,0,0,f972fd5f7c913269483eae6c48c8f4227827eb967ad59026eee1e64af42001d5,2024-11-21T21:15:10.630000 @@ -236802,7 +236802,7 @@ CVE-2023-48068,0,0,9925cf1603cbf765c65e72a2a850403dfd97ecc36b2289682be1a9c50b44c CVE-2023-4807,0,0,620b132307db3f6f2bb7e18d5353c627ec97616d5132b4d5ab5c7049ee765f56,2024-11-21T08:36:00.613000 CVE-2023-48078,0,0,c00a34b2155b03134fcb71a136a573c4ca124e70fd5c11ad7c6b0156e7d076eb,2024-11-21T08:31:04.257000 CVE-2023-4808,0,0,1e248f811281a2283818508423115c4f5b2209c6a3d1e643a18ee20419e43c2e,2024-11-21T08:36:00.777000 -CVE-2023-48082,0,1,a7812668f9e8838374689293ad69a555ede53f151772e7eebc760f5f3564285c,2025-01-09T18:15:27.130000 +CVE-2023-48082,0,0,a7812668f9e8838374689293ad69a555ede53f151772e7eebc760f5f3564285c,2025-01-09T18:15:27.130000 CVE-2023-48084,0,0,b9fbaeafe3cbbef02fa1ee7ff6f293ae50c0b1ac60029655c70d5c4ef083ad94,2024-11-21T08:31:04.710000 CVE-2023-48085,0,0,b173e19803ed3a1e9a75fa1cf0a9f8bd9f7858382985a14af5cbf3d19ceab825,2024-11-21T08:31:04.873000 CVE-2023-48087,0,0,8b296318ab748138cc44a05b6535055adbe0dc5ab26fbf63a6cf2caa0f5e6da6,2024-11-21T08:31:05.017000 @@ -237805,7 +237805,7 @@ CVE-2023-49271,0,0,3ee7fe5fabf65ae91d91abd3dccc841c18fce80fddef5eb9b4fd417e38f08 CVE-2023-49272,0,0,0946094207708538d60d035a18fc96e57bc231ab115abdedd6facdc34eff0a1d,2024-11-21T08:33:09.540000 CVE-2023-49273,0,0,4f35abcd5bcdd766ba76465bb84e443958f51a8132140e975e02f10a3dec77af,2024-11-21T08:33:09.653000 CVE-2023-49274,0,0,7a10f5bb5c7d27aa1d630fcaa313dff6b14980121c4305bb03dc8f0c827fb955,2024-11-21T08:33:09.790000 -CVE-2023-49275,0,1,09f484300df19ce3359a6b8817e9475087ed9b0503cafe6f535b5680a58d6d7a,2025-01-09T17:42:46.960000 +CVE-2023-49275,0,0,09f484300df19ce3359a6b8817e9475087ed9b0503cafe6f535b5680a58d6d7a,2025-01-09T17:42:46.960000 CVE-2023-49276,0,0,163f056daa92c1728dfc281cacd9f899d52d023e14a63d659fd9d938e1a46053,2024-11-21T08:33:10.040000 CVE-2023-49277,0,0,87da47a37da0266815ecb33f285ea0e3964c01a1d9cf49535a95cb9fa8a40d86,2024-11-21T08:33:10.167000 CVE-2023-49278,0,0,3b7c27ffd487bef673a65ca3ae26c5ab00ffdb39a26d53846eeb7b38c498ea7a,2024-11-21T08:33:10.300000 @@ -238483,7 +238483,7 @@ CVE-2023-50257,0,0,422bbd5b173542f5638fed112002b594b70f76b4620b6b6706dc89a677585 CVE-2023-50258,0,0,847fa1f0f820a174925ea6fb780e6cf01b87f2b699c99f9c70c4db921dbd3519,2024-11-21T08:36:46.033000 CVE-2023-50259,0,0,9f991c0c57473e6d502a9c6f82897d37226c244db1d75ff551d7e3bb115df69b,2024-11-21T08:36:46.160000 CVE-2023-5026,0,0,6f3ad55e3005cc6b320278909fb4588d9e0224f859df01ede35784fbb5292522,2024-11-21T08:40:55.157000 -CVE-2023-50260,0,1,59768fa8ca1d0d0a15a3809fa5e10b63da570b2af41200d141437522599a07f1,2025-01-09T17:41:36.720000 +CVE-2023-50260,0,0,59768fa8ca1d0d0a15a3809fa5e10b63da570b2af41200d141437522599a07f1,2025-01-09T17:41:36.720000 CVE-2023-50262,0,0,cbac494b3a55c49581e86ea6f9f79a8ba5aa93a5b898512d29915aa201f1bffe,2024-11-21T08:36:46.420000 CVE-2023-50263,0,0,6248dfe38cbcbb15a6b1bde2a956eca930f019b419e3d34efb60804dd3e6f99a,2024-11-21T08:36:46.563000 CVE-2023-50264,0,0,77005a1b7b7ce9223325433d0848d2dfe06c950a94756fd4438e4f05b8df690a,2024-11-21T08:36:46.707000 @@ -239986,7 +239986,7 @@ CVE-2023-52481,0,0,c036169f36373e26e323dd8da99dbd8c63f236021e8c8a4a9bb39e20912dc CVE-2023-52482,0,0,3a0df7f71f418f3e63754670552f138959109914bf16e4f18679cc937efd3c62,2024-11-21T08:39:52.390000 CVE-2023-52483,0,0,1a8b1ff366173442b98b03348889fdc6d9d6815924144c23f3b8733f390724f7,2024-11-21T08:39:52.513000 CVE-2023-52484,0,0,688b7461214e279f98589a82904a607b59c917943fab1d733720294c9192c231,2024-12-10T19:49:58.407000 -CVE-2023-52485,0,0,ea5d217cbbe7f3fbb8b73fc9db8b8e68e7acfb1bc7ee66425eeb4f3a03166777,2024-11-21T08:39:52.737000 +CVE-2023-52485,0,1,c2b5d4c1676355db8fd79448f87f50421c07ae088ffc2e3215882f350721667a,2025-01-09T20:20:59.593000 CVE-2023-52486,0,0,931d7db046363d7eac30b1a64d095d58079d7cbe4dece1d8d75f3a1561b58746,2024-11-21T08:39:52.863000 CVE-2023-52487,0,0,de51440deae5dacc8c190c40f2337dde434f7fd0e2594ff02b6d5684b990366e,2024-12-12T17:31:37.627000 CVE-2023-52488,0,0,68738be0d8dede65f330b32169dd66b0b6cfe13f45fb773a272170dda25fe6ce,2024-11-21T08:39:53.130000 @@ -239999,7 +239999,7 @@ CVE-2023-52493,0,0,226a91067fa9e733403ac59e421c8bf19e75585ed93a94075b47dc216a323 CVE-2023-52494,0,0,f0f4e2f480da11c0cee1eca9412c32c9bb1a46f077cd45c0848506b3e664fd47,2024-11-21T08:39:53.987000 CVE-2023-52495,0,0,3848dd6249fb3b0098eceb1e102e5369e6a41e490097d267a2d230f8e731f05b,2024-11-21T08:39:54.103000 CVE-2023-52496,0,0,1ceff2e059153d5a5937cc8a150530bebb0b9a38b1ee039de0fbd3b5f63c655e,2024-03-08T11:15:06.913000 -CVE-2023-52497,0,0,5c521755172acd7be44d28abbbfde9e3cb0d6d7398832ce362c82b034250c419,2024-11-21T08:39:54.233000 +CVE-2023-52497,0,1,94fd6b58b926a91cb8098bc30bfcace92de1e085d39a09a073793b0edb7aec8e,2025-01-09T20:20:02.167000 CVE-2023-52498,0,0,065e116d7373a70de6fabe612c4006ae940715deb24209d18d3d1d28ec7bcbda,2024-12-12T17:32:20.050000 CVE-2023-52499,0,0,36d2ae89dfd4614baa32c134c04c9d2feb57673da7dc39f516646dcb8c9d8c1f,2024-11-21T08:39:54.483000 CVE-2023-5250,0,0,58ce2b34b475373736e77e988be92b15eb836a64d3c5382c9b7f18d2986aa016,2024-11-21T08:41:22.493000 @@ -243378,6 +243378,7 @@ CVE-2024-10204,0,0,c1aef3d759e33911bc7bc0be9dac4b362c17b81fcf2e1e72015f81b94fc1a CVE-2024-10205,0,0,9a0aaf8f4dd4934a818d3474215b87b0af2018b85b12463338a39662b937ebfb,2024-12-17T02:15:04.670000 CVE-2024-1021,0,0,56f2f9eee79bdc92dbb448a3c95eee6b8f89b4e054d4b7192e1d1c62db78aeca,2024-11-21T08:49:37.003000 CVE-2024-10214,0,0,467db0fceb73548b6a7ebc4075348a74b9e7e348b74ad43d9d19dc1d995ea230,2024-11-05T17:03:22.953000 +CVE-2024-10215,1,1,690b780025c01a63b91324817b83455a57d2fe23d09544ba821fabbbf8cd2a8f,2025-01-09T20:15:34.410000 CVE-2024-10216,0,0,3b33d4ace8102c37cd94e685981da92ecdd510dbca3a990bc771780d9758061a,2024-11-23T04:15:07.523000 CVE-2024-10217,0,0,1895a265d2132d6d454e49e4937a0fc01a8d5847eea053c3e93a0984b4bc0700,2024-11-21T17:15:08.813000 CVE-2024-10218,0,0,8c98b77c90ab06758cb11fcdce58d3e978735cbcd3800c729831353228a0e6df,2024-11-22T21:15:07.950000 @@ -243444,7 +243445,7 @@ CVE-2024-10299,0,0,a496cf015a8bf6d0e674665663d3fb40fcba3881e2bb805c40cbbf933df90 CVE-2024-1030,0,0,6d2d82ef3072f02e7c34d7489d5c3e0649bc9fdc5d37c6ed18885f5f961ee179,2024-11-21T08:49:38.293000 CVE-2024-10300,0,0,b331a7250f0bb5e96bf1a56c31d026cc1e60b1d8760e3a75fc1ea9661d4f29cf,2024-10-25T18:49:01.953000 CVE-2024-10301,0,0,1f7fa6a8df34271bc05be880ddb0769e183b93603d32248bd264a0ee91ace111,2024-10-25T18:47:54.033000 -CVE-2024-10308,0,0,2b81407bf1898f5d27b5f059fa7b855868e99ed561fa69641b6ebab8312c72f8,2024-11-26T11:15:16.920000 +CVE-2024-10308,0,1,7d25344eaafedd87dec065a0c2fdf72a371424d31caf12f177490522cd87b5ec,2025-01-09T20:30:43.060000 CVE-2024-1031,0,0,3efe13ab8e8ca0afb2b2c16acf09e60475f45cbc86bc8540948b9d2e079bf4c2,2024-11-21T08:49:38.437000 CVE-2024-10310,0,0,9ff9c4ae788e99e7944a2ba13b3b5ac1a4941438452794ec0f6f96d02747c9be,2024-11-04T13:06:20.190000 CVE-2024-10311,0,0,99dd0a164fd5d198ec222660ccc9d29dd982dc019194a41db7c03f5195e8b984,2024-11-19T17:03:19.177000 @@ -243582,7 +243583,7 @@ CVE-2024-10462,0,0,2786d011829da8771867443f24aa66a7980a2c1c4ede689df85c917119c6e CVE-2024-10463,0,0,3ddfd266b41fd173cebb851d2bc34cbf2c785db4b330494b6a3f4845aa6052a5,2024-11-04T13:31:20.073000 CVE-2024-10464,0,0,fa0fca4ba089b4bc982df15af00e5fe7b90b3385712043456e98d4b150175b15,2024-11-04T13:30:23.513000 CVE-2024-10465,0,0,8955d1f0157719f4fbefe7fae8269c4898adc0f8f926a16acb2d50f72eb39e2b,2024-11-04T13:30:10.847000 -CVE-2024-10466,0,1,56606dd3a844c97b0e77369c2884b635a3f644e0864760575415bc55442ba9d5,2025-01-09T18:15:27.253000 +CVE-2024-10466,0,0,56606dd3a844c97b0e77369c2884b635a3f644e0864760575415bc55442ba9d5,2025-01-09T18:15:27.253000 CVE-2024-10467,0,0,e1f34dd6104cfd3e09c5a71b6aa3ee970947971a56a24313d0f901ec95ffb9ce,2024-11-04T13:26:32.343000 CVE-2024-10468,0,0,2e0775a6f7da096b11ed271b6d824dfb524d1f0c9aba0d0194c0beb3e139a796,2024-11-04T13:29:23.937000 CVE-2024-10469,0,0,a0a81c5c238b5574bd50f73f6f4f4fb8256c54c21007050a70e7590fedc07d95,2024-11-05T16:51:35.450000 @@ -243635,7 +243636,7 @@ CVE-2024-10521,0,0,f7bfdcf48e9bf7480e023febd093f90408a44bab6aec43e2cc338ab0d3f56 CVE-2024-10522,0,0,1e8d26a1978fe59d2c13acd7d1429d6305d44d553647bab9c6da717f248808f0,2024-11-21T13:57:24.187000 CVE-2024-10523,0,0,7cc4719be638488b8b84233b435754a6a5dcc357f333b40290bb3e99a0f909ef,2024-11-08T15:14:30.070000 CVE-2024-10524,0,0,c2da650c8fb959e3655afb050ea98d59c38083a2db2a6841d4636c9a53404b99,2024-11-21T08:48:42.313000 -CVE-2024-10525,0,1,bda89aff8006f9fba1d6edcae335516aad3cff7775fec489bf06a3c7c2abf668,2025-01-09T18:15:27.403000 +CVE-2024-10525,0,0,bda89aff8006f9fba1d6edcae335516aad3cff7775fec489bf06a3c7c2abf668,2025-01-09T18:15:27.403000 CVE-2024-10526,0,0,6f7e328f774c00887292c6a9b6f09466273e7b5111063f43f180124280a00fc6,2024-11-08T19:01:03.880000 CVE-2024-10527,0,0,2ac72a7f22b2d63c7ccf4054363b685d4c86d8a1de32c24784406b994a4aa3ee,2025-01-07T05:15:09.497000 CVE-2024-10528,0,0,e18f91787a7b7b21f226c7e02b70dcb124a943b826e8ab41e00995ddf212c285,2024-11-21T13:57:24.187000 @@ -243966,7 +243967,7 @@ CVE-2024-10913,0,0,639e0b55d02891f5478b4712f7fb23002245caf49026270fe765e7bbdd3b7 CVE-2024-10914,0,0,0c0e1d2bc49848006e629bb079ed677411f0de4d90fb8273d64b81628c286fd7,2024-11-24T15:15:06.090000 CVE-2024-10915,0,0,f4d1f5fde3e41011229b6dda50918740fae123d55bbcbdab068e5991f4642cf8,2024-11-08T20:11:10.973000 CVE-2024-10916,0,0,c185625e4e8251922509c643eb1e03f44cb369b9bc576eca97c8d131f0a248b3,2024-11-08T20:11:37.567000 -CVE-2024-10917,0,1,84897b64fd1cc994ca19c4da8d78c402e8655004c7da87e25c0ffb4739accfa2,2025-01-09T18:08:16.097000 +CVE-2024-10917,0,0,84897b64fd1cc994ca19c4da8d78c402e8655004c7da87e25c0ffb4739accfa2,2025-01-09T18:08:16.097000 CVE-2024-10919,0,0,a1bcc0bbdb4661c8e486fd4d8b01a051ebf0ba38e9253021ca78ae5b5fc3b9aa,2024-11-08T21:07:58.383000 CVE-2024-1092,0,0,47c9be5ad5d6bfb5c86e50521ea7c7460de8f4234d2b7a56d90fcf159ceb457a,2024-11-21T08:49:46.720000 CVE-2024-10920,0,0,ceba72435cf6aaa11cd42a90b3be4de81e949f934bd61b9a123731c509825d85,2024-11-22T20:05:52.530000 @@ -244557,7 +244558,7 @@ CVE-2024-11608,0,0,8ddbc230a8730b76ffe6955779ba3c4d90ea8f23edd3f564c2db516009c0d CVE-2024-1161,0,0,68cc61ca71a85d6059ad02181ec1fb4a89655dbd3db8900d271e7a26ec14fb67,2024-11-21T08:49:56.127000 CVE-2024-11612,0,0,bb444eed2bab8dc9d7d3d2707a19c782bc9311cf8cab3a2875a904169993bb7a,2024-11-22T21:15:17.387000 CVE-2024-11613,0,0,3746b018d4d1f1fb0e968320de63f963db0e724636c6c2189025fbf55f5bc984,2025-01-08T07:15:26.407000 -CVE-2024-11614,0,1,1d826b2223c9231b79790e24a1be505b7093f92d797415bb25ce372201436776,2025-01-09T17:15:10.980000 +CVE-2024-11614,0,1,7fc209ca70347672f57de5cba21effe4e1d493165b83e201eaf5da4b6f065fbc,2025-01-09T19:15:17.283000 CVE-2024-11616,0,0,5cf2247f3b5e7ef2cbc9a5a8f08413199c8203f7939f04113ffefbe510dd1f2f,2024-12-19T10:15:13.323000 CVE-2024-11618,0,0,faa524e213716321f8f8b440fa9593fea7194f824084fdf0ccb0ec4689ef9c66,2024-11-22T19:15:05.437000 CVE-2024-11619,0,0,17535dfba9741d471fadae0fb91280b5ae16dfa5d4f7978c2708116e3a1ee713,2024-11-22T21:15:17.500000 @@ -245474,7 +245475,7 @@ CVE-2024-1288,0,0,395f2de724425f73212a7bc39e91c09ee4289c7b4882341dd1ed370b6c884f CVE-2024-12881,0,0,ca1a79d9bb91f6e4db066c4e6e2534703ac042b68f8ca082fdad0b99821d0028,2024-12-24T10:15:06.240000 CVE-2024-12883,0,0,0bf0bf880b43f2c020abd90d085e9b9d5a11ae03a3f46d1db6bb2e2224d99f41,2024-12-21T13:15:05.613000 CVE-2024-12884,0,0,d18bebc7e8ea4bb9dd78f55d85cf8532a09a6c1829256ff8629fe588f67e9ce5,2024-12-21T14:15:21.063000 -CVE-2024-1289,0,1,f8c8a55f2a440d9e8129941363295ecfe343266b0f62bd6ed92e6812c890397f,2025-01-09T17:41:10.137000 +CVE-2024-1289,0,0,f8c8a55f2a440d9e8129941363295ecfe343266b0f62bd6ed92e6812c890397f,2025-01-09T17:41:10.137000 CVE-2024-12890,0,0,610f0274b7ac3cad611dadc6fdaf386b425b77c844fa5525b1ada89ec1adcd36,2024-12-25T03:15:19.153000 CVE-2024-12891,0,0,cced707e3b2e51a766f709eaf2966827636b579e141e7587a71bc5464135ca83,2024-12-25T03:15:19.417000 CVE-2024-12892,0,0,eaa75b8a8cde0bc0db421dbeac542a3185f54a8e10b31f0b31e75b3bfd692ca9,2024-12-25T03:15:19.537000 @@ -245691,20 +245692,20 @@ CVE-2024-13188,0,0,cc95bf1d824c3b6096fc692ac535848a10cbc0f564544683f2277bd18e0fa CVE-2024-13189,0,0,03a8ad20b4285eaac39004c7eb28ba111ec68af46d0e0b846ef6e6119fec9713,2025-01-08T21:15:12.157000 CVE-2024-1319,0,0,e6fca38f8817c3f0a93cd5d73a5a9417a178ac65495356d684dc26f204fa5765,2024-11-21T08:50:19.530000 CVE-2024-13190,0,0,b6c3d265062c184bd417077d9b801b1b02f71d26f94736dd2a2e2e78d84e35b3,2025-01-08T21:15:12.303000 -CVE-2024-13191,0,1,acf48138d6f10b5ad792d98ea4234cf17f1a67d948d65a6cf617827e1a2497f6,2025-01-09T17:15:11.267000 -CVE-2024-13192,0,1,e60f95922c3aa1971207a21d39eaa051a48c816a3b8670f8f58232779772f9b7,2025-01-09T17:15:11.420000 -CVE-2024-13193,0,1,c717570d1de8a588005559d5f3413cb5d4e9b8ede95aff5f3aed1419254b9ed5,2025-01-09T17:15:11.553000 -CVE-2024-13194,0,1,11e2a2e8c4cc0ffb69f3c39f1fc80fb9211cf61f4ac8662c031e19a5df18a666,2025-01-09T17:15:11.690000 -CVE-2024-13195,0,1,edc056ffba3fa8234e3e803f085bac395a07db6dd9597d6a293bb2b8c96d2d0d,2025-01-09T17:15:11.827000 -CVE-2024-13196,0,1,1a221c779c5ec970f9284e25c7922a23733aa4e6f0efbd0d1f31eb314a0fbe2d,2025-01-09T17:15:11.957000 +CVE-2024-13191,0,0,acf48138d6f10b5ad792d98ea4234cf17f1a67d948d65a6cf617827e1a2497f6,2025-01-09T17:15:11.267000 +CVE-2024-13192,0,0,e60f95922c3aa1971207a21d39eaa051a48c816a3b8670f8f58232779772f9b7,2025-01-09T17:15:11.420000 +CVE-2024-13193,0,0,c717570d1de8a588005559d5f3413cb5d4e9b8ede95aff5f3aed1419254b9ed5,2025-01-09T17:15:11.553000 +CVE-2024-13194,0,0,11e2a2e8c4cc0ffb69f3c39f1fc80fb9211cf61f4ac8662c031e19a5df18a666,2025-01-09T17:15:11.690000 +CVE-2024-13195,0,0,edc056ffba3fa8234e3e803f085bac395a07db6dd9597d6a293bb2b8c96d2d0d,2025-01-09T17:15:11.827000 +CVE-2024-13196,0,0,1a221c779c5ec970f9284e25c7922a23733aa4e6f0efbd0d1f31eb314a0fbe2d,2025-01-09T17:15:11.957000 CVE-2024-13197,0,0,9d5153b5ece20b4134fcd83d45bfb87bfa57926a52f471a54f4b78f71b505855,2025-01-09T00:15:25.973000 CVE-2024-13198,0,0,fb551fc384ea0792648d5bb66449568fc33fc94e148fe1e77af2f5295ee93a0d,2025-01-09T01:15:07.970000 CVE-2024-13199,0,0,74cca34a7d6812099d39c24587e1ca3fb7095e9d4c634b9fd2572aab9ae8a82e,2025-01-09T01:15:08.170000 CVE-2024-1320,0,0,80370b3cf95d31a327dfcead0766151687bef5425baa11f9a4606b327981e1e5,2024-11-21T08:50:19.647000 CVE-2024-13200,0,0,23aa3e94582350485df0ae1018ff31c7a2c62819baa08903df7e716f12383814,2025-01-09T03:15:23.820000 CVE-2024-13201,0,0,98f9e9029ecdad1b3085258c9d21a620f38d90ac00edbfea61330f3072ab29fb,2025-01-09T03:15:24.020000 -CVE-2024-13202,0,1,669843cd2767e1362c6888d90dc9775472fa50b6493947d53887c22e9cf3d3bf,2025-01-09T17:15:12.110000 -CVE-2024-13203,0,1,c75812e8b13f4399ae4b97d3cdeab90eed4085ec212b5b871ccc90cb2595bb55,2025-01-09T17:15:12.280000 +CVE-2024-13202,0,0,669843cd2767e1362c6888d90dc9775472fa50b6493947d53887c22e9cf3d3bf,2025-01-09T17:15:12.110000 +CVE-2024-13203,0,0,c75812e8b13f4399ae4b97d3cdeab90eed4085ec212b5b871ccc90cb2595bb55,2025-01-09T17:15:12.280000 CVE-2024-13204,0,0,29b356ed8e68b4bf4c454a187403ce827799c9b4a8c71e1fb3c28ca6727e9acb,2025-01-09T03:15:24.603000 CVE-2024-13205,0,0,eab2280f118cc878917b605ffe82a4e3281effe9ad63660bef82b0a134012d58,2025-01-09T09:15:07.417000 CVE-2024-13206,0,0,3592680ac4f9d21850041d74074be88a605be70d439b1229b27538d812be260a,2025-01-09T04:15:10.990000 @@ -245716,11 +245717,62 @@ CVE-2024-13212,0,0,ff0beb27cac65c4a6f3cc8b1da05d950e23c9771e58602d6b2e6c2e39adc6 CVE-2024-13213,0,0,016ccce3890e239ab31550e74b6985f8dec7be64ed2f65e683828d651c08f2a3,2025-01-09T04:15:12.453000 CVE-2024-1322,0,0,a87df03aa9d8a817a942ae8ebad8afc3111ac175155d7ee73a384181ec986bff,2024-11-21T08:50:19.883000 CVE-2024-1323,0,0,63ac2cb10ca4755662ac35d59563526e26b5fa0e58c6b5db1bc1601423d748c8,2024-11-21T08:50:20.007000 +CVE-2024-13237,1,1,10e20958b238169b5a3384e6eea5cf29c710e5caf4d86543cf11faafd6ea9c00,2025-01-09T19:15:17.437000 +CVE-2024-13238,1,1,2e39241d5d23fac9c417b4ff8212529b11134fed0e3b0c31c4ea3a1d52abefe4,2025-01-09T19:15:17.557000 +CVE-2024-13239,1,1,da7a686cd90fd65fd7738d42ed8e08fa8319b12745be2ca2c60113d73299f298,2025-01-09T19:15:17.663000 CVE-2024-1324,0,0,0549bb3be448975952143ae81e24b0d5f65c09ae2158391af7244cb59e87fadb,2024-11-21T08:50:20.130000 +CVE-2024-13240,1,1,e8933f76da14edd0d2661725ae4c25f7451b58974046338e3a2e51cf0d9f028a,2025-01-09T19:15:17.780000 +CVE-2024-13241,1,1,b59e3509f7c085ceb57c4a37ae311d85c16565cce5a205718dcd30e8b5a8f3cd,2025-01-09T19:15:17.910000 +CVE-2024-13242,1,1,fe1dfb62b1d93d628a08b2ca7528bf13a7ab7813d1364079dfe28eb1841a7a2a,2025-01-09T19:15:18.033000 +CVE-2024-13243,1,1,3fd9676a3e6e8fe3bf7d9e18091b32c00a225cc6c8758cab23987f7873e59d9c,2025-01-09T19:15:18.140000 +CVE-2024-13244,1,1,775ed77d782218cc5ccec517c839499bf0f32259c9c7827dc11f45776baf34f0,2025-01-09T19:15:18.250000 +CVE-2024-13245,1,1,43369c54868cfa61bceed27626583cf97cd6e839cd245e630d76d8d7458102ed,2025-01-09T19:15:18.370000 +CVE-2024-13246,1,1,4a19c378913a3cfadcfc3ce0279e5a2d241ec6660b9d977d259f1f691dfb281f,2025-01-09T19:15:18.497000 +CVE-2024-13247,1,1,acdf8167af6ee56fe1240f7c316ec655927a485659e5bd76ab4d3b1d2797341d,2025-01-09T19:15:18.610000 +CVE-2024-13248,1,1,7b0e56e87979a86ec1aec01b5b22976b0ec5b91e25b51848a9e1d1a861d55f67,2025-01-09T19:15:18.730000 +CVE-2024-13249,1,1,518cd1595b3faaa29d902b2dc9f039ce18e3f65f1c2557a9b29726e3bf48cf3c,2025-01-09T19:15:18.857000 CVE-2024-1325,0,0,e675927cccf3d0d372acef6efb2eaf04f606a1c54fca901ae4401eb5c8b04d53,2024-11-21T08:50:20.267000 +CVE-2024-13250,1,1,efaecca925ebec4b3b03d1c55c218fca0d1c891d49fdad01be79fa7fb943632e,2025-01-09T19:15:18.980000 +CVE-2024-13251,1,1,775b7e228630b77959de26797529396012001bc3f095248d538783c409cf2bb1,2025-01-09T19:15:19.093000 +CVE-2024-13252,1,1,ca6f07522b08b960c7e806b8c077dbb3ce46cce3686f924ddcf41691c87a4e56,2025-01-09T19:15:19.207000 +CVE-2024-13253,1,1,0ef7c233e694a185fbaf2a7d30a17ef93ca5a517a92c8aed27238f8ed6eb93dd,2025-01-09T19:15:19.317000 +CVE-2024-13254,1,1,62aaadd210764ff09ed8c6d2fa027ccc3d6c043a76bfd38d1e7a7f38f4cdbb30,2025-01-09T19:15:19.437000 +CVE-2024-13255,1,1,f23aa68c565ada73c685eeee136c29fa310c184f3cd747c61146251e30cfb54f,2025-01-09T19:15:19.540000 +CVE-2024-13256,1,1,11e547f4971f35d5a5fb3066d0176eeea91a823fc3bba2e1b4412a5fddfcf9b4,2025-01-09T19:15:19.660000 +CVE-2024-13257,1,1,fac41b93489a7de6d7f561b7f8956440a092ecba65b43fe814f238bcd8c5a975,2025-01-09T19:15:19.773000 +CVE-2024-13258,1,1,aeaa967617399500229fb0db1f82e899763c28ea34db89d535318deb8dcce341,2025-01-09T19:15:19.887000 +CVE-2024-13259,1,1,847bdf53085c55b616b44742b476777f0ef26df1f5d5643cce46f06f6e7369d3,2025-01-09T19:15:19.997000 CVE-2024-1326,0,0,9e67bbc50998f668a02ee8ba73768b06fa72128aa10aae00eb85bacb556748d9,2024-11-21T08:50:20.387000 +CVE-2024-13260,1,1,41244fb1fbbbd75956059375be7c6cbfdc232919d4020c3f744c5a95abccd194,2025-01-09T20:15:34.650000 +CVE-2024-13261,1,1,6022057636ca2c81d7c6488b1ee6e8ee028e2c50c855969dd16ffc89858d687b,2025-01-09T20:15:34.763000 +CVE-2024-13262,1,1,a37b1cc9f3bf306ab964a9d8546d7d4543b9ce461c31b5b4d9b451599cb5af91,2025-01-09T20:15:34.890000 +CVE-2024-13263,1,1,ee37be80a32aa85f33748797fafa6e11c13599064e82fe265c156a1e319b2939,2025-01-09T20:15:35.007000 +CVE-2024-13264,1,1,5380113e15e67db4a8cd8fcf90a36b5c0183bd9c78777dc6f472209e105b0a89,2025-01-09T20:15:35.117000 +CVE-2024-13265,1,1,bf6f079404ad0ed392522dc17a402693c8dc8d810372186a8024b0a4292d56f8,2025-01-09T20:15:35.230000 +CVE-2024-13266,1,1,ba5beeab2e67c03a8848d4422a4fd0281b9c914a1dc1059649a689da4986a13e,2025-01-09T20:15:35.350000 +CVE-2024-13267,1,1,c8127bf5e682d56d8ed00729b3a5392b89ea0f2055cd6e9bbee155897879978d,2025-01-09T20:15:35.470000 +CVE-2024-13268,1,1,66228e6e5d080c7d02cdf91f4bc75fad89affc1f44d946b51498d1c5fa96d646,2025-01-09T20:15:35.577000 +CVE-2024-13269,1,1,89173d50481dd9c3dd00c4964571dbf5b50e8e809227bc275980470140b3e566,2025-01-09T20:15:35.687000 CVE-2024-1327,0,0,789dd020d2c87c02ae62114f801c74a34e4f582ed93f04eba3cce875a8422c5c,2024-11-21T08:50:20.510000 +CVE-2024-13270,1,1,4b9b0295f26291dc920513ba3dbec13cbd91323e9001242235ae0bed9fb76fba,2025-01-09T20:15:35.790000 +CVE-2024-13271,1,1,2921eb8aac132e58862c628ed5acfbafef3a82347e771fcb5982fdfb2f7554b6,2025-01-09T20:15:35.910000 +CVE-2024-13272,1,1,eca1c7019c61eba57716a5cd50e8f38a7181975831b73a749c4eebf76b773a12,2025-01-09T20:15:36.027000 +CVE-2024-13273,1,1,6d07752b4521dcadb126460eea42ec194290b4d148e43ae8bea8e77b2caddd7a,2025-01-09T20:15:36.137000 +CVE-2024-13274,1,1,5420aafd6bfcc7ec45fcd790cc0f73a5dd29cd822148e4edabe96351c390666b,2025-01-09T20:15:36.250000 +CVE-2024-13275,1,1,5c4b70690589a7d741db839da087a9bbf696363c71999877417181d7b29c9874,2025-01-09T20:15:36.367000 +CVE-2024-13276,1,1,f5b6c84083d57a033a0cdc1832bf8f7c954934c8d36653d3ca28110700b2d54e,2025-01-09T20:15:36.487000 +CVE-2024-13277,1,1,f0317518ee6ee193c5ed104f9a68d991cb81fb06678f9c831d9ce8a5c912de42,2025-01-09T20:15:36.593000 +CVE-2024-13278,1,1,ae362a55a371cc825a933a5d7545501fa9f32b2b4d7bfb7f298eea9d161cf6e2,2025-01-09T20:15:36.697000 +CVE-2024-13279,1,1,d3eb01474fe55ce7ab4cde892ad73b50bacdfed8710f6cd644417ce5fd19d28d,2025-01-09T20:15:36.803000 CVE-2024-1328,0,0,dbb4237e73752ffcf9cde870b857e7149465a2d39bacb143022da362e68b5939,2024-11-21T08:50:20.633000 +CVE-2024-13280,1,1,233adc8eee2ed9ec22db81499c12510e2dd7b10a2114334925ef626f19c68dda,2025-01-09T20:15:36.913000 +CVE-2024-13281,1,1,25ba753d09063042e5776be9ad8998b2998be48bbee8682864e24b8ba94f2777,2025-01-09T20:15:37.017000 +CVE-2024-13282,1,1,700ec3d4405aa9b627b560b3b9b4c67eb4793f69b4dc039ce0af23ff6b435106,2025-01-09T20:15:37.133000 +CVE-2024-13283,1,1,9b615066b18749a421b9eff82df58c670cd480fa7bc15cc8c5a0c22a17c8b5c5,2025-01-09T20:15:37.230000 +CVE-2024-13284,1,1,f29f36578b65f269a33c81fe5d9c1a986550d143312eff439e25779bf7934cd9,2025-01-09T20:15:37.343000 +CVE-2024-13285,1,1,3c2d960e80255c947cc21bff2fc9b9887bd9cbe7f247c7db73500733b093f1ff,2025-01-09T20:15:37.470000 +CVE-2024-13286,1,1,2be87bdad97df7101a80c97396cb7342869f882ce1accf2c5cfe477e3e869a95,2025-01-09T20:15:37.563000 +CVE-2024-13287,1,1,7906a094e70f1303f9491230307f037ede132ecb2ea5fcc4199e68a3c197f43b,2025-01-09T20:15:37.687000 CVE-2024-1329,0,0,81b4a64d5bb53c5c7897dd1baf274bad80194678ff3074e25c9eae4cebc9cdd9,2024-11-21T08:50:20.753000 CVE-2024-1330,0,0,502ca86aa36ef0d9cec38bb132d44e809a7c14b6c55791005f8847665ecf9895,2024-11-21T08:50:20.897000 CVE-2024-1331,0,0,b8018aa4d406613d3ec27aefa47c4e3b21af15db4ddfb753850f1de6f3ba1fdc,2024-11-21T08:50:21.027000 @@ -245853,7 +245905,7 @@ CVE-2024-1459,0,0,9213d5c5950fb349885acd6f33d7518e8e2bb30c455edfe98d707606280d04 CVE-2024-1460,0,0,f3508d6268168ff51da7bae2a13425bf7bbfb604f01657b6170165d3f033d6f0,2024-11-21T08:50:37.957000 CVE-2024-1461,0,0,f584e3dbeb8031a8d480cb017e172e2d88e2d972ca75e28d7328042b55e0ef9c,2024-11-21T08:50:38.083000 CVE-2024-1462,0,0,22404aaf8a49dc841b4dfb8015ef3d92bcfb9afb2b174c3158b4a5b6857e5937,2024-11-21T08:50:38.210000 -CVE-2024-1463,0,1,402ad10a9076e0d12b27e422fbf08211b1e50d8b2cda28da6995c2d0d67aa49b,2025-01-09T17:37:21.223000 +CVE-2024-1463,0,0,402ad10a9076e0d12b27e422fbf08211b1e50d8b2cda28da6995c2d0d67aa49b,2025-01-09T17:37:21.223000 CVE-2024-1464,0,0,774ba0954367abdcfc9850ebba4296f304d8bfcdbba1a93325f46f442fb6af2e,2024-11-21T08:50:38.453000 CVE-2024-1465,0,0,5ee667cd15d63ff1bbe794bed1e8ceb6109854a7af40827b767f317b47dc50fd,2024-11-21T08:50:38.583000 CVE-2024-1466,0,0,8462e6000ae5180e55e19d0c1e3e4e7bfb5efcb71a99f4875c7c2804764d132a,2024-11-21T08:50:38.723000 @@ -247840,14 +247892,14 @@ CVE-2024-21649,0,0,54d488167d1d0975c8b342047705765dfc3151cb90c0a55a8000cc54daaf3 CVE-2024-2165,0,0,4a31a6d91d3242051dcbc1617fbdf3ba15ae28351822c1fc41a20ca844201063,2024-11-21T09:09:09.983000 CVE-2024-21650,0,0,f658c0fb39e15b30e400a38390c76ca7a9a77dcaa8567d83c48a76ae5c14887e,2024-11-21T08:54:48.160000 CVE-2024-21651,0,0,16b0c06a04aeba8e56815db97190d0590ae7ef0906bf36b0aa5628fe6ff0e1be,2024-11-21T08:54:48.300000 -CVE-2024-21652,0,1,d07be696d5bb52beaa1c1e151c4cefaa921251ff1ccc2c3cd5f5566075400da0,2025-01-09T17:07:47.467000 +CVE-2024-21652,0,0,d07be696d5bb52beaa1c1e151c4cefaa921251ff1ccc2c3cd5f5566075400da0,2025-01-09T17:07:47.467000 CVE-2024-21653,0,0,169e104a462b299b24d5281eb2347f8bf28cce300608ff9eafc090b5fe658c8f,2024-11-21T08:54:48.557000 CVE-2024-21654,0,0,0432652f215b67605b7c479a49468ecf13be6bcc9b063e26538c3e8ad7f4fea9,2024-11-21T08:54:48.690000 CVE-2024-21655,0,0,4c9848ede5c5a5e4d8af6b99836034ed474c8bc1fe055a3d683588be9026972a,2024-11-21T08:54:48.830000 CVE-2024-21658,0,0,9d3fa73b71342af89bdceb8694a88e289f27b58a2e1ff3862bf598918c053308,2024-09-05T14:39:07.033000 CVE-2024-2166,0,0,0e1e1919501a3519ec6ba2cd34aa411b1b1638d368e58b2ec943ec508b97cdfb,2024-09-12T17:19:43.607000 -CVE-2024-21661,0,1,d0029b0881b1ad1d364c3e642429bd8ab18383218b309f924f71241c67a43ec2,2025-01-09T17:09:38.313000 -CVE-2024-21662,0,1,e2f55f8062f320299a8dc0a1abfa1eb618d6dd5d2b86435af3b6436f2ea31ad4,2025-01-09T17:13:17.787000 +CVE-2024-21661,0,0,d0029b0881b1ad1d364c3e642429bd8ab18383218b309f924f71241c67a43ec2,2025-01-09T17:09:38.313000 +CVE-2024-21662,0,0,e2f55f8062f320299a8dc0a1abfa1eb618d6dd5d2b86435af3b6436f2ea31ad4,2025-01-09T17:13:17.787000 CVE-2024-21663,0,0,eb06b721660c36b99c73f3d2df924d2a24661f0b38a294d250853c9f1ee8351b,2024-11-21T08:54:49.297000 CVE-2024-21664,0,0,71fc319be96e43f0d1e43ac61ee090ff4bb4971930079a7a94d5e1a0a71fbf40,2024-11-21T08:54:49.440000 CVE-2024-21665,0,0,9ba5d92ac742af8bd13743254a09c8b040b29cb921e9da46042fd29d4798c4d4,2024-11-21T08:54:49.570000 @@ -247992,7 +248044,7 @@ CVE-2024-21806,0,0,76d4e18b277b03f4ae237a28217dbc1a6a11559f17846f037fef87ba1a7f8 CVE-2024-21807,0,0,529e9675184111d1bad446f22de504075505951db4aacf2389a43e129efb9085,2024-08-14T17:49:14.177000 CVE-2024-21808,0,0,99c06a6ac8aafd8cfc1be0a3ffe3830fb507906fc97acb50afd6274df8d9a629,2024-11-15T14:00:09.720000 CVE-2024-21809,0,0,24fcee3a7e40290eb2f587b80df25e5c28865632e60a847cb4975adc8cd09ccc,2024-11-21T08:55:02.570000 -CVE-2024-2181,0,1,bc2ca43c87e79a2ce51f96614a32ea2ecec3c3ecdc0cc0dd84d4621bf4f6ed8d,2025-01-09T17:23:38.353000 +CVE-2024-2181,0,0,bc2ca43c87e79a2ce51f96614a32ea2ecec3c3ecdc0cc0dd84d4621bf4f6ed8d,2025-01-09T17:23:38.353000 CVE-2024-21810,0,0,4ec81a42073da00ef760857683f4253a4873020979c4273351a33968fe90eb90,2024-08-14T17:49:14.177000 CVE-2024-21812,0,0,9bd251e219bdd80ec43de87b0d9c078ead05f7995c400e0007210d917d930bdb,2024-11-21T08:55:02.837000 CVE-2024-21813,0,0,b1fc9b3e97ad72485455a9afd1ff849eaab839871473b3dbd01f9dd0eb9be42d,2024-11-21T08:55:02.970000 @@ -248010,7 +248062,7 @@ CVE-2024-21826,0,0,b0efc7f5a4c22e53138a44b26d2cc499c807e8e037949a506587f328c4cca CVE-2024-21827,0,0,c36386bd432c8750e8234f9244bc193acdc52668f3a181b754e89d9943e1c8e0,2024-11-21T08:55:04.703000 CVE-2024-21828,0,0,b164b76bc7cd799a77840173af04b2a57766f14977ac417f1dd4a3e0cffb84c1,2024-11-21T08:55:04.850000 CVE-2024-21829,0,0,a3890329332bbdcce67fee09f03e9c5301416e681ea55a6663f4bd36bb9063a7,2024-09-16T18:03:16.707000 -CVE-2024-2183,0,1,c646a897725dabe5bcb9009da3bad9a6c059b95445a34a278392561629394b06,2025-01-09T17:18:25.953000 +CVE-2024-2183,0,0,c646a897725dabe5bcb9009da3bad9a6c059b95445a34a278392561629394b06,2025-01-09T17:18:25.953000 CVE-2024-21831,0,0,ffab4fc0733292e4ab0051dfbbe5d66d4a29c6dfbff84c323978b1e919252979,2024-11-21T08:55:05.050000 CVE-2024-21832,0,0,a543193ce14a2f6105c329e10215b4a1a984fbb7cf333eb98ef6c70d95fdbee0,2024-11-21T08:55:05.190000 CVE-2024-21833,0,0,5474c8e97495795e56bb5529245d9c4477df95df31071d5afcbaf12bbac86e23,2024-11-21T08:55:05.320000 @@ -248044,7 +248096,7 @@ CVE-2024-21864,0,0,1ad6c5ce84b48a780ceb370fb663156ccd2e7fcace23a3692a69ffb642270 CVE-2024-21865,0,0,583fd7dd0aa12097e737a2985a06d8c2e10647eb7bd05007cef306e8670a0ed2,2024-11-21T08:55:08.667000 CVE-2024-21866,0,0,877a22cac4a3ed4e6886e06de6323d143f73ef29c73f7754337e7d90afe1e6da,2024-11-21T08:55:08.893000 CVE-2024-21869,0,0,e37c8a4889f9eaef99aadb2f6512dc2821c59f5e354397dfc83a1050590fa73d,2024-11-21T08:55:09.050000 -CVE-2024-2187,0,1,1103ee7372c5ea9ac3f366f5b222f200117c18c2fbd61f44534e2c7446ae9f16,2025-01-09T17:06:43.647000 +CVE-2024-2187,0,0,1103ee7372c5ea9ac3f366f5b222f200117c18c2fbd61f44534e2c7446ae9f16,2025-01-09T17:06:43.647000 CVE-2024-21870,0,0,badf69f6043aace3f7b6a967da51f0af6e837826e42326a804de4aa7dc210c5b,2024-11-21T08:55:09.200000 CVE-2024-21871,0,0,f8a7e9cf5225fbb0e781f6412f0aa5db749ca95cdb4723dd70ba04d75dc30359,2024-09-16T18:03:16.707000 CVE-2024-21872,0,0,4b0c6cee8b302b028ef21a0a92094f117e39cced90a58681537b45b6634a2770,2024-11-21T08:55:09.673000 @@ -248133,7 +248185,7 @@ CVE-2024-22006,0,0,827e1b4346c7d2f63a3b17949a7dfae8b21e0e402307dde51aec9cb10e443 CVE-2024-22007,0,0,e31d3bf903eccbdc7068cd7cf56113078f2c9796101f0ece8b3c3b8558989512,2024-11-21T08:55:21.843000 CVE-2024-22008,0,0,aa29cf9cc02bfddd9d70a5ca3303a493c82c32aece5905ff426753d2df23c115,2024-11-21T08:55:22.030000 CVE-2024-22009,0,0,356c7b90ddcb01019496a7866c880a1ee380480011d91dbf0c14c877bad8c3ed,2024-11-21T08:55:22.223000 -CVE-2024-2201,0,1,26eadb7aa2f5722f347c0f2e386bd97079dbdb8be46da7a582f3531a892ffe48,2025-01-09T17:15:12.423000 +CVE-2024-2201,0,0,26eadb7aa2f5722f347c0f2e386bd97079dbdb8be46da7a582f3531a892ffe48,2025-01-09T17:15:12.423000 CVE-2024-22010,0,0,24c05b548507772309ac4d10c2109cc2ada2f5baf0cb1151b04e10f65fa40a11,2024-11-21T08:55:22.450000 CVE-2024-22011,0,0,d82bce95d9a57da4eb5cf6d66a8bf1abb544ebef2a691e896b0fec8f38f6dcb4,2024-11-21T08:55:23.190000 CVE-2024-22012,0,0,7eaf97c43b8b09cc15e070e27a86dff00382532a39ca334b0b4081cfb62c637a,2024-11-21T08:55:23.300000 @@ -250173,7 +250225,7 @@ CVE-2024-24910,0,0,6b331799a881a5d956a87c006abe5e882f01b24bf255742ad3b49c624db6b CVE-2024-24912,0,0,7e4db9efaf9ed4fd90c3653c0c141095d6d30e8a8ae2098e663586572a626f62,2024-11-21T08:59:57.947000 CVE-2024-24914,0,0,6a184fa1912b50a75a0f68f12ef7de42e993a65d0e5eee8a5ac41cb6b37ddf0c,2024-11-08T19:01:03.880000 CVE-2024-24919,0,0,9aadd2e9c854a8a67a60668d9c22590b064c978b0416a05db6ed866127604e0a,2024-11-21T08:59:58.267000 -CVE-2024-2492,0,1,a9b15c0f5d53de03b8229afca1c8a7b4e7a78c54ba58e9584411863892de05ef,2025-01-09T17:01:54.423000 +CVE-2024-2492,0,0,a9b15c0f5d53de03b8229afca1c8a7b4e7a78c54ba58e9584411863892de05ef,2025-01-09T17:01:54.423000 CVE-2024-24920,0,0,dc0bb25ed0284e07ee39402f3b0f41ee21d4b48f63522bd3cf324ad5fae05c1c,2024-11-21T08:59:58.420000 CVE-2024-24921,0,0,8f706e27290a72f00e99beb011183b58fc2c1911b4de017a35ddd13c318006b9,2024-11-21T08:59:58.550000 CVE-2024-24922,0,0,1b5ddc6cc839e27c9fa6c23a962d4940d592e545aa73ef4f333480bcc9de46ef,2024-11-21T08:59:58.677000 @@ -251995,7 +252047,7 @@ CVE-2024-27181,0,0,b3d8f9ae033fe9425e96e2c32b25b9c40ba572e087bbcb02731b032d54736 CVE-2024-27182,0,0,2017951a0f0922b81637c60640e07bff6b09063f0b1392a856dafbccad14ffaa,2024-11-21T09:04:02.687000 CVE-2024-27183,0,0,48ab10b3350f1ae1731e1db75e99d9694b8a322932cc7ee1031e8528907b1523,2024-11-21T09:04:02.837000 CVE-2024-27184,0,0,56cfe9bf521c4025fc7306d696dd38c052e35ed39b34be3a4055d8fcad089df4,2024-11-04T21:35:04.690000 -CVE-2024-27185,0,0,6bdcc90cc52f425214aff534e4cac0e46a1351caaffb9ead44cf59562fb3c292,2024-09-22T05:15:11.530000 +CVE-2024-27185,0,1,723ceb7b514f0bd13d1bc6375c31557473f4e4b614137bc02ec2085478150de9,2025-01-09T20:15:37.793000 CVE-2024-27186,0,0,ae316f60dd5ce68834a87df30f4055f6e057bad53ab873077b981d58b9ac0490,2024-11-21T16:15:23.160000 CVE-2024-27187,0,0,0dc9e51a6ca3f52150fb21e09ca86bd8b992a3d999fcfe948147eedaf1db6f24,2024-08-21T12:30:33.697000 CVE-2024-27188,0,0,653e51cffcf48aae05ef34580c8b5687a22a4f6fa27435eb10884b261903827c,2024-11-21T09:04:03.573000 @@ -252098,9 +252150,9 @@ CVE-2024-27295,0,0,62b63c8181e69fdf30bf5e9ea58e339ce340673603d1ccec39c0824328ff8 CVE-2024-27296,0,0,bc7f110c759f40dab70b917dec22fad4a370b676b33c49ffc610915e7181e1a5,2025-01-03T16:14:03.593000 CVE-2024-27297,0,0,0f08fd661388c47fad3b951d015108d74fd35f9d302b8c4a28976eae1f793c8b,2024-11-21T09:04:16.323000 CVE-2024-27298,0,0,fec5a39b802dd251f2972424edfe42a5be7f6a4ad28011a2651a8684a41ac677,2024-11-21T09:04:16.450000 -CVE-2024-27299,0,1,029c976c3a15e4a9e0fa1ae958d30182e2a2f2bc16237dfb8bd97dafa3f1d373,2025-01-09T17:27:11.167000 +CVE-2024-27299,0,0,029c976c3a15e4a9e0fa1ae958d30182e2a2f2bc16237dfb8bd97dafa3f1d373,2025-01-09T17:27:11.167000 CVE-2024-2730,0,0,df1b973ea168bd529abdfe561b63ebe22b42d0397347bc19dfec242d8ab4a455,2024-11-21T09:10:23.560000 -CVE-2024-27300,0,1,9e706642da1bd8e241f0137aa604c7d67cff1fad8aea0794834e32177af2ce2f,2025-01-09T17:16:12.273000 +CVE-2024-27300,0,0,9e706642da1bd8e241f0137aa604c7d67cff1fad8aea0794834e32177af2ce2f,2025-01-09T17:16:12.273000 CVE-2024-27301,0,0,0dc0e7fcca77305d1b07d51dc5d6e87edec76f4b67ea0b4c91144191fc73c057,2024-11-21T09:04:16.860000 CVE-2024-27302,0,0,1126d35a4a36c0394d9e8298833cf3f9ca789e1f50e656755905c9a44280507f,2024-11-21T09:04:16.990000 CVE-2024-27303,0,0,446eb07103109107a6b5cb1a7ac6ddf2d6869e3efe4680886a25ae0d19a80f11,2024-11-21T09:04:17.120000 @@ -252726,10 +252778,10 @@ CVE-2024-28100,0,0,980f955c88bfadf6275346988b59f10331a2302846e8287402fe5dd637f02 CVE-2024-28101,0,0,d3e24250225aa03a59bada2716112342deb809a80686ab91bce6842f3db99a5d,2024-11-21T09:05:49.057000 CVE-2024-28102,0,0,682da8e2849dc300773abf6a2f9cef874ff737bc0ed2a603e2a929ee0c916d46,2024-11-21T09:05:49.187000 CVE-2024-28103,0,0,26a1df0a97af3e8bf340a44226684b9b3738afd934bc956d23ac51b24faba65f,2024-12-06T14:15:20.130000 -CVE-2024-28105,0,1,3d7f0801a14e97fd74c347cae6238482a850b73dbf921951bb6366754e4020c4,2025-01-09T17:14:59.820000 -CVE-2024-28106,0,1,c9c892ed3a63d3c501fdcf3427f58cec3ebcabe7ce215ddbab386dc4cc952f4e,2025-01-09T17:30:11.107000 -CVE-2024-28107,0,1,7c6301cd2def445412732372afe9db36c233a5f087a5c44bd12888a8d3a36ad1,2025-01-09T17:01:02.587000 -CVE-2024-28108,0,1,e40afdb5e8255dc79035044413036428adbd5d85ab1882d8c65ceebee6cd45aa,2025-01-09T17:00:12.770000 +CVE-2024-28105,0,0,3d7f0801a14e97fd74c347cae6238482a850b73dbf921951bb6366754e4020c4,2025-01-09T17:14:59.820000 +CVE-2024-28106,0,0,c9c892ed3a63d3c501fdcf3427f58cec3ebcabe7ce215ddbab386dc4cc952f4e,2025-01-09T17:30:11.107000 +CVE-2024-28107,0,0,7c6301cd2def445412732372afe9db36c233a5f087a5c44bd12888a8d3a36ad1,2025-01-09T17:01:02.587000 +CVE-2024-28108,0,0,e40afdb5e8255dc79035044413036428adbd5d85ab1882d8c65ceebee6cd45aa,2025-01-09T17:00:12.770000 CVE-2024-28109,0,0,1eccc18b2c79a7ac7c54d045aea775d6dfc7e6339edc2544d6cfaee6e307e069,2024-11-21T09:05:50.020000 CVE-2024-2811,0,0,7ca649efe599a5e9071e040230504b89a79c0c012685e27d28102b0fe39088dd,2024-11-21T09:10:34.833000 CVE-2024-28110,0,0,02bed29e56bb2de858376e909bccd6140b6410e0e47c817033bde5090de34af9,2024-11-21T09:05:50.160000 @@ -252800,7 +252852,7 @@ CVE-2024-28171,0,0,b5eb85b06e2fe7be5f52608a9079412a2fea6983ee47a02bf32589033a759 CVE-2024-28172,0,0,ba5b0fee0a00ad08e11b31067bab56fedfbf935900fad85372a5827fc2a22a1a,2024-09-06T18:36:10.863000 CVE-2024-28173,0,0,ea128472b844ae9d393924075ea3785042942393668417797d1acc5674d32bd2,2024-12-16T15:11:43.620000 CVE-2024-28174,0,0,6dfd63f7b3e20facd0f59fc87c055b11b6d81d8ff8cd2c3f65e9da350b856bce,2024-12-16T15:07:02.497000 -CVE-2024-28175,0,1,4e11aa87236922581b63e066b241a3364104fbe40e76d7a6ad650937e71103fd,2025-01-09T17:05:59.063000 +CVE-2024-28175,0,0,4e11aa87236922581b63e066b241a3364104fbe40e76d7a6ad650937e71103fd,2025-01-09T17:05:59.063000 CVE-2024-28176,0,0,8e2712bfe1ea7116f11f8ad9a2861387b20c6463817c56944eede5e5ddf4bb41,2024-11-21T09:05:57.947000 CVE-2024-28179,0,0,7f82026281e2dd9f15927caa04d85bc2295c5beb1cf03576e742ef34b4c15043,2024-11-21T09:05:58.083000 CVE-2024-2818,0,0,0911c1acc4d9c090902c611e6719e3f0aa3c0379c78a97d42dc069d2ec5f6dee,2024-12-11T20:25:14.693000 @@ -253318,11 +253370,11 @@ CVE-2024-29015,0,0,06c1b838b075a1a879d4d8d54604d2734c08c138ce56929733b0da42db823 CVE-2024-29018,0,0,dd2b327b1b89a160d0dcc0d1fd9caced193b0522fafea0be7b407f44deca809c,2024-11-21T09:07:22.967000 CVE-2024-29019,0,0,026ec98dc834f6d523b465baf78adf168519514bfb3421c37e8d04ec7939a04a,2024-11-21T09:07:23.103000 CVE-2024-2902,0,0,5a92101f6c46f7f827b30d4ea7de164ba2c47bb156416817b124bdaa60186338,2024-11-21T09:10:47.757000 -CVE-2024-29020,0,1,8f90e1cb77a1ceaa84ea4cf6d4be9c75bb14a140b161deca4c41951dcb67026b,2025-01-09T17:20:18.197000 +CVE-2024-29020,0,0,8f90e1cb77a1ceaa84ea4cf6d4be9c75bb14a140b161deca4c41951dcb67026b,2025-01-09T17:20:18.197000 CVE-2024-29021,0,0,9e8341fdbb48e58f80e64f4861525263812a0ee45b37f3a746ea08f58df39b3d,2024-11-21T09:07:23.363000 CVE-2024-29022,0,0,86f895eb5a53cafa1adfaf8cde76caee125e12a3ff10e40b6057327fa22e9146,2024-11-21T09:07:23.490000 CVE-2024-29023,0,0,0c820b82d2ed5532f56e9a9348cb517ea9c0268e38bf40413c10e5efe36e1813,2024-11-21T09:07:23.633000 -CVE-2024-29024,0,1,ce8b2e2cde3c04ad42badb051c3fc6cc3386c5bde2b110813cdb51094ac68b8b,2025-01-09T17:32:54.613000 +CVE-2024-29024,0,0,ce8b2e2cde3c04ad42badb051c3fc6cc3386c5bde2b110813cdb51094ac68b8b,2025-01-09T17:32:54.613000 CVE-2024-29025,0,0,826ab2dee9dbde3794adb211f664391825224c08f96b9e8c5616c8f0479d1cc6,2024-11-21T09:07:23.890000 CVE-2024-29026,0,0,de9ec356ac90fd02f902d916cd7e0bc293b4028e1231d8a4fe9b0d606b6adad1,2024-11-21T09:07:24.033000 CVE-2024-29027,0,0,cad2c3e3075aa793ecd13d5a6db3c7104155fc1583df44e70e041ebc7f10c285,2024-11-21T09:07:24.170000 @@ -253501,8 +253553,8 @@ CVE-2024-29197,0,0,d61f8497bf6f8a1e63c46af3032bfe6193f99315ea572729f627ecd15c526 CVE-2024-29199,0,0,09cc6e473adce584cd4120ccee4d6a5ea4bdb7bdd90b7f55d43dc2af16f0e4db,2024-11-21T09:07:47.030000 CVE-2024-2920,0,0,ef6630752834056fa8cc7ab93e97b2cf76454bf49c9150c8d1ff05dd4741ce0a,2024-11-21T09:10:50.530000 CVE-2024-29200,0,0,1a038098db45714aeb3be524d0e7d08f9c875e1682a6c96908006240e85006ba,2024-11-21T09:07:47.207000 -CVE-2024-29201,0,1,d4f88cbc449ca32f4337d3d80ac3afcfd9e94a086c4cac851e06f523ee1720b5,2025-01-09T17:27:57.507000 -CVE-2024-29202,0,1,f93edfef63733e54099856ce56ee5acae774a78dfee515517f6737409555dad7,2025-01-09T17:25:13.830000 +CVE-2024-29201,0,0,d4f88cbc449ca32f4337d3d80ac3afcfd9e94a086c4cac851e06f523ee1720b5,2025-01-09T17:27:57.507000 +CVE-2024-29202,0,0,f93edfef63733e54099856ce56ee5acae774a78dfee515517f6737409555dad7,2025-01-09T17:25:13.830000 CVE-2024-29203,0,0,1813e8028b7bc0528c264a6e32a5d135654cfcb37e81a5dc4f057d752095c16e,2024-11-21T09:07:48.683000 CVE-2024-29204,0,0,00ab4b14adeca5f5d21e564917bd6d569b919569639aefece1994d91ecb896c1,2024-11-21T09:07:48.817000 CVE-2024-29205,0,0,53ef7c3ad26899633cde74e815973ca9a9cd71e820133eb69be79ba5edce9e7d,2024-11-21T09:07:48.940000 @@ -254230,7 +254282,7 @@ CVE-2024-30259,0,0,e42f82650b326544824a7942dea3e4f1bca864483558e162f4766cf418ecb CVE-2024-3026,0,0,0265c65c29e3faf9e14ce421339b75d0c49c5a9b120df592e573d13166cf7114,2024-11-21T09:28:42.743000 CVE-2024-30260,0,0,cc9a5cb035977000add1b98317d4f5265395260876a998a92778c07dd57d0ebc,2024-12-18T19:19:52.700000 CVE-2024-30261,0,0,53f3e7a25054b613c460b461d895e55f8582a30f659005a13e118177da8af8f7,2024-12-18T19:21:11.997000 -CVE-2024-30262,0,1,c75418623ce4282aaea732f91535af2ee5258f551665cf707bc7609117f015b6,2025-01-09T17:51:27.337000 +CVE-2024-30262,0,0,c75418623ce4282aaea732f91535af2ee5258f551665cf707bc7609117f015b6,2025-01-09T17:51:27.337000 CVE-2024-30263,0,0,676cd87ad67fe0e3fa9353437e108815e1ea9f247524858608284a2f789b9b6e,2024-11-21T09:11:34.797000 CVE-2024-30264,0,0,14d2ca971995eba71386004463a81219c2276b3f7a585e4633a736eb9ec97e79,2024-11-21T09:11:34.930000 CVE-2024-30265,0,0,d4abcb1516125280d237f8b0221ea0c7b8b27200e1515d4ab137a5bf465457cc,2024-11-21T09:11:35.073000 @@ -254754,7 +254806,7 @@ CVE-2024-30952,0,0,72d1dfe3307157cf0218b430325d0f7f356225adeed2af6cfa844ec593d2a CVE-2024-30953,0,0,4a7e5400b8e5906b881b330f0b9fbeb133d6bed4fdcdd7823e19f9c53d690e4e,2024-11-21T09:12:38.263000 CVE-2024-3096,0,0,7d886574e1f435839864ee0eb7de15ccf0552c995885a07fa07c1a8c596cb5c2,2024-11-21T09:28:53.520000 CVE-2024-30961,0,0,4221b589f508fe85a62a1249a5989843b3524e92e94cb70b49e4fc5b77a8008c,2024-12-18T17:18:39.090000 -CVE-2024-30962,0,1,838f4eabd8279fa5458ee1cdf30504168223102a09ffc0612d19ab09174233b7,2025-01-09T17:15:12.600000 +CVE-2024-30962,0,0,838f4eabd8279fa5458ee1cdf30504168223102a09ffc0612d19ab09174233b7,2025-01-09T17:15:12.600000 CVE-2024-30963,0,0,0a75db7f7140274e974f16bb11e9295573007a72d0cf023f502e16f4d5e423fc,2024-12-06T20:15:24.757000 CVE-2024-30964,0,0,70b1ad6232e9bcc29f545cfae5ea320dd34fa9d64843f8665c751a120b917aba,2024-12-06T20:15:24.937000 CVE-2024-30965,0,0,d35880fd6e81f76629097cb2da19773a7bb8ced66853b42b46c70ca93712c8c2,2024-11-21T09:12:38.480000 @@ -255013,7 +255065,7 @@ CVE-2024-31274,0,0,a1886f2ec6183d543c9f6ae1c792852b3955820cb630506d01416d21e8f77 CVE-2024-31275,0,0,64c5847544bfef68b988e8973d60bc83b81e6499be9e4263ff343c14971e8ebc,2024-11-21T09:13:10.620000 CVE-2024-31276,0,0,57c75c9a0099c3119fb793282264d2d8cd693684c6d6d2adaaebad94e49fd129,2024-11-21T09:13:10.737000 CVE-2024-31277,0,0,c259796459f53a356f921a0ab1a9759674927569494b4d04d2698de492882dc3,2024-11-21T09:13:10.860000 -CVE-2024-31278,0,1,b493d289a595c7fe90e0e71cbf6c86edf8bc4944e4c9aa5881bcced81b0ad50a,2025-01-09T17:15:33.957000 +CVE-2024-31278,0,0,b493d289a595c7fe90e0e71cbf6c86edf8bc4944e4c9aa5881bcced81b0ad50a,2025-01-09T17:15:33.957000 CVE-2024-31279,0,0,16a55e529ed250ac76d344173827479c8f2cac77638f8283079e02fa4fe06630,2024-11-21T09:13:11.093000 CVE-2024-3128,0,0,58bab748f584a7d6c461ab73d6cf985fa2d5c45b73f524ac3a2bb4970a0a0478,2024-11-21T09:28:57.730000 CVE-2024-31280,0,0,c712c230f8566109c39c7508bcc86d7852e7811ab184534606df9f66377cdc9c,2024-11-21T09:13:11.217000 @@ -255519,17 +255571,17 @@ CVE-2024-31984,0,0,b4bce1cccec417df8c488a6c8ea406f24f03544b0961f6f609e32071b4544 CVE-2024-31985,0,0,10e30f55960ede6bbacbe03ee0c88306214bebaea3201825e6868c6625029fe3,2024-11-21T09:14:17.007000 CVE-2024-31986,0,0,1b2d2f1f4cbe5034b9e36e52f0f7d71b37d4498b2ce5c76d82bf880e08c5e2f5,2024-11-21T09:14:17.133000 CVE-2024-31987,0,0,abe9dd8f42bb86acd3cf6dee2fdd2a5b29c54d5566717eab7f11f7cd41a46abb,2024-11-21T09:14:17.267000 -CVE-2024-31988,0,1,e1f6fe0e57c15ec80e26442fc27a73e4d01b1cd5c9eee218db1d87a564cae068,2025-01-09T18:54:53.390000 +CVE-2024-31988,0,0,e1f6fe0e57c15ec80e26442fc27a73e4d01b1cd5c9eee218db1d87a564cae068,2025-01-09T18:54:53.390000 CVE-2024-31989,0,0,36cdf7afb424d91302a92c3464338da9f6357aa9b905adc4be0eba8e4665664b,2025-01-09T16:56:47.220000 CVE-2024-3199,0,0,f1dcc8fa9251a13b6d2329d451b94b037b8df3eb36a8c0ed1aff5360e1397f65,2024-11-21T09:29:08.080000 -CVE-2024-31990,0,1,4ffcd4cb931fab7999e9eb8c0fc52e9e3272d1dca2a60d8c32eb43175564f375,2025-01-09T17:04:35.590000 +CVE-2024-31990,0,0,4ffcd4cb931fab7999e9eb8c0fc52e9e3272d1dca2a60d8c32eb43175564f375,2025-01-09T17:04:35.590000 CVE-2024-31991,0,0,7132990e3ccaac0b0b4c4387127e74fed9a9b88698bbb13243710b1c6f82cdf3,2024-11-21T09:14:17.827000 CVE-2024-31992,0,0,5bed648fa01ba4454ee23bd04fdfe08449c13d9c9222e0b542f88edea3bcd509,2024-11-21T09:14:17.957000 CVE-2024-31993,0,0,99d6ea45a744da20d074affde12e43167c28e7e6358931aae79747bdd8b822f4,2024-11-21T09:14:18.083000 CVE-2024-31994,0,0,bfe6e4352560c2047425e44009e084be345bb6ee469af26d50d0326874d8858e,2024-11-21T09:14:18.210000 CVE-2024-31995,0,0,ba7074e8dce6574a8d648fc9b6c6b4c7092258a8c2104dfa1559335c4b2ef3ed,2024-11-21T09:14:18.343000 -CVE-2024-31996,0,1,326190cdadf52514c522ae263564f81a122a5335079c21dd2577b2ce188f0ce2,2025-01-09T18:50:19.793000 -CVE-2024-31997,0,0,2d79437a7f85d6113220833ba8d803f6fa7739c826e3740200055bcecb5b8fba,2024-11-21T09:14:18.613000 +CVE-2024-31996,0,0,326190cdadf52514c522ae263564f81a122a5335079c21dd2577b2ce188f0ce2,2025-01-09T18:50:19.793000 +CVE-2024-31997,0,1,1dd3fd932be272b1a162cec8343001ee2372502c26ecaaf5b40f9e6c3f035e9e,2025-01-09T19:02:51.310000 CVE-2024-31998,0,0,d6ea95431b77b27fb07c01029a2d52fc33a512ac243c748203b016a09c699234,2024-11-06T14:31:46.643000 CVE-2024-31999,0,0,206a0c6cf1f93e8f6a3dac28701082c070f928d2338babff4675ddf36251eca7,2024-11-21T09:14:18.877000 CVE-2024-3200,0,0,451728bc2f4558ed06016af71e5a2fc7617d8ccc011a1bf4d4e3e9a309dc5ec8,2024-11-21T09:29:08.203000 @@ -255559,9 +255611,9 @@ CVE-2024-32029,0,0,ec00582208fdbdbc31ad232b1ff8828b057f2b25e4f7f9338f4ce73ccf6c8 CVE-2024-3203,0,0,3920aec1a426ba484de5f6e1eaf612bb0e337a4eaf196d4d4fa8f02933d17cd9,2024-11-21T09:29:08.600000 CVE-2024-32030,0,0,7ab346951e5746ec7b6e6b83b5d2265e2532974224b95f7d8430a7ce3990347b,2024-11-21T09:14:21.720000 CVE-2024-32034,0,0,f9fc59a803fb9008f0d41053bab6a9b99be261b72e8c5e005adea690eeecf65a,2024-09-29T00:14:35.067000 -CVE-2024-32035,0,1,6aeed2ead32f8adfb0b64fd6ab5bcc5fc1dd7fc2e6fffe8e5f59626195350f6b,2025-01-09T18:35:14.097000 -CVE-2024-32036,0,1,b7bb0a68606be3a71619970156645c1c4a4fce8cd747e622f28c6010c1597a6b,2025-01-09T18:14:46.097000 -CVE-2024-32038,0,1,34cde6bba7f174368a97eb36a04d03123d5b022d383c07dafde4c8aa5c18b781,2025-01-09T17:38:55.253000 +CVE-2024-32035,0,0,6aeed2ead32f8adfb0b64fd6ab5bcc5fc1dd7fc2e6fffe8e5f59626195350f6b,2025-01-09T18:35:14.097000 +CVE-2024-32036,0,0,b7bb0a68606be3a71619970156645c1c4a4fce8cd747e622f28c6010c1597a6b,2025-01-09T18:14:46.097000 +CVE-2024-32038,0,0,34cde6bba7f174368a97eb36a04d03123d5b022d383c07dafde4c8aa5c18b781,2025-01-09T17:38:55.253000 CVE-2024-32039,0,0,172b56fd288615c495ce99e51746c3a0de4706d145dd4567480a61ff31cee532,2024-11-21T09:14:22.277000 CVE-2024-3204,0,0,f13d158bcc7e48b79878b6554bb4571b63a14430974be7abf4a50cd3a1dd815f,2024-11-21T09:29:08.737000 CVE-2024-32040,0,0,d492b81106c6beb3267701281662c07f0d6ebc5408a1c9d5f35e402821136610,2024-11-21T09:14:22.423000 @@ -258007,7 +258059,7 @@ CVE-2024-3531,0,0,23d0c7b1a7166f5e65dfceeb34a70c85de4a9a0ce8abcdd8fab845b5d07656 CVE-2024-35311,0,0,0a9884447508a8c4b5592bff8eaf170276b9abc20917003a90825427562ba7db,2024-11-21T17:15:13.347000 CVE-2024-35312,0,0,0e9eeec1fafa09527089df577b5dc429dcf629272eec2813de46dea048c289da,2024-11-21T09:20:07.750000 CVE-2024-35313,0,0,8893e6908e4186de2d99c10c154748b3e72a88437d81190adf4426acc4abc986,2024-11-21T09:20:07.963000 -CVE-2024-35314,0,1,f131d7bf0129777c4cbeaaa4d92a02a05a4a9539f308c388d7a6659c3458726b,2025-01-09T18:15:27.657000 +CVE-2024-35314,0,0,f131d7bf0129777c4cbeaaa4d92a02a05a4a9539f308c388d7a6659c3458726b,2025-01-09T18:15:27.657000 CVE-2024-35315,0,0,6b8b33bec8168042b2265685b6d8b17b6670b86b9f4170cd40449344d6e5a775,2024-10-23T21:35:04.820000 CVE-2024-3532,0,0,9029770965e23bed98a8e6fcbf7a8189b5f3660760b8414c96e71f43d05f80f8,2024-11-21T09:29:47.743000 CVE-2024-35324,0,0,d40878d0b364ff2aa3f9da2dd5b26959dab2d764b95186a59898f7ec71a304d2,2024-11-21T09:20:08.497000 @@ -259665,7 +259717,7 @@ CVE-2024-37388,0,0,57cf4af147a424250df7b46d4b3e45c17f1c85f1e3b7be38767484284423b CVE-2024-37389,0,0,1489604a1203f3e496edb5968007e7712bc53e8ecdd5d37a8fdbbb54a5a6e772,2024-11-21T09:23:46.127000 CVE-2024-3739,0,0,e485b7726bfb9c0e0538daf95db79a608df3dc6996a1c1fff88cd1b1e128d791,2024-11-21T09:30:17.087000 CVE-2024-37391,0,0,ca3da23ae64c68bb02a011ee1a09d0615672daad59ca1c5693578476561d5c24,2024-11-21T09:23:46.287000 -CVE-2024-37392,0,1,68322f4c961f1aabf72adbea5d801fad10c749a00a1f8ab2d2555d5ef58cceb8,2025-01-09T18:15:27.790000 +CVE-2024-37392,0,0,68322f4c961f1aabf72adbea5d801fad10c749a00a1f8ab2d2555d5ef58cceb8,2025-01-09T18:15:27.790000 CVE-2024-37393,0,0,59f9709c253a77f24571bf0211deb5a06ff1bfae384e16dec166534c4a1c2a5e,2024-11-21T09:23:46.627000 CVE-2024-37397,0,0,645394d57366af4d14bd72b0f709a5f25542d1f984f3b92daf1f425614dbe561,2024-09-13T16:35:09.630000 CVE-2024-37398,0,0,0f42760c0326cdea8f98f78b855bbf63b71770b97a72517371b459e84e271523,2024-11-18T15:23:23.543000 @@ -261163,7 +261215,7 @@ CVE-2024-39324,0,0,5b58097cc0f94f554b16fabf13a1485b606607c6996b61ebbc380a66c6ed8 CVE-2024-39325,0,0,2d63785eb179762c856eea2ec86fc3efa2f2c067bbb8d9d3b6088dc568ae60e3,2024-11-21T09:27:28 CVE-2024-39326,0,0,36a1fd07341b99cf706e1069ff0c3c0b0e50f721ea59b85388d56c1cba535054,2024-11-21T09:27:28.167000 CVE-2024-39329,0,0,7ff8e254c337ee0bc8d4995df77a5971be90342987fb55e2cc6c6590b4df097e,2024-11-21T09:27:28.300000 -CVE-2024-3933,0,1,df64f87f68ad2e15d5453047c42e0ed6cb0fa7b8af24502bdac6a78fb0f454aa,2025-01-09T18:00:53.140000 +CVE-2024-3933,0,0,df64f87f68ad2e15d5453047c42e0ed6cb0fa7b8af24502bdac6a78fb0f454aa,2025-01-09T18:00:53.140000 CVE-2024-39330,0,0,fbd31b5b3e2b3f2feac33fefc5ce863bbb8e247faa0695e58548f2d114ee1657,2024-11-21T09:27:28.523000 CVE-2024-39331,0,0,c3218ef0cc2065ce6a6b0d43e13fb5d22e0ea291a080f467587332028f9c9ea9,2024-11-21T09:27:28.767000 CVE-2024-39332,0,0,1f97303c758e324e488ed758e883e305ce844aaff7524d06547eb074ededefc3,2024-11-01T16:35:21.290000 @@ -261181,7 +261233,7 @@ CVE-2024-39345,0,0,288dda536354f2e2e51f07fe958b1f6cd5d729852cd898f4d9311bc6a8a95 CVE-2024-39347,0,0,c33e3d2207c9e4923512f386e77a574814cecd46daea64fc6a6dda15f247c205,2024-11-21T09:27:31.230000 CVE-2024-39348,0,0,428b8c1972131c0ce55ff4a36c1ce6fb48467e1060389452ae0ca9873e8c2719,2024-11-21T09:27:31.367000 CVE-2024-39349,0,0,8aa5bd0949ee78c8eb55113896c0d7ce5fea62e907b46fd618316727ce5ef924,2024-11-21T09:27:31.493000 -CVE-2024-3935,0,1,d0e8d28c71d917000fc24bed27b0727131e3b1924e46201d86ddecb3dcbe292d,2025-01-09T18:15:28.337000 +CVE-2024-3935,0,0,d0e8d28c71d917000fc24bed27b0727131e3b1924e46201d86ddecb3dcbe292d,2025-01-09T18:15:28.337000 CVE-2024-39350,0,0,fdb3462066732470a235bff29ba1732fe017e30a0d02a9750d159a0498864ed1,2024-11-21T09:27:31.610000 CVE-2024-39351,0,0,327607e1cddd67f4054754427f899db1dcdfcaad597984bb096ea9ebdc5a5b10,2024-11-21T09:27:31.737000 CVE-2024-39352,0,0,aa50c4c28f76901b5df9c043ad69006e02bf1ae5bd879b2160fb058e608db73a,2024-11-21T09:27:31.870000 @@ -261680,9 +261732,9 @@ CVE-2024-3992,0,0,9d0a83526969939eed159f705c3b354746b7a8d83202b0515f7bb495c21d5f CVE-2024-39920,0,0,2d0ffc6668fc09328c8963241ae091338acc28267b723bf4cce9dfe8a3e96d31,2024-11-21T09:28:34.183000 CVE-2024-39921,0,0,49001a97f0278f0e14d4db5d71b44e1a5319db15e20eb6a78c34ca1772d90358,2024-09-19T14:59:49.977000 CVE-2024-39922,0,0,a8dc02e2a842a455f004dd0b5df1804610e84cea12e85fbed80aea363d932723,2024-08-13T12:58:25.437000 -CVE-2024-39924,0,1,2a4f84bdece5ebd1f422a2fb884bfc5842ec713ad0f1b7b8cbc33e507dfb0a33,2025-01-09T18:15:27.987000 -CVE-2024-39925,0,1,9746dcc58fb8cecc9e1d89cf824e88cac8bc60fdcab25d7646a74784aca525c7,2025-01-09T18:15:28.117000 -CVE-2024-39926,0,1,4b5ea093d7330777157039117017f850139879a4c317f29d3725d66f7904f02a,2025-01-09T18:15:28.220000 +CVE-2024-39924,0,0,2a4f84bdece5ebd1f422a2fb884bfc5842ec713ad0f1b7b8cbc33e507dfb0a33,2025-01-09T18:15:27.987000 +CVE-2024-39925,0,0,9746dcc58fb8cecc9e1d89cf824e88cac8bc60fdcab25d7646a74784aca525c7,2025-01-09T18:15:28.117000 +CVE-2024-39926,0,0,4b5ea093d7330777157039117017f850139879a4c317f29d3725d66f7904f02a,2025-01-09T18:15:28.220000 CVE-2024-39927,0,0,d102506d349c6cd661c84f9625100fb5afa84e23351ca69840c038d426e26cb0,2024-11-21T09:28:35.253000 CVE-2024-39928,0,0,36746816d5a179f8dacaec6e67ea9b447cd0145aa354104fbfbe630b6bc05ce0,2024-11-21T09:28:35.457000 CVE-2024-39929,0,0,04314018109d25707b696ce9116201fdf7383da3c0539980ecfd791403ce71c1,2024-11-21T09:28:35.660000 @@ -261866,7 +261918,7 @@ CVE-2024-40520,0,0,b9e8206ad831d4183c67b97163ca3ed682671b246d73a71d1a597f7f45d08 CVE-2024-40521,0,0,ae047a4c9755ac73f684b7f0941a305f4323146bd7b307336fb333a8cfce5310,2024-11-21T09:31:15.090000 CVE-2024-40522,0,0,8eef24b9d8e0dcc70ead1fe8808b41ce24ce5596907f45eba9c6a7ab80fc20e9,2024-11-21T09:31:15.230000 CVE-2024-40524,0,0,c360f12c4bfad1491ba569fd349ef8ef67f64e6d75cee75cde38e96d5c2b403a,2024-11-21T09:31:15.370000 -CVE-2024-40530,0,0,c813b92d83735bf2ef9ab1c939a92a71a9fc839b852dfc7d2d809ae105664367,2024-08-28T19:15:08.717000 +CVE-2024-40530,0,1,a88973acd5182c7d5477951073ceb47f6215b532918c5a0211e9b6f5698cdb32,2025-01-09T20:15:37.910000 CVE-2024-40531,0,0,facddf5a5356ac59d142f32c736f824adb122a53278e3316122571f16100531b,2024-10-24T20:35:06.753000 CVE-2024-40535,0,0,4dd9654ceb2e74b3ba39977b64ad78777a74d23c30af34dc5b1d9600493b9c05,2024-11-21T09:31:15.947000 CVE-2024-40536,0,0,4a82d059a06e9cb5e42b7ac9c6dcd30861da36a1e67bbe47718864b13f28ec46,2024-12-06T21:15:07.800000 @@ -263607,6 +263659,7 @@ CVE-2024-4287,0,0,b8a2cf136b3083f6bb500806e5afada31dbc16efa97357879361c584285595 CVE-2024-4288,0,0,a90edbd9d891b348809fde369462e544cf47349997cd076b1f05ba954e1b5203,2024-11-21T09:42:32.860000 CVE-2024-42885,0,0,ee56590959e67a72b05a6cda20f46f0a9d3647870a63123321ef2d7e471b6b35,2024-09-05T18:35:07.060000 CVE-2024-4289,0,0,aeefeb9696ba85f6773564fa5c4f7cdcbdf5edbf7d32a7520045491e7a4d015f,2024-11-21T09:42:32.977000 +CVE-2024-42898,1,1,aaa55b3056073a83a9f84370f5bd1f8261138edfcd992bd7f67098df9afa6bfc,2025-01-09T20:15:38.093000 CVE-2024-4290,0,0,6a2079683ecc1d5a391a845f1e72b85d31a18e6140a0ac8996a297bb31d2d7cf,2024-11-21T09:42:33.080000 CVE-2024-42900,0,0,b64f85d57002cf7240c8feee5b45ad026c6f41850d03e921da1c59ae967003ac,2024-08-29T13:25:27.537000 CVE-2024-42901,0,0,9d4f70442012ad8f1030c7f39a3f1f96438ccca748283f1dbba48d1bb86b4254,2024-09-03T20:35:17.380000 @@ -264672,7 +264725,7 @@ CVE-2024-44076,0,0,6af0b6d3a9fd545c18b2cbe3a1962374d2a251366fb88bd4a15f852fa0525 CVE-2024-44080,0,0,dbdc43fdecbe62d26533a789437791b2e78dfe380d424585b4199d8341046d56,2024-11-01T12:57:35.843000 CVE-2024-44081,0,0,98e947bc87453398d4177d7385e310545b39f9298f98053aed9e474a1b7d768a,2024-11-21T09:36:15.807000 CVE-2024-44082,0,0,61c562a7d2817e001d21598a5165a2692cb61ee5ff6733f860a689ff2c3a8b81,2024-11-07T08:35:04.653000 -CVE-2024-44083,0,0,462290d8eeb683f4a6d9a553fcc20a8ca97bd984a4b48892dbb574f575bd6a49,2024-08-28T15:15:17.050000 +CVE-2024-44083,0,1,75881fef31a2b982ff0ccfe4e38720cb48da07607332cf3f3896b76bb3353c56,2025-01-09T20:15:38.220000 CVE-2024-44085,0,0,72510709f5b8546e822fe2fbaabf03396d601cc79d20ddfd7f25c7bf9ef45fef,2024-09-10T15:35:08.883000 CVE-2024-44087,0,0,b39808fb58a14b46cc8eaeb762f745c701cc6e9b6f80384c3c0a277421323581,2024-09-10T12:09:50.377000 CVE-2024-4409,0,0,bc1f0f31b03f43ef76b3b916f61ef48377f92665a3722f4ffb4a04feeaf1f7e1,2024-11-21T09:42:46.920000 @@ -264925,7 +264978,7 @@ CVE-2024-4448,0,0,356f34c44ac1109ec5528b933202fba5dcdfacf158a90e9f78c9882d9c4396 CVE-2024-4449,0,0,e0f013aaee4b2f3a95f1ce013908a251c37d824202f60baaf056feb992729f5c,2024-11-21T09:42:51.207000 CVE-2024-4450,0,0,02e484232dba5ed729e6871e0f75add019f9f5e1494153f0f3ce664a865195ee,2024-11-21T09:42:51.320000 CVE-2024-4451,0,0,faf07e9f83c53ae5ef942ca91b86c49b80b994759e8a08c8a30c23242182311a,2024-11-21T09:42:51.450000 -CVE-2024-4452,0,1,31e0967488cd58f7aa1b5a425ccebf2e29782f1d55559ce85e4cf68972ed27f9,2025-01-09T17:46:34.190000 +CVE-2024-4452,0,0,31e0967488cd58f7aa1b5a425ccebf2e29782f1d55559ce85e4cf68972ed27f9,2025-01-09T17:46:34.190000 CVE-2024-4453,0,0,4b6d5e2b75a7f55cb1a08aaeb38fe98756bad9bb2af40909de7772f9630d03c8,2024-12-17T16:05:41.267000 CVE-2024-4454,0,0,1e6371293057edf678c7077995a2115f685fb23dd798633163e8fe89ef2481d3,2024-11-21T09:42:51.820000 CVE-2024-44540,0,0,a3ed3256f272f75cb9da6472ccef92e78443ceab0d9d284cfb0ef32a1d8d4528,2024-09-26T13:32:55.343000 @@ -265460,7 +265513,7 @@ CVE-2024-45342,0,0,a4a31e9769756ae24649b74b18bd2d95ae5ebb0482440ad62570ce13c5ec4 CVE-2024-45343,0,0,318ff9ada4e764bd6c635c00720e7b9030062bb890baf82a7e3f16a4a83b72fb,2025-01-08T20:15:27.690000 CVE-2024-45344,0,0,af604bd20c17ff15fecd0779ea006a02560ba533390f654e0b99f1b752eeb5b0,2025-01-08T20:15:27.753000 CVE-2024-45345,0,0,4e5002e5dc81035c1af4e238f5f319df35e1e7454ff3bb9f51dea50624303a65,2025-01-08T20:15:27.843000 -CVE-2024-45346,0,1,7e5d27b5e0bb35d703afc2aa4711ce7de5023d11e83b251a6cc5a4802c05e84f,2025-01-09T18:15:28.703000 +CVE-2024-45346,0,0,7e5d27b5e0bb35d703afc2aa4711ce7de5023d11e83b251a6cc5a4802c05e84f,2025-01-09T18:15:28.703000 CVE-2024-45348,0,0,1e1db77a5a16312aa537fb47b5ac485ad4a9ec1edf7b08e9d1addf2cc98471e9,2024-11-25T17:14:11.713000 CVE-2024-4535,0,0,09bcb906ab5065886bd16710eccdce15006e447ef07dbc5cac7e797ac8618de8,2024-11-21T09:43:03.457000 CVE-2024-4536,0,0,4b3bb059b8c4b443afb737a7d17afc4c59a3d98104768be082395fc2da2d1c1f,2024-11-21T09:43:03.563000 @@ -266023,6 +266076,7 @@ CVE-2024-46489,0,0,8af935ea59345c18a65a02a5934ad59e5a604855494058e15126d177378ce CVE-2024-4649,0,0,4d2745585cf315e835fe49b119863dc16ab23ffa6a0fb55c521fd42730ee3aba,2024-11-21T09:43:17.160000 CVE-2024-4650,0,0,e996a369330ff048d5d46394badf00f4a99aa8d6c43da1d218c2935f28245e26,2024-11-21T09:43:17.287000 CVE-2024-46503,0,0,4f133c90e139e687d3dd9079c4687fb4224dd448ab71bd78013c69a7fcf35624,2024-10-10T14:15:05.183000 +CVE-2024-46505,1,1,5c523d6875b198ca38ff85b254785b56a9cb84ac573f83c23f2c54d3ae278629,2025-01-09T20:15:38.377000 CVE-2024-4651,0,0,304016477f2e0da8d2c810f11ab42c8694b0d1d56c9a6b57832c85592f3b17e5,2024-11-21T09:43:18.380000 CVE-2024-46510,0,0,e9a3205dddab0350f50c282da49e122f35ec4d8f62968fc04b06d0d1993acf5f,2024-10-04T13:51:25.567000 CVE-2024-46511,0,0,3a87227fab118194b35c27ec843f20409610bb66e9a3053a91cfd554e931eb81,2024-10-04T13:51:25.567000 @@ -266401,7 +266455,7 @@ CVE-2024-46966,0,0,9cdd2da38a787da29e0b07f0d6dcd10da33561e25fc912ee27f59b8909bf7 CVE-2024-4697,0,0,6e9eec3fc18bbe27148fb3ae709181d18ecd5466c486132eee5af6541f60f69a,2024-11-21T09:43:23.923000 CVE-2024-46970,0,0,47f126874782e42ba0255278170be39f81b73559fd27fec798ec0eacead9eab6,2024-09-20T13:23:29.700000 CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d2585bf,2024-12-16T17:15:09.957000 -CVE-2024-46972,0,1,e19d7ffbd835a75458fdf16b6890ed1469688eeb0b4a5070c87028b8ff0ad2ab,2025-01-09T17:15:15.030000 +CVE-2024-46972,0,0,e19d7ffbd835a75458fdf16b6890ed1469688eeb0b4a5070c87028b8ff0ad2ab,2025-01-09T17:15:15.030000 CVE-2024-46973,0,0,0437a0b4f343551c70c990e4fd559a1c21cac753a3df1f8e90ebfba823ecbaf4,2024-12-28T17:15:07.420000 CVE-2024-46976,0,0,4b4725b042b8e303031ca8672630aa4c44d9489240e1be2826c29862d55b367d,2025-01-03T14:52:32.863000 CVE-2024-46977,0,0,fa1cd1ba8936d67d5921849fcc8f3d7b6f2a4d12d9e5b79d9c6367bb65d4c705,2024-10-31T14:15:05.870000 @@ -266605,7 +266659,7 @@ CVE-2024-47211,0,0,7cfbe4caeb9c6d5ba2e34fa790cad31c3986781c114cbdc021a3c5c02b889 CVE-2024-47218,0,0,db03414a0794c64478156435016e14cfdd9450c8bd09172385f11c2f30d16310,2024-09-26T13:32:55.343000 CVE-2024-47219,0,0,a066954bcdf131c2608027bab8859b20b54f044bb76995c0988c392d4a5406dc,2024-09-26T13:32:55.343000 CVE-2024-4722,0,0,96582af672d613cfa9970b043f1eac8395cd5d640cf951f3f6b3e11b7d203b4f,2024-11-21T09:43:27.247000 -CVE-2024-47220,0,1,f3ac3c597af9e4605453ec7e5003d51d9fc5b1c12997e286134131bb5771e3d4,2025-01-09T18:15:28.837000 +CVE-2024-47220,0,0,f3ac3c597af9e4605453ec7e5003d51d9fc5b1c12997e286134131bb5771e3d4,2025-01-09T18:15:28.837000 CVE-2024-47221,0,0,6586d4b6a5f70567bb6f944b6ad5719be99d34fce6bc621a87ed63336d72d9c7,2024-09-29T00:45:21.857000 CVE-2024-47222,0,0,80460d9e41d9d1f0107c02303de9aee8a6c8c1b10aac319fd663ff09822e6371,2024-09-30T14:02:23.007000 CVE-2024-47223,0,0,793e25c409356d9e47267c562ba592bb3512ca8ad2a6d2411ca48d0873dfd90f,2024-10-23T15:12:34.673000 @@ -267313,7 +267367,7 @@ CVE-2024-48057,0,0,854d29e18299ec9a1432f3ae60c1d2f8a2a34c19fade5fa224384e18ef65d CVE-2024-48059,0,0,e3f8f61737f0f9774697a61977452d4dae1cbee369a51fc5b18151dbe27d571a,2024-11-05T22:35:11.853000 CVE-2024-4806,0,0,ea496445e8906e3cada79f16e1d81111de69a431eec4fc799e3d8f629850f684,2024-11-21T09:43:39.443000 CVE-2024-48061,0,0,c3afd0be420d46b48a1d04be347f8e2033ef28ce6389eb40de53225f069aad4f,2024-11-06T20:35:30.633000 -CVE-2024-48063,0,1,1d03a7efb1a1db2536eca44b92894033a1489c5fbb298c8e426e8e37701b1e05,2025-01-09T18:15:29.013000 +CVE-2024-48063,0,0,1d03a7efb1a1db2536eca44b92894033a1489c5fbb298c8e426e8e37701b1e05,2025-01-09T18:15:29.013000 CVE-2024-48068,0,0,bb6dc3535d4672a7bcb126cd1559794d6c1e87939838408c4a28db34964048a0,2024-11-21T19:15:10.450000 CVE-2024-48069,0,0,25f7c3d129df2700b13d73f848ad60548a82ca182f5e27ecad466fc9255b912f,2024-11-21T17:15:18.473000 CVE-2024-4807,0,0,46c92bf5ec52610bda8bdc7f7e863c92a19dcdac9694e247c9c9c199c9338db4,2024-11-21T09:43:39.597000 @@ -267695,7 +267749,7 @@ CVE-2024-48951,0,0,9955e0a528c62a806e0f9a01557426333b92f2f1c309f49ea9b5a584817df CVE-2024-48952,0,0,63abb6d7c6cbe19516ecef34081aac5ecb1d40c537dba83cb235852186459c78,2024-11-08T19:01:03.880000 CVE-2024-48953,0,0,ac3302a48298a2fa902983e4973a1540afc2a7d3db14674d5f84dd13d808f0eb,2024-11-08T19:01:03.880000 CVE-2024-48954,0,0,ff9a31bf4829bfeb29bee0e4bfc2eb280078b0d07e27c4d23a3f5a4e5e4b0bcb,2024-11-08T19:01:03.880000 -CVE-2024-48955,0,1,a3108d376c8b903d220cbce5e7e8e91e6b2d3c44a8e39acb1ba1f4a9e9beae2b,2025-01-09T18:15:29.147000 +CVE-2024-48955,0,0,a3108d376c8b903d220cbce5e7e8e91e6b2d3c44a8e39acb1ba1f4a9e9beae2b,2025-01-09T18:15:29.147000 CVE-2024-48956,0,0,9a1115047fe5f91c0b35a738e9d434eb676aac44fa3639e4e54df697b71fe710,2025-01-06T21:15:14.573000 CVE-2024-48957,0,0,5fcdfcbeaa463107575a01d5356d8785a9ae755870410379189773fce30e9e71,2024-12-02T14:58:55.063000 CVE-2024-48958,0,0,4bd7d702f5c7b44ad567fb715dd16e3f71bc515beb7581dcafc207e9d8028dfc,2024-12-02T14:58:37.067000 @@ -267765,8 +267819,8 @@ CVE-2024-49030,0,0,2e9bdd41be8c6b131482b7fa5c2474f60463f96e2e4a1f61a7a2417bc008e CVE-2024-49031,0,0,b6bd610cb414001b2fe0908269ea9d036981a0042f84e32fcc97364c22e45e62,2024-11-18T20:31:54.983000 CVE-2024-49032,0,0,2e3ed76a18e7e440c4779b1b39efc25e7929e757a805c700d9f6cf42038a1a1e,2024-11-18T20:31:05.720000 CVE-2024-49033,0,0,0b8161312cdfc9b642b95e25fdd7fb28f8da9471a1a685f531281e8315cca116,2024-11-16T00:05:44.867000 -CVE-2024-49035,0,0,c5228ba3e33e2a155d501f707a40c215e7b1100eb60da83ef1d35c8ea2a2ef05,2024-11-26T20:15:31.763000 -CVE-2024-49038,0,0,77d8f65c945f48e649a9e70424035cba2bbc28072d30e33d5132ea454ee6b475,2024-11-26T20:15:31.943000 +CVE-2024-49035,0,1,b8c5253f989db480a09b22c2721a40bec353954b7c849014eb3accde35704a43,2025-01-09T19:33:26.117000 +CVE-2024-49038,0,1,d819cb8c436c8d1f23a8ef402cfafd0e6fa1953b75147b2b89c5ea3174acc4d3,2025-01-09T19:30:34.403000 CVE-2024-49039,0,0,1b38f44a621b2ec6c9245d6149c0d2e4243dd86623a9535e85cd3047ada03cbc,2024-11-14T15:20:51.670000 CVE-2024-4904,0,0,8f1d8ea4c71693b63388d0102ac60b48cb8ea1f86873e76d3239d3cadf4cec58,2024-11-21T09:43:50.007000 CVE-2024-49040,0,0,5d0b4fb7954b8696818411a1e9fccbcaf7848a4d687b1b89ca1a2a3a7950420c,2024-11-16T00:05:03.997000 @@ -269326,8 +269380,8 @@ CVE-2024-51152,0,0,967cbcfc73dbc16287d55b13cbb722195fe5f82a6511062fdf0ca56b7f903 CVE-2024-51156,0,0,f6b77151c60afbaf8d53a59734fbafa7af1588cdd272b2836099779a91a2a862,2024-11-18T18:35:06.703000 CVE-2024-51157,0,0,bbafa78b8a50c8fb1e7d4159721fdaf4c3afe6250954e7dd9b5098d387a20e07,2024-11-18T15:35:13.060000 CVE-2024-5116,0,0,c5d4b1414f08ab8180681382cdebd9ce0ef5c88379a43ca5ef4e39d2558da1ad,2024-11-21T09:47:00.263000 -CVE-2024-51162,0,0,aa98991254878ca92d6b685fabb0999d9cd2433fd346cf67581df76b7299d30e,2024-11-22T17:15:09.353000 -CVE-2024-51163,0,0,909afcfaa554939e2c78d7e7af80c5c6961aa7c27e1f5cf118fbed2c52564f74,2024-11-27T18:15:17.760000 +CVE-2024-51162,0,1,175972f50cb93084a5390f5cf7d25d5a4c84556568d36394113e0a9ae61b830c,2025-01-09T20:15:38.510000 +CVE-2024-51163,0,1,b22c31ecceab106c5c84cc77252b05e4b3041cdb311ac47c63ddff6d55fac7d2,2025-01-09T20:15:38.690000 CVE-2024-51164,0,0,d940764ceb362d708d88f9f5a08c2c1f5532b8b37b034d71dff6267e64a0a937,2024-12-09T17:15:09.107000 CVE-2024-51165,0,0,fb13fc4e35d92e7921bbef9ce68653c7bfa08c0c1cb970241bfa8c45e1d3cd41,2024-12-11T15:15:15.067000 CVE-2024-5117,0,0,5e271946d97109af9825c50a9b323ef04401bb4942989f9cb9a1e16ac2b2951d,2024-11-21T09:47:00.397000 @@ -270852,7 +270906,7 @@ CVE-2024-53554,0,0,21a54d7bc341c058102c672add5c6a39faba0998e6b5d3050bab27868ab59 CVE-2024-53555,0,0,98c9cd71300d5c5a0ee8cfe56c2efb641372e5ee4508b44193ca67680ed7c7bd,2024-11-26T21:15:08.560000 CVE-2024-53556,0,0,197a1e9e5d0cdfa43597989d9978403511315370ea045225b596c7a587a5fd41,2024-11-27T17:15:14.917000 CVE-2024-5356,0,0,8f1946b6e2ffce8dd75d8f13404335223fd7f289a256fdd41018e919f0c821b6,2024-11-21T09:47:29.267000 -CVE-2024-53564,0,1,9ab937f1953e956617795aaf18dddda75dd03cf95a1ae2a6d6ee23cedb4ba889,2025-01-09T17:15:15.423000 +CVE-2024-53564,0,0,9ab937f1953e956617795aaf18dddda75dd03cf95a1ae2a6d6ee23cedb4ba889,2025-01-09T17:15:15.423000 CVE-2024-53566,0,0,fc369a1b56664965996271c6928e1c8e2a064ca2d4eb527d8b2effd8b48ca032,2024-12-02T18:15:11.500000 CVE-2024-5357,0,0,9057606a4938c9bbcd6685626eec47e410331b31cc1665fb8c9e75b9a990e3a5,2024-11-21T09:47:29.400000 CVE-2024-5358,0,0,ba9d3d6f584bd09e4f2a4dbb07d0235a0771fbffd077ecd2b7b801a3c6466c2b,2024-11-21T09:47:29.543000 @@ -271588,6 +271642,7 @@ CVE-2024-5469,0,0,0593227e51e97383649ced684c68d7aaf013a250af5a8e55d4376628432995 CVE-2024-5470,0,0,b70339f8a022f56de8d4eb030bd8f5d3563ba0fc9c1634fd55ea697aee92ede9,2024-11-21T09:47:44.787000 CVE-2024-5471,0,0,631b7a50303d6f9a193814092037f29379ca6ca2282e0b67207306f8abcc9ba4,2024-11-21T09:47:44.903000 CVE-2024-5472,0,0,5e12957cd076edb077638ab18db3a7202837e8fd64948bba00e3365a85b54117,2024-11-21T09:47:45.027000 +CVE-2024-54724,1,1,1a09193dee038e553a3943fb6ccd0ff000e0be0d96537e2c07a02ed7805b4067,2025-01-09T20:15:38.863000 CVE-2024-5473,0,0,fdd6160c6121db618882f16bfc9c17f8c3a2501715cb9519638ef5a1fcd2441d,2024-11-21T09:47:45.190000 CVE-2024-54731,0,0,2ffd034fdf35990d080b6bfc4726e5afad46fa0e5f0cc3333d57d2c77c4ac0e3,2025-01-08T05:15:11.810000 CVE-2024-5474,0,0,63893131768de13d83eb37c8075bce21b1c0f49d4d852fdf9f27e69aab8b3e48,2024-11-15T17:00:35.697000 @@ -271597,6 +271652,8 @@ CVE-2024-54749,0,0,2c9d895fdb5b90a3967a9403130c1863e1d8648bd0343f58138b0aee4bfec CVE-2024-5475,0,0,3f93fbbe9009c236ea2c6da72827f7bd871ace2e1ffd3b439453d8900914ef7f,2024-11-21T09:47:45.480000 CVE-2024-54750,0,0,a2b9bd793ac60105835f796550f4eca54ad7139b40ad2fdf283a28d5ab7647fe,2024-12-09T23:15:34.020000 CVE-2024-54751,0,0,1362ae63d46fa3e6e13ddf6e48994d99d3189782d67a09cf0bde552f8a9a1b0f,2024-12-11T16:15:14.910000 +CVE-2024-54761,1,1,bbf84ca7487cf49450f6370b8c997b53f4532d26b4c540973d0db23583e50876,2025-01-09T20:15:38.990000 +CVE-2024-54762,1,1,698303387a4f954b8287fe38edc65a0c04ff09f5c32c14507705fe6464310878,2025-01-09T20:15:39.140000 CVE-2024-54763,0,0,a28abc0036bf5dd37db3abf51504ee9d8814d71bd02efc1ca179d108a93c5f59,2025-01-07T22:15:30.950000 CVE-2024-54764,0,0,a35d44940374d4d013f3417b0c39eadc28db9efc4fa6d67b447b188437088daa,2025-01-07T22:15:31.113000 CVE-2024-54767,0,0,7c02cf0b0d6cbdcad4d274fa0bc8d056590e80886a47139f828b2d63cc3bf859,2025-01-07T16:15:36.157000 @@ -271621,6 +271678,7 @@ CVE-2024-5487,0,0,9fbfbc79e6dff8c3b550139a3c2eecf9b7c4bdde8704bc6cfe1f3d5f4415c8 CVE-2024-54879,0,0,b29885c9d1f972b1a85e410837486f9a5cbdaaa5454176171e37cc430fed9212,2025-01-07T21:15:12.170000 CVE-2024-5488,0,0,703a569b98e6f1a8130cee58df129e22e6ef47912a99f32d5a452e25c6109519,2024-11-21T09:47:46.633000 CVE-2024-54880,0,0,e5b3a5485624ea2d9e12e0827ea5724e74a008cbdfa4830f07e177ce5a2b6b3e,2025-01-07T21:15:12.367000 +CVE-2024-54887,1,1,11e8ddc91935b9fbe4f352d53e17bcacfe25c55cc861de0e154d8392ceaa584b,2025-01-09T20:15:39.277000 CVE-2024-5489,0,0,6c00a6a2badf83516471ea1d81b619bbe482cb4a54de89ffa7bd06f7fa1ffabd,2024-11-21T09:47:46.807000 CVE-2024-5490,0,0,7e66a0f19af78ba5ab311e474f6c7a834b406cb5857b42d263e55e1190767452,2024-08-27T14:36:10.033000 CVE-2024-54907,0,0,80a392b1154d757e3dee13d617bee74a64b3baf8f41f4c6bebbb399698b18a69,2024-12-26T20:15:21.800000 @@ -271747,6 +271805,7 @@ CVE-2024-55471,0,0,53c8545095dcd233b02e5b5368ccdda8e9894ef3eef3c8dd7b456e3a987cf CVE-2024-5548,0,0,960acca9fdb4c73166f01cb6cab77802df52faee348d661f3dcdec3a5e889741,2024-11-21T09:47:54.380000 CVE-2024-5549,0,0,523dae47b6780776874c36c71ab66f8ac6e8e99599490648ee341f214b628e63,2024-11-21T09:47:54.507000 CVE-2024-55492,0,0,8ed1b6fc2ceef3fd61acd090adb38bc92ce31dd641c3b527d1e8f1507c1a53ee,2024-12-18T19:15:11.777000 +CVE-2024-55494,1,1,53c7bb1bfd8c66b0293309cdb0c5591fc782ec4aded2f3ec4a3667bed3ce3f0f,2025-01-09T20:15:39.400000 CVE-2024-55496,0,0,c5e38095d75676960b7fbf7f58bdc885b4b159f2f77ece315454c30d8284a24b,2024-12-20T21:15:09.090000 CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e870c,2024-11-21T09:47:54.640000 CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000 @@ -271764,7 +271823,7 @@ CVE-2024-5552,0,0,779c8b119b5a7bc042c6e25c9be4959c8015ea49092434c017d15512182ef4 CVE-2024-55529,0,0,59094f574a1ef2f6096a3e5fba1fa56f532a786844da89e23934c518ec5e2e07,2025-01-06T20:15:39.163000 CVE-2024-5553,0,0,c6aeec952a2778be27c1792a1d1c97b8ff8c01ca6ed08226c6b506a6f771b767,2024-11-21T09:47:55.040000 CVE-2024-55538,0,0,67bd56020d7a76419d848694822e6e545c69b0a5adc3b05464d4d5160a8064ea,2025-01-02T15:15:23.933000 -CVE-2024-55539,0,1,f458db4a5ff47752a8a05ab76298a754be66b6f65eac9c3cadabf0854aa3f5af,2025-01-09T17:15:16.057000 +CVE-2024-55539,0,0,f458db4a5ff47752a8a05ab76298a754be66b6f65eac9c3cadabf0854aa3f5af,2025-01-09T17:15:16.057000 CVE-2024-5554,0,0,3fb8d13bac6e351fa1470fa96b8178263946ef86d2aae872feb00193d95f3ac4,2024-11-21T09:47:55.160000 CVE-2024-55540,0,0,d204904edb4fccfaf3016ffa5e42409a320ac73e8ff7b952fc42dfaaa37df7c2,2025-01-02T16:15:07.847000 CVE-2024-55541,0,0,a2596ad27a39d4519762857435104e268d4f3a7d0c4701f9ce0e61a9ad103da4,2025-01-02T16:15:07.970000 @@ -272004,6 +272063,8 @@ CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93 CVE-2024-5610,0,0,c876fccd541dbbe5edac90b3257f7d2b3efde4d5bff83326921f06d03b7a383e,2025-01-08T23:15:09.653000 CVE-2024-5611,0,0,52c51c7a288f3c0ab122ffc809ef2624c3045fff37cac024f8608d70739aac41,2024-11-21T09:48:00.920000 CVE-2024-56112,0,0,9c37554a9e3e8121be632deb2b2e9ed13eeb0233b63a1c1f431c838fba55a392,2024-12-16T16:15:10.313000 +CVE-2024-56113,1,1,22e3565988ff4046d5c46e3365d34dfe7a115e834a14a63e0823ad57a0ef8391,2025-01-09T20:15:39.603000 +CVE-2024-56114,1,1,f02c2ad4d7ecf61e5fdce904c466ce41d4413b0292bff9e1ea986774cc1bdbf2,2025-01-09T20:15:39.730000 CVE-2024-56115,0,0,ccfdd8ee6f18e71a09e80e77c239dd784626f96d64ab8285164962abb0ea0b53,2024-12-31T20:16:07.903000 CVE-2024-56116,0,0,5e9e1abf1b4a263f6e9c895ad87cdc1730c02159e6e176fd37997ee62e12a317,2024-12-31T20:16:08.107000 CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000 @@ -272449,14 +272510,14 @@ CVE-2024-56715,0,0,c871af568cc13cfc36043e505f66a67055fb99524fa956bab4dbade56d02e CVE-2024-56716,0,0,6aa674312318253ed698928dc2c776b98db2725ca8b37ba053438507cc25eeed,2025-01-09T16:16:23.387000 CVE-2024-56717,0,0,6f99c7e7110cdf00a886c02bba11dfcfd51ee3613588581ce948a32c1d2c0844,2024-12-29T09:15:06.907000 CVE-2024-56718,0,0,79ded20f7b176b2dcc95a692c7af31bc57850e5b2bca5f3ea071c18aa952ec66,2024-12-29T09:15:07.040000 -CVE-2024-56719,0,0,a6791b71c9fe2c2a4367a8ec97965265ce00a3f428bca5f378d8f47e797e7c75,2024-12-29T09:15:07.187000 +CVE-2024-56719,0,1,1c27f9a03a384d5fd377e6dfe47d26fecb18e68ca15507a00581be407915c1a3,2025-01-09T20:10:50.880000 CVE-2024-5672,0,0,959d4e0f075fbde1ffae4f52f6c938c4cdb5c2c3237469dedb1dd077104a3da1,2024-11-21T09:48:07.940000 -CVE-2024-56720,0,0,f1894d176c3843b16f248e5e33aa1184343593d3c043d32ebca2f0fb85f5bb70,2024-12-29T12:15:06.037000 -CVE-2024-56721,0,0,da79a7e8d7831c53b2554dacb5d2a4d5e35aa93844d97cb8d926e567d99e4138,2024-12-29T12:15:06.173000 -CVE-2024-56722,0,0,192422b70068428db5159f813742cbd379b4942193fab87be93196e507d9a1e3,2024-12-29T12:15:06.283000 -CVE-2024-56723,0,0,0764f6d84894612c4c7bcea08560405887033e9e40f0569eb053145caa946b02,2024-12-29T12:15:06.390000 -CVE-2024-56724,0,0,cc2f7e3f8dc8d55c1d83c89cb0d90d388267abaf43e50a6614a9271f4c5533d9,2024-12-29T12:15:06.490000 -CVE-2024-56725,0,0,0d8c143455dd4c74ade00023de074d019020f9329ec8ea40eab7f04748540c97,2024-12-29T12:15:06.607000 +CVE-2024-56720,0,1,25c0211d40339384008a34527546ad7f9ed5e2281c8a536193add0ae9e37503f,2025-01-09T20:06:46.267000 +CVE-2024-56721,0,1,856072bc7e4a145278651a8768c410fd53c262d8ccfba70b6a4818b4b618f440,2025-01-09T20:33:31.123000 +CVE-2024-56722,0,1,ae523bfef66be8ac8db03b6281c46ed138bc0cd23020b89c4880237aaf64f9c7,2025-01-09T20:27:20.513000 +CVE-2024-56723,0,1,b53b12f0e89163007ad51706d20a7a05abebc9290336cbf7112a99a23baa37dd,2025-01-09T20:25:59 +CVE-2024-56724,0,1,311c9a289315bd6c2cdc2647099917b635ba8671dfca572821d79e9db66bf6a4,2025-01-09T20:25:25.567000 +CVE-2024-56725,0,1,66a6701af17811370d018a8a46243c870c748466da03baf1abed6ac592f576a3,2025-01-09T20:24:34.887000 CVE-2024-56726,0,0,7396cabb8e6cb5316a0d2b902b918bc1194670ee7afa660cbe82cee81253f4d0,2025-01-06T17:10:17.110000 CVE-2024-56727,0,0,eabc494dc2a4c2aa78fd4293bd969b774f7d696451c6d2e61e97848894874fc8,2025-01-06T17:09:19.120000 CVE-2024-56728,0,0,9876b31ab8f2f62b05d07e7b6cd6963d4d5c3e44378c964e0a90a0aa79c2c6a4,2025-01-07T22:03:07.837000 @@ -272505,8 +272566,8 @@ CVE-2024-56769,0,0,9afe24f702f08d9e4e1e481a58433d2a2d8f571a11e5ae36fd93a1a461164 CVE-2024-5677,0,0,1c94c489b32a2f3740f8b8867e0aff380d1e56445098bb97785a4bdba0037977,2024-11-21T09:48:08.540000 CVE-2024-56770,0,0,5854677383e6e820e5cdee945ad65b74d897b00edb04a3c6bca2e9d3611a9af1,2025-01-08T17:15:15.957000 CVE-2024-56771,0,0,16debccc3dc015a954cd6ee94102c2e7557ae015b0ea137433964de6f0cf971b,2025-01-08T18:15:17.777000 -CVE-2024-56772,0,0,732eac8f17b6d58e14e471b97d114891caad2cf101f502b91ea6d35636ec7930,2025-01-08T18:15:17.897000 -CVE-2024-56773,0,0,c85be71c1ebfc03df93cfcd74219d78187693ca219f6f260001a1bd7767bb67e,2025-01-08T18:15:18.087000 +CVE-2024-56772,0,1,53bee03f948bc2d4c6530bfff88bee1e427418d7cb2bbee84aa63b1d648ae36b,2025-01-09T20:57:26.077000 +CVE-2024-56773,0,1,1cc6764905a1f08bf917642e2aa4fbfd2818cc691ca3ecf1d232789cde1d7ef7,2025-01-09T20:59:54.917000 CVE-2024-56774,0,0,0da5f66a47122293c436b992b97d785d57c5af5a49e631e1eb4d05b74ff92000,2025-01-08T18:15:18.213000 CVE-2024-56775,0,0,b9e7adfd2a8199f2639dddd6b4cbd9e878680795ac280bc15ab94c7b45c609db,2025-01-08T18:15:18.333000 CVE-2024-56776,0,0,64b0f03755bb848ec120fc2bb2876d2b0be15b47212a61bcc711824a49e19188,2025-01-08T18:15:18.447000 @@ -274129,7 +274190,7 @@ CVE-2024-7469,0,0,bb75caf7cb65c45c8dba86f795cbaa04e526b6e4e89be055fefe937e458a8d CVE-2024-7470,0,0,03f483b2cf92aebe2ccf72a1e355fb62429e8a567a66341b73a9acc14d8a17db,2024-08-06T17:37:07.923000 CVE-2024-7472,0,0,de0c1c1a6d606e95989fe7fe23b929a31aec4fa2eabaf43817b16d022442051b,2024-10-31T18:46:32.497000 CVE-2024-7473,0,0,b8dc981d2d85278013abb8b222f018481282dc1a8b74ff93c8c1b319e96a9851,2024-11-03T17:15:15.493000 -CVE-2024-7474,0,1,e7381da2ea17372bd3b4b7483233e7d6adb698842bf2e26af5a04b1b55bee22c,2025-01-09T18:15:29.380000 +CVE-2024-7474,0,0,e7381da2ea17372bd3b4b7483233e7d6adb698842bf2e26af5a04b1b55bee22c,2025-01-09T18:15:29.380000 CVE-2024-7475,0,0,7bbd1b2dc6caeee9f6f7cf58e1447eb5146831b0c5f989701c0b6c3d0833ecff,2024-11-04T13:55:37.233000 CVE-2024-7477,0,0,6c6434fc676e81002c750c9627714098eaf963ca81b6eff0a8aeb3b62c2e1988,2024-09-11T15:03:06.637000 CVE-2024-7479,0,0,2ea71efff98f3f4975f4e7b351509dce6668cdd1c5b196a9e030ff840526ff07,2024-09-26T13:32:02.803000 @@ -274414,7 +274475,7 @@ CVE-2024-7799,0,0,ae93761b2febde8a3d4f3898ed454dbc28a7b3cf13c8abaaf207206a701f33 CVE-2024-7800,0,0,c36121d111b485122618523d29ece4f8f3e97c88204ba9e525313dd56916742b,2024-08-19T16:50:39.993000 CVE-2024-7801,0,0,de1c174e4d255134bca63a0c587454638d0b42c255fffd4a5f0594c369c20f8e,2024-10-17T15:19:27.053000 CVE-2024-7805,0,0,135d6da17dfa4c84aefd569e9d92e16548bde418c54a07f703c8b45a0b8c6cd9,2024-09-11T14:15:13.560000 -CVE-2024-7807,0,1,2f79e8d22e5d6ed09b318ab38ea343291c76b7890ace2830ff2b3c8694390017,2025-01-09T18:15:29.543000 +CVE-2024-7807,0,0,2f79e8d22e5d6ed09b318ab38ea343291c76b7890ace2830ff2b3c8694390017,2025-01-09T18:15:29.543000 CVE-2024-7808,0,0,7ac11306e30eff8e50a7b86f7aac8fe9c520c3fd210bead54deae1abf746387a,2024-08-19T18:07:44.270000 CVE-2024-7809,0,0,954ad4e20519f99939aae234167e2e1a513a575114d1fd0d8c005f141a3c37b6,2024-08-19T18:11:18.537000 CVE-2024-7810,0,0,048c5f698b16572eb13dbdde0a6f3f441c9e5f84a2c20bd6d58d137b28d8cf16,2024-08-19T18:12:14.090000 @@ -275326,7 +275387,7 @@ CVE-2024-8892,0,0,2bc42170fdadb33e24d097620e456d4331ea0e177116b9a61aed31427fea67 CVE-2024-8894,0,0,2afcf79da1ae860d0dea9bd3bcd6b3bd6c1b1aa1ddaa7801de097bd759b666b2,2024-12-04T12:15:20.763000 CVE-2024-8896,0,0,15db3dca334d16efce2b5cc93aa60cd50f1976bd9a02ff816eabd5e356b493e7,2024-11-01T16:27:16.693000 CVE-2024-8897,0,0,0fdfc9f71cfefedb0c7a5c55250fccd8899f2bafda1fe770d540ced5f92374b3,2024-09-25T19:49:02.493000 -CVE-2024-8899,0,0,f30f92ecd84badbe1c27b1d542a743c8acc55351a0e163bbc543c519dd7bfed6,2024-11-26T11:22:09.257000 +CVE-2024-8899,0,1,d4d2e6da4e618e821cb5129e519082f71d663f816a3adbdb6b5ea787e5713422,2025-01-09T20:28:09.003000 CVE-2024-8900,0,0,d3f4089befe66027b0f1c31c786919fba68b80f7363185072eb03d6b6da1b262,2024-10-30T15:35:26.207000 CVE-2024-8901,0,0,16179fb8da6b3691e42eb050c6acdbb5e9f1051b767f4e4a93bcfac530038965,2024-10-23T21:15:14.950000 CVE-2024-8902,0,0,562a2a8b6b19d45ced54e0584113549612b1e122270fd069c6c63552fab4593c,2024-10-15T12:57:46.880000 @@ -275557,7 +275618,7 @@ CVE-2024-9198,0,0,641d70ca97204854d04cbb4e4de612cfeb0ea4b8a4de965802073ac66a64a6 CVE-2024-9199,0,0,f7f1a8a24bf77060d991f64fa7f7c0b4d559bd9f8178b591e0115e53c808ca9b,2024-10-02T14:33:54.607000 CVE-2024-9200,0,0,268033b29e5d5ec23682d3c2261f73c93d30dbc35f0494171f700f2cf700f3f2,2024-12-03T02:15:17.913000 CVE-2024-9201,0,0,a603a5f3c75637d1be95df4b70d6e145f324aff77ebb4cdfe846a3ab7d10d550,2024-10-16T16:55:44.817000 -CVE-2024-9202,0,1,9bec358a87a528c01972a943c5055d439c78f9ca4e83bdd54a6636d2aa789bdb,2025-01-09T18:07:29.847000 +CVE-2024-9202,0,0,9bec358a87a528c01972a943c5055d439c78f9ca4e83bdd54a6636d2aa789bdb,2025-01-09T18:07:29.847000 CVE-2024-9203,0,0,4e20a4fb9410ceed746d6ea9a7aaaba3d229704545b019ce0319b7b1b02a3f4c,2024-09-30T12:46:20.237000 CVE-2024-9204,0,0,a5160d78b40684d13a0abe78f0110c3f251288d3f2bddb167ad6ebb658dbfbfc,2024-10-16T14:26:41.423000 CVE-2024-9205,0,0,5ae9601368f3bcca980df59978014460b19f7164118a2dcd7e7fa2f27092d41f,2024-10-15T14:16:53.337000 @@ -275857,7 +275918,7 @@ CVE-2024-9571,0,0,a31a4b971a17ba063b7e695e5ff5e7f74d34f79c0a71c27999cdaf9c9e34b6 CVE-2024-9572,0,0,0c000f870df1b4dfe4767576eb0b04ae65b10dc9ed03c6ad1f54fea004037a15,2024-10-08T18:45:03.117000 CVE-2024-9573,0,0,896c9b96b3ee6f06964287ac30a7aab9f8a0342e9079034b52b5cb43f27d5120,2024-10-08T18:45:09.057000 CVE-2024-9574,0,0,36d06474ebb9a7a11deab9285a868e6ee3306f993dd2f673b63881253e71b3b6,2024-10-08T18:45:13.147000 -CVE-2024-9575,0,1,99a3fca3901d3328d83c2282ab301542da23b187bbb75a369a1d634547d143ca,2025-01-09T18:15:29.763000 +CVE-2024-9575,0,0,99a3fca3901d3328d83c2282ab301542da23b187bbb75a369a1d634547d143ca,2025-01-09T18:15:29.763000 CVE-2024-9576,0,0,f8df6627dc8e668a24b77e8b044c7a10ae532dbc042e210d713186b99b0fb9e1,2024-11-12T19:34:37.910000 CVE-2024-9578,0,0,9ac6a0f631f50f5201c328a5712a4c754e59a6b507571c157dd5bee87bb7472e,2024-11-13T17:01:16.850000 CVE-2024-9579,0,0,9b5787a1e02c2c45dc866f289e070dd790e24d1ae554f06594bb1b24c390d960,2024-11-08T18:08:02.683000 @@ -276282,9 +276343,9 @@ CVE-2025-0299,0,0,46c993a70c9dd5843cd4dc3486123b8f79f076cb607c745df442454088b3fb CVE-2025-0300,0,0,6462b093b202cdda5c643638789beb08104cb14d8ff95eb1f2f740fecb0f8630,2025-01-07T17:15:32.090000 CVE-2025-0301,0,0,db7e09db06a3c89075ef99c6e0773ce8d9b6391802870d788b13b4dc1d994dbc,2025-01-07T18:15:21.460000 CVE-2025-0306,0,0,b68f04c884b94c2988081809303425e8fc9d9a1826584b2811a6c0892a02e108,2025-01-09T04:15:13 -CVE-2025-0328,0,1,511489195998b544d95e473f59edc225df3f03b898b8949ae54b7be85757b835,2025-01-09T17:15:17.330000 -CVE-2025-0331,0,1,5d1653aab10b087569df4f8a29838e92935196f68c8f8116069a88ef7b3aacf8,2025-01-09T17:15:17.933000 -CVE-2025-0333,0,1,2629a2f610016a17e720ebc1880354665b0ae5926a217965d584deca7c3f405b,2025-01-09T17:15:18.077000 +CVE-2025-0328,0,0,511489195998b544d95e473f59edc225df3f03b898b8949ae54b7be85757b835,2025-01-09T17:15:17.330000 +CVE-2025-0331,0,0,5d1653aab10b087569df4f8a29838e92935196f68c8f8116069a88ef7b3aacf8,2025-01-09T17:15:17.933000 +CVE-2025-0333,0,0,2629a2f610016a17e720ebc1880354665b0ae5926a217965d584deca7c3f405b,2025-01-09T17:15:18.077000 CVE-2025-0334,0,0,d7673bbf36f717e1769977669c1cac432662eda5ad40e6c872bcf27cf1dda6d8,2025-01-09T06:15:15.610000 CVE-2025-0335,0,0,d042e6fe1c6117fe3f290f44401326a621378ac168f8b7424ff902d7e887bcca,2025-01-09T06:15:15.850000 CVE-2025-0336,0,0,04ee389408992b67dce77194d9c70ae97feea3babbe755fc187c92619ca0ff05,2025-01-09T07:15:27.860000 @@ -276306,12 +276367,13 @@ CVE-2025-20167,0,0,e3874d78f816684b3ad3095069171d70c3e3e27074d9afdb1ef0c33897812 CVE-2025-20168,0,0,1b582f0e103ddf474141bdcff2b1873e77789f263e13a1a2b55771b742e937b2,2025-01-08T17:15:17.323000 CVE-2025-21102,0,0,2ea9dc2a8684b7cddaddfe4341f8f27d4b76937cd9aabee635ab02b83d4b3e6e,2025-01-08T12:15:22.850000 CVE-2025-21111,0,0,16b52f24c4b80d09f6e5e5284496a40288893ce98ea4f8b371a26cbe1749320e,2025-01-08T18:15:20.157000 -CVE-2025-21592,1,1,420ea0357519c97bb443c83d434ce75fef006838355a5cfc7efd4bb0d1a7dc02,2025-01-09T17:15:18.203000 -CVE-2025-21593,1,1,4dbaba2a09f0994c55b5dc730e2f276bd7aac9a71124da84296dbc403f23c4f4,2025-01-09T17:15:18.380000 -CVE-2025-21596,1,1,9a75e60c3ead434f8b8a3542517340d5e3a9bd680918fd469939b623e972c30a,2025-01-09T17:15:18.593000 -CVE-2025-21599,1,1,dfe924a6beede2a0be26145087727f05b25454a9c78c252d17fd0faaf3a7f14f,2025-01-09T17:15:18.770000 -CVE-2025-21600,1,1,140812af79b18904ac79e570bbd2620febb11bd34d2f9630802e89bffc9ff590,2025-01-09T17:15:18.960000 -CVE-2025-21602,1,1,e4e54ceafea22832f83c53a482244e16581b39f02a4fa54b2d294a7f322a8ac7,2025-01-09T17:15:19.150000 +CVE-2025-21592,0,0,420ea0357519c97bb443c83d434ce75fef006838355a5cfc7efd4bb0d1a7dc02,2025-01-09T17:15:18.203000 +CVE-2025-21593,0,0,4dbaba2a09f0994c55b5dc730e2f276bd7aac9a71124da84296dbc403f23c4f4,2025-01-09T17:15:18.380000 +CVE-2025-21596,0,0,9a75e60c3ead434f8b8a3542517340d5e3a9bd680918fd469939b623e972c30a,2025-01-09T17:15:18.593000 +CVE-2025-21598,1,1,959ac9ae8440b60e3c44d3f343772c309366b687590619f9880fa79998eece28,2025-01-09T19:15:20.123000 +CVE-2025-21599,0,0,dfe924a6beede2a0be26145087727f05b25454a9c78c252d17fd0faaf3a7f14f,2025-01-09T17:15:18.770000 +CVE-2025-21600,0,0,140812af79b18904ac79e570bbd2620febb11bd34d2f9630802e89bffc9ff590,2025-01-09T17:15:18.960000 +CVE-2025-21602,0,0,e4e54ceafea22832f83c53a482244e16581b39f02a4fa54b2d294a7f322a8ac7,2025-01-09T17:15:19.150000 CVE-2025-21603,0,0,b5e381674b14c0da15b91edbb6dfa15bbf2e7ab847df89260480b3be932a728c,2025-01-08T15:15:21.320000 CVE-2025-21604,0,0,ec728601eba6bd539d6daf316c2c18ea930a896bd5f0099ef67fb1e9d57f3d64,2025-01-06T16:15:30.927000 CVE-2025-21609,0,0,46e3af17bfffe98fbaec33d01272d23877fbd06c6cc0e4a79625fd3beabb7e1e,2025-01-03T17:15:09.147000 @@ -276328,7 +276390,7 @@ CVE-2025-21620,0,0,66289b3b3f28df54a495a49470b309f007a7b7fd72e39a3c6fd58a9e688ab CVE-2025-21622,0,0,6c5785ebf77d1798b874aaffe451a58c4a37257af0382e9b593172ad9a04e2cc,2025-01-07T18:15:21.703000 CVE-2025-21623,0,0,6087933d996aad8edaafac7f0dbca82dce0a66add1f565d4e48b576d3a77cbb8,2025-01-07T17:15:32.313000 CVE-2025-21624,0,0,48317da35eed5453ecdf02e6a373b353bc1bb2bc0793e255b08a0ed1235e3ac9,2025-01-07T17:15:32.417000 -CVE-2025-21628,1,1,9b45b82bc1cf7798fc9034c809b7aea070f1557febc397cdd0479edbf659b70e,2025-01-09T18:15:30.070000 +CVE-2025-21628,0,0,9b45b82bc1cf7798fc9034c809b7aea070f1557febc397cdd0479edbf659b70e,2025-01-09T18:15:30.070000 CVE-2025-22130,0,0,1c04fe501f2c52c223532c188d73e6b294c7cd14c808267f30384be4f18c686f,2025-01-08T16:15:38.543000 CVE-2025-22132,0,0,68d348d844ec3947f7795605dbc0f9b5ea1e9ec0bb464d07ae2fd1571ba27a37,2025-01-07T22:15:31.590000 CVE-2025-22133,0,0,fbcb8ce624ceed57d4b59a3f2fe5dc11cb74a45b756ff7cc7f2369bba16ab526,2025-01-08T15:15:21.727000 @@ -276339,7 +276401,8 @@ CVE-2025-22140,0,0,270f2879e8de65b243beb9d7f4b67eed45df0b791563d9a26d7b732c538b2 CVE-2025-22141,0,0,2044a7b2e6c78c72031cb6881e193da3e0a629d8a5ed02e93c39455436172a69,2025-01-08T20:15:29.897000 CVE-2025-22143,0,0,379ec5cc1d9ddc4be571cdbe4ab10dde3e7605621fcd6681c8378b70a5e0e0ce,2025-01-08T20:15:30.003000 CVE-2025-22145,0,0,a3e7e33eb43759950c0b6a9c304c03ed60cf76009fe03502e9b6e5d41248cec1,2025-01-08T21:15:13.480000 -CVE-2025-22149,1,1,285a83f8462ddbb51760ea9329a665e948c6fc32ae5305a1fdb62a7b29cc1268,2025-01-09T18:15:30.233000 +CVE-2025-22149,0,0,285a83f8462ddbb51760ea9329a665e948c6fc32ae5305a1fdb62a7b29cc1268,2025-01-09T18:15:30.233000 +CVE-2025-22151,1,1,dec579b0934ef0dde3835c92d162b87ef5ec884c54087c34c713c42f457c974f,2025-01-09T19:15:20.410000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 CVE-2025-22215,0,0,67b181a6458a232e8ac5c80f2cba09df8333cbef01abc4197cfb8a002eebc845,2025-01-08T15:15:21.927000 CVE-2025-22261,0,0,b64f32ab7c14edb8b70371073baa276f94f41977fffad6128d5b8c7f32ae4fb7,2025-01-07T11:15:13.290000