From a708cd54913ac9d8fb1ccd4d3a5d00f776c5db0b Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 22 Jan 2025 19:03:53 +0000 Subject: [PATCH] Auto-Update: 2025-01-22T19:00:26.262278+00:00 --- CVE-2015/CVE-2015-14xx/CVE-2015-1427.json | 4 +- CVE-2015/CVE-2015-16xx/CVE-2015-1635.json | 4 +- CVE-2015/CVE-2015-16xx/CVE-2015-1641.json | 4 +- CVE-2015/CVE-2015-16xx/CVE-2015-1671.json | 4 +- CVE-2015/CVE-2015-17xx/CVE-2015-1701.json | 4 +- CVE-2015/CVE-2015-17xx/CVE-2015-1770.json | 4 +- CVE-2015/CVE-2015-22xx/CVE-2015-2291.json | 10 +- CVE-2015/CVE-2015-23xx/CVE-2015-2360.json | 4 +- CVE-2015/CVE-2015-25xx/CVE-2015-2590.json | 4 +- CVE-2015/CVE-2015-30xx/CVE-2015-3035.json | 4 +- CVE-2015/CVE-2015-30xx/CVE-2015-3043.json | 4 +- CVE-2015/CVE-2015-31xx/CVE-2015-3113.json | 4 +- CVE-2015/CVE-2015-40xx/CVE-2015-4068.json | 4 +- CVE-2016/CVE-2016-200xx/CVE-2016-20017.json | 4 +- .../CVE-2017-10004xx/CVE-2017-1000486.json | 10 +- CVE-2017/CVE-2017-183xx/CVE-2017-18362.json | 10 +- CVE-2017/CVE-2017-183xx/CVE-2017-18368.json | 10 +- .../CVE-2018-10008xx/CVE-2018-1000861.json | 4 +- CVE-2019/CVE-2019-251xx/CVE-2019-25137.json | 32 +- CVE-2022/CVE-2022-343xx/CVE-2022-34321.json | 95 ++- CVE-2022/CVE-2022-424xx/CVE-2022-42443.json | 78 ++- CVE-2022/CVE-2022-488xx/CVE-2022-48834.json | 62 +- CVE-2023/CVE-2023-272xx/CVE-2023-27217.json | 32 +- CVE-2023/CVE-2023-283xx/CVE-2023-28369.json | 22 +- CVE-2023/CVE-2023-285xx/CVE-2023-28517.json | 98 ++- CVE-2023/CVE-2023-298xx/CVE-2023-29857.json | 22 +- CVE-2023/CVE-2023-299xx/CVE-2023-29985.json | 32 +- CVE-2023/CVE-2023-301xx/CVE-2023-30191.json | 12 +- CVE-2023/CVE-2023-316xx/CVE-2023-31699.json | 32 +- CVE-2023/CVE-2023-317xx/CVE-2023-31700.json | 32 +- CVE-2023/CVE-2023-317xx/CVE-2023-31701.json | 32 +- CVE-2023/CVE-2023-317xx/CVE-2023-31702.json | 32 +- CVE-2023/CVE-2023-317xx/CVE-2023-31703.json | 32 +- CVE-2023/CVE-2023-317xx/CVE-2023-31722.json | 32 +- CVE-2023/CVE-2023-317xx/CVE-2023-31723.json | 22 +- CVE-2023/CVE-2023-317xx/CVE-2023-31724.json | 22 +- CVE-2023/CVE-2023-317xx/CVE-2023-31725.json | 32 +- CVE-2023/CVE-2023-318xx/CVE-2023-31847.json | 22 +- CVE-2023/CVE-2023-319xx/CVE-2023-31902.json | 22 +- CVE-2023/CVE-2023-327xx/CVE-2023-32767.json | 32 +- CVE-2023/CVE-2023-401xx/CVE-2023-40108.json | 41 +- CVE-2023/CVE-2023-401xx/CVE-2023-40132.json | 41 +- CVE-2023/CVE-2023-477xx/CVE-2023-47760.json | 47 +- CVE-2023/CVE-2023-478xx/CVE-2023-47822.json | 47 +- CVE-2023/CVE-2023-513xx/CVE-2023-51359.json | 47 +- CVE-2023/CVE-2023-513xx/CVE-2023-51360.json | 47 +- CVE-2023/CVE-2023-527xx/CVE-2023-52760.json | 23 +- CVE-2023/CVE-2023-57xx/CVE-2023-5779.json | 66 +- CVE-2023/CVE-2023-67xx/CVE-2023-6749.json | 66 +- CVE-2023/CVE-2023-69xx/CVE-2023-6965.json | 85 ++- CVE-2023/CVE-2023-69xx/CVE-2023-6967.json | 85 ++- CVE-2023/CVE-2023-69xx/CVE-2023-6999.json | 85 ++- CVE-2023/CVE-2023-70xx/CVE-2023-7072.json | 64 +- CVE-2024/CVE-2024-120xx/CVE-2024-12033.json | 32 +- CVE-2024/CVE-2024-123xx/CVE-2024-12316.json | 37 +- CVE-2024/CVE-2024-129xx/CVE-2024-12919.json | 44 +- CVE-2024/CVE-2024-13xx/CVE-2024-1397.json | 134 +++- CVE-2024/CVE-2024-14xx/CVE-2024-1412.json | 74 ++- CVE-2024/CVE-2024-14xx/CVE-2024-1421.json | 74 ++- CVE-2024/CVE-2024-19xx/CVE-2024-1974.json | 84 ++- CVE-2024/CVE-2024-21xx/CVE-2024-2107.json | 74 ++- CVE-2024/CVE-2024-233xx/CVE-2024-23307.json | 29 +- CVE-2024/CVE-2024-23xx/CVE-2024-2395.json | 74 ++- CVE-2024/CVE-2024-241xx/CVE-2024-24101.json | 68 +- CVE-2024/CVE-2024-24xx/CVE-2024-2406.json | 72 ++- CVE-2024/CVE-2024-25xx/CVE-2024-2560.json | 91 ++- CVE-2024/CVE-2024-25xx/CVE-2024-2581.json | 95 ++- CVE-2024/CVE-2024-28xx/CVE-2024-2891.json | 113 +++- CVE-2024/CVE-2024-28xx/CVE-2024-2892.json | 113 +++- CVE-2024/CVE-2024-28xx/CVE-2024-2893.json | 113 +++- CVE-2024/CVE-2024-28xx/CVE-2024-2894.json | 113 +++- CVE-2024/CVE-2024-28xx/CVE-2024-2895.json | 113 +++- CVE-2024/CVE-2024-28xx/CVE-2024-2896.json | 113 +++- CVE-2024/CVE-2024-28xx/CVE-2024-2897.json | 103 ++- CVE-2024/CVE-2024-28xx/CVE-2024-2898.json | 113 +++- CVE-2024/CVE-2024-28xx/CVE-2024-2899.json | 113 +++- CVE-2024/CVE-2024-29xx/CVE-2024-2900.json | 113 +++- CVE-2024/CVE-2024-29xx/CVE-2024-2901.json | 113 +++- CVE-2024/CVE-2024-29xx/CVE-2024-2902.json | 113 +++- CVE-2024/CVE-2024-29xx/CVE-2024-2903.json | 113 +++- CVE-2024/CVE-2024-29xx/CVE-2024-2991.json | 103 ++- CVE-2024/CVE-2024-29xx/CVE-2024-2992.json | 113 +++- CVE-2024/CVE-2024-313xx/CVE-2024-31306.json | 52 +- CVE-2024/CVE-2024-33xx/CVE-2024-3314.json | 71 +- CVE-2024/CVE-2024-347xx/CVE-2024-34730.json | 41 +- CVE-2024/CVE-2024-370xx/CVE-2024-37093.json | 47 +- CVE-2024/CVE-2024-370xx/CVE-2024-37094.json | 47 +- CVE-2024/CVE-2024-372xx/CVE-2024-37277.json | 47 +- CVE-2024/CVE-2024-396xx/CVE-2024-39600.json | 71 +- CVE-2024/CVE-2024-424xx/CVE-2024-42471.json | 11 +- CVE-2024/CVE-2024-42xx/CVE-2024-4222.json | 74 ++- CVE-2024/CVE-2024-430xx/CVE-2024-43095.json | 41 +- CVE-2024/CVE-2024-430xx/CVE-2024-43096.json | 41 +- CVE-2024/CVE-2024-437xx/CVE-2024-43763.json | 41 +- CVE-2024/CVE-2024-437xx/CVE-2024-43765.json | 41 +- CVE-2024/CVE-2024-437xx/CVE-2024-43770.json | 41 +- CVE-2024/CVE-2024-437xx/CVE-2024-43771.json | 41 +- CVE-2024/CVE-2024-43xx/CVE-2024-4351.json | 54 +- CVE-2024/CVE-2024-43xx/CVE-2024-4352.json | 54 +- CVE-2024/CVE-2024-43xx/CVE-2024-4367.json | 382 ++++++++++- CVE-2024/CVE-2024-473xx/CVE-2024-47364.json | 47 +- CVE-2024/CVE-2024-473xx/CVE-2024-47390.json | 47 +- CVE-2024/CVE-2024-473xx/CVE-2024-47392.json | 57 +- CVE-2024/CVE-2024-47xx/CVE-2024-4774.json | 79 ++- CVE-2024/CVE-2024-497xx/CVE-2024-49724.json | 41 +- CVE-2024/CVE-2024-497xx/CVE-2024-49732.json | 41 +- CVE-2024/CVE-2024-497xx/CVE-2024-49733.json | 41 +- CVE-2024/CVE-2024-497xx/CVE-2024-49734.json | 41 +- CVE-2024/CVE-2024-504xx/CVE-2024-50453.json | 57 +- CVE-2024/CVE-2024-514xx/CVE-2024-51457.json | 86 +++ CVE-2024/CVE-2024-538xx/CVE-2024-53808.json | 47 +- CVE-2024/CVE-2024-559xx/CVE-2024-55957.json | 25 + CVE-2024/CVE-2024-562xx/CVE-2024-56252.json | 47 +- CVE-2024/CVE-2024-562xx/CVE-2024-56254.json | 47 +- CVE-2024/CVE-2024-562xx/CVE-2024-56266.json | 47 +- CVE-2024/CVE-2024-571xx/CVE-2024-57160.json | 64 +- CVE-2024/CVE-2024-571xx/CVE-2024-57161.json | 64 +- CVE-2024/CVE-2024-577xx/CVE-2024-57769.json | 65 +- CVE-2024/CVE-2024-577xx/CVE-2024-57770.json | 65 +- CVE-2024/CVE-2024-577xx/CVE-2024-57775.json | 65 +- CVE-2025/CVE-2025-06xx/CVE-2025-0651.json | 78 +++ CVE-2025/CVE-2025-201xx/CVE-2025-20128.json | 90 +++ CVE-2025/CVE-2025-201xx/CVE-2025-20156.json | 94 +++ CVE-2025/CVE-2025-201xx/CVE-2025-20165.json | 94 +++ CVE-2025/CVE-2025-215xx/CVE-2025-21529.json | 42 +- CVE-2025/CVE-2025-215xx/CVE-2025-21530.json | 42 +- CVE-2025/CVE-2025-215xx/CVE-2025-21532.json | 42 +- CVE-2025/CVE-2025-215xx/CVE-2025-21544.json | 22 +- CVE-2025/CVE-2025-215xx/CVE-2025-21545.json | 42 +- CVE-2025/CVE-2025-215xx/CVE-2025-21546.json | 42 +- CVE-2025/CVE-2025-215xx/CVE-2025-21547.json | 42 +- CVE-2025/CVE-2025-215xx/CVE-2025-21548.json | 42 +- CVE-2025/CVE-2025-215xx/CVE-2025-21549.json | 42 +- CVE-2025/CVE-2025-230xx/CVE-2025-23028.json | 90 +++ CVE-2025/CVE-2025-230xx/CVE-2025-23047.json | 60 ++ CVE-2025/CVE-2025-243xx/CVE-2025-24397.json | 21 + CVE-2025/CVE-2025-243xx/CVE-2025-24398.json | 21 + CVE-2025/CVE-2025-243xx/CVE-2025-24399.json | 21 + CVE-2025/CVE-2025-244xx/CVE-2025-24400.json | 21 + CVE-2025/CVE-2025-244xx/CVE-2025-24401.json | 21 + CVE-2025/CVE-2025-244xx/CVE-2025-24402.json | 21 + CVE-2025/CVE-2025-244xx/CVE-2025-24403.json | 21 + README.md | 100 ++- _state.csv | 605 +++++++++--------- 144 files changed, 7383 insertions(+), 929 deletions(-) create mode 100644 CVE-2024/CVE-2024-514xx/CVE-2024-51457.json create mode 100644 CVE-2024/CVE-2024-559xx/CVE-2024-55957.json create mode 100644 CVE-2025/CVE-2025-06xx/CVE-2025-0651.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20128.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20156.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20165.json create mode 100644 CVE-2025/CVE-2025-230xx/CVE-2025-23028.json create mode 100644 CVE-2025/CVE-2025-230xx/CVE-2025-23047.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24397.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24398.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24399.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24400.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24401.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24402.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24403.json diff --git a/CVE-2015/CVE-2015-14xx/CVE-2015-1427.json b/CVE-2015/CVE-2015-14xx/CVE-2015-1427.json index 657ebbb4619..87ed3fe9a69 100644 --- a/CVE-2015/CVE-2015-14xx/CVE-2015-1427.json +++ b/CVE-2015/CVE-2015-14xx/CVE-2015-1427.json @@ -2,8 +2,8 @@ "id": "CVE-2015-1427", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-17T15:59:04.560", - "lastModified": "2024-11-21T02:25:24.233", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:08:14.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1635.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1635.json index 67906a043f2..41679788c87 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1635.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1635.json @@ -2,8 +2,8 @@ "id": "CVE-2015-1635", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:01.263", - "lastModified": "2024-11-21T02:25:49.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:08:42.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1641.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1641.json index d6522125f2b..c8154c64200 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1641.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1641.json @@ -2,8 +2,8 @@ "id": "CVE-2015-1641", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-14T20:59:05.250", - "lastModified": "2024-11-21T02:25:50.510", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:08:45.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1671.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1671.json index aa88a643c27..e0898b0f47e 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1671.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1671.json @@ -2,8 +2,8 @@ "id": "CVE-2015-1671", "sourceIdentifier": "secure@microsoft.com", "published": "2015-05-13T10:59:03.910", - "lastModified": "2024-11-21T02:25:53.453", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:14:02.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1701.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1701.json index e457e20caa3..e5300e9a44e 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1701.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1701.json @@ -2,8 +2,8 @@ "id": "CVE-2015-1701", "sourceIdentifier": "secure@microsoft.com", "published": "2015-04-21T10:59:00.073", - "lastModified": "2024-11-21T02:25:57.643", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:13:40.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json index 6d6cdc3553b..0438fed5d77 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json @@ -2,8 +2,8 @@ "id": "CVE-2015-1770", "sourceIdentifier": "secure@microsoft.com", "published": "2015-06-10T01:59:36.483", - "lastModified": "2024-11-21T02:26:05.623", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:14:22.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-22xx/CVE-2015-2291.json b/CVE-2015/CVE-2015-22xx/CVE-2015-2291.json index d44ca271a42..e3779db6c00 100644 --- a/CVE-2015/CVE-2015-22xx/CVE-2015-2291.json +++ b/CVE-2015/CVE-2015-22xx/CVE-2015-2291.json @@ -2,8 +2,8 @@ "id": "CVE-2015-2291", "sourceIdentifier": "cve@mitre.org", "published": "2017-08-09T18:29:00.933", - "lastModified": "2024-11-21T02:27:09.427", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:15:24.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2360.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2360.json index fe27c15b1ea..f4312238383 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2360.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2360.json @@ -2,8 +2,8 @@ "id": "CVE-2015-2360", "sourceIdentifier": "secure@microsoft.com", "published": "2015-06-10T01:59:38.890", - "lastModified": "2024-11-21T02:27:16.887", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:14:33.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2590.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2590.json index 9289c7b4797..9f5ffcd129f 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2590.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2590.json @@ -2,8 +2,8 @@ "id": "CVE-2015-2590", "sourceIdentifier": "secalert_us@oracle.com", "published": "2015-07-16T10:59:17.050", - "lastModified": "2024-11-21T02:27:39.980", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:14:47.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3035.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3035.json index a686e97d179..ef022b72f2c 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3035.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3035.json @@ -2,8 +2,8 @@ "id": "CVE-2015-3035", "sourceIdentifier": "cve@mitre.org", "published": "2015-04-22T01:59:02.553", - "lastModified": "2024-11-21T02:28:31.600", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:13:43.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-30xx/CVE-2015-3043.json b/CVE-2015/CVE-2015-30xx/CVE-2015-3043.json index 8256724862c..a31478d80ae 100644 --- a/CVE-2015/CVE-2015-30xx/CVE-2015-3043.json +++ b/CVE-2015/CVE-2015-30xx/CVE-2015-3043.json @@ -2,8 +2,8 @@ "id": "CVE-2015-3043", "sourceIdentifier": "psirt@adobe.com", "published": "2015-04-14T22:59:21.323", - "lastModified": "2024-11-21T02:28:32.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:08:49.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-31xx/CVE-2015-3113.json b/CVE-2015/CVE-2015-31xx/CVE-2015-3113.json index 151276acf20..20187175ee1 100644 --- a/CVE-2015/CVE-2015-31xx/CVE-2015-3113.json +++ b/CVE-2015/CVE-2015-31xx/CVE-2015-3113.json @@ -2,8 +2,8 @@ "id": "CVE-2015-3113", "sourceIdentifier": "psirt@adobe.com", "published": "2015-06-23T21:59:01.960", - "lastModified": "2024-11-21T02:28:41.810", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:14:41.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-40xx/CVE-2015-4068.json b/CVE-2015/CVE-2015-40xx/CVE-2015-4068.json index cfe5b88cd0f..14e79d37de6 100644 --- a/CVE-2015/CVE-2015-40xx/CVE-2015-4068.json +++ b/CVE-2015/CVE-2015-40xx/CVE-2015-4068.json @@ -2,8 +2,8 @@ "id": "CVE-2015-4068", "sourceIdentifier": "cve@mitre.org", "published": "2015-05-29T15:59:23.327", - "lastModified": "2024-11-21T02:30:23.753", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:14:16.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-200xx/CVE-2016-20017.json b/CVE-2016/CVE-2016-200xx/CVE-2016-20017.json index 0118f391787..67113b5c55d 100644 --- a/CVE-2016/CVE-2016-200xx/CVE-2016-20017.json +++ b/CVE-2016/CVE-2016-200xx/CVE-2016-20017.json @@ -2,8 +2,8 @@ "id": "CVE-2016-20017", "sourceIdentifier": "cve@mitre.org", "published": "2022-10-19T05:15:08.817", - "lastModified": "2024-11-21T02:47:34.057", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:48:26.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-10004xx/CVE-2017-1000486.json b/CVE-2017/CVE-2017-10004xx/CVE-2017-1000486.json index b1a52adbc40..da47884b9cb 100644 --- a/CVE-2017/CVE-2017-10004xx/CVE-2017-1000486.json +++ b/CVE-2017/CVE-2017-10004xx/CVE-2017-1000486.json @@ -2,8 +2,8 @@ "id": "CVE-2017-1000486", "sourceIdentifier": "cve@mitre.org", "published": "2018-01-03T20:29:00.643", - "lastModified": "2024-11-21T03:04:50.587", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:48:15.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", diff --git a/CVE-2017/CVE-2017-183xx/CVE-2017-18362.json b/CVE-2017/CVE-2017-183xx/CVE-2017-18362.json index a5f88c6acd0..698a3a3aaaa 100644 --- a/CVE-2017/CVE-2017-183xx/CVE-2017-18362.json +++ b/CVE-2017/CVE-2017-183xx/CVE-2017-18362.json @@ -2,8 +2,8 @@ "id": "CVE-2017-18362", "sourceIdentifier": "cve@mitre.org", "published": "2019-02-05T06:29:00.233", - "lastModified": "2024-11-21T03:19:56.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:52:47.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", diff --git a/CVE-2017/CVE-2017-183xx/CVE-2017-18368.json b/CVE-2017/CVE-2017-183xx/CVE-2017-18368.json index 4a57edeb070..8f1d24b85c6 100644 --- a/CVE-2017/CVE-2017-183xx/CVE-2017-18368.json +++ b/CVE-2017/CVE-2017-183xx/CVE-2017-18368.json @@ -2,8 +2,8 @@ "id": "CVE-2017-18368", "sourceIdentifier": "cve@mitre.org", "published": "2019-05-02T17:29:00.287", - "lastModified": "2024-11-21T03:19:56.860", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:53:08.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", diff --git a/CVE-2018/CVE-2018-10008xx/CVE-2018-1000861.json b/CVE-2018/CVE-2018-10008xx/CVE-2018-1000861.json index ca6fd00fc20..fb5b7456488 100644 --- a/CVE-2018/CVE-2018-10008xx/CVE-2018-1000861.json +++ b/CVE-2018/CVE-2018-10008xx/CVE-2018-1000861.json @@ -2,8 +2,8 @@ "id": "CVE-2018-1000861", "sourceIdentifier": "cve@mitre.org", "published": "2018-12-10T14:29:01.417", - "lastModified": "2024-11-21T03:40:31.030", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:52:39.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25137.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25137.json index 02d8ada23dd..719f75a4096 100644 --- a/CVE-2019/CVE-2019-251xx/CVE-2019-25137.json +++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25137.json @@ -2,7 +2,7 @@ "id": "CVE-2019-25137", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-18T07:15:08.623", - "lastModified": "2024-11-21T04:39:57.323", + "lastModified": "2025-01-22T17:15:08.647", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-91" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-91" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-343xx/CVE-2022-34321.json b/CVE-2022/CVE-2022-343xx/CVE-2022-34321.json index 29642d5f5a7..1d07e15447d 100644 --- a/CVE-2022/CVE-2022-343xx/CVE-2022-34321.json +++ b/CVE-2022/CVE-2022-343xx/CVE-2022-34321.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34321", "sourceIdentifier": "security@apache.org", "published": "2024-03-12T19:15:47.303", - "lastModified": "2024-11-21T07:09:17.693", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:59:49.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 } ] }, @@ -51,30 +71,89 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.0", + "versionEndExcluding": "2.10.6", + "matchCriteriaId": "0DEE7013-A1A8-4DE5-A4EF-BED97EF3A7FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.11.0", + "versionEndExcluding": "2.11.3", + "matchCriteriaId": "CDA5C2BD-D15D-40F8-8418-8382248881E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.0.2", + "matchCriteriaId": "F07DBEFA-B9F0-4497-B85A-41C753961E70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:pulsar:3.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "447E0901-B5CA-42BE-B894-41E158B123AD" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/12/8", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/ods5tq2hpl390hvjnvxv0bcg4rfpgjj8", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://pulsar.apache.org/security/CVE-2022-34321/", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/12/8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/ods5tq2hpl390hvjnvxv0bcg4rfpgjj8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://pulsar.apache.org/security/CVE-2022-34321/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-424xx/CVE-2022-42443.json b/CVE-2022/CVE-2022-424xx/CVE-2022-42443.json index 92945f7e244..2c204efdcce 100644 --- a/CVE-2022/CVE-2022-424xx/CVE-2022-42443.json +++ b/CVE-2022/CVE-2022-424xx/CVE-2022-42443.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42443", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-17T17:15:07.973", - "lastModified": "2024-11-21T07:24:58.650", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T17:11:53.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.7, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,24 +69,70 @@ "value": "CWE-434" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:trusteer_android_sdk_for_mobile:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.7", + "matchCriteriaId": "7A4DE486-C3A9-4A07-BACC-EC57828C7392" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:trusteer_ios_sdk_for_mobile:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.7", + "matchCriteriaId": "BF814EDD-7EB5-40B3-8928-36D699F96F50" + } + ] + } + ] } ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/238535", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/6967785", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/238535", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/6967785", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48834.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48834.json index fcdd4587430..f59de7a2f15 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48834.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48834.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48834", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-16T13:15:10.983", - "lastModified": "2024-11-21T07:34:10.547", - "vulnStatus": "Modified", + "lastModified": "2025-01-22T18:03:59.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,9 +61,16 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.4.187", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.187", + "matchCriteriaId": "D9FFB805-4ED2-4FAE-9EF4-8AB4BC9D8F5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", "versionEndExcluding": "5.10.108", - "matchCriteriaId": "5F01618E-D6DB-46C8-B08C-503F1C05D234" + "matchCriteriaId": "24925527-AC4A-4594-8D6C-3B34D31862C5" }, { "vulnerable": true, @@ -71,6 +78,53 @@ "versionStartIncluding": "5.11", "versionEndExcluding": "5.15.31", "matchCriteriaId": "F25C317E-A673-47D1-844E-171C9BFDF352" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.17", + "matchCriteriaId": "DC9A634D-C617-4F8C-ADEF-AF94CE69D687" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*", + "matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*", + "matchCriteriaId": "C030FA3D-03F4-4FB9-9DBF-D08E5CAC51AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*", + "matchCriteriaId": "B2D2677C-5389-4AE9-869D-0F881E80D923" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc5:*:*:*:*:*:*", + "matchCriteriaId": "EFA3917C-C322-4D92-912D-ECE45B2E7416" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc6:*:*:*:*:*:*", + "matchCriteriaId": "BED18363-5ABC-4639-8BBA-68E771E5BB3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc7:*:*:*:*:*:*", + "matchCriteriaId": "7F635F96-FA0A-4769-ADE8-232B3AC9116D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc8:*:*:*:*:*:*", + "matchCriteriaId": "FD39FE73-2A9D-4C92-AE7A-CA22F84B228D" } ] } diff --git a/CVE-2023/CVE-2023-272xx/CVE-2023-27217.json b/CVE-2023/CVE-2023-272xx/CVE-2023-27217.json index c7031f51e80..dbfa74a1281 100644 --- a/CVE-2023/CVE-2023-272xx/CVE-2023-27217.json +++ b/CVE-2023/CVE-2023-272xx/CVE-2023-27217.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27217", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-18T03:15:11.453", - "lastModified": "2024-11-21T07:52:28.977", + "lastModified": "2025-01-22T17:15:10.203", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28369.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28369.json index 465a0c2238c..a9746f7d989 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28369.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28369.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28369", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-18T09:15:09.483", - "lastModified": "2024-11-21T07:54:56.247", + "lastModified": "2025-01-22T17:15:10.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28517.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28517.json index 615e18b66d2..bca3854ae3e 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28517.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28517.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28517", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-13T10:15:06.790", - "lastModified": "2024-11-21T07:55:16.223", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:40:49.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,22 +71,88 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.1.2:*:*:*:essentials:*:*:*", + "matchCriteriaId": "3E32C714-33CB-408E-8907-FC929D751588" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.1.2:*:*:*:standard:*:*:*", + "matchCriteriaId": "95F70DD2-71D1-4C6F-BE21-AA2A99E46AE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.0:*:*:*:essentials:*:*:*", + "matchCriteriaId": "6325F8BC-B7D6-4601-A2D1-B61D77BC227C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.0:*:*:*:standard:*:*:*", + "matchCriteriaId": "EEE81D1F-446F-4CA2-A2B1-3EF1298C80EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.2:*:*:*:essentials:*:*:*", + "matchCriteriaId": "430CC017-4619-4C54-883E-210221268529" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.2:*:*:*:standard:*:*:*", + "matchCriteriaId": "D391DA86-9F9B-416A-9406-5003938E7BD8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/250421", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7138575", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/250421", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7138575", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29857.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29857.json index 252614cf3be..2f0b78c43b6 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29857.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29857.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29857", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-18T02:15:10.907", - "lastModified": "2024-11-21T07:57:35.513", + "lastModified": "2025-01-22T17:15:10.550", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29985.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29985.json index 0a0646134b2..85a3ba27161 100644 --- a/CVE-2023/CVE-2023-299xx/CVE-2023-29985.json +++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29985.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29985", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-18T01:15:09.117", - "lastModified": "2024-11-21T07:57:43.633", + "lastModified": "2025-01-22T17:15:10.717", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30191.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30191.json index f75c3726a81..b9f7deed70b 100644 --- a/CVE-2023/CVE-2023-301xx/CVE-2023-30191.json +++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30191.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30191", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-17T20:15:10.680", - "lastModified": "2024-11-21T07:59:52.693", + "lastModified": "2025-01-22T18:15:16.863", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31699.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31699.json index 30f221cfbcf..360d026ef8c 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31699.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31699.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31699", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-17T13:15:09.517", - "lastModified": "2024-11-21T08:02:09.597", + "lastModified": "2025-01-22T18:15:17.453", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31700.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31700.json index 84673807ff0..41d935aec16 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31700.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31700.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31700", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-17T14:15:09.323", - "lastModified": "2024-11-21T08:02:09.727", + "lastModified": "2025-01-22T18:15:17.633", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31701.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31701.json index 4ddecf249a6..f6c7a879caa 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31701.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31701.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31701", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-17T14:15:09.383", - "lastModified": "2024-11-21T08:02:09.870", + "lastModified": "2025-01-22T18:15:17.807", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31702.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31702.json index 0b1cf5cf3dc..c9191bc82e2 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31702.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31702.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31702", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-17T13:15:09.567", - "lastModified": "2024-11-21T08:02:10.007", + "lastModified": "2025-01-22T18:15:17.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31703.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31703.json index 416f3850d95..04ab1aeec13 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31703.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31703.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31703", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-17T13:15:09.617", - "lastModified": "2024-11-21T08:02:10.143", + "lastModified": "2025-01-22T18:15:18.163", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31722.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31722.json index 934d16fb248..1f7bbd86506 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31722.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31722.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31722", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-17T14:15:09.423", - "lastModified": "2024-11-21T08:02:12.417", + "lastModified": "2025-01-22T18:15:18.343", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31723.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31723.json index 2a12295ff40..fa9f539c28b 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31723.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31723.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31723", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-17T15:15:08.873", - "lastModified": "2024-11-21T08:02:12.560", + "lastModified": "2025-01-22T17:15:11.060", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31724.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31724.json index 874647a4e9c..217b1b77103 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31724.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31724.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31724", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-17T15:15:08.917", - "lastModified": "2024-11-21T08:02:12.703", + "lastModified": "2025-01-22T17:15:11.233", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31725.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31725.json index 58c894af09b..e6eff54424c 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31725.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31725.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31725", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-17T15:15:08.957", - "lastModified": "2024-11-21T08:02:12.843", + "lastModified": "2025-01-22T17:15:11.390", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31847.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31847.json index 741429e45a2..ec18758d18c 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31847.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31847.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31847", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-17T01:15:10.013", - "lastModified": "2024-11-21T08:02:19.410", + "lastModified": "2025-01-22T17:15:11.553", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31902.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31902.json index a84bd349b2c..d98de6dac8f 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31902.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31902.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31902", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-17T13:15:09.667", - "lastModified": "2024-11-21T08:02:22.143", + "lastModified": "2025-01-22T17:15:11.717", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-327xx/CVE-2023-32767.json b/CVE-2023/CVE-2023-327xx/CVE-2023-32767.json index 3619ffb8b56..2d77cbe2e76 100644 --- a/CVE-2023/CVE-2023-327xx/CVE-2023-32767.json +++ b/CVE-2023/CVE-2023-327xx/CVE-2023-32767.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32767", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-17T20:15:10.757", - "lastModified": "2024-11-21T08:04:00.687", + "lastModified": "2025-01-22T17:15:11.870", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40108.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40108.json index 4b4c58b2fe5..d156eaed016 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40108.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40108.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40108", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:11.320", - "lastModified": "2025-01-21T23:15:11.320", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:18.543", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In multiple locations, there is a possible way to access media content belonging to another user due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40132.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40132.json index f4fd6217669..83b1b856148 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40132.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40132.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40132", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:11.437", - "lastModified": "2025-01-21T23:15:11.437", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:18.680", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In setActualDefaultRingtoneUri of RingtoneManager.java, there is a possible way to bypass content providers read permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47760.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47760.json index 2f3d06314b8..c969f77bafd 100644 --- a/CVE-2023/CVE-2023-477xx/CVE-2023-47760.json +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47760.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47760", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:29.843", - "lastModified": "2024-12-09T13:15:29.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T18:13:16.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "4.2.1", + "matchCriteriaId": "A2EBF5AA-E094-4C6F-B00E-520AED053AF8" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/essential-blocks/vulnerability/wordpress-essential-blocks-plugin-4-2-0-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-478xx/CVE-2023-47822.json b/CVE-2023/CVE-2023-478xx/CVE-2023-47822.json index 9cd26c73ec4..554a2461cf1 100644 --- a/CVE-2023/CVE-2023-478xx/CVE-2023-47822.json +++ b/CVE-2023/CVE-2023-478xx/CVE-2023-47822.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47822", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:31.253", - "lastModified": "2024-12-09T13:15:31.253", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:21:20.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sonaar:mp3_audio_player_for_music\\,_radio_\\&_podcast:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.10.1", + "matchCriteriaId": "A4746154-AD9B-40CA-9EDF-35A4352F9D73" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/mp3-music-player-by-sonaar/vulnerability/wordpress-mp3-audio-player-for-music-radio-podcast-by-sonaar-plugin-4-10-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51359.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51359.json index 46d5b6f59e9..9ea0833ad02 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51359.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51359.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51359", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:39.920", - "lastModified": "2024-12-09T13:15:39.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T18:22:07.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "4.2.1", + "matchCriteriaId": "A2EBF5AA-E094-4C6F-B00E-520AED053AF8" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/essential-blocks/vulnerability/wordpress-essential-blocks-plugin-4-2-0-multiple-contributor-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51360.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51360.json index 54b8c9d6b63..a9f9b6399a9 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51360.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51360.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51360", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:40.047", - "lastModified": "2024-12-09T13:15:40.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T17:35:03.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "4.2.1", + "matchCriteriaId": "A2EBF5AA-E094-4C6F-B00E-520AED053AF8" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/essential-blocks/vulnerability/wordpress-essential-blocks-plugin-4-2-0-multiple-subscriber-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52760.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52760.json index 62183ee059d..39b06cee999 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52760.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52760.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52760", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:15.410", - "lastModified": "2024-11-21T08:40:31.687", - "vulnStatus": "Modified", + "lastModified": "2025-01-22T18:03:56.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,8 +61,15 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.97", + "matchCriteriaId": "11DA4D7A-BB0A-4555-8D1D-ECCC5108F772" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", "versionEndExcluding": "6.6.3", - "matchCriteriaId": "24DFB8C6-5FA0-4F09-BFF5-391E59AE9F03" + "matchCriteriaId": "71017352-7799-4BE4-98EA-8822F4A50F6B" } ] } @@ -79,7 +86,10 @@ }, { "url": "https://git.kernel.org/stable/c/7ad4e0a4f61c57c3ca291ee010a9d677d0199fba", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bdcb8aa434c6d36b5c215d02a9ef07551be25a37", @@ -97,7 +107,10 @@ }, { "url": "https://git.kernel.org/stable/c/7ad4e0a4f61c57c3ca291ee010a9d677d0199fba", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bdcb8aa434c6d36b5c215d02a9ef07551be25a37", diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5779.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5779.json index cf3d7a8fa19..39687f9b13a 100644 --- a/CVE-2023/CVE-2023-57xx/CVE-2023-5779.json +++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5779.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5779", "sourceIdentifier": "vulnerabilities@zephyrproject.org", "published": "2024-02-18T08:15:06.917", - "lastModified": "2024-11-21T08:42:28.150", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T17:13:42.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,54 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.5.0", + "matchCriteriaId": "DEE5CEE1-7062-4E23-A3F2-D01DC14968AD" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7cmj-963q-jj47", - "source": "vulnerabilities@zephyrproject.org" + "source": "vulnerabilities@zephyrproject.org", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7cmj-963q-jj47", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6749.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6749.json index 4e6b4d88143..535945d05b5 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6749.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6749.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6749", "sourceIdentifier": "vulnerabilities@zephyrproject.org", "published": "2024-02-18T07:15:10.047", - "lastModified": "2024-11-21T08:44:28.780", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T17:12:49.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,54 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.5.0", + "matchCriteriaId": "DEE5CEE1-7062-4E23-A3F2-D01DC14968AD" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-757h-rw37-66hw", - "source": "vulnerabilities@zephyrproject.org" + "source": "vulnerabilities@zephyrproject.org", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-757h-rw37-66hw", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6965.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6965.json index d8d64e5ef8e..8480504bb4e 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6965.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6965.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6965", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:13.273", - "lastModified": "2024-11-21T08:44:56.290", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:38:52.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,99 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.31.2", + "matchCriteriaId": "8C5AB1DD-D7B3-40E7-A814-F7AADFFC6450" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*", + "versionStartIncluding": "2.8", + "versionEndExcluding": "2.8.23.2", + "matchCriteriaId": "91FDD715-74B2-4367-8C7E-D295FCE56C06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*", + "versionStartIncluding": "2.9", + "versionEndExcluding": "2.9.19.2", + "matchCriteriaId": "E3921A22-540B-4D73-9283-D786603B60D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.0.10.2", + "matchCriteriaId": "BD03632B-4456-4036-AE55-14914FFF63E7" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c5d330cd-ad1f-451e-bf41-39cfeb296cf0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c5d330cd-ad1f-451e-bf41-39cfeb296cf0?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6967.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6967.json index 50c99f1af0b..149d103840f 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6967.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6967.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6967", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:13.457", - "lastModified": "2024-11-21T08:44:56.537", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:36:41.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,99 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.31.2", + "matchCriteriaId": "8C5AB1DD-D7B3-40E7-A814-F7AADFFC6450" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*", + "versionStartIncluding": "2.8", + "versionEndExcluding": "2.8.23.2", + "matchCriteriaId": "91FDD715-74B2-4367-8C7E-D295FCE56C06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*", + "versionStartIncluding": "2.9", + "versionEndExcluding": "2.9.19.2", + "matchCriteriaId": "E3921A22-540B-4D73-9283-D786603B60D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.0.10.2", + "matchCriteriaId": "BD03632B-4456-4036-AE55-14914FFF63E7" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1aa7d0c2-27ec-47ad-8baa-c281c273078e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1aa7d0c2-27ec-47ad-8baa-c281c273078e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6999.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6999.json index 40f92245ad1..c5367cf7f0d 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6999.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6999.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6999", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:13.820", - "lastModified": "2024-11-21T08:45:00.187", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:34:19.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,99 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.31.2", + "matchCriteriaId": "8C5AB1DD-D7B3-40E7-A814-F7AADFFC6450" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*", + "versionStartIncluding": "2.8", + "versionEndExcluding": "2.8.23.2", + "matchCriteriaId": "91FDD715-74B2-4367-8C7E-D295FCE56C06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*", + "versionStartIncluding": "2.9", + "versionEndExcluding": "2.9.19.2", + "matchCriteriaId": "E3921A22-540B-4D73-9283-D786603B60D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.0.10.2", + "matchCriteriaId": "BD03632B-4456-4036-AE55-14914FFF63E7" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d9108d5f-7b8b-478d-ba9d-f895bdb7dbf2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d9108d5f-7b8b-478d-ba9d-f895bdb7dbf2?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7072.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7072.json index 1de5eb2bee3..990a11486eb 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7072.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7072.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7072", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-12T23:15:46.267", - "lastModified": "2024-11-21T08:45:11.407", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:40:31.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pickplugins:post_grid_combo:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.69", + "matchCriteriaId": "7B15B1C3-4638-45A0-A225-1F38965E1DC0" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/post-grid/tags/2.2.68/src/functions-rest.php#L1670", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/post-grid/tags/2.2.69/includes/blocks/functions-rest.php#L1670", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/feee3268-b384-400c-a76d-e5d7972c05b7?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/post-grid/tags/2.2.68/src/functions-rest.php#L1670", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/post-grid/tags/2.2.69/includes/blocks/functions-rest.php#L1670", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/feee3268-b384-400c-a76d-e5d7972c05b7?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12033.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12033.json index 3bd27bc90b6..dc2d2dcbae5 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12033.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12033.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12033", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T12:15:23.900", - "lastModified": "2025-01-07T12:15:23.900", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:16:45.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.8.6", + "matchCriteriaId": "0A31E934-CCEB-4A71-8F0F-B93E7C0C8225" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3214798/jupiterx-core/trunk/includes/extensions/raven/includes/plugin.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7e452aa0-bfb9-4805-b2ed-53464a4b5308?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12316.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12316.json index 13b3a18bfcb..530a07214e5 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12316.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12316.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12316", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T12:15:24.040", - "lastModified": "2025-01-07T12:15:24.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:16:27.977", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.8.6", + "matchCriteriaId": "0A31E934-CCEB-4A71-8F0F-B93E7C0C8225" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/popups/class.php#L475", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3214798/jupiterx-core/trunk/includes/popups/class.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5db195c1-8917-4465-a5ca-21089afb0bc7?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12919.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12919.json index 0bd40b17442..a1926fccd88 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12919.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12919.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12919", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-14T10:15:07.250", - "lastModified": "2025-01-14T10:15:07.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T17:29:01.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,23 +42,57 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-287" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cozmoslabs:membership_\\&_content_restriction_-_paid_member_subscriptions:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.13.8", + "matchCriteriaId": "DE62E63B-56E3-44E0-A4AE-C5F64D92CA1F" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3214706/paid-member-subscriptions", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d3a4fa4d-a7d2-4890-b0f5-5fe69bc5e7ac?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1397.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1397.json index 5bec5044927..5fa7af5ced3 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1397.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1397.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1397", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-12T23:15:46.480", - "lastModified": "2024-11-21T08:50:29.823", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:41:19.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,73 +36,171 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.4.7", + "matchCriteriaId": "F64698EC-D902-4904-80B0-DF35E6C2E51F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.4.4/htmega-blocks/src/blocks/accordion-card/index.php#L17", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.4.4/htmega-blocks/src/blocks/cta/index.php#L22", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.4.4/htmega-blocks/src/blocks/info-box/index.php#L55", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.4.4/htmega-blocks/src/blocks/section-title/index.php#L89", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.4.4/htmega-blocks/src/blocks/team/index.php#L28", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.4.4/htmega-blocks/src/blocks/testimonial/index.php#L124", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3048999%40ht-mega-for-elementor&new=3048999%40ht-mega-for-elementor&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ac66027-14b8-4e0a-a483-c014905ef04e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.4.4/htmega-blocks/src/blocks/accordion-card/index.php#L17", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.4.4/htmega-blocks/src/blocks/cta/index.php#L22", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.4.4/htmega-blocks/src/blocks/info-box/index.php#L55", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.4.4/htmega-blocks/src/blocks/section-title/index.php#L89", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.4.4/htmega-blocks/src/blocks/team/index.php#L28", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.4.4/htmega-blocks/src/blocks/testimonial/index.php#L124", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3048999%40ht-mega-for-elementor&new=3048999%40ht-mega-for-elementor&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ac66027-14b8-4e0a-a483-c014905ef04e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1412.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1412.json index 1db1a44afe0..87278a63413 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1412.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1412.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1412", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:16.860", - "lastModified": "2024-11-21T08:50:31.930", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T17:30:55.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:caseproof:memberpress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.11.27", + "matchCriteriaId": "1C615D72-0176-4282-9F07-EFD28A32F1FB" + } + ] + } + ] + } + ], "references": [ { "url": "https://memberpress.com/change-log/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/882631ab-ef16-4158-adbc-60ad177ae6b8?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://memberpress.com/change-log/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/882631ab-ef16-4158-adbc-60ad177ae6b8?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1421.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1421.json index 853fc55a0c2..ed72fad4943 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1421.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1421.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1421", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-12T23:15:46.667", - "lastModified": "2024-11-21T08:50:33.003", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:41:50.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "2.4.4", + "matchCriteriaId": "C3295B1C-288D-4292-A1BF-0D95885B4693" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.4.4/includes/widgets/htmega_post_carousel.php#L2243", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a71cbe66-4187-4260-bb87-8579bc6e75f5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.4.4/includes/widgets/htmega_post_carousel.php#L2243", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a71cbe66-4187-4260-bb87-8579bc6e75f5?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1974.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1974.json index 74df49f1865..dbfd387bebc 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1974.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1974.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1974", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:21.343", - "lastModified": "2024-11-21T08:51:42.867", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T17:28:42.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.4.7", + "matchCriteriaId": "F64698EC-D902-4904-80B0-DF35E6C2E51F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/includes/widgets/htmega_weather.php#L401", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3048999/ht-mega-for-elementor/tags/2.4.7/includes/widgets/htmega_weather.php?old=2939273&old_path=ht-mega-for-elementor/trunk/includes/widgets/htmega_weather.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/11b5f0a1-bf22-46be-a165-c62f1077da0f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/includes/widgets/htmega_weather.php#L401", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3048999/ht-mega-for-elementor/tags/2.4.7/includes/widgets/htmega_weather.php?old=2939273&old_path=ht-mega-for-elementor/trunk/includes/widgets/htmega_weather.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/11b5f0a1-bf22-46be-a165-c62f1077da0f?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2107.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2107.json index 183765ebf7d..061f73ad441 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2107.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2107.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2107", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-12T22:15:07.470", - "lastModified": "2024-11-21T09:09:02.850", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:37:31.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:blossomthemes:blossom_spa:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.4", + "matchCriteriaId": "28D237D5-91CF-47C8-B3E6-AC68DD39A05F" + } + ] + } + ] + } + ], "references": [ { "url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=220138%40blossom-spa&new=220138%40blossom-spa&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e54dbf9-a5d1-413d-96ac-93dd499c21a4?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=220138%40blossom-spa&new=220138%40blossom-spa&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e54dbf9-a5d1-413d-96ac-93dd499c21a4?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23307.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23307.json index 9f846f6fddc..0baa66381bb 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23307.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23307.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23307", "sourceIdentifier": "security@openanolis.org", "published": "2024-01-25T07:15:09.940", - "lastModified": "2024-11-21T08:57:28.370", - "vulnStatus": "Modified", + "lastModified": "2025-01-22T18:03:52.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -92,8 +92,29 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.1", - "versionEndIncluding": "6.7.2", - "matchCriteriaId": "2B220591-C1BF-4079-BC5C-242D64CF8D36" + "versionEndExcluding": "6.1.84", + "matchCriteriaId": "AE3F61C9-8D7D-4652-ACE5-F19BAC124414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.24", + "matchCriteriaId": "8018C1D0-0A5F-48D0-BC72-A2B33FDDA693" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.3", + "matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02" } ] } diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2395.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2395.json index d54a4c92b08..a75e3428988 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2395.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2395.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2395", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-12T22:15:07.640", - "lastModified": "2024-11-21T09:09:39.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:38:35.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:autopolis:bulgarisation_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.0.15", + "matchCriteriaId": "7211F818-A3D9-4D70-BFED-29C8EF18AC1F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034198%40bulgarisation-for-woocommerce&new=3034198%40bulgarisation-for-woocommerce&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4ff1d12e-1129-40d3-8c29-3a46ffc77872?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034198%40bulgarisation-for-woocommerce&new=3034198%40bulgarisation-for-woocommerce&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4ff1d12e-1129-40d3-8c29-3a46ffc77872?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24101.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24101.json index 9badefd2981..1f83b4c6020 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24101.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24101.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24101", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T22:15:07.423", - "lastModified": "2024-11-21T08:58:55.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:36:07.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,73 @@ "value": "Code-projects Scholars Tracking System 1.0 es vulnerable a la inyecci\u00f3n SQL en la Actualizaci\u00f3n de informaci\u00f3n de elegibilidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:scholars_tracking_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "783EDAF4-121E-47D5-9791-C5BB0CE2B50A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2024-24101/blob/main/CVE-14", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/ASR511-OO7/CVE-2024-24101/blob/main/CVE-14", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2406.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2406.json index 4f4e8bdb2a2..d47fb7404b6 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2406.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2406.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2406", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-12T21:15:59.713", - "lastModified": "2024-11-21T09:09:41.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:49:09.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gacjie_server_project:gacjie_server:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "7F3E02FF-A12B-4F6D-BB70-0535E317E91A" + } + ] + } + ] + } + ], "references": [ { "url": "https://note.zhaoj.in/share/7kZiVRqSuiMx", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.256503", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.256503", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://note.zhaoj.in/share/7kZiVRqSuiMx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.256503", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.256503", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2560.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2560.json index 2f280810fb4..5ac5308ad56 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2560.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2560.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2560", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T11:15:06.297", - "lastModified": "2024-11-21T09:10:00.743", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:51:20.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ], "cvssMetricV2": [ @@ -76,30 +96,85 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*", + "matchCriteriaId": "4D5CB727-FC6B-4212-A61E-2888A0DADFB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF9F8AF9-F921-4348-922B-EE5E6037E7AC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolRestoreSet.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257059", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257059", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/fromSysToolRestoreSet.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257059", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257059", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2581.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2581.json index a224a1b1646..0b3d213c3dc 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2581.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2581.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2581", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-18T03:15:06.380", - "lastModified": "2024-11-21T09:10:03.610", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T17:50:55.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,32 +94,91 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac10_firmware:16.03.10.13:*:*:*:*:*:*:*", + "matchCriteriaId": "6F1C8715-D7B4-4D1A-9E90-079C72049332" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B9E0489C-31D5-43C4-B15D-1D88119EF226" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/fromSetRouteStatic.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257081", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257081", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/fromSetRouteStatic.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2891.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2891.json index f2b20bbecff..ecd20c49b1c 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2891.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2891.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2891", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T14:15:09.530", - "lastModified": "2024-11-21T09:10:46.173", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:51:29.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,113 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*", + "matchCriteriaId": "4D94B37C-491D-4E7C-8273-F46FEDA62C9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BEE979-5BF3-48ED-AF42-0546D4F896E9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formQuickIndex.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257934", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257934", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300354", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formQuickIndex.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257934", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257934", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300354", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2892.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2892.json index 570a9e807e5..fe5dd91ffba 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2892.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2892.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2892", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T16:15:13.853", - "lastModified": "2024-11-21T09:10:46.323", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:58:23.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,113 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*", + "matchCriteriaId": "4D94B37C-491D-4E7C-8273-F46FEDA62C9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BEE979-5BF3-48ED-AF42-0546D4F896E9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formSetCfm.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257935", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257935", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300355", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formSetCfm.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257935", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257935", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300355", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2893.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2893.json index c323419fd89..8e61aff12db 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2893.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2893.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2893", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T17:15:47.810", - "lastModified": "2024-11-21T09:10:46.457", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:58:17.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,113 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*", + "matchCriteriaId": "4D94B37C-491D-4E7C-8273-F46FEDA62C9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BEE979-5BF3-48ED-AF42-0546D4F896E9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formSetDeviceName_devName.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257936", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257936", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300356", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formSetDeviceName_devName.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257936", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257936", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300356", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2894.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2894.json index 049262a53cb..59ce54ccaf9 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2894.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2894.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2894", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T17:15:48.080", - "lastModified": "2024-11-21T09:10:46.603", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:57:21.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,113 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*", + "matchCriteriaId": "4D94B37C-491D-4E7C-8273-F46FEDA62C9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BEE979-5BF3-48ED-AF42-0546D4F896E9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formSetQosBand.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257937", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257937", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300357", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formSetQosBand.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257937", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257937", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300357", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2895.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2895.json index 5c3bc847835..efad8b5a779 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2895.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2895.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2895", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T18:15:10.893", - "lastModified": "2024-11-21T09:10:46.743", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:53:34.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,113 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*", + "matchCriteriaId": "4D94B37C-491D-4E7C-8273-F46FEDA62C9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BEE979-5BF3-48ED-AF42-0546D4F896E9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formWifiWpsOOB.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257938", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257938", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300358", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formWifiWpsOOB.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257938", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257938", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300358", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2896.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2896.json index 814da242324..1c654d8b757 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2896.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2896.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2896", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T18:15:11.543", - "lastModified": "2024-11-21T09:10:46.883", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:53:24.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,113 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*", + "matchCriteriaId": "4D94B37C-491D-4E7C-8273-F46FEDA62C9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BEE979-5BF3-48ED-AF42-0546D4F896E9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formWifiWpsStart.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257939", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257939", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300359", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formWifiWpsStart.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257939", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257939", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300359", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2897.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2897.json index 0135a0a4ce2..0defe27e669 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2897.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2897.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2897", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T19:15:48.857", - "lastModified": "2024-11-21T09:10:47.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:53:14.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,101 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*", + "matchCriteriaId": "4D94B37C-491D-4E7C-8273-F46FEDA62C9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BEE979-5BF3-48ED-AF42-0546D4F896E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formWriteFacMac.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257940", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257940", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300360", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/formWriteFacMac.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257940", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257940", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300360", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2898.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2898.json index 37099767e32..3ba4688ac00 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2898.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2898.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2898", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T19:15:49.130", - "lastModified": "2024-11-21T09:10:47.180", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:52:16.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,113 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*", + "matchCriteriaId": "4D94B37C-491D-4E7C-8273-F46FEDA62C9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BEE979-5BF3-48ED-AF42-0546D4F896E9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetRouteStatic.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257941", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257941", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300361", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetRouteStatic.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257941", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257941", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300361", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2899.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2899.json index 4f47871b249..1e7dac82257 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2899.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2899.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2899", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T19:15:49.410", - "lastModified": "2024-11-21T09:10:47.327", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:52:49.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,113 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*", + "matchCriteriaId": "4D94B37C-491D-4E7C-8273-F46FEDA62C9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BEE979-5BF3-48ED-AF42-0546D4F896E9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWirelessRepeat.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257942", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257942", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300362", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWirelessRepeat.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257942", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257942", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300362", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2900.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2900.json index 06dca378fce..c1c02953420 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2900.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2900.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2900", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T20:15:10.500", - "lastModified": "2024-11-21T09:10:47.473", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:51:57.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,113 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*", + "matchCriteriaId": "4D94B37C-491D-4E7C-8273-F46FEDA62C9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BEE979-5BF3-48ED-AF42-0546D4F896E9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/saveParentControlInfo_deviceId.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257943", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257943", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300364", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/saveParentControlInfo_deviceId.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257943", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257943", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300364", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2901.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2901.json index 6f46314517a..4d5bcb0c0bc 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2901.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2901.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2901", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T20:15:10.933", - "lastModified": "2024-11-21T09:10:47.610", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:51:47.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,113 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*", + "matchCriteriaId": "4D94B37C-491D-4E7C-8273-F46FEDA62C9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BEE979-5BF3-48ED-AF42-0546D4F896E9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/setSchedWifi.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257944", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257944", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300367", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/setSchedWifi.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257944", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257944", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300367", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2902.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2902.json index ed0552dfcd0..ce507312d09 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2902.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2902.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2902", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T20:15:11.203", - "lastModified": "2024-11-21T09:10:47.757", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:51:36.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,113 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*", + "matchCriteriaId": "4D94B37C-491D-4E7C-8273-F46FEDA62C9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BEE979-5BF3-48ED-AF42-0546D4F896E9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWifiGusetBasic.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257945", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257945", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300449", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/fromSetWifiGusetBasic.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257945", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257945", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300449", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2903.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2903.json index 8d2f2e93958..af1cc8aa3c6 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2903.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2903.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2903", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-26T21:15:53.343", - "lastModified": "2024-11-21T09:10:47.910", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:48:48.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,113 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*", + "matchCriteriaId": "4D94B37C-491D-4E7C-8273-F46FEDA62C9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BEE979-5BF3-48ED-AF42-0546D4F896E9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/GetParentControlInfo.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257946", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257946", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300452", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/GetParentControlInfo.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257946", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257946", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.300452", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2991.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2991.json index 350ce692189..23cbf404519 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2991.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2991.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2991", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T19:15:49.940", - "lastModified": "2024-11-21T09:11:00.327", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:59:21.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,101 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:fh1203_firmware:2.0.1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "E28AF51D-EBFB-4EC8-9FCB-C3DFAE1DBB2E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:fh1203:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E7A0DCB-AC18-4F32-86E2-F2C2E9118A71" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWriteFacMac.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.258160", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258160", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.301366", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formWriteFacMac.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.258160", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258160", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.301366", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2992.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2992.json index 96abe7fb432..05fdd538fd7 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2992.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2992.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2992", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T19:15:50.173", - "lastModified": "2024-11-21T09:11:00.473", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:59:00.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,113 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:fh1203_firmware:2.0.1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "E28AF51D-EBFB-4EC8-9FCB-C3DFAE1DBB2E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:fh1203:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E7A0DCB-AC18-4F32-86E2-F2C2E9118A71" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formSetCfm.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.258161", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258161", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.301371", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1203/formSetCfm.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.258161", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258161", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.301371", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31306.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31306.json index a4f72230a23..c8474674a14 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31306.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31306.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31306", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-07T18:15:12.060", - "lastModified": "2024-11-21T09:13:14.467", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T17:43:48.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "4.5.4", + "matchCriteriaId": "8946BE4C-282D-40DC-85D0-38B9763B3FCD" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/essential-blocks/wordpress-essential-blocks-plugin-4-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/essential-blocks/wordpress-essential-blocks-plugin-4-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3314.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3314.json index 4d08412a191..c9687f85b53 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3314.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3314.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3314", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-04T21:15:17.203", - "lastModified": "2024-11-21T09:29:22.533", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:47:45.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.259385", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.259385", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.309526", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259385", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.259385", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.309526", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34730.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34730.json index 1b8a16677ac..0f97fb5ae26 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34730.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34730.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34730", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.297", - "lastModified": "2025-01-21T23:15:13.297", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:18.827", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In multiple locations, there is a possible bypass of user consent to enabling new Bluetooth HIDs due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37093.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37093.json index ca13c3904a0..55579768188 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37093.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37093.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37093", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-02T12:15:17.320", - "lastModified": "2025-01-02T12:15:17.320", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:41:28.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:stylemixthemes:masterstudy_lms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.2", + "matchCriteriaId": "E498AA90-63DD-42D5-A976-7460743959A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/masterstudy-lms-learning-management-system/vulnerability/wordpress-masterstudy-lms-wordpress-plugin-plugin-3-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37094.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37094.json index 7520dbb86a0..2aa6ed90935 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37094.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37094.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37094", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T14:15:05.980", - "lastModified": "2024-12-02T14:15:05.967", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:35:39.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:stylemixthemes:masterstudy_lms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.13", + "matchCriteriaId": "C41B77F3-6D2E-42F6-B3EA-685592DD424A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/masterstudy-lms-learning-management-system/wordpress-masterstudy-lms-plugin-3-2-12-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37277.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37277.json index 82007787478..284941e1a6e 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37277.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37277.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37277", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:23.293", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:03:11.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:strangerstudios:paid_memberships_pro:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.0.5", + "matchCriteriaId": "83D68630-5E4A-4858-89C5-CC62251A4F30" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/paid-memberships-pro/wordpress-paid-memberships-pro-plugin-3-0-4-insecure-direct-object-references-idor-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39600.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39600.json index 737aa82007d..6ad97018da6 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39600.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39600.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39600", "sourceIdentifier": "cna@sap.com", "published": "2024-07-09T05:15:13.147", - "lastModified": "2024-11-21T09:28:05.713", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:33:47.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.6, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.6, + "impactScore": 3.6 } ] }, @@ -49,24 +69,63 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:gui_for_windows:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "74ED382C-6C84-4C2F-BF8E-51AC10DB3611" + } + ] + } + ] } ], "references": [ { "url": "https://me.sap.com/notes/3461110", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://url.sap/sapsecuritypatchday", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://me.sap.com/notes/3461110", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://url.sap/sapsecuritypatchday", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42471.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42471.json index d668af4843a..e8c19ebb3a7 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42471.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42471.json @@ -2,13 +2,13 @@ "id": "CVE-2024-42471", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-02T18:15:35.540", - "lastModified": "2025-01-22T16:15:29.417", + "lastModified": "2025-01-22T17:15:12.137", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` on the 2.x branch before 2.1.7 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.7 or higher. There are no known workarounds for this issue." + "value": "actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` on the 2.x branch before 2.1.2 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.2 or higher. There are no known workarounds for this issue." }, { "lang": "es", @@ -117,11 +117,8 @@ ], "references": [ { - "url": "https://github.com/actions/toolkit/pull/1724", - "source": "security-advisories@github.com", - "tags": [ - "Patch" - ] + "url": "https://github.com/actions/toolkit/pull/1666", + "source": "security-advisories@github.com" }, { "url": "https://github.com/actions/toolkit/security/advisories/GHSA-6q32-hq47-5qq3", diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4222.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4222.json index 4313d022e48..b9054c2722c 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4222.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4222.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4222", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T10:15:08.687", - "lastModified": "2024-11-21T09:42:25.043", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:23:01.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "2.7.1", + "matchCriteriaId": "887F64DA-F70D-4111-BE6A-4F908EB59A00" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.themeum.com/product/tutor-lms/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/942fffb6-2719-4b70-9759-21b2d50002c5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.themeum.com/product/tutor-lms/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/942fffb6-2719-4b70-9759-21b2d50002c5?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43095.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43095.json index de904085b01..e755a0a4c24 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43095.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43095.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43095", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.393", - "lastModified": "2025-01-21T23:15:13.393", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:19.013", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In multiple locations, there is a possible way to obtain any system permission due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43096.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43096.json index 1ed720746d4..6f65e2a603f 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43096.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43096.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43096", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.497", - "lastModified": "2025-01-21T23:15:13.497", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:19.147", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In build_read_multi_rsp of gatt_sr.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43763.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43763.json index 7a414bbed7d..3bff08cf29f 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43763.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43763.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43763", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.600", - "lastModified": "2025-01-21T23:15:13.600", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:19.283", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In build_read_multi_rsp of gatt_sr.cc, there is a possible denial of service due to a logic error in the code. This could lead to remote (proximal/adjacent) denial of service with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43765.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43765.json index b4983c40abd..71d31f8434c 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43765.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43765.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43765", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.690", - "lastModified": "2025-01-21T23:15:13.690", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:19.413", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In multiple locations, there is a possible way to obtain access to a folder due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43770.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43770.json index 2daf540c477..f9def9520e5 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43770.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43770.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43770", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.790", - "lastModified": "2025-01-21T23:15:13.790", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:19.547", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In gatts_process_find_info of gatt_sr.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43771.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43771.json index 4b2dea5d47d..1267d818fb9 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43771.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43771.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43771", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:13.880", - "lastModified": "2025-01-21T23:15:13.880", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:19.680", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In gatts_process_read_req of gatt_sr.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4351.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4351.json index 278f14db202..27fcf4abba2 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4351.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4351.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4351", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T10:15:09.890", - "lastModified": "2024-11-21T09:42:40.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:23:35.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "2.7.1", + "matchCriteriaId": "887F64DA-F70D-4111-BE6A-4F908EB59A00" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.themeum.com/product/tutor-lms/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/59859583-49e5-4a80-8659-b9ca7ddc089d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.themeum.com/product/tutor-lms/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/59859583-49e5-4a80-8659-b9ca7ddc089d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4352.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4352.json index db9078b5c3a..ca432af1607 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4352.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4352.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4352", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T10:15:10.470", - "lastModified": "2024-11-21T09:42:40.890", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:24:15.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "2.7.1", + "matchCriteriaId": "887F64DA-F70D-4111-BE6A-4F908EB59A00" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.themeum.com/product/tutor-lms/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c647beda-cf73-4372-975f-a8c8ed05217f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.themeum.com/product/tutor-lms/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c647beda-cf73-4372-975f-a8c8ed05217f?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4367.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4367.json index f00c53a2e26..85daf57516d 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4367.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4367.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4367", "sourceIdentifier": "security@mozilla.org", "published": "2024-05-14T18:15:12.467", - "lastModified": "2024-11-21T09:42:42.537", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:16:51.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,59 +15,409 @@ "value": "Faltaba una verificaci\u00f3n de tipo al manejar fuentes en PDF.js, lo que permitir\u00eda la ejecuci\u00f3n arbitraria de JavaScript en el contexto de PDF.js. Esta vulnerabilidad afecta a Firefox < 126, Firefox ESR < 115.11 y Thunderbird < 115.11." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.11.0", + "matchCriteriaId": "DCAE3CC2-8B68-45CA-BADF-3DF1AF50ECD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding": "126.0", + "matchCriteriaId": "2695925F-3984-4304-A630-5FF27054F360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "115.11.0", + "matchCriteriaId": "0C7339B9-8741-4320-BF1C-3BC9F1D051FF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.10.6", + "matchCriteriaId": "36FAB456-0B41-41D1-996F-1E3D09610837" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:-:*:*:*:*:*:*", + "matchCriteriaId": "88333816-A52C-4532-873F-FB63F9D8EF50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision10:*:*:*:*:*:*", + "matchCriteriaId": "E7A59CB6-CC3B-456E-9D86-C4CF9E6E498A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision11:*:*:*:*:*:*", + "matchCriteriaId": "921BE65B-3D3D-4FC3-95DA-9BC952867DDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision12:*:*:*:*:*:*", + "matchCriteriaId": "B72BEA46-A56F-48C6-BA27-EEAECB5E5CBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision13:*:*:*:*:*:*", + "matchCriteriaId": "FEB4F9B6-0B66-428B-99F7-65899B67661D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision14:*:*:*:*:*:*", + "matchCriteriaId": "C5D81A00-9E65-4EDC-81B4-E9BA41DAFBC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision15:*:*:*:*:*:*", + "matchCriteriaId": "48ABE078-AEE4-4757-BC2A-BA93441217A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision16:*:*:*:*:*:*", + "matchCriteriaId": "F348FAF7-E5C1-4CD1-A03A-7533320F5541" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision17:*:*:*:*:*:*", + "matchCriteriaId": "099C0FAB-5E2E-4E31-890F-887866433240" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision18:*:*:*:*:*:*", + "matchCriteriaId": "77C79C72-DECD-49F2-A0EA-5CC5D502A57A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision19:*:*:*:*:*:*", + "matchCriteriaId": "D6942894-A851-4E45-AFE8-980732893B8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision20:*:*:*:*:*:*", + "matchCriteriaId": "C3975146-09F6-4654-887D-4346152717FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision21:*:*:*:*:*:*", + "matchCriteriaId": "FBF5C6B3-DAF1-443D-9A2C-531C88283023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision22:*:*:*:*:*:*", + "matchCriteriaId": "D20DBECD-C640-4C00-882C-0890DA4972F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision23:*:*:*:*:*:*", + "matchCriteriaId": "9B1E6293-A648-4585-970C-D42BAECC325D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision24:*:*:*:*:*:*", + "matchCriteriaId": "E1F0C305-68E7-4D26-92AB-861656D4D60A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision25:*:*:*:*:*:*", + "matchCriteriaId": "FEA7C621-C614-471F-807C-21D3B1B4D958" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision26:*:*:*:*:*:*", + "matchCriteriaId": "887D575F-E401-4C1F-ADDC-7F16E43FDFE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision27:*:*:*:*:*:*", + "matchCriteriaId": "03C62BEE-A21A-4065-B881-04BDEA26A6FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision28:*:*:*:*:*:*", + "matchCriteriaId": "5F505772-330D-40FB-A7B3-A36B67E6AC7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision29:*:*:*:*:*:*", + "matchCriteriaId": "1B4943D5-A188-4115-995A-3096455EB5AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision3:*:*:*:*:*:*", + "matchCriteriaId": "85ECCEA8-66F7-4075-A800-3E2CDE8AFE18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision30:*:*:*:*:*:*", + "matchCriteriaId": "165F7F6B-D335-46DE-8BC9-5A583B86867B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision31:*:*:*:*:*:*", + "matchCriteriaId": "C84E2AE8-2F76-4E1F-8FB4-F260B4D4EE36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision32:*:*:*:*:*:*", + "matchCriteriaId": "2597BB89-E838-4ED8-89C0-84D8C47A0A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision33:*:*:*:*:*:*", + "matchCriteriaId": "1E1ED3FD-EAB2-41A5-93C3-E9D31AF53E2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision34:*:*:*:*:*:*", + "matchCriteriaId": "2080E636-6C5D-4432-B07B-BED2244BDB39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision35:*:*:*:*:*:*", + "matchCriteriaId": "002FC2E8-2A04-415A-9898-119A739EB0F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision36:*:*:*:*:*:*", + "matchCriteriaId": "70B28907-BAD8-4876-9C39-E980351A2470" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision37:*:*:*:*:*:*", + "matchCriteriaId": "FB937D6A-D429-4891-BB3A-28A0B039AA3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision38:*:*:*:*:*:*", + "matchCriteriaId": "99FC8686-6511-42F7-AE15-EABF3CF1063B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision39:*:*:*:*:*:*", + "matchCriteriaId": "20C91E21-36C2-4707-A328-60B93D26297C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision4:*:*:*:*:*:*", + "matchCriteriaId": "A854AAC3-3ED9-4B28-AE12-221BB21869DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision40:*:*:*:*:*:*", + "matchCriteriaId": "631CCE15-D3BB-474A-8C61-B182A7B57125" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision41:*:*:*:*:*:*", + "matchCriteriaId": "626D1B88-86C2-4768-9B0F-CF675BCCE0E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision42:*:*:*:*:*:*", + "matchCriteriaId": "93648317-8C93-4212-AFE3-27B5B271A735" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision43:*:*:*:*:*:*", + "matchCriteriaId": "9B5FADC4-3DE4-48FF-A1EF-897475330769" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision44:*:*:*:*:*:*", + "matchCriteriaId": "79685312-DD43-4BA8-81D1-113E967F7D73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision5:*:*:*:*:*:*", + "matchCriteriaId": "F1127A48-219E-4083-A4D8-1BD47D1EC780" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision6:*:*:*:*:*:*", + "matchCriteriaId": "FC14EBB2-44E8-420A-B799-EEF5EDD25742" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision7:*:*:*:*:*:*", + "matchCriteriaId": "87F12C86-40B3-4890-8663-722402C34100" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision8:*:*:*:*:*:*", + "matchCriteriaId": "358F76F5-CCDC-4DB6-BB44-0B4D8E0028A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:7.10.6:revision9:*:*:*:*:*:*", + "matchCriteriaId": "2DE19BCC-A9CA-4CCC-B7DE-5A90710DD98C" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1893645", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00010.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00012.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-21/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-22/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-23/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Aug/30", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1893645", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00010.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00012.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-21/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-22/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-23/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47364.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47364.json index b3fdf182f94..5b87a9c52c3 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47364.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47364.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47364", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-06T10:15:05.050", - "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:27:35.677", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moveaddons:move_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.5", + "matchCriteriaId": "F81AD365-ADB0-422F-A555-39201EF0708E" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/move-addons/wordpress-move-addons-for-elementor-plugin-1-3-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47390.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47390.json index 12fc894f052..c6611cfb4d5 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47390.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47390.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47390", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-05T15:15:16.037", - "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:25:14.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jegtheme:jeg_elementor_kit:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.9", + "matchCriteriaId": "661BA096-69DC-485C-881A-8192C4B9FE4F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/jeg-elementor-kit/wordpress-jeg-elementor-kit-plugin-2-6-8-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47392.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47392.json index fc3e89f5117..afee2733abf 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47392.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47392.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47392", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-05T15:15:16.407", - "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:25:37.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,12 +69,43 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "5.7.6", + "matchCriteriaId": "79C87982-727A-48B3-B440-F0667893CFA6" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/bdthemes-element-pack-lite/wordpress-element-pack-elementor-addons-header-footer-template-library-dynamic-grid-carousel-remote-arrows-plugin-5-7-5-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4774.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4774.json index 67b4fe8ddbb..364a2fbe58b 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4774.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4774.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4774", "sourceIdentifier": "security@mozilla.org", "published": "2024-05-14T18:15:15.613", - "lastModified": "2024-11-21T09:43:35.070", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:56:00.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,88 @@ "value": "El c\u00f3digo `ShmemCharMapHashEntry()` era susceptible a un comportamiento potencialmente indefinido al omitir la sem\u00e1ntica de movimiento de uno de sus miembros de datos. Esta vulnerabilidad afecta a Firefox < 126." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding": "126.0", + "matchCriteriaId": "2695925F-3984-4304-A630-5FF27054F360" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1886598", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-21/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1886598", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-21/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49724.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49724.json index d339357afbe..72ec177bad4 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49724.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49724.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49724", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.000", - "lastModified": "2025-01-21T23:15:14.000", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:19.813", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In multiple functions of AccountManagerService.java, there is a possible way to bypass permissions and launch protected activities due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49732.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49732.json index 8d9757e3d7a..30a20c7ebb0 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49732.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49732.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49732", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.100", - "lastModified": "2025-01-21T23:15:14.100", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:19.960", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In multiple functions of CompanionDeviceManagerService.java, there is a possible way to grant permissions without user consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49733.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49733.json index 4ed594a861a..44dd12e0ddf 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49733.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49733.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49733", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.197", - "lastModified": "2025-01-21T23:15:14.197", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:20.100", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In reload of ServiceListing.java , there is a possible way to allow a malicious app to hide an NLS from Settings due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49734.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49734.json index d2ca4275eee..3eed24a44e2 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49734.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49734.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49734", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.307", - "lastModified": "2025-01-21T23:15:14.307", - "vulnStatus": "Received", + "lastModified": "2025-01-22T17:15:12.253", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In multiple functions of ConnectivityService.java, there is a possible way for a Wi-Fi AP to determine what site a device has connected to through a VPN due to side channel information disclosure. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50453.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50453.json index 4ac6065da60..f4f86991a07 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50453.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50453.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50453", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T20:15:07.463", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:29:43.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,12 +69,43 @@ "value": "CWE-23" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webangon:the_pack_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.0", + "matchCriteriaId": "F2EBF97A-7766-472A-8BD1-C50525B4F763" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/the-pack-addon/wordpress-the-pack-elementor-addons-plugin-2-0-9-local-file-inclusion-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51457.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51457.json new file mode 100644 index 00000000000..82654fdaae5 --- /dev/null +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51457.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-51457", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-22T17:15:12.390", + "lastModified": "2025-01-22T17:15:12.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Robotic Process Automation for Cloud Pak 21.0.0 through 21.0.7.19 and 23.0.0 through 23.0.19 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7181230", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53808.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53808.json index e3fed922fb3..8aff2d59363 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53808.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53808.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53808", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-06T14:15:23.233", - "lastModified": "2024-12-06T14:15:23.233", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T18:04:55.013", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:basixonline:nex-forms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.7.9", + "matchCriteriaId": "2E07EEA4-8F76-4E3C-8CF6-BFC1221FEE86" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/nex-forms-express-wp-form-builder/vulnerability/wordpress-nex-forms-plugin-8-7-8-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55957.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55957.json new file mode 100644 index 00000000000..142df07a76a --- /dev/null +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55957.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-55957", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-22T18:15:20.237", + "lastModified": "2025-01-22T18:15:20.237", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Thermo Fisher Scientific Xcalibur before 4.7 SP1 and Thermo Foundation Instrument Control Software (ICSW) before 3.1 SP10, the driver packages have a local privilege escalation vulnerability due to improper access control permissions on Windows systems." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://assets.thermofisher.com/TFS-Assets/CORP/Product-Guides/Thermo_Scientific_Xcalibur_and_Foundation.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://thermofisher.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56252.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56252.json index ffec0be2b0a..74b8ee0fe00 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56252.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56252.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56252", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-02T12:15:26.973", - "lastModified": "2025-01-02T12:15:26.973", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T17:44:01.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themelooks:enter_addons:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.1.9", + "matchCriteriaId": "B321B07A-193F-49A2-A649-DE61A156858C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/enteraddons/vulnerability/wordpress-enter-addons-plugin-2-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56254.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56254.json index 391913468a4..88f38a09ea9 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56254.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56254.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56254", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-02T12:15:27.247", - "lastModified": "2025-01-02T12:15:27.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:44:38.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moveaddons:move_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.7", + "matchCriteriaId": "30632DFA-16E3-4ABE-B2D2-37B9D4DE3D3B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/move-addons/vulnerability/wordpress-move-addons-for-elementor-plugin-1-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-562xx/CVE-2024-56266.json b/CVE-2024/CVE-2024-562xx/CVE-2024-56266.json index 95cd2e1bbe4..ec2d43bc13d 100644 --- a/CVE-2024/CVE-2024-562xx/CVE-2024-56266.json +++ b/CVE-2024/CVE-2024-562xx/CVE-2024-56266.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56266", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-02T12:15:28.480", - "lastModified": "2025-01-02T12:15:28.480", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-22T17:48:32.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sonaar:mp3_audio_player_for_music\\,_radio_\\&_podcast:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.9", + "matchCriteriaId": "000B8C00-8657-4A30-A199-BBD061E6352F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/mp3-music-player-by-sonaar/vulnerability/wordpress-mp3-audio-player-plugin-5-8-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57160.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57160.json index bdfe93262d3..3729de94988 100644 --- a/CVE-2024/CVE-2024-571xx/CVE-2024-57160.json +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57160.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57160", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T16:15:32.817", - "lastModified": "2025-01-16T16:15:32.817", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T17:15:20.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": "Se descubri\u00f3 que 07FLYCMS V1.3.9 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s de /erp.07fly.net:80/oa/OaTask/edit.html." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:07fly:07flycms:1.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "E9E565AA-68C6-429F-BC02-0680396BD9A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/1091101/yang.xian/tree/main/7/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57161.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57161.json index 18847d1c05b..dfa2c2e6ec6 100644 --- a/CVE-2024/CVE-2024-571xx/CVE-2024-57161.json +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57161.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57161", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T16:15:32.937", - "lastModified": "2025-01-16T16:15:32.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T17:15:14.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": " Se descubri\u00f3 que 07FLYCMS V1.3.9 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s de /erp.07fly.net:80/oa/OaWorkReport/edit.html" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:07fly:07flycms:1.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "E9E565AA-68C6-429F-BC02-0680396BD9A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/1091101/yang.xian/tree/main/8/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57769.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57769.json index 4c869b4ef59..6d45cd8c2a5 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57769.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57769.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57769", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:26.240", - "lastModified": "2025-01-16T18:15:26.240", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T17:07:20.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": " Se descubri\u00f3 que JFinalOA anterior a v2025.01.01 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente borrowmoney/listData?applyUser." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jfinaloa_project:jfinaloa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2025-01-01", + "matchCriteriaId": "A7943D79-E6C7-467F-9FC8-465EF8BC84B0" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/r1bbit/JFinalOA/issues/IBHUNR", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57770.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57770.json index 1675c8de626..f167307d3e9 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57770.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57770.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57770", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:26.477", - "lastModified": "2025-01-16T18:15:26.477", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T17:07:27.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": " Se descubri\u00f3 que JFinalOA anterior a v2025.01.01 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente apply/save#oaContractApply.id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jfinaloa_project:jfinaloa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2025-01-01", + "matchCriteriaId": "A7943D79-E6C7-467F-9FC8-465EF8BC84B0" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/r1bbit/JFinalOA/issues/IBHUP1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57775.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57775.json index 17419fbd081..82edfd1b70f 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57775.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57775.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57775", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T18:15:27.633", - "lastModified": "2025-01-16T18:15:27.633", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-22T17:07:33.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "Se descubri\u00f3 que JFinalOA anterior a v2025.01.01 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente getWorkFlowHis?insid." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jfinaloa_project:jfinaloa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2025-01-01", + "matchCriteriaId": "A7943D79-E6C7-467F-9FC8-465EF8BC84B0" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/r1bbit/JFinalOA/issues/IBHURT", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0651.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0651.json new file mode 100644 index 00000000000..8f753a08e13 --- /dev/null +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0651.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-0651", + "sourceIdentifier": "cna@cloudflare.com", + "published": "2025-01-22T18:15:20.363", + "lastModified": "2025-01-22T18:15:20.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Privilege Management vulnerability in Cloudflare WARP on Windows allows File Manipulation.\n\nUser with a low system privileges\u00a0 can create a set of symlinks inside the\u00a0C:\\ProgramData\\Cloudflare\\warp-diag-partials folder. After triggering the 'Reset all settings\" option the WARP service will delete the files that the symlink was pointing to. Given the WARP service operates with System privileges this might lead to deleting files owned by the System user.\nThis issue affects WARP: before 2024.12.492.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@cloudflare.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:X/R:U/V:X/RE:L/U:Green", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NEGLIGIBLE", + "automatable": "NOT_DEFINED", + "recovery": "USER", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "LOW", + "providerUrgency": "GREEN" + } + } + ] + }, + "weaknesses": [ + { + "source": "cna@cloudflare.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://developers.cloudflare.com/warp-client/", + "source": "cna@cloudflare.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20128.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20128.json new file mode 100644 index 00000000000..cc78dc41386 --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20128.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-20128", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-01-22T17:15:12.583", + "lastModified": "2025-01-22T17:15:12.583", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software.\r\nFor a description of this vulnerability, see the .\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html", + "source": "psirt@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20156.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20156.json new file mode 100644 index 00000000000..3a24141e004 --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20156.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2025-20156", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-01-22T17:15:12.800", + "lastModified": "2025-01-22T17:15:12.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the REST API of Cisco Meeting Management could allow a remote, authenticated attacker with low privileges to elevate privileges to administrator on an affected device.\r\n\r\nThis vulnerability exists because proper authorization is not enforced upon REST API users. An attacker could exploit this vulnerability by sending API requests to a specific endpoint. A successful exploit could allow the attacker to gain administrator-level control over edge nodes that are managed by Cisco Meeting Management." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-274" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html", + "source": "psirt@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA", + "source": "psirt@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmm-privesc-uy2Vf8pc", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20165.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20165.json new file mode 100644 index 00000000000..733b686e444 --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20165.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2025-20165", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-01-22T17:15:13.010", + "lastModified": "2025-01-22T17:15:13.010", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the SIP processing subsystem of Cisco BroadWorks could allow an unauthenticated, remote attacker to halt the processing of incoming SIP requests, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to improper memory handling for certain SIP requests. An attacker could exploit this vulnerability by sending a high number of SIP requests to an affected system. A successful exploit could allow the attacker to exhaust the memory that was allocated to the Cisco BroadWorks Network Servers that handle SIP traffic. If no memory is available, the Network Servers can no longer process incoming requests, resulting in a DoS condition that requires manual intervention to recover." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-789" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html", + "source": "psirt@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-sip-dos-mSySbrmt", + "source": "psirt@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21529.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21529.json index 809da04c63a..3f442192cd2 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21529.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21529.json @@ -2,20 +2,44 @@ "id": "CVE-2025-21529", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:18.720", - "lastModified": "2025-01-21T21:15:18.720", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:20.530", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Information Schema). Las versiones compatibles afectadas son 8.0.40 y anteriores, 8.4.3 y anteriores y 9.1.0 y anteriores. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios elevados y acceso a la red a trav\u00e9s de m\u00faltiples protocolos ponga en peligro MySQL Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la capacidad no autorizada de provocar un bloqueo o un bloqueo frecuente y repetible (DOS completo) de MySQL Server. Puntuaci\u00f3n base de CVSS 3.1: 4,9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." } ], "metrics": { "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", @@ -35,6 +59,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21530.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21530.json index 43c89efa972..564d16b7879 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21530.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21530.json @@ -2,20 +2,44 @@ "id": "CVE-2025-21530", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:18.850", - "lastModified": "2025-01-21T21:15:18.850", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:20.687", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Panel Processor). Supported versions that are affected are 8.60 and 8.61. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto PeopleSoft Enterprise PeopleTools de Oracle PeopleSoft (componente: Panel Processor). Las versiones compatibles afectadas son 8.60 y 8.61. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP ponga en peligro PeopleSoft Enterprise PeopleTools. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso de lectura no autorizado a un subconjunto de datos accesibles de PeopleSoft Enterprise PeopleTools. Puntuaci\u00f3n base de CVSS 3.1: 4,3 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)." } ], "metrics": { "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -35,6 +59,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21532.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21532.json index f4222087a8e..48ccbace44b 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21532.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21532.json @@ -2,20 +2,44 @@ "id": "CVE-2025-21532", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:19.107", - "lastModified": "2025-01-21T21:15:19.107", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:20.840", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle Analytics Desktop product of Oracle Analytics (component: Install). Supported versions that are affected are Prior to 8.1.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Analytics Desktop executes to compromise Oracle Analytics Desktop. Successful attacks of this vulnerability can result in takeover of Oracle Analytics Desktop. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto Oracle Analytics Desktop de Oracle Analytics (componente: Instalaci\u00f3n). Las versiones compatibles afectadas son anteriores a la 8.1.0. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con pocos privilegios que inicie sesi\u00f3n en la infraestructura donde se ejecuta Oracle Analytics Desktop ponga en peligro Oracle Analytics Desktop. Los ataques exitosos de esta vulnerabilidad pueden provocar la toma de control de Oracle Analytics Desktop. Puntuaci\u00f3n base CVSS 3.1: 7,8 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)." } ], "metrics": { "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -35,6 +59,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21544.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21544.json index b0d620694d7..e87ea6148e5 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21544.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21544.json @@ -2,20 +2,24 @@ "id": "CVE-2025-21544", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:20.690", - "lastModified": "2025-01-21T21:15:20.690", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:20.993", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle Communications Order and Service Management product of Oracle Communications Applications (component: Security). Supported versions that are affected are 7.4.0, 7.4.1 and 7.5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Order and Service Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Order and Service Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Order and Service Management accessible data as well as unauthorized read access to a subset of Oracle Communications Order and Service Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto Oracle Communications Order and Service Management de Oracle Communications Applications (componente: Seguridad). Las versiones compatibles afectadas son 7.4.0, 7.4.1 y 7.5.0. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios reducidos y acceso a la red a trav\u00e9s de HTTP comprometa Oracle Communications Order and Service Management. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante y, si bien la vulnerabilidad se encuentra en Oracle Communications Order and Service Management, los ataques pueden afectar significativamente a otros productos (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la actualizaci\u00f3n, inserci\u00f3n o eliminaci\u00f3n no autorizada de algunos datos accesibles de Oracle Communications Order and Service Management, as\u00ed como el acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Communications Order and Service Management. Puntuaci\u00f3n base CVSS 3.1 5,4 (impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)." } ], "metrics": { "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21545.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21545.json index a9390d97488..fa654e434ca 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21545.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21545.json @@ -2,20 +2,44 @@ "id": "CVE-2025-21545", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:20.860", - "lastModified": "2025-01-21T21:15:20.860", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:21.117", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: OpenSearch). Supported versions that are affected are 8.60 and 8.61. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of PeopleSoft Enterprise PeopleTools. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto PeopleSoft Enterprise PeopleTools de Oracle PeopleSoft (componente: OpenSearch). Las versiones compatibles afectadas son 8.60 y 8.61. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP ponga en peligro PeopleSoft Enterprise PeopleTools. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la capacidad no autorizada de provocar un bloqueo o un bloqueo frecuente y repetitivo (DOS completo) de PeopleSoft Enterprise PeopleTools. Puntuaci\u00f3n base de CVSS 3.1: 7,5 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)." } ], "metrics": { "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -35,6 +59,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21546.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21546.json index 762f15a1073..c687f229d21 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21546.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21546.json @@ -2,20 +2,44 @@ "id": "CVE-2025-21546", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:20.987", - "lastModified": "2025-01-21T21:15:20.987", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:21.270", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Security: Privileges). Las versiones compatibles afectadas son 8.0.40 y anteriores, 8.4.3 y anteriores y 9.1.0 y anteriores. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios elevados y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa MySQL Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso no autorizado a actualizaciones, inserciones o eliminaciones de algunos datos accesibles de MySQL Server, as\u00ed como un acceso de lectura no autorizado a un subconjunto de datos accesibles de MySQL Server. Puntuaci\u00f3n base CVSS 3.1 3.8 (impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N)." } ], "metrics": { "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 3.8, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", @@ -35,6 +59,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21547.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21547.json index 5c7eba1f7f5..39bf7ef725e 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21547.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21547.json @@ -2,20 +2,44 @@ "id": "CVE-2025-21547", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:21.110", - "lastModified": "2025-01-21T21:15:21.110", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:21.433", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle Hospitality OPERA 5 product of Oracle Hospitality Applications (component: Opera Servlet). Supported versions that are affected are 5.6.19.20, 5.6.25.8, 5.6.26.6 and 5.6.27.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality OPERA 5. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality OPERA 5 accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Hospitality OPERA 5. CVSS 3.1 Base Score 9.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto Oracle Hospitality OPERA 5 de Oracle Hospitality Applications (componente: Opera Servlet). Las versiones compatibles afectadas son 5.6.19.20, 5.6.25.8, 5.6.26.6 y 5.6.27.1. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP ponga en peligro Oracle Hospitality OPERA 5. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso no autorizado a datos cr\u00edticos o un acceso completo a todos los datos accesibles de Oracle Hospitality OPERA 5 y la capacidad no autorizada de provocar un bloqueo o un bloqueo frecuente y repetible (DOS completo) de Oracle Hospitality OPERA 5. Puntuaci\u00f3n base CVSS 3.1 9.1 (impactos en la confidencialidad y disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H)." } ], "metrics": { "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", @@ -35,6 +59,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21548.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21548.json index f3341d9bf89..85fa93b53bc 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21548.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21548.json @@ -2,20 +2,44 @@ "id": "CVE-2025-21548", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:21.240", - "lastModified": "2025-01-21T21:15:21.240", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:21.583", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. CVSS 3.1 Base Score 6.4 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:H)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto MySQL Connectors de Oracle MySQL (componente: Connector/Python). Las versiones compatibles afectadas son 9.1.0 y anteriores. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios elevados y acceso a la red a trav\u00e9s de m\u00faltiples protocolos ponga en peligro MySQL Connectors. Los ataques exitosos requieren la interacci\u00f3n humana de una persona distinta del atacante. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la creaci\u00f3n, eliminaci\u00f3n o modificaci\u00f3n no autorizada de datos cr\u00edticos o de todos los datos accesibles de MySQL Connectors, as\u00ed como el acceso de lectura no autorizado a un subconjunto de datos accesibles de MySQL Connectors y la capacidad no autorizada de provocar un bloqueo o un bloqueo frecuente y repetible (DOS completo) de MySQL Connectors. Puntuaci\u00f3n base de CVSS 3.1: 6,4 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:H)." } ], "metrics": { "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:H", @@ -35,6 +59,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21549.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21549.json index d46095bb36f..234cbcc9d48 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21549.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21549.json @@ -2,20 +2,44 @@ "id": "CVE-2025-21549", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:21.377", - "lastModified": "2025-01-21T21:15:21.377", - "vulnStatus": "Received", + "lastModified": "2025-01-22T18:15:21.740", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP/2 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto Oracle WebLogic Server de Oracle Fusion Middleware (componente: Core). La versi\u00f3n compatible afectada es la 14.1.1.0.0. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP/2 ponga en peligro Oracle WebLogic Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la capacidad no autorizada de provocar un bloqueo o un bloqueo frecuente y repetitivo (DOS completo) de Oracle WebLogic Server. Puntuaci\u00f3n base de CVSS 3.1: 7,5 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)." } ], "metrics": { "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -35,6 +59,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23028.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23028.json new file mode 100644 index 00000000000..cbe8b8cb53e --- /dev/null +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23028.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-23028", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-22T17:15:13.487", + "lastModified": "2025-01-22T17:15:13.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. A denial of service vulnerability affects versions 1.14.0 through 1.14.7, 1.15.0 through 1.15.11, and 1.16.0 through 1.16.4. In a Kubernetes cluster where Cilium is configured to proxy DNS traffic, an attacker can crash Cilium agents by sending a crafted DNS response to workloads from outside the cluster. For traffic that is allowed but without using DNS-based policy, the dataplane will continue to pass traffic as configured at the time of the DoS. For workloads that have DNS-based policy configured, existing connections may continue to operate, and new connections made without relying on DNS resolution may continue to be established, but new connections which rely on DNS resolution may be disrupted. Any configuration changes that affect the impacted agent may not be applied until the agent is able to restart. This issue is fixed in Cilium v1.14.18, v1.15.12, and v1.16.5. No known workarounds are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cilium/cilium/pull/36252", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cilium/cilium/security/advisories/GHSA-9m5p-c77c-f9j7", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23047.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23047.json new file mode 100644 index 00000000000..d7798f699fd --- /dev/null +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23047.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-23047", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-22T18:15:21.893", + "lastModified": "2025-01-22T18:15:21.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. An insecure default `Access-Control-Allow-Origin` header value could lead to sensitive data exposure for users of Cilium versions 1.14.0 through 1.14.7, 1.15.0 through 1.15.11, and 1.16.0 through 1.16.4 who deploy Hubble UI using either Cilium CLI or via the Cilium Helm chart. A user with access to a Hubble UI instance affected by this issue could leak configuration details about the Kubernetes cluster which Hubble UI is monitoring, including node names, IP addresses, and other metadata about workloads and the cluster networking configuration. In order for this vulnerability to be exploited, a victim would have to first visit a malicious page. This issue is fixed in Cilium v1.14.18, v1.15.12, and v1.16.5. As a workaround, users who deploy Hubble UI using the Cilium Helm chart directly can remove the CORS headers from the Helm template as shown in the patch from commit a3489f190ba6e87b5336ee685fb6c80b1270d06d." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cilium/cilium/commit/a3489f190ba6e87b5336ee685fb6c80b1270d06d", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cilium/cilium/security/advisories/GHSA-h78m-j95m-5356", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24397.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24397.json new file mode 100644 index 00000000000..65d2d91f963 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24397.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-24397", + "sourceIdentifier": "jenkinsci-cert@googlegroups.com", + "published": "2025-01-22T17:15:13.670", + "lastModified": "2025-01-22T17:15:13.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An incorrect permission check in Jenkins GitLab Plugin 1.9.6 and earlier allows attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enumerate credential IDs of GitLab API token and Secret text credentials stored in Jenkins." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.jenkins.io/security/advisory/2025-01-22/#SECURITY-3260", + "source": "jenkinsci-cert@googlegroups.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24398.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24398.json new file mode 100644 index 00000000000..8582bebe51c --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24398.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-24398", + "sourceIdentifier": "jenkinsci-cert@googlegroups.com", + "published": "2025-01-22T17:15:13.760", + "lastModified": "2025-01-22T17:15:13.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Jenkins Bitbucket Server Integration Plugin 2.1.0 through 4.1.3 (both inclusive) allows attackers to craft URLs that would bypass the CSRF protection of any target URL in Jenkins." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.jenkins.io/security/advisory/2025-01-22/#SECURITY-3434", + "source": "jenkinsci-cert@googlegroups.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24399.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24399.json new file mode 100644 index 00000000000..8fd70f67491 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24399.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-24399", + "sourceIdentifier": "jenkinsci-cert@googlegroups.com", + "published": "2025-01-22T17:15:13.853", + "lastModified": "2025-01-22T17:15:13.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Jenkins OpenId Connect Authentication Plugin 4.452.v2849b_d3945fa_ and earlier, except 4.438.440.v3f5f201de5dc, treats usernames as case-insensitive, allowing attackers on Jenkins instances configured with a case-sensitive OpenID Connect provider to log in as any user by providing a username that differs only in letter case, potentially gaining administrator access to Jenkins." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.jenkins.io/security/advisory/2025-01-22/#SECURITY-3461", + "source": "jenkinsci-cert@googlegroups.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24400.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24400.json new file mode 100644 index 00000000000..3776dff3cfc --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24400.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-24400", + "sourceIdentifier": "jenkinsci-cert@googlegroups.com", + "published": "2025-01-22T17:15:13.943", + "lastModified": "2025-01-22T17:15:13.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Jenkins Eiffel Broadcaster Plugin 2.8.0 through 2.10.2 (both inclusive) uses the credential ID as the cache key during signing operations, allowing attackers able to create a credential with the same ID as a legitimate one in a different credentials store to sign an event published to RabbitMQ with the legitimate credentials." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.jenkins.io/security/advisory/2025-01-22/#SECURITY-3485", + "source": "jenkinsci-cert@googlegroups.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24401.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24401.json new file mode 100644 index 00000000000..9f84687a2a7 --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24401.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-24401", + "sourceIdentifier": "jenkinsci-cert@googlegroups.com", + "published": "2025-01-22T17:15:14.027", + "lastModified": "2025-01-22T17:15:14.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Jenkins Folder-based Authorization Strategy Plugin 217.vd5b_18537403e and earlier does not verify that permissions configured to be granted are enabled, potentially allowing users formerly granted (typically optional permissions, like Overall/Manage) to access functionality they're no longer entitled to." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.jenkins.io/security/advisory/2025-01-22/#SECURITY-3062", + "source": "jenkinsci-cert@googlegroups.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24402.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24402.json new file mode 100644 index 00000000000..e24ac3ddf0b --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24402.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-24402", + "sourceIdentifier": "jenkinsci-cert@googlegroups.com", + "published": "2025-01-22T17:15:14.123", + "lastModified": "2025-01-22T17:15:14.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins Azure Service Fabric Plugin 1.6 and earlier allows attackers to connect to a Service Fabric URL using attacker-specified credentials IDs obtained through another method." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.jenkins.io/security/advisory/2025-01-22/#SECURITY-3094", + "source": "jenkinsci-cert@googlegroups.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24403.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24403.json new file mode 100644 index 00000000000..68c0b1d7465 --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24403.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-24403", + "sourceIdentifier": "jenkinsci-cert@googlegroups.com", + "published": "2025-01-22T17:15:14.220", + "lastModified": "2025-01-22T17:15:14.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A missing permission check in Jenkins Azure Service Fabric Plugin 1.6 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of Azure credentials stored in Jenkins." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.jenkins.io/security/advisory/2025-01-22/#SECURITY-3094", + "source": "jenkinsci-cert@googlegroups.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index cf8fd54ae26..f698da8803d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-22T17:00:26.262198+00:00 +2025-01-22T19:00:26.262278+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-22T16:53:51.830000+00:00 +2025-01-22T18:53:08.023000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -278595 +278610 ``` ### CVEs added in the last Commit -Recently added CVEs: `124` +Recently added CVEs: `15` -- [CVE-2025-23806](CVE-2025/CVE-2025-238xx/CVE-2025-23806.json) (`2025-01-22T15:15:24.163`) -- [CVE-2025-23809](CVE-2025/CVE-2025-238xx/CVE-2025-23809.json) (`2025-01-22T16:15:31.437`) -- [CVE-2025-23811](CVE-2025/CVE-2025-238xx/CVE-2025-23811.json) (`2025-01-22T15:15:24.297`) -- [CVE-2025-23812](CVE-2025/CVE-2025-238xx/CVE-2025-23812.json) (`2025-01-22T15:15:24.437`) -- [CVE-2025-23846](CVE-2025/CVE-2025-238xx/CVE-2025-23846.json) (`2025-01-22T15:15:24.570`) -- [CVE-2025-23866](CVE-2025/CVE-2025-238xx/CVE-2025-23866.json) (`2025-01-22T15:15:24.707`) -- [CVE-2025-23867](CVE-2025/CVE-2025-238xx/CVE-2025-23867.json) (`2025-01-22T15:15:24.847`) -- [CVE-2025-23874](CVE-2025/CVE-2025-238xx/CVE-2025-23874.json) (`2025-01-22T15:15:24.980`) -- [CVE-2025-23882](CVE-2025/CVE-2025-238xx/CVE-2025-23882.json) (`2025-01-22T15:15:25.123`) -- [CVE-2025-23910](CVE-2025/CVE-2025-239xx/CVE-2025-23910.json) (`2025-01-22T15:15:25.267`) -- [CVE-2025-23914](CVE-2025/CVE-2025-239xx/CVE-2025-23914.json) (`2025-01-22T16:15:31.780`) -- [CVE-2025-23918](CVE-2025/CVE-2025-239xx/CVE-2025-23918.json) (`2025-01-22T15:15:25.403`) -- [CVE-2025-23921](CVE-2025/CVE-2025-239xx/CVE-2025-23921.json) (`2025-01-22T15:15:25.547`) -- [CVE-2025-23931](CVE-2025/CVE-2025-239xx/CVE-2025-23931.json) (`2025-01-22T15:15:25.687`) -- [CVE-2025-23932](CVE-2025/CVE-2025-239xx/CVE-2025-23932.json) (`2025-01-22T15:15:25.827`) -- [CVE-2025-23938](CVE-2025/CVE-2025-239xx/CVE-2025-23938.json) (`2025-01-22T15:15:25.967`) -- [CVE-2025-23942](CVE-2025/CVE-2025-239xx/CVE-2025-23942.json) (`2025-01-22T15:15:26.103`) -- [CVE-2025-23944](CVE-2025/CVE-2025-239xx/CVE-2025-23944.json) (`2025-01-22T15:15:26.240`) -- [CVE-2025-23948](CVE-2025/CVE-2025-239xx/CVE-2025-23948.json) (`2025-01-22T15:15:26.383`) -- [CVE-2025-23949](CVE-2025/CVE-2025-239xx/CVE-2025-23949.json) (`2025-01-22T15:15:26.527`) -- [CVE-2025-23953](CVE-2025/CVE-2025-239xx/CVE-2025-23953.json) (`2025-01-22T15:15:26.670`) -- [CVE-2025-23959](CVE-2025/CVE-2025-239xx/CVE-2025-23959.json) (`2025-01-22T15:15:26.810`) -- [CVE-2025-23966](CVE-2025/CVE-2025-239xx/CVE-2025-23966.json) (`2025-01-22T15:15:26.950`) -- [CVE-2025-23992](CVE-2025/CVE-2025-239xx/CVE-2025-23992.json) (`2025-01-22T16:15:32.120`) -- [CVE-2025-24027](CVE-2025/CVE-2025-240xx/CVE-2025-24027.json) (`2025-01-22T15:15:27.090`) +- [CVE-2024-51457](CVE-2024/CVE-2024-514xx/CVE-2024-51457.json) (`2025-01-22T17:15:12.390`) +- [CVE-2024-55957](CVE-2024/CVE-2024-559xx/CVE-2024-55957.json) (`2025-01-22T18:15:20.237`) +- [CVE-2025-0651](CVE-2025/CVE-2025-06xx/CVE-2025-0651.json) (`2025-01-22T18:15:20.363`) +- [CVE-2025-20128](CVE-2025/CVE-2025-201xx/CVE-2025-20128.json) (`2025-01-22T17:15:12.583`) +- [CVE-2025-20156](CVE-2025/CVE-2025-201xx/CVE-2025-20156.json) (`2025-01-22T17:15:12.800`) +- [CVE-2025-20165](CVE-2025/CVE-2025-201xx/CVE-2025-20165.json) (`2025-01-22T17:15:13.010`) +- [CVE-2025-23028](CVE-2025/CVE-2025-230xx/CVE-2025-23028.json) (`2025-01-22T17:15:13.487`) +- [CVE-2025-23047](CVE-2025/CVE-2025-230xx/CVE-2025-23047.json) (`2025-01-22T18:15:21.893`) +- [CVE-2025-24397](CVE-2025/CVE-2025-243xx/CVE-2025-24397.json) (`2025-01-22T17:15:13.670`) +- [CVE-2025-24398](CVE-2025/CVE-2025-243xx/CVE-2025-24398.json) (`2025-01-22T17:15:13.760`) +- [CVE-2025-24399](CVE-2025/CVE-2025-243xx/CVE-2025-24399.json) (`2025-01-22T17:15:13.853`) +- [CVE-2025-24400](CVE-2025/CVE-2025-244xx/CVE-2025-24400.json) (`2025-01-22T17:15:13.943`) +- [CVE-2025-24401](CVE-2025/CVE-2025-244xx/CVE-2025-24401.json) (`2025-01-22T17:15:14.027`) +- [CVE-2025-24402](CVE-2025/CVE-2025-244xx/CVE-2025-24402.json) (`2025-01-22T17:15:14.123`) +- [CVE-2025-24403](CVE-2025/CVE-2025-244xx/CVE-2025-24403.json) (`2025-01-22T17:15:14.220`) ### CVEs modified in the last Commit -Recently modified CVEs: `45` +Recently modified CVEs: `127` -- [CVE-2024-49735](CVE-2024/CVE-2024-497xx/CVE-2024-49735.json) (`2025-01-22T16:15:29.573`) -- [CVE-2024-49736](CVE-2024/CVE-2024-497xx/CVE-2024-49736.json) (`2025-01-22T15:15:13.007`) -- [CVE-2024-49737](CVE-2024/CVE-2024-497xx/CVE-2024-49737.json) (`2025-01-22T15:15:13.150`) -- [CVE-2024-49738](CVE-2024/CVE-2024-497xx/CVE-2024-49738.json) (`2025-01-22T15:15:13.280`) -- [CVE-2024-49742](CVE-2024/CVE-2024-497xx/CVE-2024-49742.json) (`2025-01-22T15:15:13.407`) -- [CVE-2024-49744](CVE-2024/CVE-2024-497xx/CVE-2024-49744.json) (`2025-01-22T15:15:13.557`) -- [CVE-2024-49745](CVE-2024/CVE-2024-497xx/CVE-2024-49745.json) (`2025-01-22T15:15:13.707`) -- [CVE-2024-49747](CVE-2024/CVE-2024-497xx/CVE-2024-49747.json) (`2025-01-22T15:15:13.840`) -- [CVE-2024-49748](CVE-2024/CVE-2024-497xx/CVE-2024-49748.json) (`2025-01-22T15:15:13.980`) -- [CVE-2024-49749](CVE-2024/CVE-2024-497xx/CVE-2024-49749.json) (`2025-01-22T15:15:14.110`) -- [CVE-2024-51941](CVE-2024/CVE-2024-519xx/CVE-2024-51941.json) (`2025-01-22T15:15:14.247`) -- [CVE-2024-57575](CVE-2024/CVE-2024-575xx/CVE-2024-57575.json) (`2025-01-22T16:53:51.830`) -- [CVE-2024-57583](CVE-2024/CVE-2024-575xx/CVE-2024-57583.json) (`2025-01-22T16:53:20.263`) -- [CVE-2024-57726](CVE-2024/CVE-2024-577xx/CVE-2024-57726.json) (`2025-01-22T16:25:12.533`) -- [CVE-2024-7344](CVE-2024/CVE-2024-73xx/CVE-2024-7344.json) (`2025-01-22T15:41:04.577`) -- [CVE-2024-7347](CVE-2024/CVE-2024-73xx/CVE-2024-7347.json) (`2025-01-22T16:10:28.490`) -- [CVE-2024-9020](CVE-2024/CVE-2024-90xx/CVE-2024-9020.json) (`2025-01-22T15:15:14.407`) -- [CVE-2025-0203](CVE-2025/CVE-2025-02xx/CVE-2025-0203.json) (`2025-01-22T15:47:10.633`) -- [CVE-2025-0204](CVE-2025/CVE-2025-02xx/CVE-2025-0204.json) (`2025-01-22T15:42:44.060`) -- [CVE-2025-0205](CVE-2025/CVE-2025-02xx/CVE-2025-0205.json) (`2025-01-22T15:33:38.597`) -- [CVE-2025-0206](CVE-2025/CVE-2025-02xx/CVE-2025-0206.json) (`2025-01-22T15:24:50.937`) -- [CVE-2025-0395](CVE-2025/CVE-2025-03xx/CVE-2025-0395.json) (`2025-01-22T16:15:29.893`) -- [CVE-2025-21329](CVE-2025/CVE-2025-213xx/CVE-2025-21329.json) (`2025-01-22T15:02:32.270`) -- [CVE-2025-23195](CVE-2025/CVE-2025-231xx/CVE-2025-23195.json) (`2025-01-22T15:15:15.237`) -- [CVE-2025-23196](CVE-2025/CVE-2025-231xx/CVE-2025-23196.json) (`2025-01-22T15:15:15.390`) +- [CVE-2024-47392](CVE-2024/CVE-2024-473xx/CVE-2024-47392.json) (`2025-01-22T18:25:37.310`) +- [CVE-2024-4774](CVE-2024/CVE-2024-47xx/CVE-2024-4774.json) (`2025-01-22T17:56:00.637`) +- [CVE-2024-49724](CVE-2024/CVE-2024-497xx/CVE-2024-49724.json) (`2025-01-22T18:15:19.813`) +- [CVE-2024-49732](CVE-2024/CVE-2024-497xx/CVE-2024-49732.json) (`2025-01-22T18:15:19.960`) +- [CVE-2024-49733](CVE-2024/CVE-2024-497xx/CVE-2024-49733.json) (`2025-01-22T18:15:20.100`) +- [CVE-2024-49734](CVE-2024/CVE-2024-497xx/CVE-2024-49734.json) (`2025-01-22T17:15:12.253`) +- [CVE-2024-50453](CVE-2024/CVE-2024-504xx/CVE-2024-50453.json) (`2025-01-22T18:29:43.147`) +- [CVE-2024-53808](CVE-2024/CVE-2024-538xx/CVE-2024-53808.json) (`2025-01-22T18:04:55.013`) +- [CVE-2024-56252](CVE-2024/CVE-2024-562xx/CVE-2024-56252.json) (`2025-01-22T17:44:01.447`) +- [CVE-2024-56254](CVE-2024/CVE-2024-562xx/CVE-2024-56254.json) (`2025-01-22T17:44:38.787`) +- [CVE-2024-56266](CVE-2024/CVE-2024-562xx/CVE-2024-56266.json) (`2025-01-22T17:48:32.873`) +- [CVE-2024-57160](CVE-2024/CVE-2024-571xx/CVE-2024-57160.json) (`2025-01-22T17:15:20.300`) +- [CVE-2024-57161](CVE-2024/CVE-2024-571xx/CVE-2024-57161.json) (`2025-01-22T17:15:14.067`) +- [CVE-2024-57769](CVE-2024/CVE-2024-577xx/CVE-2024-57769.json) (`2025-01-22T17:07:20.067`) +- [CVE-2024-57770](CVE-2024/CVE-2024-577xx/CVE-2024-57770.json) (`2025-01-22T17:07:27.687`) +- [CVE-2024-57775](CVE-2024/CVE-2024-577xx/CVE-2024-57775.json) (`2025-01-22T17:07:33.500`) +- [CVE-2025-21529](CVE-2025/CVE-2025-215xx/CVE-2025-21529.json) (`2025-01-22T18:15:20.530`) +- [CVE-2025-21530](CVE-2025/CVE-2025-215xx/CVE-2025-21530.json) (`2025-01-22T18:15:20.687`) +- [CVE-2025-21532](CVE-2025/CVE-2025-215xx/CVE-2025-21532.json) (`2025-01-22T18:15:20.840`) +- [CVE-2025-21544](CVE-2025/CVE-2025-215xx/CVE-2025-21544.json) (`2025-01-22T18:15:20.993`) +- [CVE-2025-21545](CVE-2025/CVE-2025-215xx/CVE-2025-21545.json) (`2025-01-22T18:15:21.117`) +- [CVE-2025-21546](CVE-2025/CVE-2025-215xx/CVE-2025-21546.json) (`2025-01-22T18:15:21.270`) +- [CVE-2025-21547](CVE-2025/CVE-2025-215xx/CVE-2025-21547.json) (`2025-01-22T18:15:21.433`) +- [CVE-2025-21548](CVE-2025/CVE-2025-215xx/CVE-2025-21548.json) (`2025-01-22T18:15:21.583`) +- [CVE-2025-21549](CVE-2025/CVE-2025-215xx/CVE-2025-21549.json) (`2025-01-22T18:15:21.740`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f15bf241a63..5efa943f32e 100644 --- a/_state.csv +++ b/_state.csv @@ -74952,7 +74952,7 @@ CVE-2015-1423,0,0,a859ae7ef2be6cad83a7ef4410e0ccdceaeb5fc6c26e932bffd2946aca2b4c CVE-2015-1424,0,0,cec2006d28f1b666d26a5d68f96ab3ead0fbe2bac80ec37f4fe6f91caaf48aa3,2024-11-21T02:25:23.790000 CVE-2015-1425,0,0,0fd8da360e7a9c30a4bea07f92e8217f284f97c8aebe1c7dcc8a54e77db62c48,2024-11-21T02:25:23.933000 CVE-2015-1426,0,0,423a77efe89ddb20ddf89a099253ba7c05bcab7eb7a38083082398cf40a45822,2024-11-21T02:25:24.083000 -CVE-2015-1427,0,0,4bc287272197c8c33bb60dfb804cd1b5a84986a8234d2d7ab50f855f1a8baeac,2024-11-21T02:25:24.233000 +CVE-2015-1427,0,1,6dfd00e6abb0313452e896534f452f5fe444d622adc7ef7318d9b36bf34f8883,2025-01-22T17:08:14.403000 CVE-2015-1428,0,0,ede17d91bd162aa9178bd11f8244e01812b114cb8d828212263a11688563cb04,2024-11-21T02:25:24.393000 CVE-2015-1429,0,0,9ca9c7a6283aff915ddfef13fc7b5aea9b94bd930070d4d07d8bec2023439d31,2024-11-21T02:25:24.540000 CVE-2015-1430,0,0,fb883bf00f80d8bccb64a347e69add15b18f9af2e1190dfce0d855c4047da2f9,2024-11-21T02:25:24.683000 @@ -75122,13 +75122,13 @@ CVE-2015-1631,0,0,3f16e6ee99636f29a88be130d961bf4a372deda7d9052f8887f0832c83e8ea CVE-2015-1632,0,0,7fd7fe2c3d73803fd4e06db046f4e0d83c73e2bce9b40038e65d7be484c7e7cc,2024-11-21T02:25:49.413000 CVE-2015-1633,0,0,60450537510b2031fe4786094d06bc0b2d5a2cf0374e1c94939fb195b11bb8dd,2024-11-21T02:25:49.520000 CVE-2015-1634,0,0,4ddb53260427bec09f06c926a30bf3bb11190a2d35af980fb19fc94478d3ad2a,2024-11-21T02:25:49.640000 -CVE-2015-1635,0,0,3b99851b88b223b945caa9d763de5c0ce2f52a4dc3b57a650301a9adcdfa37c4,2024-11-21T02:25:49.760000 +CVE-2015-1635,0,1,7131320cc783ebfefd4cd0be5d872edeac2c0272c2841e9357fd255755afc714,2025-01-22T17:08:42.177000 CVE-2015-1636,0,0,08639d4c8567a257244c84a37e861ba149fc19985ed450d2abf075408a34623a,2024-11-21T02:25:49.890000 CVE-2015-1637,0,0,059d467417a4bcb328229f380a74be3f9a2d56f3d657eb1dbf0a9bb0f99de5c8,2024-11-21T02:25:50.010000 CVE-2015-1638,0,0,daef968245a5d8fd79d931ce1ffd08b3f2e1d88478095e206dc2c85022015bc0,2024-11-21T02:25:50.140000 CVE-2015-1639,0,0,34505230ce09a0015f32d75857dbd4437155d53d3a8d301d593db632ff0e6063,2024-11-21T02:25:50.263000 CVE-2015-1640,0,0,801ae17082793204d46bf77801ffd5de8c9c829afdb3530ebef3b0a19f191653,2024-11-21T02:25:50.390000 -CVE-2015-1641,0,0,913c22d7558bea0c75255e58334088a59285fdd02f3ed9c077433b0f9afc207b,2024-11-21T02:25:50.510000 +CVE-2015-1641,0,1,2c4a18e15fd0ec073b3b7c43b2091f2dd92b585856734d63f6d5414d4a55b50e,2025-01-22T17:08:45.847000 CVE-2015-1642,0,0,b5d348ae611a85e11931653f7b298a9616d66bc5043315babd122859ce2b9c21,2025-01-17T21:14:52.883000 CVE-2015-1643,0,0,35965b865ae4a0fe7d80f230f483ebd1ed4164b7f19a9ddda1fca4ecbbcd5c1a,2024-11-21T02:25:50.753000 CVE-2015-1644,0,0,a460657ddeb2cebbe863b19e4913930868d68bdff8abc83394f5f8a8c15788d1,2024-11-21T02:25:50.873000 @@ -75158,7 +75158,7 @@ CVE-2015-1667,0,0,c8e8b56225942cdc89e488369ea08536d951820217b9bc72c3c2416aad269a CVE-2015-1668,0,0,4b0428494e7e9ba63442f6a623c9ee0cdce7154d9863cc57c4d8c5dae4f6e9f5,2024-11-21T02:25:53.203000 CVE-2015-1669,0,0,9e9377f53a9179c1e8bf02f36eb329dab88689648a3ef1206b44b2d15a59829f,2023-11-07T02:24:53.023000 CVE-2015-1670,0,0,d2cab4451a6f3c31693726bbb53acbaa7058623747b787db1f1e4c92c7c9ea44,2024-11-21T02:25:53.337000 -CVE-2015-1671,0,0,27bcc122ae25e1453c9721a91e1c64a6dc5c9d45d12beb1ecc2cd34e936c9147,2024-11-21T02:25:53.453000 +CVE-2015-1671,0,1,f196f09f380f599ee258e2651e9aaac055f4d73e2467d70834bf8e4dc7882aa5,2025-01-22T17:14:02.217000 CVE-2015-1672,0,0,5a4f2c0bb3a8e4a0c0726c491fb82a51751d9929e247fe9ae4b1d1511776aaa4,2024-11-21T02:25:53.590000 CVE-2015-1673,0,0,51e7d81cae4918d004e6ea474b90dfc85d42dbbb18a286351050c4819fcf237c,2024-11-21T02:25:53.720000 CVE-2015-1674,0,0,42b737c6da05e7baa817de85b8cec93b8288ff33a8d8407da41ba04bd810c820,2024-11-21T02:25:53.823000 @@ -75188,7 +75188,7 @@ CVE-2015-1697,0,0,6b51bbad2f27b9527847d07891f8518562409c695260d17eb4f98ea3c57997 CVE-2015-1698,0,0,7406d7d7989440b87400f2bfbd6ad008082568979e81788b1e17d0e730ff409c,2024-11-21T02:25:56.640000 CVE-2015-1699,0,0,39028973fe7fbc9473bcc5336fc3f507fa92a028df182138b79554701c74149e,2024-11-21T02:25:56.767000 CVE-2015-1700,0,0,2132a9f089e058148bff4577e60abeae36af3937301a92d2e707241197afa23c,2024-11-21T02:25:56.943000 -CVE-2015-1701,0,0,c5520508fd9355542f262ebad70d011cc4e209e962bc62e6ac0cdd4932c94649,2024-11-21T02:25:57.643000 +CVE-2015-1701,0,1,c74132a71e212004d81917a22d70a50852f92e267961c7849b13472948ccbf2f,2025-01-22T17:13:40.250000 CVE-2015-1702,0,0,735c45b16bfc3b23428151dd04a60f616d7c6ce5df03061291c80f9618d0a5b7,2024-11-21T02:25:57.800000 CVE-2015-1703,0,0,6ed9b8669f32099d03c20f238d82fcefda2c7eea7db1352ad88deaea003f259a,2024-11-21T02:25:57.963000 CVE-2015-1704,0,0,99a219d5ef32df40090ea715c285543c33dd4857dbe2757c69ea9443f992ffe7,2024-11-21T02:25:58.077000 @@ -75257,7 +75257,7 @@ CVE-2015-1766,0,0,3f00a70e44f7fa95c26bd5cb8bcf5b39076875377af9edefc257bc0d9d230c CVE-2015-1767,0,0,292b1f56789470d2933eef9d582c7832d8d18f0b3d4658197d1dc427c079f87e,2024-11-21T02:26:05.267000 CVE-2015-1768,0,0,b2fc6680ee97b1d0858e4bb59d759f45ec5d75cf1c3839c62cbe9f26046551ab,2024-11-21T02:26:05.380000 CVE-2015-1769,0,0,ea69303f8701c35ee0a2a8320ac522e3920ce265bfacdbf4b362a7bb2f942bc1,2025-01-17T21:31:06.387000 -CVE-2015-1770,0,0,ac4dd844443bdb2d660ee56ae351b4e74e4c7f4d429bf19d57edadd471942ebc,2024-11-21T02:26:05.623000 +CVE-2015-1770,0,1,ec7fe6943971f96c339b1bddf9cccbf1e127f65c5cbb9619e06911702fe020d5,2025-01-22T17:14:22.697000 CVE-2015-1771,0,0,a44961f133acd00d46d9847eec99f2955a76b6125ced31ae1d283f363776ed0c,2024-11-21T02:26:05.747000 CVE-2015-1772,0,0,26826297cb83f5add3d9515dbab903d2b96da4af06792c133c24c3386ce750e3,2024-11-21T02:26:05.867000 CVE-2015-1773,0,0,fd832b300fcebda30714577992c0dfc0547751b17ec68289f32185de9303ed35,2024-11-21T02:26:05.997000 @@ -75730,7 +75730,7 @@ CVE-2015-2285,0,0,7e6c8d250565b288e3d44ddbdd73bf03c54604623ed6eba5409fb32ca49839 CVE-2015-2286,0,0,68914d6beaab6d72a8660b6b34347a473c69bb7b642ebb41f6da11699c10980f,2024-11-21T02:27:09.123000 CVE-2015-2287,0,0,a50cb2351b0abf60313d28967e8f7623893f16414972711aebc66526db1da1bf,2023-11-07T02:25:12.530000 CVE-2015-2289,0,0,d62fb50b189ff1d58f5f28c65ace35ccf3076705b7ab6f4500b82d1a955c8b3b,2024-11-21T02:27:09.277000 -CVE-2015-2291,0,0,430fbb85675c87f88f89c0ebab231529c3971ec5f75bf76a71c69496d6172d31,2024-11-21T02:27:09.427000 +CVE-2015-2291,0,1,f28eee4b6a1be105cbe19bd5452342daa67a978d63596817f0fded474c78120a,2025-01-22T17:15:24.027000 CVE-2015-2292,0,0,2e615b68e53e179e262f8589b774af622e0e4972d1ba12157776ebd95bacd9e3,2024-11-21T02:27:09.570000 CVE-2015-2293,0,0,16fde132f52bb308dd68bd8bc55004e60f1a96fc17a261675e8ee3d396418904,2024-11-21T02:27:09.720000 CVE-2015-2294,0,0,835037d83c28a86cc759949cd5322602c1aef7af0a7dbbe9da049932cc41babf,2024-11-21T02:27:09.857000 @@ -75787,7 +75787,7 @@ CVE-2015-2350,0,0,a61d3c439266cd4793d26dd677160c7fc0eb78d5317376c300f3dd027b621a CVE-2015-2351,0,0,212dd006f67ca3ef633ebc48049f242b05ffc8e2bfdfa1e5b9b2b5e19d057ffa,2024-11-21T02:27:16.530000 CVE-2015-2352,0,0,d0014c06ea0f135c7c3867f2133c309a489c5822a4ea0d3519f2e7692761eed4,2024-11-21T02:27:16.657000 CVE-2015-2359,0,0,7cae3d350c087df32df3df7093160e82aec7264b9eecf6aa4647f4013aae4804,2024-11-21T02:27:16.787000 -CVE-2015-2360,0,0,0d871ac5aebd6e4ee2ce9150e381ebe26208ed67809743253449b8c45a244435,2024-11-21T02:27:16.887000 +CVE-2015-2360,0,1,02d9a416c88250bd6f4af8309da88ab93388ce369a2dcd3cee3a008d6df38cc2,2025-01-22T17:14:33.597000 CVE-2015-2361,0,0,d4a108a4c8b8021db3f04e14e33622c7bb7b6506f17131e584e240997746a923,2024-11-21T02:27:16.990000 CVE-2015-2362,0,0,4da5a0400b6c72dec5b4cfbc12064495c682867e5449a7bc83e975bb5b893bcc,2024-11-21T02:27:17.077000 CVE-2015-2363,0,0,54a1b28069d6bede4572b942fb84e8d316e24d1b8fac78a05e1c2063c6184ee7,2024-11-21T02:27:17.173000 @@ -76016,7 +76016,7 @@ CVE-2015-2586,0,0,f7336a9706450103ece990b8dc3e5cfe9fff23527d8669a2206910f1dfbf47 CVE-2015-2587,0,0,a7a8e9262ae558130626b497395f70b685474b1fabfd6cfe3ca69da5ae881a3f,2024-11-21T02:27:39.650000 CVE-2015-2588,0,0,2d6abcf9dcc87813f7c80a49e4ad91b833dc7ae4c00d52c35ee3bde9b03beb32,2024-11-21T02:27:39.760000 CVE-2015-2589,0,0,16ba72acc2ee7a44e8f12b337a80a9ba43822171758525445b69e70e502b57cf,2024-11-21T02:27:39.867000 -CVE-2015-2590,0,0,ef4fbcdb78328f49a496f509755b2eeeb635e5045074decc3235c9bc81fe90dc,2024-11-21T02:27:39.980000 +CVE-2015-2590,0,1,8043a5fb1a98873fe696a7daf9bb26e9d1eb832a3f3dcbba24443b7811710fe3,2025-01-22T17:14:47.177000 CVE-2015-2591,0,0,3db22671feed4b1e0e0de73da2d636f599dff04de3005eb3d7522a4fbf228b95,2024-11-21T02:27:40.180000 CVE-2015-2592,0,0,00f99a81eeb661d9e79dd210fc21d75879f46783d0b78982f7627aaf7da7f697,2024-11-21T02:27:40.300000 CVE-2015-2593,0,0,1a90d85e6ce3d6eba414d138990ba3730ac9d278b575daa0ce6f2758b4eab7c0,2024-11-21T02:27:40.417000 @@ -76414,14 +76414,14 @@ CVE-2015-3027,0,0,c0b00dcc0f84a72cfde736ee4da8c784559b22039f6b517af1eb142b074307 CVE-2015-3028,0,0,69fdc1fa0a82b567bb393d4b776a663d75a366eae0e34781e8eb0fc126a89b60,2024-11-21T02:28:31.177000 CVE-2015-3029,0,0,bff423b756f07c12f6c8834008dbc96fd67933516867a88b4a4beeb0ff3f2fe7,2024-11-21T02:28:31.323000 CVE-2015-3030,0,0,907d52382a149b5155bceec324aca9cf058e96a08a1a0aef764184654572afea,2024-11-21T02:28:31.463000 -CVE-2015-3035,0,0,98018e8d62eff18e814e7da42ff20b6bacfc3f08ae8de53dffa5fa220b73e096,2024-11-21T02:28:31.600000 +CVE-2015-3035,0,1,0ef52bbda1d836dfe6ba8671e3badb4db2c2c1a8c8352aba79be4b4e8613c7d8,2025-01-22T17:13:43.680000 CVE-2015-3036,0,0,998bbd5091c7830e94d2de45a7b8461434c654b912ba7f97edc7af86ea47da1c,2024-11-21T02:28:31.787000 CVE-2015-3038,0,0,98b1f4f76e66e028e73f99a6bc225232a85009365d4c6894e9f0df997c403541,2024-11-21T02:28:31.947000 CVE-2015-3039,0,0,b3adb45385dca7bfa8182146c98c04268c97e07b5011d02ad8d218b9f4e7b853,2024-11-21T02:28:32.073000 CVE-2015-3040,0,0,dab5cfec3b5aa8d98ed5fb4e3a3725663bc865631030702b4167830844d1e80a,2024-11-21T02:28:32.227000 CVE-2015-3041,0,0,2ee98df78095b084022a1bc065f163d8a47b1af021e5ff357dc81dd4100bd38d,2024-11-21T02:28:32.373000 CVE-2015-3042,0,0,ae35846dd2ea4a16341a53f543f3b9372663396c4f87756ac45fb538b1249c51,2024-11-21T02:28:32.513000 -CVE-2015-3043,0,0,12f042867acfee8f8cce2c465d839a6381ff80013b1de5c6e6d2a3bd01181a5b,2024-11-21T02:28:32.663000 +CVE-2015-3043,0,1,16639a64dab28409fe5ab34728cfba11087be030f43c7b926b653fc0ee31e8a5,2025-01-22T17:08:49.520000 CVE-2015-3044,0,0,c59d63f75c6506a89268c03d2b6f879139ebbe54ba850872b3b78b277b23b542,2024-11-21T02:28:32.817000 CVE-2015-3045,0,0,7247b26e06c0e841aa6dc6d83e32aee805acfd8bbb1c795bb2a354636ede17c0,2023-11-07T02:25:28.660000 CVE-2015-3046,0,0,54eedb6dfca9eb314e7f8221ac00c49c3f073edc8ef01e585efa88b9286c4dcb,2024-11-21T02:28:32.983000 @@ -76491,7 +76491,7 @@ CVE-2015-3109,0,0,55f7bed559d74932631a9289c0e282b167433393c92926f0274b286505e75b CVE-2015-3110,0,0,22e4392945cb917190f32f405660a507936fb6b4a40bbd144ae1fd0f83992a7f,2024-11-21T02:28:41.457000 CVE-2015-3111,0,0,a761c11fab71d2e174ebbde91cb447c6872894176806c00295bc4835ff9fe072,2024-11-21T02:28:41.577000 CVE-2015-3112,0,0,25a1d24318eb594ae448d4394d710de254b84e4e3c112ce5714c2985b6ca2ce1,2024-11-21T02:28:41.697000 -CVE-2015-3113,0,0,54dd82d013718fcf766a4828d26e8c5945f6b14d7e47497a67008a47de6d7b32,2024-11-21T02:28:41.810000 +CVE-2015-3113,0,1,480f6487b7abf904ad226cb43b1c4b5641c3b86d59e3dbfe12b2eb639eb7c762,2025-01-22T17:14:41.030000 CVE-2015-3114,0,0,9006b707b312fffeee7e8d0a0db640014aa4411c187d10f57433ac8a3eff6f11,2024-11-21T02:28:41.950000 CVE-2015-3115,0,0,8d1838ae2145ff7fe82197e237e868573966b34ed94e2e9e95a1029f93e652b4,2024-11-21T02:28:42.080000 CVE-2015-3116,0,0,67ba34841dfcd92305138744ea439aa32be106b911249617f45dad6fba0a0ac3,2024-11-21T02:28:42.203000 @@ -77199,7 +77199,7 @@ CVE-2015-4064,0,0,e48f0873e051c9c7315bd741fa98a65a469ce7eb2a98fed00a59faf8425d32 CVE-2015-4065,0,0,7d9521a9d47735f900c52be164d2a6d7d109c04084badb1054c6f735847a2af1,2024-11-21T02:30:23.307000 CVE-2015-4066,0,0,b427a12e6dc43cf1245205cb7c00b7cf312b2f588da450f9b0b889efd73b9946,2024-11-21T02:30:23.453000 CVE-2015-4067,0,0,be28666ba8d468db268d222f58acc0085fe6f9b675cc1d3660ef368b2d8a15b3,2024-11-21T02:30:23.607000 -CVE-2015-4068,0,0,dda2b7d07b351cfa020f3c4313cbbc833e40efb71dc45e84fbefacb700a50469,2024-11-21T02:30:23.753000 +CVE-2015-4068,0,1,e6a56a66c547cf89a03803c80bb23dfb3a4870e47eb1d9917678af10d3e45bde,2025-01-22T17:14:16.633000 CVE-2015-4069,0,0,99f59bb4f21f5687c87fc647af6f7006d6abe388a977513fbf308105b739c134,2024-11-21T02:30:23.910000 CVE-2015-4070,0,0,0282a2e4068df5172635e16bd80103fbbd862077acf1d407e7023526f0d62929,2024-11-21T02:30:24.057000 CVE-2015-4071,0,0,7c810d3df70e887ea0c2dae1bcc81c6a21bbe94db4c40732403247d2c9faf9a7,2024-11-21T02:30:24.203000 @@ -85381,7 +85381,7 @@ CVE-2016-20013,0,0,375320b34d7018855a9779d603a6ae72facbdf8000d800760a7d6696a1bf6 CVE-2016-20014,0,0,0d0e88405755cd5416acec12272996d3000114689b324596c137a83cb6b43b50,2024-11-21T02:47:33.570000 CVE-2016-20015,0,0,544e3fe1a43c79d69f18f0bacada7b20f9d7703455a23788c0f3779fe655c7fb,2024-11-21T02:47:33.733000 CVE-2016-20016,0,0,54f70016458b236626396e47c463c1e033cbf3b421bafdf8cccc59797a185287,2024-11-21T02:47:33.900000 -CVE-2016-20017,0,0,c2b45452f9eca0ff5bdb670b83ac535aa18f887942b09096060af6bd239bb42a,2024-11-21T02:47:34.057000 +CVE-2016-20017,0,1,6a5ef68dcaa9688c834c5b98e628bb3815e481e3ebdc442a377a2a1f6271f0da,2025-01-22T18:48:26.733000 CVE-2016-20018,0,0,62c09eb5dba9905cc98613f73c036000dc23cdec0f8a6845db0dc239c7ec6f18,2024-11-21T02:47:34.203000 CVE-2016-2002,0,0,89e5eea0bca0712faf6111a41600c6c5c1134e38594a6c5c17b21dd0ccc512d3,2024-11-21T02:47:34.963000 CVE-2016-20021,0,0,ddf15001084ec81189844eec1b1019cd1afd4763fd6f96fb5217f33cd8b25ba3,2024-11-21T02:47:34.367000 @@ -94071,7 +94071,7 @@ CVE-2017-1000482,0,0,f56be1a1c490db8d7470b6562288751e5bc0dd569231a1a8d892f0d500f CVE-2017-1000483,0,0,4e8157222e73fa2cdd841e8be2a43b2be2d8ca049382b26da848dbaa8322d416,2024-11-21T03:04:50.133000 CVE-2017-1000484,0,0,089607fe827c8679474ac0e4c2290a7e0bb1cf131223536fde7739934ad59470,2024-11-21T03:04:50.290000 CVE-2017-1000485,0,0,f697c00177fb17803f06afda7928b9b4707bed01c6c6e6333631b5d3f7b9705c,2024-11-21T03:04:50.443000 -CVE-2017-1000486,0,0,4629168b83813ce81600f95a1999344d9c2e95dad50725b660be62503a4f5e2e,2024-11-21T03:04:50.587000 +CVE-2017-1000486,0,1,72834940bf321e73d14f082513e269335b6d6728af0d297ea08df4e507c89b1e,2025-01-22T18:48:15.750000 CVE-2017-1000487,0,0,af5ca6c396c74c5b1b3cbe9848ebae920297fa2d550ce5ce3524b1c656a09eac,2024-11-21T03:04:50.743000 CVE-2017-1000488,0,0,15dcc2dad5b26e7d6dc3f6675e2eb3384b71af76179fb3e95470c04c8ff40a8d,2024-11-21T03:04:50.917000 CVE-2017-1000489,0,0,d27b3871cbb594c60e390aba9c0dda9aab7f2a1382b6059bea547f257b2d6efe,2024-11-21T03:04:51.063000 @@ -101639,12 +101639,12 @@ CVE-2017-18359,0,0,f1d98b33bac96cf695fa950bdbcdd7a311c83e19f455170e58bc35381794a CVE-2017-1836,0,0,2eadb33b5673dd5153f647e0246479cb85188c2410423a24916ad1a27ff3db3a,2023-11-07T02:42:30.607000 CVE-2017-18360,0,0,76eaad1aa0b699626d370599721ca0a5764d621d0e44ae79c780f485a9a7accd,2024-11-21T03:19:55.710000 CVE-2017-18361,0,0,79097ec256618e70926053b6c2d55cb9b1b6109fd6a460fe2fbb1506a6804683,2024-11-21T03:19:55.883000 -CVE-2017-18362,0,0,5f94d6625c74cb8f2f419c9a83734cc1432cde44bd09927c16bf149bda6a07f0,2024-11-21T03:19:56.040000 +CVE-2017-18362,0,1,4f2a6cb165a54f74179206995982244696ce0206e94372d97995f4e59bb396d7,2025-01-22T18:52:47.837000 CVE-2017-18364,0,0,bc7317e9185590e388714b1189da33d9f710f239fda1f524daf8e0926e20bd5f,2024-11-21T03:19:56.200000 CVE-2017-18365,0,0,eeac2cdbfe6b611eb4299f3914fc765966c6087303288e334f759b75d56bdc70,2024-11-21T03:19:56.347000 CVE-2017-18366,0,0,8b404b41129dc55dda93db71ee9497117f78539da5cb1b61cb1396483881a2e1,2024-11-21T03:19:56.493000 CVE-2017-18367,0,0,4f74418bf8eed28ff4a802714f348fcd6318883475bdd37613a5b63dc80e24dc,2024-11-21T03:19:56.640000 -CVE-2017-18368,0,0,e5af345f79386b1c5522b3c3423bca555dba892c2c1e7cee3e22e75ef5def26c,2024-11-21T03:19:56.860000 +CVE-2017-18368,0,1,4fa137d2d96aece0df94298ebcf85ce9fa4167f63ef8643ac668f639ff30c404,2025-01-22T18:53:08.023000 CVE-2017-18369,0,0,f819e21d899e0819c347e08d85edbeff37afe4026adf281e195f83e934d45498,2024-11-21T03:19:57.060000 CVE-2017-1837,0,0,8c90e7b1ad59a6aa57a607e36285e4b808e61e279558e68578b00a2a54a94f2e,2023-11-07T02:42:30.830000 CVE-2017-18370,0,0,288955fe9433655d1eb96c264ecb2f4b0acf32aca395f1a13a7ac7853bebdd1d,2024-11-21T03:19:57.207000 @@ -111171,7 +111171,7 @@ CVE-2018-1000857,0,0,bbff1f6caeac77e463e8132c696d637acbdfbda8b4819d52854763ab250 CVE-2018-1000858,0,0,719a3aba3d9273a11ef430daf2249120aa360901def7cfd775778eb141bff53f,2024-11-21T03:40:30.710000 CVE-2018-1000859,0,0,0379ba721739945bc88bc45ea1b69525cefff3738173e629b266eda7713ec3a7,2023-11-07T02:51:14.167000 CVE-2018-1000860,0,0,ee6332a4b4fe0f3988335236f45ee6596840ca935d0641296f01e032c1c75e87,2024-11-21T03:40:30.883000 -CVE-2018-1000861,0,0,eccefa1ecf10432e0a5a05c3ba66b026041e03b4b84acb296c311ee8ea3ab234,2024-11-21T03:40:31.030000 +CVE-2018-1000861,0,1,b61bef21e96448b0ff1a39a12f6f25d45718a1ea26603f0327f7adacd5f738eb,2025-01-22T18:52:39.477000 CVE-2018-1000862,0,0,0b5623126c4c2c570d68d3d691f4c27b26ecd06cacf8661f457c44910a0d771b,2024-11-21T03:40:31.197000 CVE-2018-1000863,0,0,4cd52a95c2f6a8ff7b64ab38f6520309b679c0b819d2e5e972e2067377c02455,2024-11-21T03:40:31.350000 CVE-2018-1000864,0,0,bc37a8f023e5095e3119845d74eec2fa872cec65aa8066a5790c38674ef71928,2024-11-21T03:40:31.510000 @@ -115313,7 +115313,7 @@ CVE-2018-14624,0,0,36aa1b2ecf39b6dd6b0c6e9b17b748b71239ead4beec7fe32161e43f01ea9 CVE-2018-14625,0,0,ae0b1384e52a2313f8e935d0fd7b4d74e4857f031357615f7ccef40b4cececc5,2024-11-21T03:49:27.037000 CVE-2018-14626,0,0,093eab743947661f9b3a1e8eab9fe5da6af49f7bdb3ea04c7527d28f39ea1caa,2024-11-21T03:49:27.180000 CVE-2018-14627,0,0,5753c9d1dc5bee4ebd6218ed4faf7cedfc289787c4083d05abd7ba662d5cc11f,2024-11-21T03:49:27.310000 -CVE-2018-14628,0,1,8d6a06adc98ad32af743b78368e83f8a0e33d6e3051d59e814fabd8917a29444,2025-01-22T16:10:38.410000 +CVE-2018-14628,0,0,8d6a06adc98ad32af743b78368e83f8a0e33d6e3051d59e814fabd8917a29444,2025-01-22T16:10:38.410000 CVE-2018-14629,0,0,801ba65c1f5d9ea5b9a3b32f4e8ccc29f4fe913d98e2bb050a226d846d6e9f9b,2024-11-21T03:49:27.623000 CVE-2018-1463,0,0,294af0f142ee75e0a12d34fc1ae7b029ed6868203c60374a3e80ed244b30c681,2024-11-21T03:59:52.310000 CVE-2018-14630,0,0,dcc6c28dd65b4f7eb72f0a646c026d0da64d998b71c4bdb1f8e8b92654b0c126,2024-11-21T03:49:27.770000 @@ -138525,7 +138525,7 @@ CVE-2019-2511,0,0,c0988ccd82bc5b584b1f45acde74dea31fbfe8a406e71873f462eefd767ca6 CVE-2019-2512,0,0,d868a4bd495eb28e78f5bf29d3144bf81d9c043ac0ea1126f1af4a0cbca3254b,2024-11-21T04:41:01.290000 CVE-2019-2513,0,0,89a4f0afa00fb6165e067c0fd554018d0b7b0c382d11df235e6c1701240f4e3c,2024-11-21T04:41:01.420000 CVE-2019-25136,0,0,45e98e459d7f8d4f6cd4e12d2c20f5e7c66568e3609250a98d78ee717473ecc7,2024-12-11T17:15:05.877000 -CVE-2019-25137,0,0,611eef4fb5b2d87eb40bc5f0bd86b472f4c73525c37c88325d45367ef895d81d,2024-11-21T04:39:57.323000 +CVE-2019-25137,0,1,fe48a0f7ed3d988f3f9415612649f2e76d6b5eac58ab67e2102f48c9826e6b1f,2025-01-22T17:15:08.647000 CVE-2019-25138,0,0,986e567409626728e38c746233e290013c4b79fa210185f46a0055f3b8a89566,2024-11-21T04:39:57.490000 CVE-2019-25139,0,0,b70320216716a9cee9596425903e50f90d308e70626c905bd6562dca135abb24,2024-11-21T04:39:57.630000 CVE-2019-25140,0,0,60fce937790838e1905dad8c4288e7c111a6ea26b8702bfb66c6e17b1946e80f,2024-11-21T04:39:57.750000 @@ -200481,7 +200481,7 @@ CVE-2022-32417,0,0,d64f19058251d88c14160b8f609db47d69ca031dcf015b8e8878d830ca3c2 CVE-2022-3242,0,0,1c73ec2d1f6f69f9cc2febb7ee35d92f9fb4b3a3a99a05eeb2fa3b82f4600399,2024-11-21T07:19:07.643000 CVE-2022-32420,0,0,e82c9311a55a1f6b169829406434dffa63bc018f3132002b0bda7da2debb7f92,2024-11-21T07:06:21.083000 CVE-2022-32425,0,0,ad6e1c74636e1b8940feea7a3c6128080e8a5e466735d42cd203ffcade73b6f2,2024-11-21T07:06:21.227000 -CVE-2022-32427,0,1,8894777b61bd93d6e7166d2ffb8559bfbfde0cea2cb2200095f432a32b8fdbd3,2025-01-22T16:10:51.403000 +CVE-2022-32427,0,0,8894777b61bd93d6e7166d2ffb8559bfbfde0cea2cb2200095f432a32b8fdbd3,2025-01-22T16:10:51.403000 CVE-2022-32429,0,0,340f8334e3ead01ece5d0cf008e8b80ff3942c9fe5919b0b4e59a89cc32df1f6,2024-11-21T07:06:21.513000 CVE-2022-3243,0,0,0ad00fd54d518a8767726778b7d3d62fc8ce4664131b47fdbd08523227836ca2,2024-11-21T07:19:07.780000 CVE-2022-32430,0,0,3c00ae0f81ccaf00007552fec860354d3595308ce665bfa010dd07934953ca43,2024-11-21T07:06:21.653000 @@ -201894,7 +201894,7 @@ CVE-2022-34318,0,0,f9a861333799e9b64876ae44ef179644f0a31b1709d00283de6db5a7de986 CVE-2022-34319,0,0,aef60ca70699e8d1b26e5d11ea0634e0df9cc8b3b26427eeee0f68ebe3078d95,2024-11-21T07:09:17.443000 CVE-2022-3432,0,0,ed8c3d3c053de14c7cd1e0678b6c1f6cf7da74e48258f34e50461d133dffb1ce,2024-11-21T07:19:30.240000 CVE-2022-34320,0,0,245655b0171fab34d7184a3dfd840d8991cc2b17e8dd724426634875a48a8305,2024-11-21T07:09:17.557000 -CVE-2022-34321,0,0,ffb740cac90be4b2dd63edea2c7b0ab52ff52d1590d3a06ebbcefb7933b0b7fe,2024-11-21T07:09:17.693000 +CVE-2022-34321,0,1,82f5c7d0a58654aa1dcfa717f236254c27364e2d13a4259281663c02b5b14f00,2025-01-22T17:59:49.280000 CVE-2022-34322,0,0,4f80c935bd5a2bddda62a2a8b21aa664a66992e210ac169890ee662957e720eb,2024-11-21T07:09:17.810000 CVE-2022-34323,0,0,18f8a86a9ea7367250de4c574733b23b6cb443c54bb1f05564aba032a1233dbf,2024-11-21T07:09:17.943000 CVE-2022-34324,0,0,b78cbad7fe3dba0d1281388c8a288e34447a872aa35eae1eaba4e96f6efe865d,2024-11-21T07:09:18.080000 @@ -208356,7 +208356,7 @@ CVE-2022-42438,0,0,afc2fe0cf473b52ca23d69a4275bc1761565798a837222c9234a9b499e5be CVE-2022-42439,0,0,4e01fbb9c33edea9106ffc0b4167a5a65dc49e1e9db6790bbdbe9b0df445cb8b,2024-11-21T07:24:58.383000 CVE-2022-4244,0,0,ac7aa8637bd51b0082b62accf7566c41956dfaa0408f9eef65ee5607ca988b28,2024-11-21T07:34:51.510000 CVE-2022-42442,0,0,9f02592b0effba1bc336659f8f416a172ce8eaf02f19e1c1af2a6cd21863ff89,2024-11-21T07:24:58.523000 -CVE-2022-42443,0,0,60af02c0291a4350ff60e5eba93b4421c9e26332e51edcb7f86cbfae36514f9c,2024-11-21T07:24:58.650000 +CVE-2022-42443,0,1,fc50246ac900a4083ccdedef27e62d7e1413964daee1a320fba3c5aaf67e1007,2025-01-22T17:11:53.350000 CVE-2022-42444,0,0,b6a005bbc9248f0ccd336983da93f006a5d7ff4ae1a55f8166d0ea2956c4cdd4,2024-11-21T07:24:58.767000 CVE-2022-42445,0,0,7135c0c8f5d54c81855dcfdaf053678518868309e600df07d7c8780aecf75dba,2024-11-21T07:24:58.893000 CVE-2022-42446,0,0,42971664056387c462ee497f548a6df2aa4c23ac4c265a4511e389c929317b52,2024-11-21T07:24:59.017000 @@ -212852,7 +212852,7 @@ CVE-2022-48830,0,0,528e538a1cb5b7fc619709dd1a627afd309d21ad4886875ad2412a3af030b CVE-2022-48831,0,0,05bb24217e56141a02362670e6855afe44bffe0bad1a2d46f283b17ecf64f728,2024-11-21T07:34:10.210000 CVE-2022-48832,0,0,412b19f2926396c16f14324151947f9bb5b297fa00c72ccfe19f1676fd085e12,2024-11-21T07:34:10.327000 CVE-2022-48833,0,0,bcffa0c9d2bd50571209615ec22020a57e066e9d7ebee3bc1b1fa3f00efa01a9,2024-11-21T07:34:10.433000 -CVE-2022-48834,0,0,c58fe53d8e28d575d43a72098033053fc7397256adc051fe38a382616b08fd06,2024-11-21T07:34:10.547000 +CVE-2022-48834,0,1,87779f23e16a9258fe7a23ba318389fabb27aa62366d4bc60f43d60299d8a4cf,2025-01-22T18:03:59.087000 CVE-2022-48835,0,0,a0babffb7a50b42dadca10563d60986cc8f46df398cc44acd65c5a9efaef8b94,2024-11-21T07:34:10.673000 CVE-2022-48836,0,0,cd59aa7fbb33ccce663f3ef435a755e567d8d249c3170f77d4ebbed189a4679a,2024-11-21T07:34:10.797000 CVE-2022-48837,0,0,3cdf3d5f799307cfbe64f978367c74b31518e0cf6dc0220319e1b72937987714,2024-11-21T07:34:10.930000 @@ -216959,7 +216959,7 @@ CVE-2023-22080,0,0,6a1575c7329708f6beb64fe6bdd6962ae4615de752f26fb2ce83470eef282 CVE-2023-22081,0,0,8098b67026ff6b067f26ad72e46f746e7415829127eabb312f3ddfca90d8d836,2024-11-21T07:44:14.347000 CVE-2023-22082,0,0,217f2a7d5d523b4332dcd4ba0f1ee40b70b3f8dda6f1da13ddb6619c8dd3e76a,2024-11-21T07:44:14.483000 CVE-2023-22083,0,0,549569d4f434b2b64b53f184eb945f77bc60cf824fbb758a791df5757f7c7ca7,2024-11-21T07:44:14.600000 -CVE-2023-22084,0,1,f043c014a7d0fe08f101e9c3332dfc390a6a944c09aacb0e30ad3ded0fda5f07,2025-01-22T16:10:07.627000 +CVE-2023-22084,0,0,f043c014a7d0fe08f101e9c3332dfc390a6a944c09aacb0e30ad3ded0fda5f07,2025-01-22T16:10:07.627000 CVE-2023-22085,0,0,6bfc1d596b6f19fc1e323c430faac564baf4255880646c1b2e54a076f1922f61,2024-11-21T07:44:14.853000 CVE-2023-22086,0,0,31b717095cd6330dc7fe03956beaa84a2f0f4a7376ac8b20a2aebdace32ca4e8,2024-11-21T07:44:14.967000 CVE-2023-22087,0,0,242e6251cbd6d56e4bc795b041c8038cb4373057265c4411e435a4e04ae60c9c,2024-11-21T07:44:15.087000 @@ -220994,7 +220994,7 @@ CVE-2023-27212,0,0,a0ec87fc36c6303fff9a0fd8456f97de589511705b9acd0945bcba1cf3918 CVE-2023-27213,0,0,c909625e71de621203eeefd4541b3f27ec8f8a7b4d4363d0ee72a35244ec0f5f,2024-11-21T07:52:28.540000 CVE-2023-27214,0,0,ea769ee688983edb9434a5e4681bcd07c82bdc53396295318c3ec5360f1d1219,2024-11-21T07:52:28.680000 CVE-2023-27216,0,0,bc24ad8e0f3dd99d6536c987cfd2eada7d75bb703c40d4edb83fafff41b765d8,2024-11-21T07:52:28.820000 -CVE-2023-27217,0,0,6185afa98d681299a5f563e9f670a5ce4419ecca4d0674bfed65b8964801ea85,2024-11-21T07:52:28.977000 +CVE-2023-27217,0,1,319ed6c2134a957f225aa67bc8890c2d84cd1efedafd0d5e4a5356cc3e5403c2,2025-01-22T17:15:10.203000 CVE-2023-2722,0,0,578a1b6a456132fb10eb1f8c0efad32fd83bc4ff202041e0d9bc42f758a68d5d,2024-11-21T07:59:10.037000 CVE-2023-27224,0,0,b5a3ba24a808fd250dbb119ffe0717a6785837309eb1a8cdb6a59bd7dff5a789,2024-11-21T07:52:29.110000 CVE-2023-27225,0,0,f02d88e14e051adfde9702aef4c1b81e13bc7ffe0bb996c0ac7e0066ae8e1282,2024-11-21T07:52:29.253000 @@ -222034,7 +222034,7 @@ CVE-2023-28365,0,0,4859f30e6a1c91c44b3748aad21832f67bb60327910ad2139bb1ab931e722 CVE-2023-28366,0,0,960802829fc443cdad65c26e57c943b97bd525d1c3e69a293aaac3644999e79b,2024-11-21T07:54:55.887000 CVE-2023-28367,0,0,ea542543ae5e959ac9dd6964b8c5f27f5841b12efe8c4d64b461fc5cfcaa014c,2025-01-17T19:15:27.370000 CVE-2023-28368,0,0,36f7dd98387b40400855f4cffb9250bac7b1a05259b6ebff4e7caf81b76ab285,2024-11-21T07:54:56.150000 -CVE-2023-28369,0,0,815c110e1ebcd6e549e22f4e285aba8d19a651b9d972e72a40643fc9d8cd7614,2024-11-21T07:54:56.247000 +CVE-2023-28369,0,1,5326e433e1c21fed17a32ece498ce8bc21b008499283471ca20802183944fd70,2025-01-22T17:15:10.370000 CVE-2023-2837,0,0,ac2b220952bcea1d0717efa8546becfc7608c322c6c4219716a62813de1b4fcb,2024-11-21T07:59:23.307000 CVE-2023-28370,0,0,8ddfe0194bd02605113924b198b97ec7507865195d1cda20ecb693368d670695,2025-01-16T16:15:28.637000 CVE-2023-28371,0,0,b6df0c22e30ccc2b0d0f39efba2aaf78f63bc29870241aaed15184440466de58,2024-11-21T07:54:56.470000 @@ -222187,7 +222187,7 @@ CVE-2023-2851,0,0,7ba8f792fc3fa0e1fc66d41c7883c06fdc98e4bafbc9a4acc1539e5335343a CVE-2023-28512,0,0,905bced05b9d94f9fb010dd76a64efd044b1e18c0d17f0fe01c0e785c0fcf691,2024-11-21T07:55:15.773000 CVE-2023-28513,0,0,e9946240011947f68ba84203cd8006bb612def46b47525afd835dea122138d0a,2024-11-21T07:55:15.897000 CVE-2023-28514,0,0,cd4136cacd314150419772de032429e96c9c80cb63cb7edbb8650a7546b78f76,2024-11-21T07:55:16.053000 -CVE-2023-28517,0,0,11acce6f7519925feb9780bce41c0d48c0b180e03546256515973ab09ddc162b,2024-11-21T07:55:16.223000 +CVE-2023-28517,0,1,1f707c4ca4e076ea1927682820bdb187d539b7fcb6432bd306345959db1a9734,2025-01-22T18:40:49.833000 CVE-2023-2852,0,0,15a8736ecba62a5495ab259dc73cff27cb5ca3e70bdd52b5da508eda2a3c8683,2024-11-21T07:59:25.320000 CVE-2023-28520,0,0,7afffc97c67b44ff449392b73a6c12d9c670fce2954c4beff250981a10d5820c,2024-11-21T07:55:16.367000 CVE-2023-28522,0,0,880ed0441dfc22421005d6fb849b60ef66bf3fdabed2fa72b4d627271bbb03a9,2024-11-21T07:55:16.517000 @@ -223301,7 +223301,7 @@ CVE-2023-29850,0,0,a81b8c5567d5da4adb295ee9f08035dfb076cc3f42a4b9f0bd2c2c3c6079f CVE-2023-29854,0,0,fc98dbefb3f0918404342d0de6358664a9df189b2710368d978c55821fd941df,2024-11-21T07:57:35.073000 CVE-2023-29855,0,0,d1ad81ec4ef8e2e5d3a5a0c41230b142ddf1c1926bd0df4dfbae07bf537dbff0,2024-11-21T07:57:35.210000 CVE-2023-29856,0,0,b07bbd6f3df18d3f0c08e71dffe9eeaab7b72b9f25dad866594c7cca7b9f8a6d,2024-11-21T07:57:35.347000 -CVE-2023-29857,0,0,e2227f0ffad1aecac9493abe980b04fff212857a75b446f20d1cbf11bdd55711,2024-11-21T07:57:35.513000 +CVE-2023-29857,0,1,0760939b20d3d88a77d487b55a7da2f82fabbe0bc7d6bfc81ea34e8a82edb139,2025-01-22T17:15:10.550000 CVE-2023-2986,0,0,fd575d0d1fc5fd4e594291bb8d594452294ed760175b3a8b0c59fd6d69ed1f44,2024-11-21T07:59:42.210000 CVE-2023-29860,0,0,5c2742c261171840d6f34f370da60d924460a62e3a3def8de75e8ffa5cdc3f5c,2024-11-21T07:57:35.657000 CVE-2023-29861,0,0,82ff7cef243bfd86ee88a495dba3f937ac9fd2757a16b6cce4845e39b4ac8a62,2024-11-21T07:57:35.797000 @@ -223362,7 +223362,7 @@ CVE-2023-29975,0,0,40720ee6d47d55a51706f124606d253d1ffa588cef9f156aa93ddba9fbd6c CVE-2023-2998,0,0,1b6ce606c073f2f25d79f3f75e5e06457895c01800a04a3eca245ac3c767f43f,2024-11-21T07:59:43.453000 CVE-2023-29983,0,0,d6df98ed72aa45d7a9fc1731ad28a4a7c0bcb225dfb02278d5e3600199fcb6a8,2024-11-21T07:57:43.140000 CVE-2023-29984,0,0,849d1d8bb8d1c82dd4465e18dc063bc7bb7d4f6685f858666cc49d05da57a8b5,2024-11-21T07:57:43.273000 -CVE-2023-29985,0,0,0bfad4f126983abe50a71bd382993a07488ad557354f34bdd6986aa34f97555f,2024-11-21T07:57:43.633000 +CVE-2023-29985,0,1,b12310c1ee5bbdc1261f7a8ed5e13634d33dba6518ddef2866864286487694ec,2025-01-22T17:15:10.717000 CVE-2023-29986,0,0,c0a4da31bf6e6fcd318ed3581b7de177d3f4a8c74bca980aa70eef57c49d0ccc,2024-11-21T07:57:43.767000 CVE-2023-2999,0,0,e84b86584803df914c413c71c789115543e508f0f37e047743cf55901a755646,2024-11-21T07:59:43.583000 CVE-2023-29994,0,0,0d588203ce56bb6ec198443b64e6307afb104e1a348d444db41d8a25f6f5d348,2024-11-21T07:57:43.897000 @@ -223450,7 +223450,7 @@ CVE-2023-30187,0,0,264816bf4634a71474b718d96d8baf48913ba13cfa653a00891795b5f5e44 CVE-2023-30188,0,0,bd69c02b1b4277403197d9ae4a4d5755a2a34b9daf6c3dabe7b5765d14b0d232,2024-11-21T07:59:52.393000 CVE-2023-30189,0,0,39faca687da87ac093839f657c4998e47990450979510972d2b161cf2bc08052,2024-11-21T07:59:52.543000 CVE-2023-3019,0,0,3f2eae215750afa5621e4e308f7ca75563ffc785802895ca3b7c64fecccce699,2024-11-21T08:16:15.360000 -CVE-2023-30191,0,0,baf991b005d2918b8ace439297debd51f00a880020c2785607144cfbf94e0480,2024-11-21T07:59:52.693000 +CVE-2023-30191,0,1,affd8afbdd3a1ff86c0284e22b7c40ba550b3c3af6460f8ab59c55f9734edd57,2025-01-22T18:15:16.863000 CVE-2023-30192,0,0,76ef88ebb30e0eb7a330a15d67abe9acdd9b3732c18c14e5467f80708cef8059,2024-11-21T07:59:52.850000 CVE-2023-30194,0,0,97916a3149d4accd5e7cecee33423a08e2cb7a42bf400ac1c6746cf4b6f8b95a,2024-11-21T07:59:53 CVE-2023-30195,0,0,9f6fd32b889ec86f9e06a9f333ca1033c4dc8bc185606c569140c5f599d8388a,2024-11-21T07:59:53.150000 @@ -224527,7 +224527,7 @@ CVE-2023-31587,0,0,e3e9fa62a3bcdaae5be5ba07108774f22c24f16b19946c6231450e8e366c5 CVE-2023-3159,0,0,9807e6d823aeb3a21864e69407a3985c2540754f15da81cf40cfb1f6730d0a44,2024-11-21T08:16:35.373000 CVE-2023-31594,0,0,2ce3e386965dea1f61dddc297872812c537c7c3578bf01ba97d20e1959ccf4a0,2025-01-16T15:15:10.397000 CVE-2023-31595,0,0,2026436fcd8bf62d8ba7fed6d43e84eb30b5d83d2404d7bba01566f62966490b,2024-11-21T08:02:03.823000 -CVE-2023-31597,0,1,1f8bdd9d0a309d5ec76ed85b4521636202eecaa199c66cd085c2481943451f84,2025-01-22T15:15:08.770000 +CVE-2023-31597,0,0,1f8bdd9d0a309d5ec76ed85b4521636202eecaa199c66cd085c2481943451f84,2025-01-22T15:15:08.770000 CVE-2023-3160,0,0,3706adbaff758c87939153381553b204ed7dad56f061b584bcec323680f304d6,2024-11-21T08:16:35.520000 CVE-2023-31606,0,0,566928f240e95aed16a3c3742b1ad454864df53f0c03b37939832a70716ca961,2024-11-21T08:02:04.130000 CVE-2023-31607,0,0,7ad6178e32d830059cd8b10ec7a2dd8d4aafa1cb81bdcf4aa36742f616e32ed1,2024-11-21T08:02:04.280000 @@ -224577,12 +224577,12 @@ CVE-2023-3168,0,0,1bd92a1174d3d25efb01791dc24e9721f58f20da4ecaaad50c6cc157e99ec7 CVE-2023-31689,0,0,e1a0688f6f537b7c1fa56c9ec182be01ee7169349e51aec1bda32ba01c926cc0,2024-11-21T08:02:09.323000 CVE-2023-3169,0,0,c91442e162ed6b40e2ae0d4cb311993a8a2c9d900971320a57eb9faf25b7a47c,2024-11-21T08:16:36.763000 CVE-2023-31698,0,0,8c41f620a0b0851f781e3f3c6cb4ecc9f44b43d68037b88e96fa4ec01608a58d,2024-11-21T08:02:09.457000 -CVE-2023-31699,0,0,aebd7af60822a8cbb08ec54317d4468122c6a7100584d6cb58cb29bdb339abfa,2024-11-21T08:02:09.597000 +CVE-2023-31699,0,1,53129eaf3a83785c0fc3132ffe189c5da80a64b39e9211df74592a9f2bf7e5c6,2025-01-22T18:15:17.453000 CVE-2023-3170,0,0,f6ee7c13f83858aeeb323c91656d76607f26b72519a6d241f590aed2aa069226,2024-11-21T08:16:36.950000 -CVE-2023-31700,0,0,aad62a517d71c98ea3e4881e3ffd152a2b79e2010e2002595c17ff61e419ecf2,2024-11-21T08:02:09.727000 -CVE-2023-31701,0,0,6029da9608aa169470771560a0276bbde8b6eb3535cb5621f3226d39e94a8067,2024-11-21T08:02:09.870000 -CVE-2023-31702,0,0,a037b826cfac9b8330536cb35f08bb46fdf6aab6fb0812061a35fd36da8ba255,2024-11-21T08:02:10.007000 -CVE-2023-31703,0,0,b367ca18cec592e717234ba36178779d21d50236f74b699c28187cd2fe90060e,2024-11-21T08:02:10.143000 +CVE-2023-31700,0,1,26e50dcc25b5cda71d4b83435d2cfc8bebd1276ed7affb3663e646933a5a8519,2025-01-22T18:15:17.633000 +CVE-2023-31701,0,1,7efd3953654bfdb87cbaf9051d7d43568cdcc64f8404a792c1255bc8e7110a99,2025-01-22T18:15:17.807000 +CVE-2023-31702,0,1,ebc221dcc3be229aa423b94db56ba4913b6cd87249260cf93d182cd7ab61d802,2025-01-22T18:15:17.980000 +CVE-2023-31703,0,1,9de43cc0b8851f15633b2a79cd6bfd0c2ce96c42a398bc38eb5becb496d3a8ee,2025-01-22T18:15:18.163000 CVE-2023-31704,0,0,dcadf3768124226be21b17226f961f32fe8500ab6fae55f914f11d3698ff8084,2024-11-21T08:02:10.287000 CVE-2023-31705,0,0,bd023ce2b1586c8d59c14150e06b7b4bc8760149d19ef7cce3711b540982c6f6,2024-11-21T08:02:10.450000 CVE-2023-31707,0,0,c9548077edc996d875913e1b63676abaedd026a05e493791c294ee33c2889d98,2025-01-21T18:15:13.783000 @@ -224595,13 +224595,13 @@ CVE-2023-31717,0,0,9d602fd97b8172636ac6b038e60a701d4c1ddc1fc8454cca1a51886c61049 CVE-2023-31718,0,0,5179c420f8061355da29dc34be7f72b25e5771fe333e0db37ff4c80b25aef14d,2024-11-21T08:02:12.090000 CVE-2023-31719,0,0,acf1bd4463e026935be3350348ea2110cc6f8cb50b0c23e53690fed8e5dca3f9,2024-11-21T08:02:12.240000 CVE-2023-3172,0,0,40ce327036be5f0dae16371e93554cc8f44e04c46cd864d7c73250828e099059,2024-11-21T08:16:37.370000 -CVE-2023-31722,0,0,051a25982ef5435f0503c6d07c978f734bd60bcbdb80a5a1da0b9108c3e0b947,2024-11-21T08:02:12.417000 -CVE-2023-31723,0,0,55715ad45e3b390e36628645fd220886ea824d18262ffacc104d991402c300a9,2024-11-21T08:02:12.560000 -CVE-2023-31724,0,0,f136e6d29012cb72688c8055424f030d16332cc47fb41ce432cff8f3b50435c2,2024-11-21T08:02:12.703000 -CVE-2023-31725,0,0,fccc160562726b8de174ea471d330427b9c97e64fe5802af6e7a278c6136a310,2024-11-21T08:02:12.843000 +CVE-2023-31722,0,1,9ab0f0e83a3aa478e23e325969dac829a8a53a68a44c73545c0e39baedce3ed3,2025-01-22T18:15:18.343000 +CVE-2023-31723,0,1,52c2195bcbd2d629cd73f7aee9ce88a585cae90c69dc6633dc10132691d036e3,2025-01-22T17:15:11.060000 +CVE-2023-31724,0,1,2de49c585fb3ab321fa0718a5654d8b061a397b13169c03c55bfc3aae1bef0cd,2025-01-22T17:15:11.233000 +CVE-2023-31725,0,1,5cc309aa559dea4fca4e8102d1ec894d28f7ef5f892acfe85df2559ae11cef67,2025-01-22T17:15:11.390000 CVE-2023-31726,0,0,b91c3c01947d9cd4f2893e286d5dd2597c383b83e1d789ca47c1df062d733706,2025-01-21T19:15:10.157000 CVE-2023-31728,0,0,1d216e390f5004be5bad0e31ab34abe0504f9631fe739cc8bfddee3565a6fc2c,2024-11-21T08:02:13.123000 -CVE-2023-31729,0,1,fb850d7e9530696277b89467d42b2446bbca42462c9d5510c48ec451f9e2b3a1,2025-01-22T15:15:09.043000 +CVE-2023-31729,0,0,fb850d7e9530696277b89467d42b2446bbca42462c9d5510c48ec451f9e2b3a1,2025-01-22T15:15:09.043000 CVE-2023-3173,0,0,022677952ebd42989b06e1597f2563b8948d7c0602e4beeb60f1c2aa27971ff0,2024-11-21T08:16:37.493000 CVE-2023-31740,0,0,80e7b9a45904c8543256467b80a91316d59d9a1749284741343b92ae51a51232,2025-01-21T19:15:10.353000 CVE-2023-31741,0,0,b89581e0d2046fed9493237ea7dce65f515c3b7ec5a3eb03b769c3cda9c77a61,2025-01-21T19:15:10.547000 @@ -224656,7 +224656,7 @@ CVE-2023-31842,0,0,216b8f15018b084ece08520bbe6db9754d2bfd5a6c33dfcefd31c96d92009 CVE-2023-31843,0,0,54f7849724cbe11f6da5e667fc7780219d0ba47cbdb5d8c6918953c560b9b7fb,2024-11-21T08:02:19 CVE-2023-31844,0,0,e313c4eac2abb96cd6478dd52b1ff49af079b7d6e2512e59f45183f714a754c5,2024-11-21T08:02:19.137000 CVE-2023-31845,0,0,010ff27f4b802c204ea560e2a6d6dd8efc9afa0421f31c35db1cacf2e475b140,2024-11-21T08:02:19.277000 -CVE-2023-31847,0,0,3bc6fa454e292c996517d5ea55a74bc93e67b211a0d27c5a7879e15d5694e571,2024-11-21T08:02:19.410000 +CVE-2023-31847,0,1,61652494dcf39a47d9c41c5bcf334843a00bb44003843e702e7fa0ecace274fc,2025-01-22T17:15:11.553000 CVE-2023-31848,0,0,5256ae3c08d44e561db926e9fafe7d2eb6c7df72056b8e75d61fc4cf6694e73b,2024-11-21T08:02:19.550000 CVE-2023-31851,0,0,28e0ff2c774b14b35c919062a5005171b7eb64e8e88e7d86e80fbeb0e947f032,2024-11-21T08:02:19.697000 CVE-2023-31852,0,0,60b88d15d49f418b5ee4e9b6f24abed1c597679dc7c775beba5502c414a2e904,2024-11-21T08:02:19.847000 @@ -224671,7 +224671,7 @@ CVE-2023-31862,0,0,183773c4fb48488b0f34d273b560a7d98eb8d59c9dafd533700dcea0bf624 CVE-2023-31867,0,0,3f97c746a106b59feb7da8efbb130c3ebd33dce765f13b1306b2c553d6ba473a,2024-11-21T08:02:20.963000 CVE-2023-31868,0,0,6e260dda95c178839b85901984cda3cae3d6a2568e86e3744b8b1efedda9c1ce,2024-11-21T08:02:21.100000 CVE-2023-3187,0,0,45abe4d68423e085db7e015c5bcbba672c78865717ff9602ec07cb7d3d5494b6,2024-11-21T08:16:39.137000 -CVE-2023-31871,0,1,c6714f3ca0909870885f9e4316df01380af14fccb4af3b23d234101bc7caf222,2025-01-22T15:15:09.237000 +CVE-2023-31871,0,0,c6714f3ca0909870885f9e4316df01380af14fccb4af3b23d234101bc7caf222,2025-01-22T15:15:09.237000 CVE-2023-31873,0,0,e8f324843a2b4958ad8c7c21a6de302711bfe57ffed4fca5ff260067652382db,2025-01-14T19:15:29.990000 CVE-2023-31874,0,0,aaeeb0431a9a1893d552c2a1d86d7024a1cb24bbc16d2ac3b3a4d2f0898bb0a7,2025-01-14T19:15:30.187000 CVE-2023-3188,0,0,ed975c2ca95a43dd0a1601e3d12e0e041e6ed66a4ffa6869eb0b4e0368f2ec18,2024-11-21T08:16:39.287000 @@ -224680,7 +224680,7 @@ CVE-2023-3189,0,0,90b7be594abf8f0ecc9df91220db42abe0006221673e859b30a599fddc34f4 CVE-2023-31890,0,0,dbfc8dc304aefcfd73cedba88cdbdab1d70ac9812e6e1b86de38d65aabb218f5,2024-11-21T08:02:21.873000 CVE-2023-31893,0,0,21ba3fe4129e701a3557352f945cc0417a22c044d81b30613e43c14f9ebc4b4f,2024-11-21T08:02:22.007000 CVE-2023-3190,0,0,7db86e04544f8eba511b6d963d5edd9521b55a2eef0f5beead6ede415eae6a3c,2024-11-21T08:16:39.573000 -CVE-2023-31902,0,0,449a2da393ed77672d488d692ae6adb79dcf83db893b9c46ee38966da6605935,2024-11-21T08:02:22.143000 +CVE-2023-31902,0,1,4970407b0151e647b1b82c1825347a6db8937a2ca6f3d25b0a873338c17dd0bd,2025-01-22T17:15:11.717000 CVE-2023-31903,0,0,672e71598928bc83de5d90e02af4d013d4e062df79b7b118e381bc8f2a470b10,2024-11-21T08:02:22.280000 CVE-2023-31904,0,0,f318ebe4f1e995c606297cf984e3deb2bb7dae615c713345d091fe18a45204b8,2025-01-21T20:15:30.193000 CVE-2023-31906,0,0,1590296e688e9fe8aaa247010cbdb299d1d8f018eb4ef5c7d242aa8db0b7a4a7,2024-11-21T08:02:22.553000 @@ -225529,7 +225529,7 @@ CVE-2023-32762,0,0,8885e1478d5a5347dcddddfc5f391080f8ea3998809c16cc92a63732c551f CVE-2023-32763,0,0,13dc09fc98abd947b5057782cd048a40b85b6d5b968ed9bbc1c3021b6d91770c,2024-11-21T08:04:00.213000 CVE-2023-32764,0,0,ebc54782bec9818ece3aefb2fba6620578488822b7196a3e93048212e5122f14,2024-11-21T08:04:00.367000 CVE-2023-32766,0,0,0b633d8bc727e25998a2d5776f4ba3f10229add0f4d08e2a39500e8a6b98823a,2024-11-21T08:04:00.537000 -CVE-2023-32767,0,0,e92de8cdee01ae2e4990e439d1fd4d65ec423abba205ecd73c206aca217f7819,2024-11-21T08:04:00.687000 +CVE-2023-32767,0,1,e573f0a224dba1331459e8b9b25cc09b5c7a2f0c0801d91639ae6d5f5fcdd842,2025-01-22T17:15:11.870000 CVE-2023-3277,0,0,90615256f2e0ecfe35a741b5ec93ea7bf575e0e5bd001d6eb46ee44a6fbc00db,2024-11-21T08:16:55.077000 CVE-2023-32781,0,0,1c28c4f8cbbf9ba5459c5c2720ccc094314b220a049ba39518db0d5264c8c090,2024-11-21T08:04:00.830000 CVE-2023-32782,0,0,a27c1f6af0cf2b09ab6c0363bb92c6d09ef03251df19e8a390c7370a5b70c4ab,2024-11-21T08:04:00.983000 @@ -225914,7 +225914,7 @@ CVE-2023-33200,0,0,1482adc920259f95b6a700c02d62d5aeb18de8038dc9f0fa8efc557ac3801 CVE-2023-33201,0,0,46948cbfdecddf27ae9357173adcb832bd0a7c27ffbf7a2d7b96267b60b2c447,2024-11-21T08:05:06.870000 CVE-2023-33202,0,0,c1f0b838e1e25f532d4e871e1a1c2423c3a3d4c6a6baa771d9553fc2585425e2,2024-11-21T08:05:07.057000 CVE-2023-33203,0,0,74e478a7f3e2b5250c04b4920837ca7ceba8b0a676ca8415788ae03fe1c180b1,2024-11-21T08:05:07.270000 -CVE-2023-33204,0,1,cea2fde1a1ebbc478e53b25fcdce6e68b350a0b628a540cc4b97fe230433fa51,2025-01-22T15:15:09.430000 +CVE-2023-33204,0,0,cea2fde1a1ebbc478e53b25fcdce6e68b350a0b628a540cc4b97fe230433fa51,2025-01-22T15:15:09.430000 CVE-2023-33206,0,0,59ce158ed0055ec7cc71d8ed85e231647fdd939f2a653e9d867caea0c5474a9e,2024-08-19T19:04:03.527000 CVE-2023-33207,0,0,3e2ea1c51159f842434559a3d9780e80b56d06684a2de676b943edcb202ba5ea,2024-11-21T08:05:07.897000 CVE-2023-33208,0,0,81223ae0d1c7ed9c9541da1a08a9bd4c064cb93d9e0dcafaa23e9d2dfae255aa,2024-11-21T08:05:08.040000 @@ -228623,31 +228623,31 @@ CVE-2023-36992,0,0,bae724c6dfb236c635b6c832140deece61ed44b28909df77601ad61a13545 CVE-2023-36993,0,0,4c68873d179dc3a675980898a346ad69636c26c4f9df0ac27f53753d08294f3a,2024-11-21T08:11:00.330000 CVE-2023-36994,0,0,fff5298c4b24c0e5b92702a6a1f0446ede67f47123caeb5ebf984e5560e8128b,2024-11-21T08:11:00.477000 CVE-2023-36995,0,0,4e2506dc3314d1c8d3c5decfa5d038b5e536042093e975b150aa20e381792196,2024-11-21T08:11:00.623000 -CVE-2023-36998,1,1,050b9f23b70793da5e6e28022f4c8d3392ca43208afa94d6ffb9fbdeae85b81e,2025-01-22T15:15:09.647000 +CVE-2023-36998,0,0,050b9f23b70793da5e6e28022f4c8d3392ca43208afa94d6ffb9fbdeae85b81e,2025-01-22T15:15:09.647000 CVE-2023-3700,0,0,453d92acb238b2558e7054067437e7c096de953ccf1cbfc4152eb94511be7528,2024-11-21T08:17:52.480000 -CVE-2023-37002,1,1,25a391d4521fb6bdd9d80d99be497c908addf8c4b798245a4c9e587f83a6be23,2025-01-22T15:15:09.757000 -CVE-2023-37003,1,1,4301da6b77cb5320623c97a28fe26ef828f1db5df4973cb167fa2e225860c979,2025-01-22T15:15:09.867000 -CVE-2023-37004,1,1,30e8fe7c552e6758164f070c8b643b24b902af67a8b9e8cd849e8a4f72955726,2025-01-22T15:15:09.970000 -CVE-2023-37005,1,1,478ae349c18f582d14de24715ebb5f027fb6be6eeddda8339b13e9c8d04ce8bb,2025-01-22T15:15:10.067000 -CVE-2023-37006,1,1,063a55b6b1bf43281e94c46ed0d82b423221a672228b49bdf1d3d3bed52647bb,2025-01-22T15:15:10.170000 -CVE-2023-37007,1,1,5ce5ba5e9dac8d99801c83070ac97392594170709b9934ff29d77e9f73d1d630,2025-01-22T15:15:10.270000 -CVE-2023-37008,1,1,b5b34e6c507cc9f89e55577f268c80e136445bde2f6fcb7e8d59d27a9d56362b,2025-01-22T15:15:10.373000 -CVE-2023-37009,1,1,f8e9160fbb8cada09b213f677944db678dd2061f88cbd70ecd20c63690336331,2025-01-22T15:15:10.473000 +CVE-2023-37002,0,0,25a391d4521fb6bdd9d80d99be497c908addf8c4b798245a4c9e587f83a6be23,2025-01-22T15:15:09.757000 +CVE-2023-37003,0,0,4301da6b77cb5320623c97a28fe26ef828f1db5df4973cb167fa2e225860c979,2025-01-22T15:15:09.867000 +CVE-2023-37004,0,0,30e8fe7c552e6758164f070c8b643b24b902af67a8b9e8cd849e8a4f72955726,2025-01-22T15:15:09.970000 +CVE-2023-37005,0,0,478ae349c18f582d14de24715ebb5f027fb6be6eeddda8339b13e9c8d04ce8bb,2025-01-22T15:15:10.067000 +CVE-2023-37006,0,0,063a55b6b1bf43281e94c46ed0d82b423221a672228b49bdf1d3d3bed52647bb,2025-01-22T15:15:10.170000 +CVE-2023-37007,0,0,5ce5ba5e9dac8d99801c83070ac97392594170709b9934ff29d77e9f73d1d630,2025-01-22T15:15:10.270000 +CVE-2023-37008,0,0,b5b34e6c507cc9f89e55577f268c80e136445bde2f6fcb7e8d59d27a9d56362b,2025-01-22T15:15:10.373000 +CVE-2023-37009,0,0,f8e9160fbb8cada09b213f677944db678dd2061f88cbd70ecd20c63690336331,2025-01-22T15:15:10.473000 CVE-2023-3701,0,0,50c60623ffa7110070b51e3894d8b141f7b048bb1af146331e25664835932475,2024-11-21T08:17:52.610000 -CVE-2023-37010,1,1,db91e1583a7f4cae891cc62de0b0abd853c64237b0f7f7ed598bfa2ae11ffa41,2025-01-22T15:15:10.580000 -CVE-2023-37011,1,1,10e4db718a9fd96024e307839707ef8a5501fb4943d8cfe86e523e9692779a34,2025-01-22T15:15:10.683000 -CVE-2023-37012,1,1,c9df3caf42232b255846ddb0fc112463b3fa15dade422f6bb3673ba7652ee282,2025-01-22T15:15:10.783000 -CVE-2023-37013,1,1,6fbe217b9c9df40775ec262fd152758e20a0de7a6293ed020f995fba3b79f075,2025-01-22T15:15:10.883000 -CVE-2023-37014,1,1,2b54ff439f8b41bf4b2fbbd2be62923d7ba9e49157f05c892b09bab86d315f30,2025-01-22T15:15:10.987000 -CVE-2023-37015,1,1,66eb73469b3ba78b3bab79aeac6ed24ca4d3de4a641b6c180ec19e903039dadd,2025-01-22T15:15:11.100000 -CVE-2023-37016,1,1,8868c5ec313c58fd9423256b4570250ee9f085e38d76a3597757ad99b53b6e56,2025-01-22T15:15:11.207000 -CVE-2023-37017,1,1,09eaf3964fab7bf3f6f67e22c338e5bc8cc4a602f57d2893183367b5e452ca70,2025-01-22T15:15:11.310000 -CVE-2023-37018,1,1,16b59946c2b55bcdd78347ea3af7a79bb463313e51f4116dfefc754730e013f0,2025-01-22T15:15:11.410000 -CVE-2023-37019,1,1,edf7b6a2ad715042569c565919367bd3db4e10905fae667123c59f9a1a2cc26f,2025-01-22T15:15:11.510000 -CVE-2023-37020,1,1,0f1e5e8c95316ef7094cc0c60501980062de896244304caffad32e9e769abbb4,2025-01-22T15:15:11.613000 -CVE-2023-37021,1,1,1a830f672e29163e83b8a89e2600a4e2a6422ba8cde7f2035d8b0ba2ff721a0f,2025-01-22T15:15:11.710000 -CVE-2023-37022,1,1,0b0fd64ce93d8a6c0376111f45a55e6bfe7530be537d4a4470b1846a858a55e8,2025-01-22T15:15:11.817000 -CVE-2023-37023,1,1,bd9dc31664e38e12575d80c55c419ca71263921e4ea4349c3dd7d6e3d5ec000b,2025-01-22T15:15:11.913000 +CVE-2023-37010,0,0,db91e1583a7f4cae891cc62de0b0abd853c64237b0f7f7ed598bfa2ae11ffa41,2025-01-22T15:15:10.580000 +CVE-2023-37011,0,0,10e4db718a9fd96024e307839707ef8a5501fb4943d8cfe86e523e9692779a34,2025-01-22T15:15:10.683000 +CVE-2023-37012,0,0,c9df3caf42232b255846ddb0fc112463b3fa15dade422f6bb3673ba7652ee282,2025-01-22T15:15:10.783000 +CVE-2023-37013,0,0,6fbe217b9c9df40775ec262fd152758e20a0de7a6293ed020f995fba3b79f075,2025-01-22T15:15:10.883000 +CVE-2023-37014,0,0,2b54ff439f8b41bf4b2fbbd2be62923d7ba9e49157f05c892b09bab86d315f30,2025-01-22T15:15:10.987000 +CVE-2023-37015,0,0,66eb73469b3ba78b3bab79aeac6ed24ca4d3de4a641b6c180ec19e903039dadd,2025-01-22T15:15:11.100000 +CVE-2023-37016,0,0,8868c5ec313c58fd9423256b4570250ee9f085e38d76a3597757ad99b53b6e56,2025-01-22T15:15:11.207000 +CVE-2023-37017,0,0,09eaf3964fab7bf3f6f67e22c338e5bc8cc4a602f57d2893183367b5e452ca70,2025-01-22T15:15:11.310000 +CVE-2023-37018,0,0,16b59946c2b55bcdd78347ea3af7a79bb463313e51f4116dfefc754730e013f0,2025-01-22T15:15:11.410000 +CVE-2023-37019,0,0,edf7b6a2ad715042569c565919367bd3db4e10905fae667123c59f9a1a2cc26f,2025-01-22T15:15:11.510000 +CVE-2023-37020,0,0,0f1e5e8c95316ef7094cc0c60501980062de896244304caffad32e9e769abbb4,2025-01-22T15:15:11.613000 +CVE-2023-37021,0,0,1a830f672e29163e83b8a89e2600a4e2a6422ba8cde7f2035d8b0ba2ff721a0f,2025-01-22T15:15:11.710000 +CVE-2023-37022,0,0,0b0fd64ce93d8a6c0376111f45a55e6bfe7530be537d4a4470b1846a858a55e8,2025-01-22T15:15:11.817000 +CVE-2023-37023,0,0,bd9dc31664e38e12575d80c55c419ca71263921e4ea4349c3dd7d6e3d5ec000b,2025-01-22T15:15:11.913000 CVE-2023-37024,0,0,fdde923f545a782296ba940851623c412455317ea848c36c10ce5ccf126d428b,2025-01-21T23:15:09.500000 CVE-2023-37025,0,0,f90abd65c13cfed8867b2c6ee8abcfc09f44a8341f55662a404159db37abc10b,2025-01-21T23:15:09.623000 CVE-2023-37026,0,0,bfbad1a1a324a8114ef90dd361be4401e77b13e26a65b2ffdcdcfa09407fb402,2025-01-21T23:15:09.747000 @@ -228660,7 +228660,7 @@ CVE-2023-37031,0,0,106f5ee9c873f3689420a5aeaa2d7e1796b238ac49a78634e0a65e0d2b3cb CVE-2023-37032,0,0,80ace4103da18e9cace3feaf65daad824cef6637ee11a013b6bed7be6fc3e084,2025-01-21T23:15:10.473000 CVE-2023-37033,0,0,32028a3e1e8d86131f8f8821f5a01fc99919ce9591be3439b64ccd2ca1c5d5a9,2025-01-21T23:15:10.580000 CVE-2023-37034,0,0,34ea2153524fa8bb2d0c220606ad810f0556a9a247d6faa25fb623865f8968a4,2025-01-21T23:15:10.703000 -CVE-2023-37035,0,1,4b68b44e876ecbdfd20bbceeb836e386c8998e840e614841a322bd28cdb9d09d,2025-01-22T15:15:12.017000 +CVE-2023-37035,0,0,4b68b44e876ecbdfd20bbceeb836e386c8998e840e614841a322bd28cdb9d09d,2025-01-22T15:15:12.017000 CVE-2023-37036,0,0,10aca712be1ca99db21ed3c7abe2896d9d73585b83ec10f389501c7e54297d2d,2025-01-21T23:15:10.970000 CVE-2023-37037,0,0,55d0be8f067165e37af1a64464df4bcf595561c724711afa1728c2effadc1360,2025-01-21T23:15:11.080000 CVE-2023-37038,0,0,5b2e955f501ea29279d0f6fd257167b7b466219d721bde59e67dd5d4b17fbaaf,2025-01-21T23:15:11.203000 @@ -229216,7 +229216,7 @@ CVE-2023-3777,0,0,0a5c2b434a475c2596be8b4702119daa0a7ff2510c52387329cf5dfe36d76f CVE-2023-37770,0,0,7948ebb82ba3c4d501e76d04f7c9ea141d2f29ba331509dc38f3c4014869bfca,2024-11-21T08:12:14.713000 CVE-2023-37771,0,0,571558f975810ad1a18c92729d1baa9a885ba229675f8f8b36f1f00c20f4c1f3,2024-11-21T08:12:14.883000 CVE-2023-37772,0,0,2c9825453789b3704f1bb92537d3ff9be391ef8f2d0a8addbff93cf7755fdb75,2024-11-21T08:12:15.037000 -CVE-2023-37777,1,1,ecc5bfc8cd2f15d8ff3fd934a591faf29440078db0df1fcd53aedf6e48abd8d2,2025-01-22T16:15:28.187000 +CVE-2023-37777,0,0,ecc5bfc8cd2f15d8ff3fd934a591faf29440078db0df1fcd53aedf6e48abd8d2,2025-01-22T16:15:28.187000 CVE-2023-37781,0,0,ae5c172e9edc2c48161a9b4a9bf7d2a65636bca3c57570aa1aea9bb200fe229a,2024-11-21T08:12:15.200000 CVE-2023-37785,0,0,345093fae305f6a074a713d36337118217321babdb63a765da58ba8c38347cd5,2024-11-21T08:12:15.373000 CVE-2023-37786,0,0,d10df939f6a5298afb57ae4aecf763187ccb1b069623eba9c34ce09272783198,2024-11-21T08:12:15.553000 @@ -231146,7 +231146,7 @@ CVE-2023-40104,0,0,b3b514fe5c5c90b3fd96bac202151426665bbebe93179878299d731c6e6b4 CVE-2023-40105,0,0,99fd48612470195f9c737f8096f56e0b77060289b39968dc0daaaa2383cd197e,2024-12-13T21:27:40.283000 CVE-2023-40106,0,0,dd94462a1cc0ecff68b893d4c352cb3561e324fb5a1af15f4a62c1d3f1ffd1ae,2024-12-13T21:20:34.837000 CVE-2023-40107,0,0,cbfd670fe9974a0bf3a935ebb0bae79e008c2a28e1b9f32ec59b9835bda81f23,2024-12-13T21:02:17.693000 -CVE-2023-40108,0,0,f7844327d3995653822af7222e12cc2fcf13d7fc41d7010bfda174d078deb0aa,2025-01-21T23:15:11.320000 +CVE-2023-40108,0,1,b3d5696bcd70abefbcbdd8ddd700527a7c8bb13e3841ab7fbf03dc56df9cb92b,2025-01-22T18:15:18.543000 CVE-2023-40109,0,0,e4c3773b4535f894e1bed277d66aa40ca3b1bf83f795fb073a350f209e5bc2e6,2024-12-16T19:34:04.793000 CVE-2023-4011,0,0,77e08656072a7907646eb543cf48d306dfce66e36e2f14dc48363fc6a8adc3bd,2024-11-21T08:34:13.530000 CVE-2023-40110,0,0,1796eb5c3e87a14dd825f784ac43182d16eca1e76a01978818fdb769a3e34ac4,2024-12-13T20:56:22.790000 @@ -231170,7 +231170,7 @@ CVE-2023-40129,0,0,4dd2dc96251ed33b386eb4bf36dbfc8133a1074a121884b0e6efce82c7a5e CVE-2023-4013,0,0,81a1814e2860a38e869ad893f24750f16a5c3c351a223a2f4d9b78f2288f9401,2024-11-21T08:34:13.823000 CVE-2023-40130,0,0,73b56fd8bff33c5840eb190bfaff74aa5558771cf7c7277c3137c479f8e1a15c,2024-11-21T08:18:50.080000 CVE-2023-40131,0,0,d299c70704211e34f2f3042a44222799ffd6635ecde64b088a69c82024d8983d,2024-11-21T08:18:50.290000 -CVE-2023-40132,0,0,7094c014b7878780d07ea1dc78911645b3e34934b0ec34d9b55aa216def74287,2025-01-21T23:15:11.437000 +CVE-2023-40132,0,1,630d3930bddb4a4dfbb670dce807881ff3c8178d51b34e6a7aff2da256f3e8ae,2025-01-22T18:15:18.680000 CVE-2023-40133,0,0,6fefa73958d1b96e5e74a310e07325347682bbd679ff777a3ac2fea0d81edadd,2024-11-21T08:18:50.427000 CVE-2023-40134,0,0,1263dafd545707095a277b1240280c9a53625615d402a194a4fa0dfe676e5495,2024-11-21T08:18:50.570000 CVE-2023-40135,0,0,963325a31ec9de455dea7fe77240c283d9fc28ae4b896f1eb180d999fadb14b7,2024-11-21T08:18:50.693000 @@ -236736,7 +236736,7 @@ CVE-2023-47757,0,0,317288cd78d3b2135f26b25969c953189486bd6540248bbc58d39003d17fd CVE-2023-47758,0,0,b4afc986eaaad2bc295764834946d2e1766d768eeea67bc230362dc8247a48ae,2024-11-21T08:30:45.943000 CVE-2023-47759,0,0,806084a7f96c87d97bd6be8bcdc5142be46195d86b29a2c32927dcb5479c2465,2024-11-21T08:30:46.070000 CVE-2023-4776,0,0,cb7964d60bb4cfd8d195179c52a1ee7c5209abe2b9d3634cc88964bf1fa458e6,2024-11-21T08:35:57.677000 -CVE-2023-47760,0,0,1d95d56bd7905733b817922cd37fd9f26e90111c740da9a33d1f6fab4d79e672,2024-12-09T13:15:29.843000 +CVE-2023-47760,0,1,6d0552ccfa6c3540969b262c390e3f63790889e013b5ecdcbb11ebc1789066a8,2025-01-22T18:13:16.527000 CVE-2023-47761,0,0,3388417bb54b71c5c3de49c7229208ebf5e5e4f4770d6b117850fdca7f9b46d4,2024-12-09T13:15:29.983000 CVE-2023-47762,0,0,1a05d596ff1cd86c9324b27838b611d9f736ebe72d896f219fd66820da0c43f4,2024-12-09T13:15:30.113000 CVE-2023-47763,0,0,12dfdc7197316e14b5c59bc38b2ff00827a7995cd9ce51a7586b07e01edb9f93,2024-12-09T13:15:30.240000 @@ -236801,7 +236801,7 @@ CVE-2023-47819,0,0,2acfa8466f84f79270fe648165931e9eefa39c36aae2ee917bb35a9d357de CVE-2023-4782,0,0,e5805488b01da3d85e73b3359bc45916fd6725f238ac0454d1b2d2cee152d6a9,2024-11-21T08:35:58.410000 CVE-2023-47820,0,0,eaf39b5a1c408837984dcb9ca554ea7dbadf9b792438142e35c79e7f6b162d52,2024-12-09T13:15:31.100000 CVE-2023-47821,0,0,1345c354e174d85dd630ed11b0f18500dab7c99a6b2f25218fe165930cc59161,2024-11-21T08:30:52 -CVE-2023-47822,0,0,ec555d1883fca9b41578d2206af515749ee96cb81c854c1ff6354cebdc439167,2024-12-09T13:15:31.253000 +CVE-2023-47822,0,1,e529cb8a167b794c51a330aec1c3c847cbfd68081c2f9ce193eff367c71d570c,2025-01-22T18:21:20.150000 CVE-2023-47823,0,0,78346fd77912bfff7c73f7c82810f7e0d823b4db807bfd46e60e086a782aa2a3,2024-12-09T13:15:31.390000 CVE-2023-47824,0,0,ea1cc68bd7c5ae9083aa5d353ffd37d1b8b9f9a8fdc6e84fccc42c7aeb45e698,2024-11-21T08:30:52.120000 CVE-2023-47825,0,0,efccb510abacdada329987df18c744babc854ceef1657a649eff6d5a3dfd622f,2024-11-21T08:30:52.250000 @@ -239178,9 +239178,9 @@ CVE-2023-51355,0,0,403a1b38462fab64d2958d48b042a496c74a03590091d2ef7736ab842bdb9 CVE-2023-51356,0,0,0c338ccdcc36826e4261bb2d65b363156e88e8f2d31d7f5f3ac98f0991e9c93c,2024-11-21T08:37:57.153000 CVE-2023-51357,0,0,3c21a89f88ae47ff4fd0648590c1ac79ce18a621fa63e072f9934422d6832830,2024-12-09T13:15:39.773000 CVE-2023-51358,0,0,cdbe460ef61ea842baa77a4baeed60ac4eae47df327faa5565bb9b3eaa566c2c,2024-11-21T08:37:57.270000 -CVE-2023-51359,0,0,f31b947514ea180f769d8cd21085d3fc353fbb880421357f81907aebd63aa1ae,2024-12-09T13:15:39.920000 +CVE-2023-51359,0,1,7e2eee8543b23764033f0ce56e163bd712c63c28ee111a20d605a25b769c2a27,2025-01-22T18:22:07.870000 CVE-2023-5136,0,0,7273ff22f0e2accd512ee99ad682c65422501bc1bb9a2f070bf448d981e446b8,2024-11-21T08:41:08.100000 -CVE-2023-51360,0,0,ec585349e50fce8a8f616c21b13c681299cfd9d03f29d503c5c0d6a349fff04f,2024-12-09T13:15:40.047000 +CVE-2023-51360,0,1,9dbbb6d5091eee3c22d7883819881354cdb10de0958e4aa8236917302ea73b83,2025-01-22T17:35:03.477000 CVE-2023-51361,0,0,7730a85e4bdad685c605f88dbe50f8092a6a78c603d024ff441352152f5f5654,2024-11-21T08:37:57.393000 CVE-2023-51362,0,0,009c621730c352dbe13859fd05d7f5cd26f435e9c16a23822cf9d9ac3627aacd,2024-12-09T13:15:40.170000 CVE-2023-51363,0,0,f4a3bb5a030de694d5865d970b8fcf3c8b98dc66e20355d0cacbbe44dd522f78,2024-11-21T08:37:57.513000 @@ -239359,7 +239359,7 @@ CVE-2023-51525,0,0,cc8a41c95e97e3eef08e489711755257d7199a61c16f9491fa2dfe0854a50 CVE-2023-51526,0,0,dc39ba53880880a209811de957064dec653f5a2194637d5488682a7102ecc314,2024-11-21T08:38:18.633000 CVE-2023-51527,0,0,c3da9a7c1c016de9d25d32847d10f50d0382b55f23b651c58546e170ef761d78,2024-11-21T08:38:18.760000 CVE-2023-51528,0,0,c49e308c293e2d0ca394ad156fe5902ce66e0aa1218ae3b97aed072ebe31c1a8,2024-11-21T08:38:18.887000 -CVE-2023-51529,0,1,ef479d22e0a83a673466919347ece1db7eb5c7423bb53907f916b358d608d132,2025-01-22T16:21:12.423000 +CVE-2023-51529,0,0,ef479d22e0a83a673466919347ece1db7eb5c7423bb53907f916b358d608d132,2025-01-22T16:21:12.423000 CVE-2023-5153,0,0,9c9af9ee0585ae99c11dc28be44a3d285d24f0e534e56e6e3bc49f885c490b2b,2024-11-21T08:41:10.440000 CVE-2023-51530,0,0,aacd0ae4430751ee66bd692b65f7bdedffd90735fbd54cf00f3857e1ffbc7331,2024-11-21T08:38:19.133000 CVE-2023-51531,0,0,71ff9fd2d5f352c2c15ad64fe11aebf88dd3b69b741259be74db54a5b11c32e1,2024-11-21T08:38:19.260000 @@ -240402,7 +240402,7 @@ CVE-2023-52757,0,0,83faf8146bb9edf4bec680ab6747f1137ea407cca802569ea48b5e721e0da CVE-2023-52758,0,0,1dec77a3ad2d46363a8d440866791b91e3ba2419e4f6b349bb352575fcbf86ba,2024-05-24T16:15:09.010000 CVE-2023-52759,0,0,d02de4f2e673632abe3697cddfe6669da6af361a999f03297379c860e218d9d0,2024-12-19T11:15:30.140000 CVE-2023-5276,0,0,0b7db42a0b69ca7893c46dd3bcba89bcdb20b2edc3fa2c1057d10c47dc3e90db,2024-11-21T08:41:26 -CVE-2023-52760,0,0,98d3d4c8bacf4c312879ef9527d08a9e77d7aad79d38c26f0713e99c5d9dd931,2024-11-21T08:40:31.687000 +CVE-2023-52760,0,1,e225beb74f176155c5de5fb84653dce76d2796c70c5432fc12736d42fc8f9cc8,2025-01-22T18:03:56.987000 CVE-2023-52761,0,0,2de2d44e86efe53326e55f7ec6f21c5145ed9df593be989838b4687490700a3c,2024-11-21T08:40:31.823000 CVE-2023-52762,0,0,b1526cb45988cef620a220c45195944361e97b42679e23f18e92d83e3ddbd163,2024-11-21T08:40:31.957000 CVE-2023-52763,0,0,51608820498fd55626f4c63260788d9dac36f63a4eb8157e60a3920e8ba1efdd,2024-11-21T08:40:32.093000 @@ -241046,7 +241046,7 @@ CVE-2023-5774,0,0,1bebce900d8ad9a3f072ab6a9e7a3b0c8ee6eac7970df7784f0f4971b0feb1 CVE-2023-5775,0,0,c373b9f686b85b32ab5f06271bf899c743c82ff2b37565ee36cd83cafab5f09c,2024-11-21T08:42:27.783000 CVE-2023-5776,0,0,b0a65d1b13a29db138cfd2b79c42475e3d219f945b399481d660e928e899941d,2024-11-21T08:42:27.897000 CVE-2023-5777,0,0,461ac3e7ae51d631ad2dd9309b1f6a918c92c345ccef3b0b03d3ab875932e3c2,2024-11-21T08:42:28.023000 -CVE-2023-5779,0,0,84a92945b2b503097b3c9da93f751361a884b1fdc6dd544dd167a1cfa2a6ae6c,2024-11-21T08:42:28.150000 +CVE-2023-5779,0,1,6cadf72ad9fe90835fc35f421f0ca036e070fbc97b87b8a50061d3995d27727b,2025-01-22T17:13:42.143000 CVE-2023-5780,0,0,15c00db343d63315f01d70d7a8b6f226cb5e300284bc17b238bb1669f947978e,2024-11-21T08:42:28.263000 CVE-2023-5781,0,0,ff4a03b696f21eaf89e641a3b42df7b88ac83ba5c98195e9bcd5c04490283fab,2024-11-21T08:42:28.403000 CVE-2023-5782,0,0,38cc4654cce59b546782a1717e4dd9838ea821053f6fbeb61b7957eb5850287b,2024-11-21T08:42:28.540000 @@ -241911,7 +241911,7 @@ CVE-2023-6745,0,0,c2df4cdafbf74897e9eea24dcbefbab3bccb43b78e892bae5f48a918042a6f CVE-2023-6746,0,0,d7ff11dddecae5300361052ebb0e500954674a7d62babed59f4ffc80fac1fb33,2024-12-16T19:07:48.603000 CVE-2023-6747,0,0,f1b669eb92efe8ef444d542bea6bd00978e396921b41145289be2c45bbd151e0,2024-11-21T08:44:28.527000 CVE-2023-6748,0,0,cf38ea04efb873027a42aa1c020e6885f6acfab0c6fff5502b7b09f2d51be788,2024-11-21T08:44:28.660000 -CVE-2023-6749,0,0,f8c91a50224b14b87bcd28f8627a8d72ecb9793f12597331a87b6725548e32f0,2024-11-21T08:44:28.780000 +CVE-2023-6749,0,1,9da0575760139ef01fcf0bf904b0253c34ea0a5aa6121b2c61d0bb63077d6036,2025-01-22T17:12:49.580000 CVE-2023-6750,0,0,0731099e46b55b099a2949fcf23ba656a8917e5327c54b7717c585f2be95763d,2024-11-21T08:44:28.897000 CVE-2023-6751,0,0,e93947d6b47731dde44d9809da9debbbc8b65086c446b53936e2f3f76b8718ba,2024-11-21T08:44:29.090000 CVE-2023-6752,0,0,58d96a73b163b5c71f73bbe8131f888193770c5fc8d9eceef767177b5ab85445,2024-01-02T20:15:10.653000 @@ -242110,9 +242110,9 @@ CVE-2023-6961,0,0,d0ee25ffa8bdb76f77c8ea3e3a486e8e065ab8917741a035a963350aba6676 CVE-2023-6962,0,0,4cadfa868aaf20f5de107a0c09d8fd16163bd9c10cf19a5360f8e7a410c0501a,2024-11-21T08:44:55.890000 CVE-2023-6963,0,0,01c79ae6ebdcef8bfb9c31ad967ef0972931fd93edc1bd88ea5a1b8e1c328f53,2024-11-25T16:47:33.943000 CVE-2023-6964,0,0,59149016838fd9e15f69c8e3ebf3a72ceec9d74b315e0e55e9bf9363bd1710b6,2024-11-21T08:44:56.170000 -CVE-2023-6965,0,0,f6e3e105e9a2a017627d97abf6941db90e8be471b48869112271220e47e4349c,2024-11-21T08:44:56.290000 +CVE-2023-6965,0,1,671119831e99b85712d14f962400a5f5d2c3e9505fd6f45362771f7c204cacb4,2025-01-22T17:38:52.513000 CVE-2023-6966,0,0,404b8477c36a669c3840eadcbfd58d58203be0eba6f2f11300b8a16c973bcbfc,2024-11-21T08:44:56.403000 -CVE-2023-6967,0,0,59300b2cc3bb9047b4457057ec76f2b59296de8c0e79da116e074f8507f110f3,2024-11-21T08:44:56.537000 +CVE-2023-6967,0,1,71a83952da97a18e8c99c2e6cdfbba3ea47b86dcd29e00b7db96e2206ee4bb12,2025-01-22T17:36:41.760000 CVE-2023-6968,0,0,e305de6e66181a39e2b6c25e5e4fa341cb65869913f65587f94fba4a34ff03b9,2024-11-21T08:44:56.653000 CVE-2023-6969,0,0,fad3f6e82ad35aea1701f26bd3b25c05400ab049ac4bee37ba7c5a2687aaec8e,2024-11-21T08:44:56.793000 CVE-2023-6970,0,0,b1eba1e19bef79d8ccacdb9d3c2541f8fd1190cd62a020686ed05171449766e0,2024-11-21T08:44:56.910000 @@ -242142,7 +242142,7 @@ CVE-2023-6994,0,0,d15a852e7f08a1579ce5fe6303f4c0fc2419f62d98812cf73ce75adcf6d06b CVE-2023-6996,0,0,52002d14cb86abbd1281d090e84e4c42a72e92b614af25723f08db101d431aca,2024-11-21T08:44:59.900000 CVE-2023-6997,0,0,6e27e5b63f0a87af454d1261575dc30b0f4ff5f301848e086587a6cca0abb399,2024-06-07T19:15:23.410000 CVE-2023-6998,0,0,bdc0ada6e08e3eee8c2f0effb337d53dcef7c2bf7a80b8f32db217f457f92b0b,2024-11-21T08:45:00.053000 -CVE-2023-6999,0,0,f90bcf62b28a5e65270cc6ab57b9e07244188940cee872aaed5480346cc5c691,2024-11-21T08:45:00.187000 +CVE-2023-6999,0,1,32172c6e5dba3e450899c6aa7c2fa833b0109f8a25fa23104cedf20ec37074ad,2025-01-22T17:34:19.660000 CVE-2023-7002,0,0,84396c0bdf73e170d66b798921a49a9f0a13dde1ac20a4cf4c9ca68c4bd2e87e,2024-11-21T08:45:00.317000 CVE-2023-7003,0,0,090dbcb22a27ae8d1249b5396e7cb61a556fd7edf17cf3f654f7795066af7307,2024-11-21T08:45:00.443000 CVE-2023-7004,0,0,2b0a1c3f594514067c80c828d3cdf50833ef4cd40d9bad21bf097cc6e6910593,2024-11-21T08:45:00.633000 @@ -242212,7 +242212,7 @@ CVE-2023-7068,0,0,66612add00985bee1cb0a47a183f4ec85fafb21e3c327acc340b0d97270e84 CVE-2023-7069,0,0,34c08207af52ed58978c3a450428597e03be145f6a2130e41378d9419807b940,2024-11-21T08:45:10.960000 CVE-2023-7070,0,0,d4f8c7975a3506a7dcc8c4cfe544d8efda7b15b1eb3e3eebf34fdba11847a94d,2024-11-21T08:45:11.107000 CVE-2023-7071,0,0,48fee3396f888c148a3fc3a5c0899df76aaf5be1af3e416151e1024486b5674c,2024-11-21T08:45:11.260000 -CVE-2023-7072,0,0,451a22d96b8329378c5ec58a80495ba47deec3124ae75cfc96bd23025e299db6,2024-11-21T08:45:11.407000 +CVE-2023-7072,0,1,d85a1b5261fe067f55449dd8ab95f1a6c37cff62f1fc8c8fa6eb5a0b33e60777,2025-01-22T17:40:31.817000 CVE-2023-7073,0,0,85b3734eba0e857f75453bf3ac337fab097371ed1baa19537546b7ca2054c908,2024-11-21T08:45:11.537000 CVE-2023-7074,0,0,291d8c5c534661f5dfaf35a7ff2936d8f8587deb8df66b45ac15b47f998232e9,2024-11-21T08:45:11.670000 CVE-2023-7075,0,0,d0df2f8a9cc7c4dfc585b329a5ad90139d84978807f1e8347549224668d83135,2024-11-21T08:45:11.810000 @@ -244103,7 +244103,7 @@ CVE-2024-10924,0,0,f1198492ea5d0448c480cfb52c449c77b28f46a760324baad7abe4da889f1 CVE-2024-10926,0,0,ad47f219103ae4ebd92db7592078769652c8133d266b35358f61dcfb9dc4e1ed,2024-11-08T19:01:25.633000 CVE-2024-10927,0,0,f09c2725d755f5937d35809a87d5ada4fd8d3d09c9d48fcc66b16a3fa883071d,2024-11-22T19:14:48.190000 CVE-2024-10928,0,0,862f1a88452be3b22edef7e2642809ba572832547c6da90647052695aaf77de0,2024-11-22T19:10:19.290000 -CVE-2024-10929,1,1,c339a09b7418a4b1af0ff6406ebd0b49b561f995c2406671fd12a529fe0453f7,2025-01-22T16:15:28.790000 +CVE-2024-10929,0,0,c339a09b7418a4b1af0ff6406ebd0b49b561f995c2406671fd12a529fe0453f7,2025-01-22T16:15:28.790000 CVE-2024-1093,0,0,ac60ea90a5bdbcab92bbb148d0d6ccb636fae604fade2bd9337658c1f747481a,2024-12-23T17:03:58.370000 CVE-2024-10932,0,0,28109702b795f9356a11af2c3727eebea623b98c280555fa2778753a6b0d3d2f,2025-01-04T08:15:05.713000 CVE-2024-10933,0,0,04454997e745a68880991c602cc8325b99e3c53905740538bda66aba85b8cef1,2024-12-05T20:15:21.417000 @@ -245085,7 +245085,7 @@ CVE-2024-1203,0,0,d1f896c2674b7d8b8ac7ccf181e7d9a7e598afaaabec693045eb0f85d52368 CVE-2024-12030,0,0,ab03bb849d6b0ac5fee4be199a6829464d936641a4ff08f4885974ca9f654ae5,2025-01-08T05:15:09.510000 CVE-2024-12031,0,0,d30b745c703c186af9776c88e8d0d222bab220bbc78efc5ddb772b6e524ac88f,2024-12-24T10:15:05.580000 CVE-2024-12032,0,0,d28549d87ab7a1da8c8e60b219695b8c0bac78074e1f07aa186ddc87bdbbdb60,2024-12-25T04:15:05.497000 -CVE-2024-12033,0,0,bffaeb972922744e32cf3053889ef8f842d0f1c8a2b3c52d8033e337066b5a75,2025-01-07T12:15:23.900000 +CVE-2024-12033,0,1,5cda97496640b0b6aed202f7b1c5b5c1b99afbb11db7e6b9c1179f2506c52c5c,2025-01-22T17:16:45.530000 CVE-2024-12034,0,0,9c507f78158cc030dfd314ae6dde1db490ceaf3d6dfd0f8120e54566524e4e3e,2024-12-24T06:15:32.553000 CVE-2024-1204,0,0,52c83c0f4289636bc1afd18cb37875b782729e90167239cc1a53f532e5633e12,2024-11-21T08:50:02.033000 CVE-2024-12040,0,0,82ff661fdb988bbdc555297e0b0d4a5a42a6c3fde3cb51373bdf40b4e4dd0633,2024-12-12T06:15:22.947000 @@ -245297,7 +245297,7 @@ CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654f CVE-2024-12311,0,0,3af6eab31cd30d4c0065a32bdb34b2964678187eb437151de7a1f6c0c5de09e2,2025-01-06T14:15:08.153000 CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b6052467b,2024-12-12T07:15:10.090000 CVE-2024-12313,0,0,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000 -CVE-2024-12316,0,0,2570abed78e04df0d70e5592258d76ad89a9394bd03499a3e471de7c1b107996,2025-01-07T12:15:24.040000 +CVE-2024-12316,0,1,eca8691c5b3893d514ca6edc1aa6f96dd65d6266b3ab54367da0968d84fc6712,2025-01-22T17:16:27.977000 CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000 CVE-2024-12322,0,0,84247a031ea6a724314932d42a7460599ae4e2c971abe58241a0cfedf89e325e,2025-01-07T05:15:18.063000 CVE-2024-12323,0,0,06bea100acdfcead34fe4d931dfd21a64a280c25bd363945a1e09f063078f508,2024-12-10T15:15:07.300000 @@ -245714,7 +245714,7 @@ CVE-2024-12907,0,0,d89f3365314aa5778f704685a334ac72db82727dcecdbb78151d02652b150 CVE-2024-12908,0,0,76a88b8500008d4ca56b5c37bddceec64b40a69d8577b8cdbf6118a2030881b4,2024-12-27T15:15:10.240000 CVE-2024-1291,0,0,8f051cca86e07e915f10677720017dd69f0d69620ffe64fe34f7d04e63b0eedf,2025-01-16T15:28:37.230000 CVE-2024-12912,0,0,746e63a7cfb944606513a06821763c045edbf693309ba8391961cb9c8e0e7197,2025-01-02T09:15:17.470000 -CVE-2024-12919,0,0,1c2e8b779628b44ff131f72054d62442fff08b11e2e6cc4877fd414cfba22a7e,2025-01-14T10:15:07.250000 +CVE-2024-12919,0,1,267cd9cf604b008de2f506d778d176d8d6c4286f989194d3cfe533433123b414,2025-01-22T17:29:01.883000 CVE-2024-1292,0,0,38d9bc6a557167174bf37c6662c68d5de6a783380fb5a30941c923054e3f2f16,2024-11-21T08:50:14.983000 CVE-2024-12926,0,0,fc2a26ab92b192ae501d4e54cc781c262c43c0b12662ce958be5565acbb713e7,2024-12-27T15:15:10.360000 CVE-2024-12927,0,0,29caca6ad2306153fa9ab094fa9e0334461e2ea665f8d59bbd5e4f726fcaf708,2024-12-27T15:15:10.513000 @@ -246152,14 +246152,14 @@ CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c82 CVE-2024-1387,0,0,2c2f906637a61e38d38a9b0ca47ff4dc68c131d6fabb5f801315dfb2710ce089,2025-01-07T18:19:26.400000 CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000 CVE-2024-1389,0,0,5873690e0845507df8953cc4f63b4ccd0c40998cbb5a2b9d552ef1fc675e0a5e,2024-11-21T08:50:28.477000 -CVE-2024-1390,0,1,4f3d9af8e4f645cacc042445b3c6c1015224ae23e87226c88c372fa7ef3e2644,2025-01-22T16:49:11.553000 +CVE-2024-1390,0,0,4f3d9af8e4f645cacc042445b3c6c1015224ae23e87226c88c372fa7ef3e2644,2025-01-22T16:49:11.553000 CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000 CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000 CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000 CVE-2024-1394,0,0,3bfb4bdf7cbd2e83903d52b6ed8359606dbe1ee24d71dfdae11060be7f14efdb,2024-11-21T08:50:29.120000 CVE-2024-1395,0,0,aa14344d5f3c417e75370dfad240218276bccf85a1cff8add87ecef1ce7213df,2024-11-21T08:50:29.483000 CVE-2024-1396,0,0,99c867002ef97abbaaafea27abb6c91c61f510e73a2f0816bc88ba650d70c41c,2024-11-21T08:50:29.700000 -CVE-2024-1397,0,0,af37b22741b42c954ae00d3ead16e6f842ac343d14b5596867caada2abbbaeef,2024-11-21T08:50:29.823000 +CVE-2024-1397,0,1,b23e8b9ccb5706ad3f8d257df0efb1d8013c2af60938dfd6b0df8c51fda39522,2025-01-22T17:41:19.017000 CVE-2024-1398,0,0,7f10f6a1be1871472979dfa3e08ce990ab03c4b0b1b77b6b442adf652486984a,2025-01-08T18:39:21.643000 CVE-2024-1399,0,0,de4ae2e68321a6c15c8c7d567274d914b003ef22dbc953f97581fd2a2e98f996,2024-11-21T08:50:30.073000 CVE-2024-1400,0,0,0b9f577a46a1a3fcd46ea85e11e275ccee345bc2c1e6b2f734cc9454a636beb2,2024-11-21T08:50:30.200000 @@ -246170,11 +246170,11 @@ CVE-2024-1404,0,0,72e7bfa50d663f6618ea5cb7b36bb28904508f29cf1e05b2cbe5def310af38 CVE-2024-1405,0,0,f1f20b7fcf6fcb7016c5464ac9de09f0711e13473f6f7d4ae7139e675dbe1403,2024-11-21T08:50:30.937000 CVE-2024-1406,0,0,6b28f10833aa0266c21bf391a699e38b0fbc18d07df506bf50ade27d766794c5,2024-11-21T08:50:31.093000 CVE-2024-1407,0,0,aea146a24e9e07a019a2882d28a7220b14386947f663004dd47c26ab47e7f0fa,2025-01-17T15:05:23.520000 -CVE-2024-1408,0,1,6a5d8e939c0fd88c81e5b17570e1c72e8e089968a9376e722c191d6ab22a6e4c,2025-01-22T16:44:00.387000 +CVE-2024-1408,0,0,6a5d8e939c0fd88c81e5b17570e1c72e8e089968a9376e722c191d6ab22a6e4c,2025-01-22T16:44:00.387000 CVE-2024-1409,0,0,7962f407df3c3ae50439b2eca79b45057e814b108e0e2b019b6d191d89933849,2024-11-21T08:50:31.520000 CVE-2024-1410,0,0,5e6f7cca224df908329417aec1336b7ff4ef9e141a0c106289cba50bfd976a14,2024-11-21T08:50:31.643000 CVE-2024-1411,0,0,1a3f3817141b708692776a1cc4fd5069ccf1e40fdb5dcd96fc448a68f63f24d6,2025-01-15T18:41:08.613000 -CVE-2024-1412,0,0,488aaea4090fd0bfbd6439d19bc44e277648de8ce1e7b471395f315b7b1d9749,2024-11-21T08:50:31.930000 +CVE-2024-1412,0,1,74a8318f0235491a47ac5c268a03c25ac7408d43f295965870169cd18026bd87,2025-01-22T17:30:55.463000 CVE-2024-1413,0,0,b623d556bbec42264ef043138e776c7d90f87c26e80da7db9473f0a4c76ce89b,2024-11-21T08:50:32.080000 CVE-2024-1414,0,0,0b464a7a884be744b6e28bb40b7df1056b85218e62ce2d568fb777444fbfebfd,2024-11-21T08:50:32.210000 CVE-2024-1415,0,0,c14b0840efea8f222abfc94f2ec3b47ebc1c7f10e81408ec1d19d42586f2f55a,2024-11-21T08:50:32.330000 @@ -246183,7 +246183,7 @@ CVE-2024-1417,0,0,80c71b6f5eccf4d89c847cf92ad69321e88152cd31952527e9649572b5abaf CVE-2024-1418,0,0,22561da6c61f825effad6710d5e038f72164164027714334fbeb98ec73fee765,2024-11-21T08:50:32.733000 CVE-2024-1419,0,0,c806b39ab52f2cac617215f7b4ca10d634b1f03d43de49a7264dd29eeccfba37,2024-11-21T08:50:32.870000 CVE-2024-1420,0,0,87cbde692a44b30138e5311554a8fe03ab6752ef419e674117c5a1abadbc52bd,2024-02-12T15:15:07.733000 -CVE-2024-1421,0,0,eef8b6fdfd25c4c0c8676af47f8465849c88f15c3078de98d816a2ea6042bc91,2024-11-21T08:50:33.003000 +CVE-2024-1421,0,1,fce1981b75bfc198cf465137dc2c270b1d9fba91a6f00b707f307cdaadc63f73,2025-01-22T17:41:50.340000 CVE-2024-1422,0,0,c910d0586a998d32e26f3d43ad0e4a4057e510585a23426b26fef7d51c99eee6,2025-01-17T19:56:49.607000 CVE-2024-1423,0,0,cf9424b269ea30f1f1f93fb8aca6f7020e19a4ef0b7ad3a1dcf8f2e9317f1810,2024-02-27T15:15:07.460000 CVE-2024-1424,0,0,3a0dddd030d6706d7ea56e2d0d2580f7738e1c15b83c7969d9f91a85b7900a41,2024-11-21T08:50:33.260000 @@ -246273,7 +246273,7 @@ CVE-2024-1512,0,0,26a89e8ea4daeb69acb8ef0a5290d443e1fbb4f0997b4751a3c4b63986c140 CVE-2024-1514,0,0,065a08306127871145f34727c9c34814a36355420c30f0cb2ae4276b319437fa,2024-11-21T08:50:44.403000 CVE-2024-1515,0,0,a3add1da137a72880095a1615a74b53662a1751b21dec935a7c4b7d184dd4113,2024-02-16T18:15:07.820000 CVE-2024-1516,0,0,ae0dda1e388fbe9bb68c26e49d1e55447c78bca551e4128fdafd45f882514681,2024-11-21T08:50:44.537000 -CVE-2024-1519,0,1,ef8db52d6697b00e9b63b12b86b1ca9a8ef9f7b004809c241d596d1b84437d97,2025-01-22T16:38:11.330000 +CVE-2024-1519,0,0,ef8db52d6697b00e9b63b12b86b1ca9a8ef9f7b004809c241d596d1b84437d97,2025-01-22T16:38:11.330000 CVE-2024-1520,0,0,42b948a706335187322a4277626050fd427db0ba076fbc016021b2dffcc98301,2024-11-21T08:50:44.787000 CVE-2024-1521,0,0,85d803e7fe3d979f91dca5b591f48c2f70fe4bd0fc6f503898efba23c478b51a,2024-11-21T08:50:44.933000 CVE-2024-1522,0,0,9cdb2d31b60237752ef77325c4d109881b58042aa66e5c8934108a236d1a4daf,2024-11-21T08:50:45.060000 @@ -246321,7 +246321,7 @@ CVE-2024-1566,0,0,4ac720135761f12018d810740b03599e211c6d2088b3ec7481b0c1665640c9 CVE-2024-1567,0,0,6cdbaee71c1770d77caf03403af77d158a420504c05e33f36e632e6fe2f3ce20,2025-01-08T20:47:46.820000 CVE-2024-1568,0,0,4660f06f13504a73ee731b062d7289c45d2cdd5ee8fbad08955ed262bed14189,2025-01-16T15:34:31.447000 CVE-2024-1569,0,0,cc3fd6764ddebd625443ddcd2f6dd2aba14c01115654ddd2b36f709166cad3a4,2024-11-21T08:50:51.360000 -CVE-2024-1570,0,1,25898391ded7988cd2da012ae2a7ccaf83daa0ac2ffc39f3073e6c6025585cb6,2025-01-22T16:31:46.067000 +CVE-2024-1570,0,0,25898391ded7988cd2da012ae2a7ccaf83daa0ac2ffc39f3073e6c6025585cb6,2025-01-22T16:31:46.067000 CVE-2024-1571,0,0,59f01ab78b4f7b0f9ac0a699e09826fef03bb32078a1a72f10d58201a8f77caf,2024-11-21T08:50:51.597000 CVE-2024-1572,0,0,a83548f030b810663477d0b6737646927187cff3fac85148113c7069e7392583,2024-11-21T08:50:51.713000 CVE-2024-1573,0,0,55326b48e714bd45f8a7f03a13179fac399e55741cedcbe359268a4ab07b26b6,2024-11-21T08:50:51.837000 @@ -246698,7 +246698,7 @@ CVE-2024-1970,0,0,1e68c292fef725944fbb9e7172936f1df0740cc26f68e5a4d50f99195a9662 CVE-2024-1971,0,0,4b24a31643e2e814171ed8081cde83b5f7a9321b19bbb1a976723bca6278ad5b,2024-12-17T22:08:13.060000 CVE-2024-1972,0,0,0cc508917c2a729c9424480608443d75bc2e0685066a841069988bd5d702f994,2024-12-10T19:53:51.173000 CVE-2024-1973,0,0,bdcc19c6cd3463ae97ce819fbb0ae7d75ae93c2f8b01f9a3134154723cf24538,2024-11-21T08:51:42.740000 -CVE-2024-1974,0,0,ddf10b2e07b26483d69810a06ba5463d244f8930001a2db1397a922f561c064f,2024-11-21T08:51:42.867000 +CVE-2024-1974,0,1,eaa50a4b08004c31860f05e044d5035945cf42def5f73984f24e27883e4f1dd6,2025-01-22T17:28:42.213000 CVE-2024-1975,0,0,1ae0a6f555a0b739aa7c380171466dc1803a13ce978f8add5306445e96cc4399,2024-11-21T08:51:43 CVE-2024-1976,0,0,a3555dbbbe1be129a03f073ac3b859df5d9dc7ad39e5f16531bc3f78a64440d9,2024-11-21T08:51:43.140000 CVE-2024-1977,0,0,b866919a45ab83f05a121c6cfdedc8a9e6189ad67b4d630b7e1d7f06da0f1de5,2025-01-16T17:49:32.567000 @@ -247641,7 +247641,7 @@ CVE-2024-21066,0,0,5254867ca361c1df6197368693a80ccca6b7c988d9f5863427754676a4593 CVE-2024-21067,0,0,7e2edd873612105fa331df870f2f4f4ada069d86fe84a937d7710550c7267de2,2024-11-21T08:53:43.450000 CVE-2024-21068,0,0,22cb123e2b550308d0173e521466dd982631e5a97ed4a6d7bc6a3b636818cf7d,2024-12-06T19:22:57.927000 CVE-2024-21069,0,0,c9f01955133ee2d7d88ba224021b6a44140d5daf435c1f4f00ecf007d265c6fa,2024-12-06T19:04:31.867000 -CVE-2024-2107,0,0,dfe574120b4a46c67696f59bcdf68aa0e508d18a7345fecf6dd3726f78076db4,2024-11-21T09:09:02.850000 +CVE-2024-2107,0,1,f6b06b3b7d2a7fd14939cc7b98294c66c6c74558e1f24a1569c0e585aca9e3c5,2025-01-22T17:37:31.183000 CVE-2024-21070,0,0,8c69e86f327387e344a4a157732398076b6e10c698da182731e3238f871e4c5d,2024-12-06T17:08:50.733000 CVE-2024-21071,0,0,ad9de5bdbf88b7ca7e98e8441723f697f87793b07a2985337f90fcea37bcfe55,2024-12-06T21:18:54.143000 CVE-2024-21072,0,0,3ac71ebde404278590ff522ceda3046ad4c8241198899f7a8f9724077bcc2ed1,2024-12-06T21:13:10.447000 @@ -249393,13 +249393,13 @@ CVE-2024-23302,0,0,5043f715c2fa63c722dc3efa75b00dbd5486ddd9a33d197f8822311b66d88 CVE-2024-23304,0,0,92c39ed25142e10292f4cf492619ffe50eef087dc223559e6d3336ffb6a74a4d,2024-11-21T08:57:27.987000 CVE-2024-23305,0,0,811995e8f7860a145af8387b87d1909378208dac4b439457eba7739a6c205287,2025-01-21T18:34:33.877000 CVE-2024-23306,0,0,edde950ea5922ba255a0d83d63eb4aad08f941b8aae52599bd480c8fbb7eb7d0,2024-11-21T08:57:28.243000 -CVE-2024-23307,0,0,a9556517f89dd7026defc5e7a83735290a7a0d5574a0ffa43eae73ba7c04aa00,2024-11-21T08:57:28.370000 +CVE-2024-23307,0,1,dc44e5463afa43f85a72ab52ee9a53fa93d658e5285d4bb1fd5b154f58a67bb1,2025-01-22T18:03:52.313000 CVE-2024-23308,0,0,2451e6da930bbab951e0370d09bf853ad2eafd61488a022c59e14c670726c985,2024-12-12T19:10:12.500000 CVE-2024-23309,0,0,9871251e43bcd47915fc0e89139d02bfc787229cb784c5b0133b33f1742cb37f,2024-11-21T08:57:28.620000 CVE-2024-2331,0,0,725ba9bc922e0647096bf95f81d8267c1757632a1de6135c4813ddf1b07ca317,2024-11-21T09:09:31.250000 -CVE-2024-23310,0,1,451aa86a63ae136a8d0e148ff74cfa1dbe778cec053bdd91ed8edd81fc8225ea,2025-01-22T16:18:16.783000 +CVE-2024-23310,0,0,451aa86a63ae136a8d0e148ff74cfa1dbe778cec053bdd91ed8edd81fc8225ea,2025-01-22T16:18:16.783000 CVE-2024-23312,0,0,c66457950e92c000c52798147d176b50f5cb337e36e1eeeef424a02e12bbfb36,2024-11-15T14:00:09.720000 -CVE-2024-23313,0,1,521ca534e335670c7ec3a91e711faddd21409921c71ecbd07d230843832b3507,2025-01-22T15:30:48.677000 +CVE-2024-23313,0,0,521ca534e335670c7ec3a91e711faddd21409921c71ecbd07d230843832b3507,2025-01-22T15:30:48.677000 CVE-2024-23314,0,0,42bb7e0a54a79cfda8be0f14ce8581a9d6ac611ce699060b9ef1b60b052c5f08,2024-11-21T08:57:29.147000 CVE-2024-23315,0,0,7d1dc70c2077c35cd6479c6b1655e6667530eb2dca011d25832e4c199f02224f,2024-11-21T08:57:29.267000 CVE-2024-23316,0,0,f991e4d2bfc533226809c990c7070963c80c9a8181a0ab46cecdef9ea8914294,2024-11-21T08:57:29.393000 @@ -249992,7 +249992,7 @@ CVE-2024-23946,0,0,9c898cf09e521a2a31019dd3080db79ce9c32f7697e5321cb7301cafff4dd CVE-2024-23947,0,0,f911293c6af8cf8e2a4c71b3a16ce5c03d9ac810bd789b6ce8a33c36c29ca1c5,2024-11-21T08:58:44.480000 CVE-2024-23948,0,0,d6d4011f0c2b673928e54c2b884e178d06b968843ed951ce2e90e73776691214,2024-11-21T08:58:44.607000 CVE-2024-23949,0,0,da62630c8fa87849f3b8e313b2b05021cd7919bca6993eb5f7ba2a2cc72248d1,2024-11-21T08:58:44.733000 -CVE-2024-2395,0,0,f66dcdda2ce49cb674a9451421d75e2dcebccfa4caa6dade8e0260a999b230b5,2024-11-21T09:09:39.687000 +CVE-2024-2395,0,1,af5ee44ed4e5a55dc7cee72e73dd87c7eca19f4fdfa76a380a7f63de620cfa5f,2025-01-22T17:38:35.133000 CVE-2024-23950,0,0,fc22aca121744540088f0a682a9a12e51b13e88920d5f4c103703a8401d15b2a,2024-11-21T08:58:44.840000 CVE-2024-23951,0,0,90949de6749d1342df813fafd173be208f7c748b51ad2522c41738d2f7a7174f,2024-11-21T08:58:44.960000 CVE-2024-23952,0,0,d956573f944b52b54178c073558282ca45131f0d187b6cc2538746038d148592,2024-11-21T08:58:45.077000 @@ -250053,7 +250053,7 @@ CVE-2024-2405,0,0,960ea883c9f1b1211a05bedc3cb2dbec1a47e697fbdc35497132d4ee90c4f2 CVE-2024-24050,0,0,df324bebea47854fd5bf49149fd24bb3d23d85a2ab4e77ffbeb5039ce83eec65,2024-11-21T08:58:52.560000 CVE-2024-24051,0,0,577b0feff0fd7f408d75fabaee913163e83ceec716679058d7f2e7811bf1d897,2024-11-21T08:58:52.783000 CVE-2024-24059,0,0,992f0ee13ac120c754aac0b1433b58212b741c898be6c2c1e97347d8e56fa919,2024-11-21T08:58:52.963000 -CVE-2024-2406,0,0,e6dfb85cc8ab9d9d72f5a0e1beee647a9bfcba5e6f077450b8f3b7ad4414fe08,2024-11-21T09:09:41.330000 +CVE-2024-2406,0,1,c9b679e86de726ed280bae6f96533f4aea7f8098b4506ff442be791301afa220,2025-01-22T17:49:09.127000 CVE-2024-24060,0,0,76420c08875743804b95d33c1b8e327e25e9a56c748b2569fe6e9e74860b3f4b,2024-11-21T08:58:53.127000 CVE-2024-24061,0,0,b44f4520c297437d45fb26f88d26245a5b6e5157f6d3a6fede608839ca3e86f0,2024-11-21T08:58:53.283000 CVE-2024-24062,0,0,d3cdf223be8020055c4207e039bf97e140dcf6cc437e7b4ae7acaaca5d0681eb,2024-11-21T08:58:53.443000 @@ -250069,7 +250069,7 @@ CVE-2024-24098,0,0,8e13363e4e09e1493a5d55427f95804d39c8799860c1a5cf7a571b32d79dd CVE-2024-24099,0,0,4b668ecaad05d276a2b0054855eb68c0aef970c2685ad8df476e53deb1482b76,2024-11-21T08:58:55.073000 CVE-2024-2410,0,0,3be5ca8a66a5bd9557281be3e70bc0a40d70cbb2d20f1abc90621dbc68baf023,2024-11-21T09:09:41.717000 CVE-2024-24100,0,0,05dc63327c0c57ce6ab042ce950205521d3695836e7001d3858a8b7fbb0a65c4,2024-11-21T08:58:55.273000 -CVE-2024-24101,0,0,713c31b6ca71d1e446283ee4fa6486dd54d1d15de4993f1b456126c208a6f2d1,2024-11-21T08:58:55.397000 +CVE-2024-24101,0,1,563312b74900c09422642fc4bafe8c2840bea986472e646f74632b6726180976,2025-01-22T17:36:07.860000 CVE-2024-24105,0,0,255c139eabd3d6721f6c2c8b3ad56b8ba1f8f667587ce82d0155af0ac2d90fa5,2024-11-21T08:58:55.537000 CVE-2024-2411,0,0,c10cd1d76af0d2128fe1664c0a5b334d61c58b2c6f82ae734cd0e50f8085a213,2024-11-21T09:09:41.837000 CVE-2024-24110,0,0,24e3bfd7edfbdc9c648c149e52de113518ac1893351463aa09c13045ca7b364b,2024-11-21T08:58:55.667000 @@ -250223,11 +250223,11 @@ CVE-2024-24425,0,0,f020647313a266e9b26d920d7b3ff0c5a70298ceb4b38f72086ac27d496b3 CVE-2024-24426,0,0,1ba202c66d22ec01d9165c4229044ba2d8de45fa575e097063ba053bd7d0b3a7,2024-12-03T17:15:09.400000 CVE-2024-24427,0,0,2019b77465bfd95e39f1460e0b6b34de1fd7f7de7c71851c707c200c7bcefb73,2025-01-21T23:15:12.640000 CVE-2024-24428,0,0,56ac6724305fe409e3e4c3d95c26987e02b61fc626ad26902adf33f2c52010a7,2025-01-21T23:15:12.767000 -CVE-2024-24429,1,1,4ab29af21421fe9731a30a80f100729ff3757ff97b28d5817033562018b538d4,2025-01-22T16:15:28.907000 +CVE-2024-24429,0,0,4ab29af21421fe9731a30a80f100729ff3757ff97b28d5817033562018b538d4,2025-01-22T16:15:28.907000 CVE-2024-2443,0,0,1bdda57280ff24c7755bfc385c8c5e030e460e899c6d0c2078c3b0acbbc8fb06,2024-11-21T09:09:45.827000 -CVE-2024-24430,1,1,46b66d232b9249c729f8cafc71a3d1e619dc092962ad7a81b422b7d65ab3b805,2025-01-22T15:15:12.680000 +CVE-2024-24430,0,0,46b66d232b9249c729f8cafc71a3d1e619dc092962ad7a81b422b7d65ab3b805,2025-01-22T15:15:12.680000 CVE-2024-24431,0,0,df56f81b7c3a1e35add47673987ba3302b83c2d47d8419bd59e79e036d2e2abd,2024-12-03T16:15:21.187000 -CVE-2024-24432,1,1,8f5779f5919d73329002c1b84a29f1fc16c658faaf52302aadd0e87a855a1c40,2025-01-22T15:15:12.793000 +CVE-2024-24432,0,0,8f5779f5919d73329002c1b84a29f1fc16c658faaf52302aadd0e87a855a1c40,2025-01-22T15:15:12.793000 CVE-2024-2444,0,0,d9ff5dc2f1cec3e82221567fd131c75cf5704e6ca903fd99eda244483e9cdd6e,2024-11-21T09:09:45.953000 CVE-2024-24442,0,0,dab1d192224455c9dbc2bb672a2b1d0803f5127b7d95d237ff5a5b7907e7708e,2025-01-21T22:15:11.610000 CVE-2024-24443,0,0,9e2edcea8b8b5767acc38926824c13bf6abb747a0f51a97e2a5a56f1a3d118a3,2025-01-21T23:15:12.897000 @@ -251027,7 +251027,7 @@ CVE-2024-25596,0,0,6186618554109e3d2a029dee7ff783ca6bb5457223dc35a27b1e9213b1e2e CVE-2024-25597,0,0,d6753bcf92b2b2cb17d0603d676eb65cb5ad229f296f95c507cc7b74d6441098,2024-11-21T09:01:02.913000 CVE-2024-25598,0,0,d1a1805c77bf344303a6352c38a2d681b3301f1209882142cd84bf98bb95feda,2024-11-21T09:01:03.040000 CVE-2024-25599,0,0,1e405853502d37a32519454e3bbc96a90c793cbcb44778a175a4f144b956282a,2024-11-21T09:01:03.180000 -CVE-2024-2560,0,0,5d006437181537550ba5f010993e8db34562f6948f1e46f92d03dce5a82ba1d0,2024-11-21T09:10:00.743000 +CVE-2024-2560,0,1,43271ba3d968c1299b607dfd85a0caad1fabd1eefbce835e71c67cfc67678a7f,2025-01-22T17:51:20.490000 CVE-2024-25600,0,0,28903babf8e9ad9ce0e5926e98fade9a295a4e34c50bc53f7183dac7a35971aa,2024-11-21T09:01:03.307000 CVE-2024-25601,0,0,592b72e8287af6c7a3150c0f52361c80173956d1cbaa844c63524e684c186930,2024-11-21T09:01:03.450000 CVE-2024-25602,0,0,43c5fd7be09141d81d52c491e8514b96cba0daa24c348da2dd7a06a5b7ef9400,2024-11-21T09:01:03.573000 @@ -251176,7 +251176,7 @@ CVE-2024-25801,0,0,e2993589549c6dae3f3d9a84b0ee9483a3497268380a0a4bf15de29aa11f1 CVE-2024-25802,0,0,b6de64ac789d5540ee131e18d0f578c1c5415194cb6568c3398edb4e4eeb5252,2024-11-21T09:01:21.880000 CVE-2024-25807,0,0,878f62a4098025b1352876641763ce23a3a9fc00f16f84d372a72055d263d901,2024-11-21T09:01:22.093000 CVE-2024-25808,0,0,e7107e502af714fde13b5314ac17bedd5501104f8976aca532b23b042cd471f6,2024-11-21T09:01:22.323000 -CVE-2024-2581,0,0,a49699e7f376291f857d65c58c39c909e2c432c1ead0baa58aa1d6fe635c5deb,2024-11-21T09:10:03.610000 +CVE-2024-2581,0,1,524e7162ba8902ffd159f0321288102d68de4ec5f9b57785f939855fe6891543,2025-01-22T17:50:55.987000 CVE-2024-25811,0,0,5bc7e32c6557d5f422fcc385a2dd3185eccb3c42436a0ef942c3353dead89142,2024-11-21T09:01:22.550000 CVE-2024-25817,0,0,24fb9fa88c35098258f5c3f08547ebdab9fa05429aca7f1384875ff62d1c8191,2025-01-15T16:49:06.050000 CVE-2024-25825,0,0,0ffb769a5b15104308a542a8126cf407f088d0f85637998c3ea573ab17a15826,2024-10-11T21:36:24.583000 @@ -252508,7 +252508,7 @@ CVE-2024-27301,0,0,0dc0e7fcca77305d1b07d51dc5d6e87edec76f4b67ea0b4c91144191fc73c CVE-2024-27302,0,0,1126d35a4a36c0394d9e8298833cf3f9ca789e1f50e656755905c9a44280507f,2024-11-21T09:04:16.990000 CVE-2024-27303,0,0,446eb07103109107a6b5cb1a7ac6ddf2d6869e3efe4680886a25ae0d19a80f11,2024-11-21T09:04:17.120000 CVE-2024-27304,0,0,6d9daedacc8a33e2d7baab9bf30efd010b154dcb9215fa336d95f0244e4ac2d9,2024-12-12T21:15:07.677000 -CVE-2024-27305,0,1,e12f3c61dd0cffc99acfa36652f57b0b6eeecc0c2f6472e94e57f7ef61b87913,2025-01-22T15:02:31.500000 +CVE-2024-27305,0,0,e12f3c61dd0cffc99acfa36652f57b0b6eeecc0c2f6472e94e57f7ef61b87913,2025-01-22T15:02:31.500000 CVE-2024-27306,0,0,7a28ab142666bcaf42530dd089da65a8aca11e816370cd89a9870260ca5d05b6,2024-11-21T09:04:17.527000 CVE-2024-27307,0,0,cf618de8ec42069f47b1c5022714176e378177129a4fe94cef62bc4f79ac235a,2024-11-21T09:04:17.667000 CVE-2024-27308,0,0,37f214bdd3eae19c6ca746aa11f3f3b092a842a3922749c87981b4f4a93b4ee5,2024-11-21T09:04:17.800000 @@ -253253,7 +253253,7 @@ CVE-2024-28232,0,0,4016560842e5dbe0556f8c825e8c7f66803aa1fc46a7caeb391820502d6b2 CVE-2024-28233,0,0,9dfb6a281036a246e6a8c7797767e8821a8200df2339f7f383cd7903646892b5,2024-11-21T09:06:03.527000 CVE-2024-28234,0,0,598260d530e844b988103ffca1d1f3c6f915fb6f021808bfe5979b115274823f,2025-01-02T17:49:55.720000 CVE-2024-28235,0,0,f9c80821f34b650e72ffd4fc2fa6535c9df1dafab141b6f3941dee35e5200ab7,2025-01-17T15:42:02.050000 -CVE-2024-28236,0,1,294f4bea5192de8890d34a2469441173f7ea2e4a4a8d788a4e4b9d638a85213a,2025-01-22T15:05:22.287000 +CVE-2024-28236,0,0,294f4bea5192de8890d34a2469441173f7ea2e4a4a8d788a4e4b9d638a85213a,2025-01-22T15:05:22.287000 CVE-2024-28237,0,0,6596ca9e95c7bbdbdf1ce7fad38ad1f3d78868edb778ee33c83d80a6c532886b,2025-01-08T16:22:58.707000 CVE-2024-28238,0,0,54e673a11dc58ef2f1ce67b17902858e9a639439ca947a54911f01e497b4cc07,2025-01-03T16:14:55.823000 CVE-2024-28239,0,0,cad2389eb8ad3f3fc89b4de0deaf45f55e8417efae42f10b632472f86525ee21,2025-01-03T16:17:32.100000 @@ -253618,7 +253618,7 @@ CVE-2024-28906,0,0,2d31615044f057a4577ab855bd3b743067a2cccf8fb6a4a0761ba8b0e41a1 CVE-2024-28907,0,0,0a0e9df28d068123203d200496d461a9f5a85cf195778c93d73b68574a7b0ece,2024-12-05T18:28:21.740000 CVE-2024-28908,0,0,e189c552850b13ca5d7cf421de7fdb33bf42d073e18ceb4a8a422b1f433b922d,2025-01-07T20:22:56.653000 CVE-2024-28909,0,0,2869f3da223760286387aba0b464ef4c8875977e0881d377c9525fc6f7881df0,2025-01-07T20:20:43.007000 -CVE-2024-2891,0,0,bd3f749e6c21a7f6d547ee1f933bc22268be0a4654afc275e43c1a6f1e6e2a4f,2024-11-21T09:10:46.173000 +CVE-2024-2891,0,1,f49d65ff7414995cd7f7b974e5d94fb6bc73f690021803552aefc10e4036c124,2025-01-22T17:51:29.227000 CVE-2024-28910,0,0,e3b369e4a8d472d72e9a19b12774a71460fc4bab55bc84a0c4568ee848a06deb,2025-01-07T20:17:51.460000 CVE-2024-28911,0,0,5df5116a7758f00ac661fba3cb2509ac1329af2e07838f553897093eddccdcad,2025-01-07T20:11:27.670000 CVE-2024-28912,0,0,652f6f09ef9e3cb510a1123a480abcb8fb57058b882893d580010967efb9e099,2025-01-07T20:08:15.217000 @@ -253628,7 +253628,7 @@ CVE-2024-28915,0,0,4d9efd3b5de3b2e9930bbec9717f9230f7b3a49711c9d523bcf861dacb977 CVE-2024-28916,0,0,e34cd9ef2748a7cccd5995352677bfa0b35bbb61565917369bb676539d215256,2025-01-08T18:35:14.683000 CVE-2024-28917,0,0,89bc645416800446819a0650a2fb393ffa2225d66115e5b665d823e1631a9607,2025-01-07T19:29:24.970000 CVE-2024-28919,0,0,1c6282b7290ea6d12f58497301cfb1bf431a4c9d6bfe90ac3ecda81daa1fc9b4,2025-01-08T16:10:55.147000 -CVE-2024-2892,0,0,92873276fd2f6e3e9a8171d454a0c01749460d399f5bb48c6c11f14ef5bd6b4c,2024-11-21T09:10:46.323000 +CVE-2024-2892,0,1,cbd83563fe2308dadda8111a7c69899bf660369762934ef0ebd35fc5bd1a9251,2025-01-22T17:58:23.927000 CVE-2024-28920,0,0,b1f59a0172c6d2ab413458de6a58ff8bb5ad0546c83587f17da4930f09c4e726,2025-01-08T16:11:26.560000 CVE-2024-28921,0,0,8e0c5de7255ffbaf24ec273d5f031faae03acb44b8a2c66037dc33a5236abed7,2025-01-08T16:11:39.433000 CVE-2024-28922,0,0,69fdcf8fc01da16e5d877ef26236de0eef66dfedc059000948bd219bf8b8531b,2025-01-08T16:11:54.427000 @@ -253639,7 +253639,7 @@ CVE-2024-28926,0,0,c5f375be6d2d488bea53ec1e93300777cdfbddeb5ddc37526b3c2ac3b4aa9 CVE-2024-28927,0,0,695e9c189aff014fc53371c2cc03e1340199354cfc08d7dc2774750486df412c,2025-01-15T18:45:39.533000 CVE-2024-28928,0,0,c27b696b54b60804049f3d90e44cea72634bdc70647e90d01df999543c8b82a6,2025-01-15T22:32:19.930000 CVE-2024-28929,0,0,046264c571aafda225d7365c3059ab68bd25c30dca254045cc4347ca9da9e90f,2025-01-14T20:47:41.253000 -CVE-2024-2893,0,0,da0d4c1f772373e5095e93c42c7b64faab0a08d64fbcd20ca086de248f77f2a9,2024-11-21T09:10:46.457000 +CVE-2024-2893,0,1,775fbd6f01d70be226a79075a038715eb70e2624a0802de710239f6c1552d5ee,2025-01-22T17:58:17.153000 CVE-2024-28930,0,0,61f753279169a9d3d53d3ab92a960da8c3002d265e18e3e04a743a7e521200cb,2025-01-14T20:48:06.263000 CVE-2024-28931,0,0,612cffb3be59ea3e82b7e58fbf7aa17ec7918f4b9682159ff2fa8d555d876ff1,2025-01-14T20:52:05.480000 CVE-2024-28932,0,0,8c877a376da85f927fa18714f62d4005c85e7a2c413c669a0f71039ddfefb9c4,2025-01-14T20:48:30.367000 @@ -253650,7 +253650,7 @@ CVE-2024-28936,0,0,4264c80a5f3a08d5f205f651ba6b20f9bdacfc5ecc900ceccddb8f2af2de3 CVE-2024-28937,0,0,f7c193f0a4b300cb22ce8d1015fa240677db7dffadf67f0783951778c1c26673,2025-01-14T20:50:38.043000 CVE-2024-28938,0,0,4c3ed97a2df40cd15aafe170d8f206c668154d1c86cc5aea8e7d1547ef3219c2,2025-01-14T20:51:01.370000 CVE-2024-28939,0,0,38ebf183fe37377b8fd2ccb268afcf629c3fc3a5e43928b9e008d675f0d5fedd,2025-01-15T19:06:06.007000 -CVE-2024-2894,0,0,54fd15927475e7f93099e91936175dbd1bef40db66449490c1d7c67160d97aa8,2024-11-21T09:10:46.603000 +CVE-2024-2894,0,1,f49379d10213ac298d9d9814a5e96257b11b1130aef21c36eca0ce03b69f1752,2025-01-22T17:57:21.890000 CVE-2024-28940,0,0,b4e91055e512829ef86de877890d0613f8bb207a143a8a2a9701b281837d479a,2025-01-15T19:06:25.340000 CVE-2024-28941,0,0,c146dba5cc5132ed8f71f242b70ea18220d6242e2e3181c7792809978cb5aa59,2025-01-14T20:51:28.040000 CVE-2024-28942,0,0,45e12863cfd2906d7e9b154de89b6a52a9867356e5cbdae1fbce2828713bad02,2025-01-15T19:06:35.190000 @@ -253660,14 +253660,14 @@ CVE-2024-28945,0,0,fd0f929d94e9a072a54ac6220b0a882ea43cf1101ced55267196733ea906c CVE-2024-28947,0,0,f423c6da395b9fab8d455cff865afb02d4eaef269f598c96201d2b407abccf3e,2024-09-12T18:52:38.433000 CVE-2024-28948,0,0,1666ae581c80c38aac0ccf842fe7ca7d976d37f538b8ec7b216cab7a6078bfb5,2024-10-04T18:58:14.400000 CVE-2024-28949,0,0,1f3684a855e01293d9c0333b231907267ad216e334a79f7ff99fcfcf991a1b22,2024-12-12T21:38:08.237000 -CVE-2024-2895,0,0,8fa57bfbf55405e8b59474276ac13e2c45fe5cc933b052bd2f421c6a0cd377db,2024-11-21T09:10:46.743000 +CVE-2024-2895,0,1,4bca94af9c633d3a7edc0e2eccaef4b77d246f77b868137a5fc657e7e56cfaac,2025-01-22T17:53:34.827000 CVE-2024-28950,0,0,1a05508e6285963097a3b72b652266b51c45af88f660c467f1463d180a5b37f5,2024-11-15T14:00:09.720000 CVE-2024-28951,0,0,09416b672634bd3150f06f0e71a1c5a6f0ce65faa90f7a522075aea097dec4ac,2024-11-21T09:07:15.640000 CVE-2024-28952,0,0,a3c4c6996f99d6d10f644fb690635fed6d4bd8920a537bc08e5b50bd933cd304,2024-11-15T14:00:09.720000 CVE-2024-28953,0,0,c901751ea2f147779352c1e947dd13228802aa9d79715e869d0c3f0d67f4b2c7,2024-08-14T17:49:14.177000 CVE-2024-28955,0,0,d25f942d0189970997c9beaa87ecae40becc3e717d61eb7169e70ed01f911452,2024-11-26T08:15:05.043000 CVE-2024-28957,0,0,4149b5010d0b1c2568f2f4f291564713cd37dee8d620ca60dda3ebe3092552df,2024-11-21T09:07:16.013000 -CVE-2024-2896,0,0,14c42c63ee3f528f0219ab7aa8059bf97c5438489c68a4a7829405d64f22f256,2024-11-21T09:10:46.883000 +CVE-2024-2896,0,1,89f8d0b7afd8cee22c5446e1104fb112d58a6865bcf798f3d90494b32b968aed,2025-01-22T17:53:24.233000 CVE-2024-28960,0,0,07be4df1b4177567bcc011207a77201ed2e71e2ecf6eaf000238ed73bba54553,2024-11-21T09:07:16.223000 CVE-2024-28961,0,0,72ef1aac80f9e5ee01b55b825560f9e29b42a73d432d42432b59b38533093f5d,2024-11-21T09:07:16.467000 CVE-2024-28962,0,0,1722d1439be0e57d00fac6f93bc2a029df89951b0809396a3013f82491cdd038,2024-08-19T17:12:57.750000 @@ -253678,7 +253678,7 @@ CVE-2024-28966,0,0,066af8407887272bce3b5de87d8ae4299d575b7614379b3ebba1050d470af CVE-2024-28967,0,0,2d5d2eae0b61a88c479fdaffdfb4a01de4bb9a33be5b7acb7c671741cefb783d,2024-11-21T09:07:17.290000 CVE-2024-28968,0,0,30f0a5615ec1f86d46723a888e87f3cc1d2f5fb43a379b06e125991c23e00070,2024-11-21T09:07:17.450000 CVE-2024-28969,0,0,ed2e7d307eae482486e0f8ca0f0bec91773f9a523ac1edf23b80faee6c1caf7f,2024-11-21T09:07:17.613000 -CVE-2024-2897,0,0,864ec8506cba1fbd197b3ff2b26693fae6fd4975d2af8fad04aae953ee6343e4,2024-11-21T09:10:47.040000 +CVE-2024-2897,0,1,3be50c7fb1beb72b37f347e1c0851ffd4301791d62380b3584870314fe24d1fa,2025-01-22T17:53:14.800000 CVE-2024-28970,0,0,40de7b82743a11a5ad6d4091afb1ee76e91a11478a88b6485d9e52873333afdf,2024-11-21T09:07:17.760000 CVE-2024-28971,0,0,60c1b7cea147deb90a66336e84867f097cd9c3f3d33da0bd555b1b0b9c115e15,2024-11-21T09:07:17.927000 CVE-2024-28972,0,0,12c7e7efe1195c680c17aa2603704c5c29d6e9fd7636c8c8b733f1d9d5598f42,2024-08-23T16:59:11.070000 @@ -253688,7 +253688,7 @@ CVE-2024-28976,0,0,caa8bfea0914d137c2be9fb5457606e9907ed9fa635d4e2043de70a7a5286 CVE-2024-28977,0,0,08e5aa631d446df2875f7b417e5760d9e5fd3f4ccc9e4a23eb70ca460e37cb69,2025-01-21T18:47:57.500000 CVE-2024-28978,0,0,da799c0a16393f900a300a366c8e866774ce711453c2c4b1160779dba68ae01b,2024-11-21T09:07:18.667000 CVE-2024-28979,0,0,99a7aab3884e5ebe09de299942c15bf9528d835168880a8bb57f8c808495f0e1,2024-11-21T09:07:18.823000 -CVE-2024-2898,0,0,1e7971e90d44ed7db0f72653ff1b70766173836d462ed401dc3a5f3c5b92adfe,2024-11-21T09:10:47.180000 +CVE-2024-2898,0,1,4e3255cbb3d949cb224ace5d36c85a1998408ab17d3e02741e60cfdc4b4e67c0,2025-01-22T17:52:16.723000 CVE-2024-28980,0,0,6dd21a20c6c7ec39652a020c019163d4e095ed0f8bb0af407011aafd97fe6635,2024-12-13T15:15:26.953000 CVE-2024-28981,0,0,692b15f24059cba73d7928530e872749524473b415389822d7c1810b6de68905,2024-09-12T12:35:54.013000 CVE-2024-28982,0,0,293d85a1eda8daf3f0e9e42b82681e8e9ccfbfdcf941f77ed8a2fd39fc8cc421,2024-11-21T09:07:19.063000 @@ -253696,7 +253696,7 @@ CVE-2024-28983,0,0,853eb2b12a9ad3bf106c30e0e1489518e0cbe87352e67323535e3cf905652 CVE-2024-28984,0,0,e221ea1e0ed5d84a917cf65a0a3924161f9f1b60c50e39e56b41be334f33064d,2024-11-21T09:07:19.380000 CVE-2024-28986,0,0,04047c53e92796f6c88df692b7a4dee29fbd1f79089034259bae8c2d933c1c88,2024-08-16T15:04:28.150000 CVE-2024-28987,0,0,eb1d6e8c195369e8160428cb16da1b0c3f28c82362eb42d58d03aebe865d58d1,2024-11-29T16:34:47.650000 -CVE-2024-2899,0,0,a67fee834d3a87ebb8f6c6ee8fa2ff24bf761302839456c3a5a0607b6ba528a2,2024-11-21T09:10:47.327000 +CVE-2024-2899,0,1,7cc8b0c8010df9303c19753fd59ebd4f763921e3eca5004a65c9ef3e83d4668f,2025-01-22T17:52:49.950000 CVE-2024-28990,0,0,cee78bb41c487ff5287bc312509ab2a1c6447da39e21d14ddee35c76b2524b3b,2024-09-16T18:05:28.957000 CVE-2024-28991,0,0,162d93769e8b87d4db4424fce1391a16d64fa7b50a85c14e446e72b5f1e1c43f,2024-09-16T18:06:20.037000 CVE-2024-28992,0,0,b140bc55fc6732ddb5ef57978bf3e0425b496a5e01b1ccf218e40bde197b87c9,2024-11-21T09:07:20.070000 @@ -253704,7 +253704,7 @@ CVE-2024-28993,0,0,67d676c59b2b64f7cf16de77d9ab2b66f2844145b2467910d0a492be96927 CVE-2024-28995,0,0,586946315238795a13c3f5bce631e421acdfee18bf0dfa89e4162af89f2dbf2a,2024-11-29T16:35:14.907000 CVE-2024-28996,0,0,0806bb8d40fe342d5e6e04c891592d793f0bfade4e371bb2d2e66a14bcbe06a0,2024-11-21T09:07:20.530000 CVE-2024-28999,0,0,e77bc8aadf745e15c481beb594110ef5ca9c38e6804be89ec42b866b0bf1bd6b,2024-11-21T09:07:20.680000 -CVE-2024-2900,0,0,918a5c815cd030307ef8006fc220981ecd1a809db5673bfca663e784039be483,2024-11-21T09:10:47.473000 +CVE-2024-2900,0,1,f7482bbb003820021817080c5dd6fe5d70271af2905e1dc9b5a5a89ef9e1e544,2025-01-22T17:51:57.717000 CVE-2024-29000,0,0,7a305cccd175671343b97767d7c882563f2afc3a0fbb62aa579187b27944ae15,2024-11-21T09:07:20.827000 CVE-2024-29001,0,0,33e499e26ccfffab77e2a9a0196071af4053eafb3c7b487e58f86d3831f9cb69,2024-11-21T09:07:20.983000 CVE-2024-29003,0,0,aa0448857305ef8166f64d09b6a0aecfc681d4d8ef2dd604c70ca9d26cf84df4,2024-11-21T09:07:21.100000 @@ -253713,7 +253713,7 @@ CVE-2024-29006,0,0,3abee45cbfaada31ae0786001965936ff6bb74d5feb252bef431fa2f6d2c4 CVE-2024-29007,0,0,9467d08502d3e36b2d3e90e284f19d567ff6430ff612d29071e043652d272704,2024-11-21T09:07:21.500000 CVE-2024-29008,0,0,ca0aecdf68c77dbd22be28cfa60b571dde82304762578b0f93292832da2ce951,2024-11-21T09:07:21.670000 CVE-2024-29009,0,0,d62ab061bcc3cb61c24bc6f5800368ca076909ddd0e49b565343116fd7600952,2024-11-21T09:07:21.850000 -CVE-2024-2901,0,0,42399ab95d0bfc31667e9d0d54250f1708549f72ebd26149b6753db3178369a0,2024-11-21T09:10:47.610000 +CVE-2024-2901,0,1,4a7aeac7c015447d111eabc56ba2b8138e6c83716ab3368b8919f39c2cca4f05,2025-01-22T17:51:47.007000 CVE-2024-29010,0,0,4dbbb313be40d0c135584395796085f49dfc5a38f9b20d53ef797f5c9a7732c3,2024-11-21T09:07:22.030000 CVE-2024-29011,0,0,c6021f6c242e39fc9aace540c8602442981098d2fe2c3f610f36278c6132416e,2024-11-21T09:07:22.173000 CVE-2024-29012,0,0,40c05b14afddb0cc661d36c69dbf118239f07d1b247ec5496c2f0ead6efef9ae,2024-11-21T09:07:22.317000 @@ -253722,7 +253722,7 @@ CVE-2024-29014,0,0,2bb4c7c55a453adc3bca5a57be7f0dc897cf7a6df37b2c7e2f7280b1bcb1a CVE-2024-29015,0,0,06c1b838b075a1a879d4d8d54604d2734c08c138ce56929733b0da42db823b8c,2024-09-12T18:53:33.647000 CVE-2024-29018,0,0,dd2b327b1b89a160d0dcc0d1fd9caced193b0522fafea0be7b407f44deca809c,2024-11-21T09:07:22.967000 CVE-2024-29019,0,0,026ec98dc834f6d523b465baf78adf168519514bfb3421c37e8d04ec7939a04a,2024-11-21T09:07:23.103000 -CVE-2024-2902,0,0,c6ee7fd8346a057b16b23b2bef0d5db5f1c249f0c7d3131956aea3dd14500aa6,2024-11-21T09:10:47.757000 +CVE-2024-2902,0,1,dcb25ee512c4ad0a0bc0d336e3e13cb918895edf9eb87939e448ec4ad3a3a97d,2025-01-22T17:51:36.857000 CVE-2024-29020,0,0,8f90e1cb77a1ceaa84ea4cf6d4be9c75bb14a140b161deca4c41951dcb67026b,2025-01-09T17:20:18.197000 CVE-2024-29021,0,0,9e8341fdbb48e58f80e64f4861525263812a0ee45b37f3a746ea08f58df39b3d,2024-11-21T09:07:23.363000 CVE-2024-29022,0,0,86f895eb5a53cafa1adfaf8cde76caee125e12a3ff10e40b6057327fa22e9146,2024-11-21T09:07:23.490000 @@ -253733,7 +253733,7 @@ CVE-2024-29026,0,0,de9ec356ac90fd02f902d916cd7e0bc293b4028e1231d8a4fe9b0d606b6ad CVE-2024-29027,0,0,cad2c3e3075aa793ecd13d5a6db3c7104155fc1583df44e70e041ebc7f10c285,2024-11-21T09:07:24.170000 CVE-2024-29028,0,0,9c4c6ceae51e15abd24bea2f10c8a8287e79fbe320fdae0f3644ccb394d11342,2024-11-21T09:07:24.313000 CVE-2024-29029,0,0,79a14ecda4dc6dc09574b170d06c65a72f1bb1b8f0316fc9902a134d522b067a,2025-01-02T20:46:24.867000 -CVE-2024-2903,0,0,8ed571512c9c5cbc7c1ab6d7dfd9be521fa1e9c30bc4ee67110a431ba198f916,2024-11-21T09:10:47.910000 +CVE-2024-2903,0,1,d07796c3c57db604adb0c44d66e16393d3a06f7e1e65a8292fadfe10520655f2,2025-01-22T17:48:48.723000 CVE-2024-29030,0,0,4839b6e2f6738537338b92d9d9c426892d773e51c9de6dd341d7931249443992,2024-11-21T09:07:24.583000 CVE-2024-29031,0,0,43885b264be637e71494b7988bfccd07c0c261c20bf20a201a9b30066be50cac,2024-11-21T09:07:24.720000 CVE-2024-29032,0,0,e4982184528b3910b9311a270985ad61418d068232bdcad658d089c012dde188,2024-11-21T09:07:24.850000 @@ -254288,7 +254288,7 @@ CVE-2024-29906,0,0,fc1e1d7bc1a280d50b9cbddd32252e5bdb3a644c28a879459cc87af91c93e CVE-2024-29907,0,0,6a6dcf1abf6285cfc2a5cb15e8dbf09a7ebfbf7c0b9c54766035c8a196da0082,2024-11-21T09:08:35.543000 CVE-2024-29908,0,0,2015ea0a79e2dfbfcfcc8c9f56219cb4aa05d88d8743a9e6a62e5bb7ea1c486a,2024-11-21T09:08:35.660000 CVE-2024-29909,0,0,fb9ae7b23fa5013e6341fa9c080778ffeab890f332e295ba676aa55a587bf1de,2024-11-21T09:08:35.787000 -CVE-2024-2991,0,0,9dc7d42e6ba1825bb49a2cc1dd121a48d401f9d4fa8ee810196a06baaf9e46e8,2024-11-21T09:11:00.327000 +CVE-2024-2991,0,1,f0d75c29e897c922f15c2f748d83b090b7fdb8711147be6c36e835f48c893bd7,2025-01-22T17:59:21.180000 CVE-2024-29910,0,0,c41d09944920a9d8d61c20066a9b3c470d9f0156387a3f57445729a2f0a08722,2024-11-21T09:08:35.910000 CVE-2024-29911,0,0,5ae28372f5af08c3e1887f676ae9a2bc6b1682d2f9adce9a9ce29199c6d86ad0,2024-11-21T09:08:36.040000 CVE-2024-29912,0,0,4295d9a37bfaa06115d9f12a98aef4d1b4334764122065277f0bd2af0a62ed4a,2024-11-21T09:08:36.173000 @@ -254299,7 +254299,7 @@ CVE-2024-29916,0,0,fed07f372a294d1dc418025e45647dee93bbfe0cfafb11ea87699b7604e5c CVE-2024-29917,0,0,26002c5dbce9d5777a47fe26cf8c981f233fd4f8a95f76aa44370c6e2de3a035,2024-11-21T09:08:36.923000 CVE-2024-29918,0,0,a57618c3fb51dbee6f018076fd6e632fdeec606ca829af7180033f4e9040c547,2024-11-21T09:08:37.053000 CVE-2024-29919,0,0,ac098cacaad21d239504a2c5ebecf9b813bc711e379f46354a8c421b03e7425c,2024-11-21T09:08:37.187000 -CVE-2024-2992,0,0,a64bdc9926cfddb7eea233d6d35587921525832cb81243003f5550a352d71836,2024-11-21T09:11:00.473000 +CVE-2024-2992,0,1,55bbd6115b2de17ac5872344f17f9eecdf8654fc7cbe39085e40803186207c8b,2025-01-22T17:59:00.077000 CVE-2024-29920,0,0,581a8a03ba9787c287fbcaaf180ab7a4e4a61be263962bb7b2b47bcd0dad3d9f,2024-11-21T09:08:37.313000 CVE-2024-29921,0,0,867bb45d677d0dc68c74a78c2826c6adab41a83b47b3c52810ab95377ef5a86f,2024-11-21T09:08:37.447000 CVE-2024-29922,0,0,72dae7d1c92fd306a11a646a4720aeaa6df484efff05a113be2d239141b3f2fa,2024-11-21T09:08:37.560000 @@ -255453,7 +255453,7 @@ CVE-2024-31302,0,0,10889b50b5e02a1dda63d5909c58d9d2085b18409aa01938b27db4ce86518 CVE-2024-31303,0,0,7918a9171463badbee4fea58db116784a87ffc5b3dca6068ae635f31bf37ec42,2024-11-21T09:13:14.070000 CVE-2024-31304,0,0,3aa73de7b8176e4d49d8b03c7557f82fd38b6cd852d6ee2190fb2a7d2d8022f6,2024-11-21T09:13:14.207000 CVE-2024-31305,0,0,2041b3c041c41020cbdbcf81dcf14136c1b07667e1cb70efa4fc5df4f2352447,2024-11-21T09:13:14.350000 -CVE-2024-31306,0,0,d225ff4e02585256db330196e23247f53caf206b29d320d872b89047c58064ae,2024-11-21T09:13:14.467000 +CVE-2024-31306,0,1,6640a1f5d3e61d5729b7ac83396c8252af4bb85df21a084877c89baf912ca98d,2025-01-22T17:43:48.133000 CVE-2024-31307,0,0,fe5c146bc2e01b31d10c8798aabeced41a593f46147cc701844fecf521def462,2024-11-21T09:13:14.583000 CVE-2024-31308,0,0,e26bc58410205067bb8d8db3d33abfda2da6af578804048a337db59e83ec9878,2024-11-21T09:13:14.700000 CVE-2024-31309,0,0,4d74e223b139d85cacb1e8588eca9fc311ad79bf20795c25cd105fa0c27c32c5,2024-11-21T09:13:14.817000 @@ -255847,7 +255847,7 @@ CVE-2024-31898,0,0,2bdf434c4d06bca201e71e4a7c99060368586d3dea800b988968adc32062e CVE-2024-31899,0,0,e3477cb6ba6850b36435640b21267340780a9020b61b2670506bdd2d9d1ba253,2025-01-07T20:02:40.877000 CVE-2024-3190,0,0,bad297e304fb4b0d6eafd0a234cf1fc72af8a9c2c234dc9ef80f9a08d6ffcbca,2024-11-21T09:29:06.810000 CVE-2024-31902,0,0,003a18851ece455ee1e6ea2a4455c0284b8742534b1304a5388aa31d40a16816,2024-11-21T09:14:06.483000 -CVE-2024-31903,1,1,a9ee045a5ba7b879b4c31f26753e26edef5ce97c6e396a00e63c54ed05546807,2025-01-22T16:15:29.030000 +CVE-2024-31903,0,0,a9ee045a5ba7b879b4c31f26753e26edef5ce97c6e396a00e63c54ed05546807,2025-01-22T16:15:29.030000 CVE-2024-31904,0,0,d2a04e1afb3ab14e7bd62c982b1ec9fbcf0becba36a47360842f1553f25b269c,2025-01-07T21:05:40.810000 CVE-2024-31905,0,0,4f1bdfcd5321f7b992df963e233e7a11fb0781b24167b44218cf69a784597a28,2024-08-28T22:08:30.560000 CVE-2024-31907,0,0,56360f441ba18f82366ed4eb471a5c96a8260a64fefc6012f99306629a9a97be,2025-01-08T17:06:40.250000 @@ -256867,7 +256867,7 @@ CVE-2024-33122,0,0,0868bb01e4bb9981dec89f062640d42956a3e024a237db623c97f8abe8d23 CVE-2024-33124,0,0,e8e7fc9b3f4c3c20a2f001aad74eca1df30a4dbfa8749113ee0a19aea169d675,2024-11-21T09:16:33.437000 CVE-2024-3313,0,0,6e8cdb5d7eae798bbd013f2c09830c63055cded6e685f9624b5c28fb30bc07d5,2024-11-21T09:29:22.393000 CVE-2024-33139,0,0,3c0cbfdd18d263d342e87e03c7da967e315bb5561cc9eea5bd4103f1b96e3fb6,2024-11-21T09:16:33.657000 -CVE-2024-3314,0,0,43684b92e6505cff72b6e66fd5f6d01ebfca7001ab8c6751ad8c67e01d813d64,2024-11-21T09:29:22.533000 +CVE-2024-3314,0,1,0c1456724008889523340e7a68639168655b50e2b04d682caa3f1568ecf630df,2025-01-22T17:47:45.063000 CVE-2024-33144,0,0,b3e7c4b483653f877a725bca7e0dba440fbc5178535e6bdd978539cce7b654ee,2024-11-21T09:16:33.870000 CVE-2024-33146,0,0,171629cc4b8cb62195d164515a6fed4d8999741d196bb0f46c6f160081fc78d1,2024-11-21T09:16:34.090000 CVE-2024-33147,0,0,c2cfd2d98b97ea5fdcb835818c9cad8c555afacce5b3b33cc198b2c0c2ba88be,2024-11-21T09:16:34.300000 @@ -257290,7 +257290,7 @@ CVE-2024-33809,0,0,5f800f5285ff2bfc0ecc751acd21c04b6bc87ec606c35f99e2cfc9f62ed3b CVE-2024-3381,0,0,54f1490359f84b37b9085d1c2a64f460d8cc1a4d213b5755f1dd6de7bae13285,2024-05-27T13:15:08.490000 CVE-2024-33818,0,0,8ed01d3814fe01ef937bdf9ed38c458a5713855afe9ef1068e8930fb56f7619a,2024-11-21T09:17:32.723000 CVE-2024-33819,0,0,7e61d4c0dd3553f64a2e5fef11b92143383472dd77b567ea2aea59f5055dae94,2024-11-21T09:17:32.847000 -CVE-2024-3382,0,1,2806fc89766558764c830c6154793a1d7167aad2ece415e69784f0d03afe9946,2025-01-22T15:44:24.527000 +CVE-2024-3382,0,0,2806fc89766558764c830c6154793a1d7167aad2ece415e69784f0d03afe9946,2025-01-22T15:44:24.527000 CVE-2024-33820,0,0,cfee89ad7ad37aa0a23734591a3b5cbc350282c1f511c40effb3edcabf5bfacf,2024-11-21T09:17:33.030000 CVE-2024-33829,0,0,29c77d19540accb450598443b67b5c2e3910197757a370c151dd370ee4356fa7,2024-11-21T09:17:33.210000 CVE-2024-3383,0,0,430b0d8561d28c308c86f02f1afeb4736d70095c27a3c26603f2024bafec2629,2024-11-21T09:29:30.393000 @@ -257643,7 +257643,7 @@ CVE-2024-34226,0,0,1d377f61cf795fbe00be67ffd9f00a82954a881e118fc5adc61c7c13a7e4c CVE-2024-3423,0,0,04c44e8c396e88e33e76b227756ab6e4a3cdb303568294582004d57706273469,2024-11-21T09:29:34.370000 CVE-2024-34230,0,0,ee5efe3516751b032076977625757928f003fe090164432914314acde3d27151,2024-11-21T09:18:20.700000 CVE-2024-34231,0,0,29220a31577fead32a56d0eaaed07b40b7e0f50ecbc13725dd1aa6abfb3d2ca2,2024-11-21T09:18:20.947000 -CVE-2024-34235,1,1,af0ad3586f59718b30b4386fbbf1fda4d3ffade8250cb8d07a7bc44099145fab,2025-01-22T15:15:12.900000 +CVE-2024-34235,0,0,af0ad3586f59718b30b4386fbbf1fda4d3ffade8250cb8d07a7bc44099145fab,2025-01-22T15:15:12.900000 CVE-2024-3424,0,0,e0718adbebcf95028a75e1d01668f5e86810db0c5f9d10c5b9f35accf22b943e,2025-01-17T16:39:48.853000 CVE-2024-34240,0,0,a6cc74a4b7e6ac1ff4630f4dda1cfe0067255faac0d07ac084685fd926fc750d,2024-11-21T09:18:21.180000 CVE-2024-34241,0,0,e6b9fe6b441390d6d7cebe002b321929ea0e881ede166ad6eb49a567d3b43c57,2024-11-21T09:18:21.420000 @@ -258058,7 +258058,7 @@ CVE-2024-34726,0,0,bdf1c10bad500e5f1e09d27cd2da23e006e09b1ecb18278113f96b8780dfa CVE-2024-34727,0,0,4a9f253e72de9fd61a800297452a281a67b416608269846034f2964d86b9f842,2024-09-11T12:43:45.260000 CVE-2024-34729,0,0,a9c60c9154b250ad0ad8fb09f024d8d1b9a123940a86c93e901bc505dc2f9470,2024-12-17T19:39:04.070000 CVE-2024-3473,0,0,635984728ea9670d6b9cfdf6ab19079fff83892dfbc983db637b3e272784b4e4,2024-11-21T09:29:40.730000 -CVE-2024-34730,0,0,1323186891281986459acb883589d56c8985486c039b87ff75d81db60fcb12a2,2025-01-21T23:15:13.297000 +CVE-2024-34730,0,1,9de90587a2d7fe20d7b8a0bb27224d362df13e896e75f411e43d214819eb540f,2025-01-22T18:15:18.827000 CVE-2024-34731,0,0,dabcba1d59e1f025a63b5ba7e0e668c40ba804a6e53f3f2f1868cf15359d53cd,2024-12-17T18:12:43.217000 CVE-2024-34734,0,0,d30ceeebe447a9d3b85ba81bb31ffe8db8e1bfaa20f969b2a1722a59d0c81073,2024-12-17T18:49:54.800000 CVE-2024-34736,0,0,796d4e22dedbbf6a45bf78b4b61b6b991a6074c75d5a0d88ca4d35b7a87b1fd1,2024-12-17T18:49:00.327000 @@ -259815,8 +259815,8 @@ CVE-2024-37089,0,0,8d387479d3a2a6e03e30baefa0716f09d2a1a735bef61b94a2cbba881bf01 CVE-2024-37090,0,0,c8c780f174a978437f3b8dd70e2e53729b421f624c42b5d0406b423c315ea8d0,2024-11-21T09:23:10.460000 CVE-2024-37091,0,0,516fee9b33edc9a2ec4e5cbefae8497129a19a168e7efc3b6e9674fd24788fb2,2024-11-21T09:23:10.593000 CVE-2024-37092,0,0,7fec326954dcfe116fd2c6e3f2c5f0e501a13f13685558ec812a9e8d4848fc3a,2024-11-21T09:23:10.750000 -CVE-2024-37093,0,0,d6b0dbf4138885b6fb77900b3158be8e78bafa360c06661b9a105e6f63dd38db,2025-01-02T12:15:17.320000 -CVE-2024-37094,0,0,4d48016dfd5694d29dfc178b242f2c60573ffb791673e49c484b4e5a78615a61,2024-12-02T14:15:05.967000 +CVE-2024-37093,0,1,3077d61e4325252cd80587b39979fe84c706b8ae00980258bf5fbe496bfaa5ed,2025-01-22T17:41:28.947000 +CVE-2024-37094,0,1,5de0fc7c38ce31ebd889f58065c30d096c94c46f6a1973ef5b1a30616b071aa2,2025-01-22T18:35:39.520000 CVE-2024-37095,0,0,e6056456aed9cfa1233740ab02a62cd5d905d39ecc612d79030adf2d2b42d0e6,2024-11-01T20:24:53.730000 CVE-2024-37096,0,0,7640b912a9fe5480a0e761f27d148ee529239584c0f97b1b0a5419d2ae02ad37,2024-11-01T20:24:53.730000 CVE-2024-37097,0,0,e9df334d9906ce4bb450b7dd9cd6bdcd90517f518eb81e79cd91caf03472947f,2024-11-21T09:23:11.190000 @@ -260000,7 +260000,7 @@ CVE-2024-37273,0,0,19aa6d304da1bd4a46159a727b6cd1e00f85560895b8810050128dc09a188 CVE-2024-37274,0,0,bea4b4f99916a1a84b897cc9ac81d665de60e3f1089864833b0f3d46bae05e8e,2025-01-02T12:15:18.857000 CVE-2024-37275,0,0,cd3274dcdadb7cfece3b7cc68a35fc8b7f02682cb36b503bd3d552d1bfd411e7,2024-11-21T09:23:31.230000 CVE-2024-37276,0,0,8fa601787078a7d94291da07862d06b98f1c8d76701e8d01e1801face58b737d,2024-11-01T20:24:53.730000 -CVE-2024-37277,0,0,9c3953ae2724e4487650be2a93e302666d83e5a2250210f791b372755de193f5,2024-11-01T20:24:53.730000 +CVE-2024-37277,0,1,c951e6d90783a3283ce398ffedcdf162b0450c6da0d3b95041ad7cec2b97b8fb,2025-01-22T18:03:11.373000 CVE-2024-37278,0,0,1436c2c246d028569aadd71e09653ad12932a70965aba38322d19c40d94fb1ce,2024-11-21T09:23:31.583000 CVE-2024-37279,0,0,abea7d170e037ff0e94eacd5a1d2641ca163a9b9cff50d73ada60b93d302eb74,2024-11-21T09:23:31.710000 CVE-2024-3728,0,0,2f47ba3b88b08d1c7f062871db579ad3a810495a3df2f8082be944b99e745aa1,2025-01-08T21:11:21.157000 @@ -261878,7 +261878,7 @@ CVE-2024-39596,0,0,893e1c9fce39419ef3b13056c373b857a964f4b4252465634523bae4ccab6 CVE-2024-39597,0,0,aaae11edbe6c14ce3b088d5cad1fed5dfbc4f7414258f0217398431b4338a6e0,2024-11-21T09:28:05.280000 CVE-2024-39598,0,0,0c2f73f732e09887cba0af0194e5f3c77ef9d94c00b244fcde4b41869555362e,2024-11-21T09:28:05.417000 CVE-2024-39599,0,0,c6157ebaa688355f491b611bda5e2b3f7e1b4434772e7545edbfcdef1fc2022f,2024-11-21T09:28:05.570000 -CVE-2024-39600,0,0,5cdcdd4d33cd14270a72aa6948e7fd08f2047e4e8ef5f5943733a11c8548d2b2,2024-11-21T09:28:05.713000 +CVE-2024-39600,0,1,bab37b1cfc6f04e50d665176f6ef9cb8b15433725cdd4ec6b18fa3cf42b0a5a5,2025-01-22T18:33:47.870000 CVE-2024-39601,0,0,92d2b69fbd2e8bc149b176391e3e16765df166d2a97846f11f4915fdfd4741f9,2024-11-21T09:28:05.847000 CVE-2024-39602,0,0,27041e41974104fd1b79b4ac803ed5fde80beca6cb3dd96452797a458af7b383,2025-01-14T16:15:31.540000 CVE-2024-39603,0,0,1437983f8883ed245799b0e5c1e1953f598b12b478ace10cadcd2f37e9d67a15,2025-01-14T16:15:31.640000 @@ -263464,8 +263464,8 @@ CVE-2024-42009,0,0,9a4960a836fc73ce032e2e0a9284183ff828482153b71c569eb4f6a260620 CVE-2024-4201,0,0,caa8de420bccc88e064fd619fe08f6837c80c46ab6ceb4db233139f54456b674,2024-11-21T09:42:22.800000 CVE-2024-42010,0,0,03e7dee0af7871a1319da5b152346d87a38864f6270cfec745878dfc136b3e64,2024-08-12T14:15:07.370000 CVE-2024-42011,0,0,266d3b924a10f9b724bb81458292feaa2d0436def0bdd21429b955b06ed88aca,2024-10-30T18:35:10.283000 -CVE-2024-42012,1,1,ff0ddccfcde7aae3f33b3ee9a2186803e72deb89bf1da17b62fcece083609a4d,2025-01-22T16:15:29.183000 -CVE-2024-42013,1,1,8c91ff5c027d0d86c7f9698278f51c909392fd40179c79b6bba7da92932fd578,2025-01-22T16:15:29.303000 +CVE-2024-42012,0,0,ff0ddccfcde7aae3f33b3ee9a2186803e72deb89bf1da17b62fcece083609a4d,2025-01-22T16:15:29.183000 +CVE-2024-42013,0,0,8c91ff5c027d0d86c7f9698278f51c909392fd40179c79b6bba7da92932fd578,2025-01-22T16:15:29.303000 CVE-2024-42017,0,0,5509e2b803cf969223b73bdcf88f1502d3b190466153a8d92dad3bae23d94eb3,2024-10-29T15:35:30.713000 CVE-2024-42018,0,0,eb9a1a6ae48726fe6d8ca5270a76e202e200b6b8c357ecfcb36c7033e7e13c63,2024-11-06T20:35:23.377000 CVE-2024-42019,0,0,3685530b36a39a63856807b2e771ed1cffbe416901360d0224102921ef6aa582,2024-09-09T17:35:05.247000 @@ -263645,7 +263645,7 @@ CVE-2024-42196,0,0,74165ceca6e8e10016e2eeb4a033a572e7a1426e3140b48f5bdc3f16162b9 CVE-2024-4220,0,0,c10e6b612d929680611c4be467944f24a66f27a0712499a1f349b6953213d81a,2024-11-21T09:42:24.913000 CVE-2024-42218,0,0,3bca921601eaa25faf0015687ed4f595ccacf0ae5ca15099cde7ba2db042877a,2024-08-12T18:27:54.660000 CVE-2024-42219,0,0,a97969401a201997f2184a96905a9ffb0133ef1ebb5bd9c9a8f1fdcbd582f6f4,2024-08-12T18:30:21.627000 -CVE-2024-4222,0,0,621723da9b7d63377c7efd4a0da29d219e60b2675c6f759d6ed9f3e633900466,2024-11-21T09:42:25.043000 +CVE-2024-4222,0,1,78ad3754433d9edd7ad7b04b2e437643c27bc5a8227a6a311a1fd475543e40e7,2025-01-22T18:23:01.487000 CVE-2024-42220,0,0,d3e9a86c5ed2eb1e6b4e3f9ea5afc7f88bbfa6125b0132e25031f187bcda9b65,2024-12-19T17:15:09.243000 CVE-2024-42222,0,0,31d1ecceb29f6dc0a006287b8f36eb69950f688f623593894878e73f68b4744b,2024-11-21T09:33:45.030000 CVE-2024-42223,0,0,bfd3e9b2497c2cd4ce56cfc4b3f7c8c085d8282b329417cd9636c8478537873e,2024-11-21T09:33:45.160000 @@ -263897,7 +263897,7 @@ CVE-2024-42468,0,0,91c14dbad0da95a7d20ad07c6ebbc6085068bc54fc3eef0d212065df746a9 CVE-2024-42469,0,0,bd532ffbfcb2510bddf31f3489868340a08ae9cc539bc98fff873ea7f9675c22,2024-09-12T16:02:35.023000 CVE-2024-4247,0,0,026ea97df26ebfa2459cfc0be0355aa17efdb50861c588da4ecdc7266d52e5ae,2024-11-21T09:42:28.047000 CVE-2024-42470,0,0,8b7b5dccd48e502c3b09a254aa458aad8ac26b6024d8fbceaeb5d75e56828aec,2024-09-12T16:04:23.273000 -CVE-2024-42471,0,1,b53941438ad45b511dfe4dbdac0a594d005f8966c7e083cb147e076c067320cb,2025-01-22T16:15:29.417000 +CVE-2024-42471,0,1,050c7d2c902313d0a8719a34c9b07446f7bbadb7af57eb5c8f43685dc95994c6,2025-01-22T17:15:12.137000 CVE-2024-42472,0,0,db9f0de24b1225cdc8879f2296bf2f39eb10609a5468059691ded7e4227382ef,2024-11-21T09:34:05.540000 CVE-2024-42473,0,0,74a74a158c4e42de3e6b5ebd0e1022e526e45c03aec99eaf13526fc0b3957655,2024-10-01T12:21:50.327000 CVE-2024-42474,0,0,849037a26897712db76b382c255fc41b35047731bd22fe7efbcd94de2edd89bf,2024-09-16T14:30:13.683000 @@ -264252,8 +264252,8 @@ CVE-2024-4309,0,0,cf6d99d40224d9ea0048df61a24b0034afd2baf32b8f2402feb311af37805c CVE-2024-43090,0,0,bfb455ba3b27b8e5f909736d7638aa4c244eafab69b7641e19b79e78332f1fbf,2024-12-17T20:43:24.893000 CVE-2024-43091,0,0,18a7813067907079929e1aa7a03c2ea14a6eb858fe26b9c9489160580668468c,2024-12-17T20:35:58.717000 CVE-2024-43093,0,0,3f092629a0cce74f6f59bab52d6247e2ce3f3aaa2972aab5920268e0f2acfa91,2024-11-14T21:42:34.923000 -CVE-2024-43095,0,0,75dab9d1862d3051bf5d863011f15e375317299b86a3a48225c45a72c8ac8464,2025-01-21T23:15:13.393000 -CVE-2024-43096,0,0,8640a82160af4faf6e096212014425dca21811ba4370cc6830fa1559fd2b49dc,2025-01-21T23:15:13.497000 +CVE-2024-43095,0,1,dc7aa514ea744f71be052866e554f8b741d5ded0142ff34365a7d8a146ad4f62,2025-01-22T18:15:19.013000 +CVE-2024-43096,0,1,32af869676835e888d7ed1c80867f07e4fec5047515aeac716220147e68f376c,2025-01-22T18:15:19.147000 CVE-2024-43097,0,0,004c4d6e0d21742822f66f64708df4b2724897f8929303b830f9e30aebcf9183,2025-01-03T22:15:07.503000 CVE-2024-43098,0,0,aaa4bffdf6c6e20ec4753899ba345f210f592f053c3f9fc872d1827eacad7c11,2025-01-11T13:15:21.240000 CVE-2024-43099,0,0,dd4c6171d90425754eb8c361c1c6555117a95d6bcad5f992f28ec42a1deec5f9,2024-09-14T11:47:14.677000 @@ -264649,7 +264649,7 @@ CVE-2024-43505,0,0,fbc495ccd681183727f4b91b42933ffca66b81f95ea6fbca03decf5858a95 CVE-2024-43506,0,0,45e1aa7a5af247b48caa79f629a2010ec598f373d403a748bed4408ee40110db,2024-10-17T20:19:06.707000 CVE-2024-43508,0,0,a77c25e762e31f58a51af309fe2eb70916818bf667fb797bfc3c41d004f5379c,2024-10-17T20:18:55.517000 CVE-2024-43509,0,0,703195e160708b0af67d5eb5c68e4b7879b746ecc041a0a43b6cf90a9f374ee3,2024-10-17T20:18:45.110000 -CVE-2024-4351,0,0,6bba0bfc4309b9eec326268b3f638e7988fc4402fd55650f05589acc6566222e,2024-11-21T09:42:40.787000 +CVE-2024-4351,0,1,8d41a8b4d777b13661752958abd44bc99247a204cc19e7038ddc04d45608de6f,2025-01-22T18:23:35.573000 CVE-2024-43511,0,0,3d02287c565a2090ab3ee7dfcfc8ca8fde9d5b425335519be8be2c2f020e26c2,2024-10-17T20:18:33.103000 CVE-2024-43512,0,0,3da4373663b1df4b93eb953bfd44dceb6bc6c04d436c2e21a62fdd92bdb06269,2024-10-17T20:05:03.257000 CVE-2024-43513,0,0,85d727739869a2bea118e595d3a2591683d726d4eca3032eb3cdf0e3b9801662,2024-10-17T20:04:08.917000 @@ -264659,7 +264659,7 @@ CVE-2024-43516,0,0,b62aabdf0fe3608c30853a86f006be8102f5b8fbf2de64f43d98287888478 CVE-2024-43517,0,0,ecc65d1061c4f22d357ff2d5f7a6705cb4146c9e1a752d049f225bc17223774f,2024-10-17T20:02:38.190000 CVE-2024-43518,0,0,cc1707e95b4d237623dda37ffee1c9e370d180d0495706cfb38c4ca5b144a770,2024-10-17T18:55:19.963000 CVE-2024-43519,0,0,143112ac05413bbf67cb50fe3ba31003c83c3b52bcbb854339ddab82189ba147,2024-10-17T18:53:48.217000 -CVE-2024-4352,0,0,ac5f6dc43b198c5fee8cc8e341f3b60cd827a60ac0c692b8ce3fa549be20b825,2024-11-21T09:42:40.890000 +CVE-2024-4352,0,1,5df52b07679d73f7ab8e52eb8324fd43386373bbafb539092e9ba7941cd91a06,2025-01-22T18:24:15.257000 CVE-2024-43520,0,0,14b3af449d0c342f092cf50dd0fdd884cfb273b720481f68d000f760a7774e89,2024-10-17T18:40:06.807000 CVE-2024-43521,0,0,564a8df8e16b7da61336c004a84f8fd16312654196c6af9960132b9d00e07eb4,2024-10-17T18:39:36.567000 CVE-2024-43522,0,0,683cafc7380bcfabc8111b404163e9cd8b46387f5818df74494622da78f6695b,2024-10-17T18:38:51.557000 @@ -264804,7 +264804,7 @@ CVE-2024-43660,0,0,238845f4a9d34597d8664c50dd0fa08545611e1bed47ee50fa5d4dd87d303 CVE-2024-43661,0,0,c70725ed5b48f93093f892c549359e2d42477c7c299ead1de45c75542d8e6cab,2025-01-09T15:15:17.937000 CVE-2024-43662,0,0,e334affe46a369f95b6a85bfbb8d720aee845ddb9b4fed0030c89383aab45244,2025-01-09T08:15:29.637000 CVE-2024-43663,0,0,ee082244e3082be3e29c575c6f9c4b1d33a6184a6affdfde70ed6b52fa37688f,2025-01-09T15:15:18.173000 -CVE-2024-4367,0,0,06d0056dd66ff219c5446225478001d7ace4cdfa0f0e8d7454a5c61b93b71c50,2024-11-21T09:42:42.537000 +CVE-2024-4367,0,1,0531c57dcee451ef44987794e9a54d309868657ea35469337f1e944267096377,2025-01-22T17:16:51.557000 CVE-2024-4368,0,0,3d10c8e78c29700111196d36c50b5f085edebb06975b60275c2b591108b23a7b,2024-12-20T17:23:03.420000 CVE-2024-43683,0,0,df9b098d0d10bbc57333de3cddd48795135c3c7c667cdc231a2f356001c571ba,2024-11-01T16:15:08.930000 CVE-2024-43684,0,0,4a243a48ba516eb20e6ab29bdd16712edb7b93acf46d8d67ea6d12ff5a4303fa,2024-11-01T17:15:17.127000 @@ -264883,15 +264883,15 @@ CVE-2024-43759,0,0,4270d1c80d4da61f734b4e2d0cec7cefaa5eece74e1d071a8d6c550e1b894 CVE-2024-4376,0,0,dbe4e9d8f2663e8bb2fcb94d44ccb172ebc9983e208169b15baf349baf189407,2025-01-15T17:55:38.783000 CVE-2024-43760,0,0,0699b036c3a09290ea9d3ac93f3f512789df4a5bccdc81b41420a254e04019cc,2024-09-13T17:00:30.440000 CVE-2024-43762,0,0,b8dfe10bc41a54941c91e23f33f7c446be6ae8c1200d07b09e86c0c499c65832,2025-01-03T22:15:07.640000 -CVE-2024-43763,0,0,4885c5edd11eba2743bd41fa1789e479b2acb1ac42ae4cf7b1e77168ffb42711,2025-01-21T23:15:13.600000 +CVE-2024-43763,0,1,82d726eed3fe99e2255d2d21495ea9d8f2484783b03be4f115fa23b489623fc7,2025-01-22T18:15:19.283000 CVE-2024-43764,0,0,b8a70c9b4bf3da07474f063814c421df50a0a0e7358525550868f9c97beac2b0,2025-01-03T22:15:07.783000 -CVE-2024-43765,0,0,607ad7afb57499afaa932c6f4566c3506ac7f56e4cf753ff19e8fb8739ad0f5c,2025-01-21T23:15:13.690000 +CVE-2024-43765,0,1,934f1ba85a151f7784160aacfc2497d230b44acd95f87c19b7bcad33831177fc,2025-01-22T18:15:19.413000 CVE-2024-43767,0,0,af155cf93cc328c05c081440c1f007ae01c3d33d1458fc2c3459ea52a0cc31d8,2025-01-03T23:15:06.627000 CVE-2024-43768,0,0,d63d3ffccaf584eee421ee122021fb0ca8d78148254dd26c8ab21528b275e51d,2025-01-03T23:15:06.767000 CVE-2024-43769,0,0,13983ee3cb62290dd1770f68b2a21cae6948e8a4eebfe4f723c6f963b63155be,2025-01-03T23:15:06.903000 CVE-2024-4377,0,0,9e469d2c6e38c9024d3118d881da3bdecf42eee078f84183253e0517e0cefe8c,2024-11-21T09:42:43.760000 -CVE-2024-43770,0,0,97ce4eff47256ea26139494fb789cf2aba34fbd0b98279ee7b81ebe192da98f7,2025-01-21T23:15:13.790000 -CVE-2024-43771,0,0,274d3f982d31fe367140970a8c057ce86a156fc7ae2930471b7e8a6c169d0586,2025-01-21T23:15:13.880000 +CVE-2024-43770,0,1,01d8ab020ec7fff7dabc0764629b8312217c0ae5c3311bba5d1ce0fbce193a32,2025-01-22T18:15:19.547000 +CVE-2024-43771,0,1,f37d44f13fe89dd062140cbc93b9715744a107df40101864fbd8c3cc9b246542,2025-01-22T18:15:19.680000 CVE-2024-43772,0,0,63f7dc411da3ded034b2d2ffb4e0bad8e95b60c318b3d1e644db504bb5e5c6e9,2024-09-04T12:11:13.073000 CVE-2024-43773,0,0,826b7c5200d245cfd0c67f5d1708290c5274b8ea410b663d2bc4e8259de07c4c,2024-09-04T12:26:08.270000 CVE-2024-43774,0,0,267603d5dcdafd9bbb030b267307fb5b633f3e8c3df39d738d42af146bd763d1,2024-09-04T12:26:42.387000 @@ -267297,7 +267297,7 @@ CVE-2024-47360,0,0,3505750b43af9495495e6581d3aea77c21b1c501fbd0d883ba17ea947a88b CVE-2024-47361,0,0,33dc229f4d22271f1ecd394a993c61c75da3d2f296de3692410ee4c5a9290664,2024-11-12T20:25:04.763000 CVE-2024-47362,0,0,56bc4f07dcdfdb017da34c825963826df9398c632c974d75f574faa2381d2aaf,2024-11-05T21:44:55.657000 CVE-2024-47363,0,0,c615105e8ee5adfd6a8485d6e6e139d86ffcb58bc6a37be5e338f997edaafe55,2024-10-07T17:47:48.410000 -CVE-2024-47364,0,0,eda3d19f8b6af238e879a13750854c6d9f4d8f7d51e14cd0e2f1f30450606dd0,2024-10-07T17:47:48.410000 +CVE-2024-47364,0,1,2fe33474edb540126db4c4281ee3227a6e9d0509c934dee31dea30c33ddc6c06,2025-01-22T18:27:35.677000 CVE-2024-47365,0,0,afb0d6a8b18ae6c2493d0789ee81de1a1a73bd252d339cdf1953803b3d5de00b,2024-10-07T17:47:48.410000 CVE-2024-47366,0,0,4d57dd3357453352263a477fdf262b3e7ef903ab36a0e51fdd022964ed094a2f,2024-10-07T17:47:48.410000 CVE-2024-47367,0,0,bad7707269a1522b052638ed4752b9594efc2bb8cd40e160a382a90cb47d38c9,2024-10-07T17:47:48.410000 @@ -267326,9 +267326,9 @@ CVE-2024-47387,0,0,c7bda230ed387b3a5e8a3302c0dd2e0a690bfa613a8307335761c5f8a12fc CVE-2024-47388,0,0,758c51fdaec18732cfb900475a403560931bd32506c62fbb2207642d3eb56ac1,2024-10-07T17:47:48.410000 CVE-2024-47389,0,0,86299bdd264d50bc9da88c821e9d991bc90211ce853bedb296f6ed1186c3eff3,2024-10-07T17:47:48.410000 CVE-2024-4739,0,0,7b14c0aa87931fd19f500e5986f0b9cf9b632066d66dcbd2ac4307c74e99fb69,2024-10-22T14:07:02.023000 -CVE-2024-47390,0,0,cc63875e69f06d4c17e24abcdb338b4f6bd982a7482b6fa20c9c6090683f0101,2024-10-07T17:47:48.410000 +CVE-2024-47390,0,1,8328d11880857af87c4ba73b7c6581cb89225b6c15b16ece34f53c4c32578502,2025-01-22T18:25:14.177000 CVE-2024-47391,0,0,500eb0e23f5ae3d06f662233d5d40aa77710641ba95c8d575dc20b70f2347927,2025-01-07T13:57:47.850000 -CVE-2024-47392,0,0,00551b6f97fd19b84d21351afbdb0a4f67e271ab807a9926f6f48e11f73620b7,2024-10-07T17:47:48.410000 +CVE-2024-47392,0,1,8199b22d755d63b1cd2b1b46112332f20054e5d24fd2bdbd950a59b01e2fbf2c,2025-01-22T18:25:37.310000 CVE-2024-47393,0,0,228410e0daf6874cb668c644bc1c416844376ff82bc2ee46443d12bb91864fc8,2024-10-07T17:47:48.410000 CVE-2024-47394,0,0,a0040493a4339256d0c055721ffe7da5d10466a1db94b9e0e71b6b8311834a32,2024-10-07T17:47:48.410000 CVE-2024-47395,0,0,1bb947c2581bc5b0cdddabd963abdc1a3b1033f7495712457f47382960f59672,2024-10-07T17:47:48.410000 @@ -267663,7 +267663,7 @@ CVE-2024-47736,0,0,6251bb1a925f6c84a7ab8567e03d184596befb3a365d434caebb2c8a894c2 CVE-2024-47737,0,0,4dd7c9ce187b0519537c08f355b0dad9f278eecdca535734225ad6579c947614,2024-11-08T16:15:27.153000 CVE-2024-47738,0,0,7330b29372b6b3d0ffd631a2ff22069faf576a007233eccb402e8cba04efadfa,2024-10-23T22:12:44.370000 CVE-2024-47739,0,0,1a41b55497bc31e46e84a93c5c16b468b4b620cf8a3fe70b414f0b6a0ced9536,2024-10-23T16:58:37.707000 -CVE-2024-4774,0,0,be858684db7a8fcf56e8bd6447de0c875805ab7ddb791b897d824d247f211859,2024-11-21T09:43:35.070000 +CVE-2024-4774,0,1,e82a5939996461b632c42e3ff7558a8760cfc0f83a4135e41eccf1ac3d4f6280,2025-01-22T17:56:00.637000 CVE-2024-47740,0,0,fee4db0fc8250ad866ae9615c00703616e55d3140e6cb547085ac1bb866fdba3,2024-11-08T16:15:27.477000 CVE-2024-47741,0,0,c82fb15f5f8e7b31428a8dfb3cd94e2bbdc9b9bb2c6842d5a1b73a2071d9d9e6,2024-10-23T22:14:34.090000 CVE-2024-47742,0,0,e3740f3f14484d88bca721609a2f4f9a29f3773fe0765b2486a8663397878c33,2024-11-08T16:15:27.613000 @@ -267696,7 +267696,7 @@ CVE-2024-47766,0,0,5b022f50b7abc217edfef7982d0e5a686ced57373c6d0a3e12a0288c83d82 CVE-2024-47767,0,0,94aadbc9fc16d474275d6aca7a65361d425ec92b8c6014ba3dfdd771cd3b2ca8,2024-10-17T13:50:45.307000 CVE-2024-47768,0,0,88ae4f70ab087b8300d230292887e805c01d66e7a5c039ba6592b0b94e773598,2024-11-13T14:55:39.690000 CVE-2024-47769,0,0,0c177c50fe296e854c4d574b21c2d2abde6e70c193e41fa822f8df15acb9f1d0,2024-11-13T15:12:54.033000 -CVE-2024-4777,0,1,f5d82bbae979bc4d2f73fd5aa0aa703237c6002a2996292106f7c34b0b91fd70,2025-01-22T16:45:18.820000 +CVE-2024-4777,0,0,f5d82bbae979bc4d2f73fd5aa0aa703237c6002a2996292106f7c34b0b91fd70,2025-01-22T16:45:18.820000 CVE-2024-47771,0,0,d9e667f8f1c80546a8045e1095310494da0b5c3573a4d135848ba5926d74346b,2024-10-16T16:38:43.170000 CVE-2024-47772,0,0,268d48580bc08bc06a9592581bf7c15b183982df7936e45259c48576c264bf04,2024-10-19T00:58:21.947000 CVE-2024-47773,0,0,2009644e404b2ecafb661ade272442df90db2955e19ee81df643af922d4ed623,2024-10-10T12:56:30.817000 @@ -268912,22 +268912,22 @@ CVE-2024-49703,0,0,773f468dd20b89d6b077ffb05058547737a4c510a41e2a52930200811683b CVE-2024-49704,0,0,011946741b0918ef57c6cb1900342b7378aadc477a57c2845fd73363988334a5,2024-12-10T14:30:44.573000 CVE-2024-4971,0,0,17f65e33f654be41e85b2c190603b91b92e7c1a1f8fa7f8e99556cdd76507595,2025-01-08T19:28:26.847000 CVE-2024-4972,0,0,6d57573ddd08bf2299e1f6597809329f00babdc0f3ad1d5869880ad1a42cee17,2024-11-21T09:43:58.863000 -CVE-2024-49724,0,0,1c970cd15f01ef94cdb9805dc7c7895642ab2cc9563c5283c66c2d119062455b,2025-01-21T23:15:14 +CVE-2024-49724,0,1,4a13f7c7aa30fccf0970b1884e58e7e7a31f01f7e82028a9baa5856257f1b52c,2025-01-22T18:15:19.813000 CVE-2024-4973,0,0,19ccbb7e67bd4c75d6b883a0abe41227afb09f5e151258438b28388488924a3a,2024-11-21T09:43:59.010000 -CVE-2024-49732,0,0,79905e81310627bd846c6b303778a61c549180fd7d441513bb9aa76a2aa5f629,2025-01-21T23:15:14.100000 -CVE-2024-49733,0,0,4ea3a79600738a5a051a531e4536c27a7275ffb6bb3cb3f57ddf3e3052ec65d9,2025-01-21T23:15:14.197000 -CVE-2024-49734,0,0,854a15556093726e3f16593398c49e1d6f74bdcecae8161021ca6186dedae34c,2025-01-21T23:15:14.307000 -CVE-2024-49735,0,1,6e82e6dd127ffa040fc1a14579443a53bb3ca3cda230b1dd32f241c6aea7cef1,2025-01-22T16:15:29.573000 -CVE-2024-49736,0,1,abb53a60f7b8c4b30ab54ebc044e67a54dc2d8658382f295c6a64d25e7172ecd,2025-01-22T15:15:13.007000 -CVE-2024-49737,0,1,5b8a41296add9b60d2bd23d524691a6a9402bd8f7a3a23c7a85b4ed4febbc7ea,2025-01-22T15:15:13.150000 -CVE-2024-49738,0,1,cd4b279ab947304d716fd3789992ba3820266545e70a14de0202f788aaf229e5,2025-01-22T15:15:13.280000 +CVE-2024-49732,0,1,f7a25c052f1079e165e7dce5098e1fa20cea987f9906967c40992e341d0a938f,2025-01-22T18:15:19.960000 +CVE-2024-49733,0,1,b1cd4b8ea380c4ff0bba0d45ce5ab5473affed7ac4a0d8328367b08eb84a5bc5,2025-01-22T18:15:20.100000 +CVE-2024-49734,0,1,fa0a2758d17f29ea8951376a0dce32025e12e4916cb3c34b5a586823e303df27,2025-01-22T17:15:12.253000 +CVE-2024-49735,0,0,6e82e6dd127ffa040fc1a14579443a53bb3ca3cda230b1dd32f241c6aea7cef1,2025-01-22T16:15:29.573000 +CVE-2024-49736,0,0,abb53a60f7b8c4b30ab54ebc044e67a54dc2d8658382f295c6a64d25e7172ecd,2025-01-22T15:15:13.007000 +CVE-2024-49737,0,0,5b8a41296add9b60d2bd23d524691a6a9402bd8f7a3a23c7a85b4ed4febbc7ea,2025-01-22T15:15:13.150000 +CVE-2024-49738,0,0,cd4b279ab947304d716fd3789992ba3820266545e70a14de0202f788aaf229e5,2025-01-22T15:15:13.280000 CVE-2024-4974,0,0,d16672721f53b136de1b80de87435b925886996f97e506cdb2d6dc9e6ef8a3f1,2024-11-21T09:43:59.157000 -CVE-2024-49742,0,1,7eef665a1fecedb640da0453d3423d2565b0b2a9863841471a0905437587a333,2025-01-22T15:15:13.407000 -CVE-2024-49744,0,1,893c3e4158dfef22e11bfb26c5e77a6967b9bc4fa8c4ba4f91957edccb19b8ed,2025-01-22T15:15:13.557000 -CVE-2024-49745,0,1,ec3fc231238b743039fbaaf5776ba076c7962f598c5d5696f0fb57938019d8eb,2025-01-22T15:15:13.707000 -CVE-2024-49747,0,1,2d8b794bd3749166ed339f9f429c39b24a48fe7fd48c61f20f9e5b51e0b3a34e,2025-01-22T15:15:13.840000 -CVE-2024-49748,0,1,38b0ed020d011a6e22437dc3312798cb1d17299f8e1aaee32090cd2c9c8a600c,2025-01-22T15:15:13.980000 -CVE-2024-49749,0,1,12bb211f652372e794b8cfd82d8b0d77d0ac3ffddc07278e6873cb738eef5427,2025-01-22T15:15:14.110000 +CVE-2024-49742,0,0,7eef665a1fecedb640da0453d3423d2565b0b2a9863841471a0905437587a333,2025-01-22T15:15:13.407000 +CVE-2024-49744,0,0,893c3e4158dfef22e11bfb26c5e77a6967b9bc4fa8c4ba4f91957edccb19b8ed,2025-01-22T15:15:13.557000 +CVE-2024-49745,0,0,ec3fc231238b743039fbaaf5776ba076c7962f598c5d5696f0fb57938019d8eb,2025-01-22T15:15:13.707000 +CVE-2024-49747,0,0,2d8b794bd3749166ed339f9f429c39b24a48fe7fd48c61f20f9e5b51e0b3a34e,2025-01-22T15:15:13.840000 +CVE-2024-49748,0,0,38b0ed020d011a6e22437dc3312798cb1d17299f8e1aaee32090cd2c9c8a600c,2025-01-22T15:15:13.980000 +CVE-2024-49749,0,0,12bb211f652372e794b8cfd82d8b0d77d0ac3ffddc07278e6873cb738eef5427,2025-01-22T15:15:14.110000 CVE-2024-4975,0,0,d158c3c26e7b9ed3b1558cbe1dfa904308e63625da2b58fbfd707b0851aa6e0c,2024-11-21T09:43:59.293000 CVE-2024-49750,0,0,b8c0592657dc23f5dade6581318fd4431bb1aa3486d0f4172a6b42fac1aa50c3,2024-11-06T14:58:19.993000 CVE-2024-49751,0,0,b6ddfe86ed223562a30da85143aed986d928de448e01372a87230a49d1f635ac,2024-10-25T12:56:36.827000 @@ -269614,7 +269614,7 @@ CVE-2024-50449,0,0,a326465cb01e1e7b8848f74b154c9f8396a893705017326aaa28915611951 CVE-2024-5045,0,0,bd84e1b4cb68c5f16229e522b82965a2a3bc593cc0136370e64e5ecea74da8ee,2024-11-21T09:46:50.953000 CVE-2024-50450,0,0,347ec8bc31e40019006517b58dffc734ba4a3bc85c98dec49411a7c49c9e8fe4,2024-10-29T16:05:40.250000 CVE-2024-50451,0,0,32f02546caae281a9f31a76c5b7c54690c8c2781db2b8b136cb02a5572b39e02,2024-11-13T19:44:17.430000 -CVE-2024-50453,0,0,a47ecd0a0c4c7445b841adcfc3224b6fca1bdb50b84d60aa9e384e519533f775,2024-10-29T14:34:50.257000 +CVE-2024-50453,0,1,318c29b0cf5346bbb7ec7950d114cb9d2c8ede1301e0091a8ed78c555b16361f,2025-01-22T18:29:43.147000 CVE-2024-50454,0,0,6ee9d34962df930309e61436d538d619b08eeca9060889d9f6e45b118a06d818,2024-11-01T12:57:35.843000 CVE-2024-50455,0,0,e03e2c552a99e7c6bb62688d5bf42baec86ad2304c59f21946bed5c0f08526f4,2024-11-07T17:01:30.937000 CVE-2024-50456,0,0,ed2b515b1f33cb2da2e4ab27de8df631f04c7735dc3d5ebd017e6b920fac7057,2024-11-07T17:02:03.653000 @@ -270108,6 +270108,7 @@ CVE-2024-51442,0,0,663939a871d0d38a9b2a62d30b7d5c04a240d1619da5f372debf5ffd926c4 CVE-2024-51448,0,0,b2ae8cc65c8989503d0b014630e6c65571d6434c6efef511344d8e3c826913fc,2025-01-18T15:15:08.183000 CVE-2024-5145,0,0,1ce6a725d120216d833ed23f25099d9f4810ecb9d4c63ffcf11012cbf68534d1,2024-11-21T09:47:03.920000 CVE-2024-51456,0,0,66b05d860daa73e2ca5150a1c93bd2ff924126d07f9447d85a1bb5c4e9cf4c2f,2025-01-12T14:15:06.550000 +CVE-2024-51457,1,1,c0d17c3f3eb3b9b1b24d65c918aa9e3f3893ec04e5fc224327544bfdc7f7238b,2025-01-22T17:15:12.390000 CVE-2024-51460,0,0,df7bada56a61ae8e12a2e4d5be2899c3081302373c6923b3ae2a7f5e2e034bd4,2025-01-14T19:40:36.670000 CVE-2024-51462,0,0,e409bb58b33b455caed173bb21388906f853ca63445a80f0344bbaf4e996dab1,2025-01-17T03:15:07.527000 CVE-2024-51463,0,0,c0364c05afe1e0b2d0890e7f96c1b512b7afe4d3c2862d4a930e0585099ce1e6,2024-12-21T14:15:21.453000 @@ -270593,7 +270594,7 @@ CVE-2024-51938,0,0,242c0a65941c537ffd1a193d6e9d54026ec931cfbdc5570b7417a6063e45f CVE-2024-51939,0,0,20d7c044823f2dbd5a93ccbf1e62122469f38a0e0e61d27f0eead27fdd2e22c5,2024-11-19T21:57:32.967000 CVE-2024-5194,0,0,dbdec7c8317bad6b5de916ef203d1a0f247b2d83da15b3a997ab91b9b739d1ef,2024-11-21T09:47:09.967000 CVE-2024-51940,0,0,eea7140ef8e6920e3e5dd47ba7cd4d003e663b87564e69e84f825f175f7f9241,2024-11-19T21:57:32.967000 -CVE-2024-51941,0,1,99e7c2ec210b1b461bcd0a5c19e2f109b9f77e87df47efb160f27ffa568291f1,2025-01-22T15:15:14.247000 +CVE-2024-51941,0,0,99e7c2ec210b1b461bcd0a5c19e2f109b9f77e87df47efb160f27ffa568291f1,2025-01-22T15:15:14.247000 CVE-2024-5195,0,0,e5801157a03af57b0b477f12ddbbdfdf2400954236093425a1336efcab3d77e3,2024-11-21T09:47:10.100000 CVE-2024-5196,0,0,c1ed13355afe2ad57b4673ab6c37a350a1a3ee6e8c7dde25b17a93063a8f0698,2024-11-21T09:47:10.230000 CVE-2024-5197,0,0,c395e7ddc635786cbca10e48f5338a794f356687d6b361f56c4276f3833a35e8,2024-11-21T09:47:10.363000 @@ -271728,7 +271729,7 @@ CVE-2024-53804,0,0,c64f2291c3e202809c8bf90598d4a2a0d324c8b22742806eb77826f9e995a CVE-2024-53805,0,0,f6fbe145ee852ec5282c6eab9bdebf9592e6eef4e867082a6f67281833d0254b,2024-12-06T14:15:22.823000 CVE-2024-53806,0,0,5d0f271a2983f1f83d7508a02584eca59adaab527ea8901c453129bf95b28a3a,2024-12-06T14:15:22.967000 CVE-2024-53807,0,0,751bfdc593286768f425347630b2bb5cdc74565427163649502df4c7031e3f57,2024-12-06T14:15:23.103000 -CVE-2024-53808,0,0,2dbdc10adc548714475ac6e3a4e4a4cfb3503dfe64897d4dcb288b3782e40725,2024-12-06T14:15:23.233000 +CVE-2024-53808,0,1,f89dae365d8d913c563caeeb1159d641fb081cdbef85561c86b0c5b4681274a6,2025-01-22T18:04:55.013000 CVE-2024-53809,0,0,17427c419c7de66655b1e47e44c0d29c5f3fb35f4b69dff194a411c2dc4c773b,2024-12-06T14:15:23.370000 CVE-2024-5381,0,0,9f7e4aaec825976e9a0bdf11a7d8967a98b45cb6baef860075a12db62657c2b3,2024-11-21T09:47:32.687000 CVE-2024-53810,0,0,e98d78a114e65e3c19821776336507856eb72ce3497a2398568bdbd161c6e99c,2024-12-06T14:15:23.500000 @@ -272506,7 +272507,7 @@ CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53 CVE-2024-55470,0,0,dcfc79f3be29f89e1f2e700b61e3b076a29307f3f819bb5e3e6622ca15c02991,2024-12-20T18:15:30.370000 CVE-2024-55471,0,0,53c8545095dcd233b02e5b5368ccdda8e9894ef3eef3c8dd7b456e3a987cf26a,2024-12-20T18:15:30.730000 CVE-2024-5548,0,0,960acca9fdb4c73166f01cb6cab77802df52faee348d661f3dcdec3a5e889741,2024-11-21T09:47:54.380000 -CVE-2024-55488,1,1,f0f3e524c8548fe1fe6d4f124bfe8710d694b8d638ca11299653bfd921fc9617,2025-01-22T16:15:29.770000 +CVE-2024-55488,0,0,f0f3e524c8548fe1fe6d4f124bfe8710d694b8d638ca11299653bfd921fc9617,2025-01-22T16:15:29.770000 CVE-2024-5549,0,0,523dae47b6780776874c36c71ab66f8ac6e8e99599490648ee341f214b628e63,2024-11-21T09:47:54.507000 CVE-2024-55492,0,0,8ed1b6fc2ceef3fd61acd090adb38bc92ce31dd641c3b527d1e8f1507c1a53ee,2024-12-18T19:15:11.777000 CVE-2024-55494,0,0,a1b10176f7d1839512005775c9e7583ed311f893fd691a402dee6bebdd80dd5c,2025-01-13T22:15:14.153000 @@ -272665,6 +272666,7 @@ CVE-2024-55953,0,0,b8838dbbbaba7da3aab89f4fad26ee3c0ffb57f557fd7e9c1a84146519fea CVE-2024-55954,0,0,809e5572e293545af4228663dbdea98405c00ed8174fc27cfd28075595b51642,2025-01-16T20:15:32.890000 CVE-2024-55955,0,0,18cba96888915c0389c7defca71606c5156a68e05c936a654d308cd47645f10a,2024-12-31T17:15:09.270000 CVE-2024-55956,0,0,8a3a8fd441b4aa1d48f534ccf7c90847b13a0644de401a73337d5c665ef64cb7,2024-12-20T15:21:39.287000 +CVE-2024-55957,1,1,93ec958ce84a5b94e18aae8b6c1c1c30fbcd01fd14ce2c9365d9638ed6be10f7,2025-01-22T18:15:20.237000 CVE-2024-55958,0,0,17fb53507a41492ecf6be0cac867c424c34ce7651264ce92eabee12acb8f7e0e,2025-01-21T21:15:11.200000 CVE-2024-55959,0,0,51a8504bb3c41973bd0622b20d6f9671032f558a4b6cd001edddcde78702ed37,2025-01-21T21:15:11.323000 CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e06,2024-11-21T09:47:59.330000 @@ -272875,9 +272877,9 @@ CVE-2024-56249,0,0,4fb8a14ebb538b39415820a3086682c61dbc902852732dad0994cbfa71a33 CVE-2024-5625,0,0,d3de3914e71e24c0640febb528961abd09321cf732dc235d08627199bf00a95c,2024-11-21T09:48:02.390000 CVE-2024-56250,0,0,fad514099844fd3a40a460e7b2f8b539a1827f56918983d298bbc6627256cadd,2025-01-02T12:15:26.703000 CVE-2024-56251,0,0,bf5059a40f2f69a193b9f087bf4681f76ef9e2fbd017b99c10bc6dbbe6743a4d,2025-01-02T12:15:26.840000 -CVE-2024-56252,0,0,bcb55d9aa2aadd71289002a4156bb5f8ef8a93cdcf119b8a855a5677a77aa8b9,2025-01-02T12:15:26.973000 +CVE-2024-56252,0,1,a741ed4fe010e76005858c2f644665b605ea5fb49a9e0b659454f18793616305,2025-01-22T17:44:01.447000 CVE-2024-56253,0,0,052bb57aad380ab1163937481d3ea63eb4fff054d20b021d2dc31b61be64863e,2025-01-02T12:15:27.110000 -CVE-2024-56254,0,0,2b5b313142eb54beaafa6ecc460e76642bf02fce5000b53a14e9bfde5562a81b,2025-01-02T12:15:27.247000 +CVE-2024-56254,0,1,6ed905e8e1d014bb303cbed00e0f61eebe41f0d6c811e75d6b55d98ef0cc7ae0,2025-01-22T17:44:38.787000 CVE-2024-56255,0,0,e25a417498dee039f9b9bb01d0aa00b5e9649106ae99313547414bcf56b7b83a,2025-01-02T12:15:27.373000 CVE-2024-56256,0,0,e02d1c8c5bc51a1b179a5bca398725aea9ad7a89db71f48878c2f5bce3510a46,2024-12-31T11:15:09.543000 CVE-2024-56257,0,0,e31ff6866c2c4c35beae38750d7442e6309a0a5186f5a5bb07d11dea1360b332,2025-01-02T13:15:07.963000 @@ -272890,7 +272892,7 @@ CVE-2024-56262,0,0,4447534a78607e1275b0ed628da648df4beb28771835b217aa80a6ddb743e CVE-2024-56263,0,0,974f02d536848b4074de4f0a7a6ee52770aab22023237624b3ca89478ab882dc,2025-01-02T12:15:28.193000 CVE-2024-56264,0,0,073527848c96e2530225db6050f6576f8658501e1459fca3855280b46e6bd00a,2025-01-02T12:15:28.327000 CVE-2024-56265,0,0,06c317e12da44533cb0101010f8fb0fb21a84e3dee4894f6712c25ad3b90c059,2024-12-31T11:15:09.707000 -CVE-2024-56266,0,0,356e024a93d0eb9899f21db50cc1cfe82e9b29846d8260827e962784043b87aa,2025-01-02T12:15:28.480000 +CVE-2024-56266,0,1,114c7b9090da6150ffa0570c16506c279ed39f99a190bb0852f16b8f630aaea7,2025-01-22T17:48:32.873000 CVE-2024-56267,0,0,1a857d7bf07f7bdad7247fe75bbc7603553ef3ae2a1cef53f9569ee0b2c25d2f,2025-01-02T12:15:28.617000 CVE-2024-56268,0,0,6c5e42fafa8d0d431aa18ee0814c13c9e3020d74b57b5ddd14fbebc4b330873e,2025-01-02T13:15:08.120000 CVE-2024-5627,0,0,4f3ee87aef2fc9763c8caa5864c6f83c1e8820b485bf86b137197706dbea80f8,2024-11-21T09:48:02.683000 @@ -273401,8 +273403,8 @@ CVE-2024-5714,0,0,849fc94b6902757fdfdae1f78ce00df63ab2c5ba63744e880696de74b0f190 CVE-2024-5715,0,0,8c569768d6a890bf6135b49c7618937c530109ec67dd48fa94109e61c60d211f,2024-11-21T09:48:13.567000 CVE-2024-57159,0,0,87b08e206ddc43db244ef415dcb6a137db640416ec561fc3cf69cd71d133ddf8,2025-01-16T16:15:32.700000 CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000 -CVE-2024-57160,0,0,c55573c40a94af5aeb89725ea34b55d50a8811329a1d0da11335a64c8b0104db,2025-01-16T16:15:32.817000 -CVE-2024-57161,0,0,b551dd821ed77efd3756854f787f4707269ef93bee88c51d1fffdc2fbe9375c0,2025-01-16T16:15:32.937000 +CVE-2024-57160,0,1,aa8c59ac0526c71da83328e18c9141cb756c3f85c3b3a889d7b7ff6da4e9d450,2025-01-22T17:15:20.300000 +CVE-2024-57161,0,1,a5c89c4fcaf2013dde33803c2e35f39270b837cce1b452b06abc4903399ec188,2025-01-22T17:15:14.067000 CVE-2024-57162,0,0,60c182cc7bdecdf8663a17fa18a906ebc08420924403492f251bb25cb53c4f36,2025-01-17T18:15:27.240000 CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000 CVE-2024-5718,0,0,5319c47b63a6835fedbdcd43dc1fd8b869ba81977081921f790378b370cee719,2024-11-22T20:15:10.340000 @@ -273474,7 +273476,7 @@ CVE-2024-57545,0,0,29448170a68680a59613fe6cb937aba1159c3cc4ca362fc589dd6bd024a8a CVE-2024-5755,0,0,d9beb74b4cc757e5dafe2ce46b6f3c5c752c1749a1b4a2abdedbdd95bff1173d,2024-11-21T09:48:17.093000 CVE-2024-5756,0,0,f306d50c688e90f1ac281dc052b52f0a73fe2794efab7031898c419d58649207,2024-11-21T09:48:17.217000 CVE-2024-5757,0,0,d27353d3a809fffc6956c99202ff019e529c86d532d278e7bed95c99f1ad6b65,2024-11-21T09:48:17.330000 -CVE-2024-57575,0,1,59a16fb9024fc8c7ec7916d5858b18b7919141f32cacfdb0ceffe784dd16fcd5,2025-01-22T16:53:51.830000 +CVE-2024-57575,0,0,59a16fb9024fc8c7ec7916d5858b18b7919141f32cacfdb0ceffe784dd16fcd5,2025-01-22T16:53:51.830000 CVE-2024-57577,0,0,bae775b370a8acb307c4cb68af424e3eba8ab59b46dde10579b517ba186c6837,2025-01-17T18:15:27.893000 CVE-2024-57578,0,0,c3279c5dafbf0cdd4403337b162aba3068d6b8d4f0424f16fe98dbf2bcb27771,2025-01-17T18:15:28.430000 CVE-2024-57579,0,0,0233c9ac7198ab370ea173147491e5d577f0db0cbec488179ef90a735ff73434,2025-01-17T18:15:28.983000 @@ -273482,7 +273484,7 @@ CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee9 CVE-2024-57580,0,0,bdb0b94b78717db32044fb1ebf152be16356daef98584c7a2fbebb19f878301b,2025-01-17T17:15:12.410000 CVE-2024-57581,0,0,d33766716cfcc1229c50a7310d1424328b4dc7c6b3c33c20370b98899cfad2e3,2025-01-17T17:15:12.597000 CVE-2024-57582,0,0,2a1d35e4fc860c65eb8a4315ed1ba4c31f49b01c911d5b356fd3e8b7f891a8b3,2025-01-17T17:15:12.797000 -CVE-2024-57583,0,1,a02bfc66fca0e321afc33c8ed95edf293ab0d78b8736a62da8c5a6dc7f2892d3,2025-01-22T16:53:20.263000 +CVE-2024-57583,0,0,a02bfc66fca0e321afc33c8ed95edf293ab0d78b8736a62da8c5a6dc7f2892d3,2025-01-22T16:53:20.263000 CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000 CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 @@ -273561,7 +273563,7 @@ CVE-2024-57703,0,0,648a1f97a651c02bc9cbd814c3aaa6ce923f775ec3dcd0727ff2f9993e5e0 CVE-2024-57704,0,0,5d3ea96b243ef47ad9a653892bd654803ec2d81d9a41451dd6e5053bc648eb08,2025-01-16T23:15:08.113000 CVE-2024-5771,0,0,8829a844c7846b06bb23778fad93312a505e31e0f93087e15ef0b64a0b36f535,2024-11-21T09:48:18.863000 CVE-2024-5772,0,0,04004702ec5106d11d8a70be9a1c34eceae4a60526afd5c3eb12e840c71e6683,2024-11-21T09:48:19.003000 -CVE-2024-57726,0,1,65fd2cddc719c88ffa0e00b4be18aec8ffa9fb5d459bdfe85cd0cb0d5409aec0,2025-01-22T16:25:12.533000 +CVE-2024-57726,0,0,65fd2cddc719c88ffa0e00b4be18aec8ffa9fb5d459bdfe85cd0cb0d5409aec0,2025-01-22T16:25:12.533000 CVE-2024-57727,0,0,92f5d24a0d77d41fbb6ea3a796a25597f2aecf3a4600a0571ed4ae9364be0356,2025-01-16T21:22:25.317000 CVE-2024-57728,0,0,fb354679bf974c668fb55e36081142c182c86cd0df2050f9f41db6946683897d,2025-01-16T21:24:08.077000 CVE-2024-5773,0,0,a81a8a1444339b4362dba96291597bd9b9bbe8a53c3349e61bbda1dd4baa2ba4,2024-11-21T09:48:19.137000 @@ -273578,14 +273580,14 @@ CVE-2024-57765,0,0,bb5f0bdcee1790691f17d8834f335b790811b9389ec0c6763671ac65c55be CVE-2024-57766,0,0,8f0d61778f541b88c287d10c0f6e2af8e8d7fcb63b0a840bbdf68bc276d18da5,2025-01-15T00:15:34.433000 CVE-2024-57767,0,0,dca7521d8c2d164ca91c3f80ad6518d83fadbebdc631af42baf521d4db6c6f0e,2025-01-15T00:15:34.543000 CVE-2024-57768,0,0,e00f69a24549670426cf3162728515b005047dfd2006716c80c3c15216823f81,2025-01-17T18:15:30.633000 -CVE-2024-57769,0,0,b999fe9cd6d815b37615c202124914c6be25fb061629ca55f8b8761ee0e8f08f,2025-01-16T18:15:26.240000 +CVE-2024-57769,0,1,a32204ac2410f81a8583f8856f53d17e5ecfbc2b7be967f5831a11911769e4ea,2025-01-22T17:07:20.067000 CVE-2024-5777,0,0,36540573098e4e57e2480cda4540050e04f465dce04feabfdc311a1dd5bf4bae,2024-06-12T08:15:51.113000 -CVE-2024-57770,0,0,c2670ecc7d10147061f09e3a7e216daa7b7961162680fe996d6040fe901c7730,2025-01-16T18:15:26.477000 +CVE-2024-57770,0,1,7f24d3ef2d08261d65b18505b6bf2c322f3ee58de7c2037a3c6ac03aee39d7c4,2025-01-22T17:07:27.687000 CVE-2024-57771,0,0,eaf092bb0a93375274a0327d1c073ccab1dedd7c60e73e4c952c30beac3ab538,2025-01-21T17:15:15.880000 CVE-2024-57772,0,0,5c9e3ebdf8909aa581e4be2fe94c325564f1d0feb1a0d39ebfd0677986ed4fc7,2025-01-21T17:15:16.073000 CVE-2024-57773,0,0,1472bdb16aea64af8fca7b40bd42060d257a747077a74fb79d13a84acc8a924d,2025-01-21T17:15:16.250000 CVE-2024-57774,0,0,2551abca035214b076f4360f33057fe8d04ee4b5e8e086ec9ba87a0de1485501,2025-01-21T17:15:16.433000 -CVE-2024-57775,0,0,10091268f59d36a89c0555c6e2bbf6b1502819a2ceddda3c031d0797e713b4c8,2025-01-16T18:15:27.633000 +CVE-2024-57775,0,1,b519291092c64b6875c13ce1b7f0d73d455ce9748baa071b22f0e6486753a896,2025-01-22T17:07:33.500000 CVE-2024-57776,0,0,eaab98e11b19f3fb779abcf8d8f9f304af86ab319f8e72a23ae3da3c19719e8b,2025-01-16T18:15:27.870000 CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000 CVE-2024-57784,0,0,13e3853bb84451bd96ad42acd016f282a76aebd120900fc78df88a4edeadade0,2025-01-16T23:15:08.213000 @@ -275089,10 +275091,10 @@ CVE-2024-7340,0,0,afceb6b3fac1138f8cb83e0f415cec5ebdcab90ac887ac6cc7416d04596c33 CVE-2024-7341,0,0,9879605967e8521e630e3508fca649ab0616466777cf91cc4c4478c8d606e537,2024-10-04T12:48:43.523000 CVE-2024-7342,0,0,bbab372366d62b7492fd885c0fd46da4598051b512f5991327f8cfce46915879,2024-08-15T18:40:22.537000 CVE-2024-7343,0,0,7f2632b50e9d4a4da19cdb31448eaac6640ad60d85ef9c956fde33f5c8956343,2024-08-15T18:40:52.707000 -CVE-2024-7344,0,1,41ec0d1fc8818b5427742be88275de65e522c05fc70fb579f3eb90da335d2c77,2025-01-22T15:41:04.577000 +CVE-2024-7344,0,0,41ec0d1fc8818b5427742be88275de65e522c05fc70fb579f3eb90da335d2c77,2025-01-22T15:41:04.577000 CVE-2024-7345,0,0,7689b50cbee63ee18ebf904fc91903644247462e42f3178c6191ec55402d6f73,2024-09-05T14:11:00.493000 CVE-2024-7346,0,0,25638c7d38cc54d22ba7fca216c7c1e04ae0c03279aa3b42c264161ca8172985,2024-09-05T14:03:24.040000 -CVE-2024-7347,0,1,76507e84fbd35b359868f6cef009a1ad152aee7a0ffa5fef85d30e96f1519d08,2025-01-22T16:10:28.490000 +CVE-2024-7347,0,0,76507e84fbd35b359868f6cef009a1ad152aee7a0ffa5fef85d30e96f1519d08,2025-01-22T16:10:28.490000 CVE-2024-7348,0,0,09c0d21b00fb7cb86488ca2787685d9b9da3b886a45d9334b1e89a04d5e121f5,2024-11-21T09:51:20.720000 CVE-2024-7349,0,0,ccf23d688d536a2eff13a87ef73563f5aaca69c358d1f3c9dd8bb4ccf304b0b7,2024-09-12T12:43:32.957000 CVE-2024-7350,0,0,fafe078281631d5be201e74994adbfcbb9fc4af4b45d3f1320c0b47fe8799534,2024-08-08T13:04:18.753000 @@ -276499,7 +276501,7 @@ CVE-2024-9009,0,0,eeb88ddbe5b876be2da9458977e863a4a7e2f8f749b5ec4c67398617f01067 CVE-2024-9011,0,0,5f917ba5d6e9e414a668fa259efdc89c2355605a5666ae5f81812d44488e6ab9,2024-09-25T17:48:14.820000 CVE-2024-9014,0,0,220003038e0ed1cc49a0befe3090135c41cd16a5f829c2d65bd6cc8f984c0497,2024-09-26T13:32:55.343000 CVE-2024-9018,0,0,9d5f9a71065cb5737c3eb97e3b8fce2545d7a7505edc442df3224ec9cdcd8b15,2024-10-07T19:20:48.293000 -CVE-2024-9020,0,1,13f7d55260c3dda01ac88411af938bbf50d791e8c741bac69665223f77a450e5,2025-01-22T15:15:14.407000 +CVE-2024-9020,0,0,13f7d55260c3dda01ac88411af938bbf50d791e8c741bac69665223f77a450e5,2025-01-22T15:15:14.407000 CVE-2024-9021,0,0,38ce15408413883ac2962e131e46ff98aae3d8ba8d1d410ba95b4f315f4dd5ce,2024-10-10T12:57:21.987000 CVE-2024-9022,0,0,b97de3f37f13459888a48b84864cef3e3e6492a34af924d2e6bb02f8326a41fe,2024-10-15T14:34:12.063000 CVE-2024-9023,0,0,566271d29d8f54a0a61ddaf86501114bfe67a778e35c5f516ed0b6b3612b9879,2024-10-01T14:39:38.370000 @@ -277339,10 +277341,10 @@ CVE-2025-0199,0,0,865eff50876368f6ac555513ef5b5fdc0dc9570302fec6e10d6fc34ec2c217 CVE-2025-0200,0,0,1c56f86e27712fa129121bf2c2fd0e92b6fdb9217c52909f73ec929344fbe1a0,2025-01-04T03:15:07.020000 CVE-2025-0201,0,0,30d561bbfd9ec1b18fbccd47b917b093d8cbccc70befce1eb07ea9e1538c205f,2025-01-04T04:15:05.620000 CVE-2025-0202,0,0,4c4572616f5f93191d3ca13fa7d12bcd95c17e726cd3cc4bf6f102513e2b629c,2025-01-22T07:15:16.570000 -CVE-2025-0203,0,1,a5f6177ca59532137b7b1f2b25e590caf5585a2f4c15e38814775e99d2a98cb0,2025-01-22T15:47:10.633000 -CVE-2025-0204,0,1,c001082b579b79c29609669bbec6a0725a6fcece40acb248427f26e9b7e4a830,2025-01-22T15:42:44.060000 -CVE-2025-0205,0,1,c1b8963cbb2c2d758fd565d8a381a54f1bf965f9ab8540f4de794a43621e8aeb,2025-01-22T15:33:38.597000 -CVE-2025-0206,0,1,064dfa4d1e97db9eae9addeb262c8b5d590ee6362351d05bec1694aa9acd36ce,2025-01-22T15:24:50.937000 +CVE-2025-0203,0,0,a5f6177ca59532137b7b1f2b25e590caf5585a2f4c15e38814775e99d2a98cb0,2025-01-22T15:47:10.633000 +CVE-2025-0204,0,0,c001082b579b79c29609669bbec6a0725a6fcece40acb248427f26e9b7e4a830,2025-01-22T15:42:44.060000 +CVE-2025-0205,0,0,c1b8963cbb2c2d758fd565d8a381a54f1bf965f9ab8540f4de794a43621e8aeb,2025-01-22T15:33:38.597000 +CVE-2025-0206,0,0,064dfa4d1e97db9eae9addeb262c8b5d590ee6362351d05bec1694aa9acd36ce,2025-01-22T15:24:50.937000 CVE-2025-0207,0,0,efb215193134d5c08e2d49348e35ad7019ed0b6e630925d219b699652b9455e4,2025-01-10T21:27:26.337000 CVE-2025-0208,0,0,5a82bd838f0fb22689ddb131fe9167ef55569a112269991392ae74673203ed76,2025-01-10T21:28:35.270000 CVE-2025-0210,0,0,3ba2859cb45e451a40b49d3263091b5cb6aeae0c2bc600704b5eb18b048c0e12,2025-01-10T21:20:42.080000 @@ -277421,7 +277423,7 @@ CVE-2025-0391,0,0,ab8f7905746a492810fe86765faefb1fff997fc4d75bb4be776d20c58a3559 CVE-2025-0392,0,0,59785954f613ac3d294944412df9ed2ed102ba9c9ed7f965ef5916a645263c65,2025-01-11T11:15:06.657000 CVE-2025-0393,0,0,959e820d75bdf7a4a4738ade5c663f0e8ec388ca0f6b468cd52102afbed99998,2025-01-14T09:15:21.263000 CVE-2025-0394,0,0,8af05602da319139a083fa2a7a4d905dc508d9028abbcf98db5f09623dbab6ca,2025-01-14T09:15:21.430000 -CVE-2025-0395,0,1,028a49af5b50e5ca5090934d62970e433f1ebf15a1a5555a600e8217de824ec3,2025-01-22T16:15:29.893000 +CVE-2025-0395,0,0,028a49af5b50e5ca5090934d62970e433f1ebf15a1a5555a600e8217de824ec3,2025-01-22T16:15:29.893000 CVE-2025-0396,0,0,18d39e6a7adcce3603c1c0aa9eb8543815bc0fec0a28cf7987d5debab0b3fa41,2025-01-12T12:15:17.963000 CVE-2025-0397,0,0,08feac0210d169d6c425c3e514046442ce8702b1c9bf4c395a52e3132e842759,2025-01-12T13:15:07.333000 CVE-2025-0398,0,0,4dce72a8ed9b3c643da849528d4f1f4a44373786b63fbf729a0e8a57af35dcc2,2025-01-12T14:15:08.993000 @@ -277528,12 +277530,13 @@ CVE-2025-0584,0,0,37edd7443b159fd364fe1f94f606e27d6a33e0c9083f38da0f466f56b50d0a CVE-2025-0585,0,0,da99d05fd55072bf46a920856a2fb4b6ebf8e817a63e5b48426e8c31494a0fa3,2025-01-20T03:15:09.283000 CVE-2025-0586,0,0,abf0a06c875b8bd5421f2c6f6ef5b8719d6ca1dacc61f1270de8b585f4b2e6ab,2025-01-20T03:15:09.433000 CVE-2025-0590,0,0,c554cb9a0bdc14b97d65dbcaf6b8f0519615dcf5380f9d8d26f0b94a792fad9b,2025-01-21T15:15:14.117000 -CVE-2025-0604,1,1,87d9407a02620becef67b9dd9028944889fa4567f9f58fb72c0a174c2afe74dd,2025-01-22T15:15:14.827000 +CVE-2025-0604,0,0,87d9407a02620becef67b9dd9028944889fa4567f9f58fb72c0a174c2afe74dd,2025-01-22T15:15:14.827000 CVE-2025-0614,0,0,c85e5b141df45983a9b8023744afed1074e3155c77698a4efcba3b1933f20f8e,2025-01-21T12:15:27.580000 CVE-2025-0615,0,0,24948b17ddad86445a37019481e808c754a1ff5ca4b2da53c27f9618c73c00c8,2025-01-21T12:15:27.737000 CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000 CVE-2025-0625,0,0,aa2cb20c8c831ead0221791f1496fad6fff25e44f479f9085e096921461f29e7,2025-01-22T02:15:31.123000 -CVE-2025-0638,1,1,ac9cca0d245198ff4674963eab0600993bc0b56692f14b75cf07327388ff27d0,2025-01-22T16:15:29.977000 +CVE-2025-0638,0,0,ac9cca0d245198ff4674963eab0600993bc0b56692f14b75cf07327388ff27d0,2025-01-22T16:15:29.977000 +CVE-2025-0651,1,1,8c67aa0f80c9f1e30412c542495f9f971e1fa118a8f80db65a60da0b955bdf05,2025-01-22T18:15:20.363000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000 @@ -277543,6 +277546,9 @@ CVE-2025-20086,0,0,c718ee138c5d706935ee7319c465eb1db60c32a8ee92f074be268892106cc CVE-2025-20088,0,0,d069a0a8d0e55448ae448cb2d1bba620f97cc6785542779fdc1ef2f2206cb89e,2025-01-15T17:15:19.243000 CVE-2025-20123,0,0,54512af23f890abd1fef44213c66523a0b62c1420699fcab5bda08e37f5f4455,2025-01-08T16:15:38.150000 CVE-2025-20126,0,0,0fcc9383f8a59c5e0d551ae3c2ee7933f9c74701d79731c282030a0992412e7d,2025-01-08T19:15:38.553000 +CVE-2025-20128,1,1,47fb5de6da06ac449d2610501ca34ca927a02f85d092f55ceca7dc5b48f1b121,2025-01-22T17:15:12.583000 +CVE-2025-20156,1,1,4bfc4209b2cfe36d0a3ee83a991ba63b278b5299bedbcd6f0e6a8f03afd401ff,2025-01-22T17:15:12.800000 +CVE-2025-20165,1,1,7c386eb2d21dbfcb92b62e0c7c9dd42da0645cf465e4c16dec26060ce9893e4e,2025-01-22T17:15:13.010000 CVE-2025-20166,0,0,188546bff78f1ed6c60c3dafa709981ac0aa7d116e226da5b14281c3f0f04183,2025-01-08T17:15:16.990000 CVE-2025-20167,0,0,ea01454738582257d8f0561c538bde2bc3fca79642eac6232d7fa05917ea3b87,2025-01-08T17:15:17.163000 CVE-2025-20168,0,0,f8a58ad4899086a228f10ada9d537b9205b9094ad2b0c298be3af0260ad230d2,2025-01-08T17:15:17.323000 @@ -277686,7 +277692,7 @@ CVE-2025-21325,0,0,31758d0cc76d6380f02d2304f83926081d1e932ac95a6eee2a71dc7102dbe CVE-2025-21326,0,0,a5e6f1ef9b9a2944d2bea648da839845d2d7762f68463063bd25e92cfb364e2b,2025-01-22T14:48:07.620000 CVE-2025-21327,0,0,7bac4461b88a40da2348ee4029e1707219f2df088efa12aa55c2e9580623a255,2025-01-22T14:59:37.587000 CVE-2025-21328,0,0,dd919c7fd6a45815c6a0be9a54c809e84249c572d7c566b2907d17270baa8f75,2025-01-22T14:59:12.047000 -CVE-2025-21329,0,1,9be90aee067b9fd32a5a19fe91b2514af6fe209fd987df078deb30d3caaab83e,2025-01-22T15:02:32.270000 +CVE-2025-21329,0,0,9be90aee067b9fd32a5a19fe91b2514af6fe209fd987df078deb30d3caaab83e,2025-01-22T15:02:32.270000 CVE-2025-21330,0,0,e9596fdbe050e6b04292f06212bec1896e015b0111ce0ee99a206b6dc4f64682,2025-01-21T20:04:19.400000 CVE-2025-21331,0,0,082b98f28b869f075fe82528f0ac19a8ce6f77d17ae317e8556aad895fa48f1a,2025-01-21T19:58:20.833000 CVE-2025-21332,0,0,edf859babd061219cc1cce3d52c09e668a5e0f31058bfea0e2ae4470ea2b16a4,2025-01-21T19:57:17.993000 @@ -277770,10 +277776,10 @@ CVE-2025-21525,0,0,7c4c12af2a56ea4e167d7c43f8f4236dbaa79a5bc75f8f2cda6698423269c CVE-2025-21526,0,0,eadb5f70cd6c5c15f528804be5703753e56b447d5a1326c9d52b172c381214bb,2025-01-21T21:15:18.337000 CVE-2025-21527,0,0,cecb1eac10a032ffdd65739887cd72535a25bd8424276c4782816d3af0186cf1,2025-01-21T21:15:18.467000 CVE-2025-21528,0,0,83beb13e142ab564dc1e2aff77180fbfe0bbb2899ecf4f862fb3b6e8ea646caa,2025-01-21T21:15:18.597000 -CVE-2025-21529,0,0,840ad56be5507c705f682d953070259eb2fe5f7ea01dd1db6540ecc2ddc7566c,2025-01-21T21:15:18.720000 -CVE-2025-21530,0,0,d609dc744ac8fdf5b8f12e6b08c735ec14a98f0052ee9c105ffd618620d4fda3,2025-01-21T21:15:18.850000 +CVE-2025-21529,0,1,dee20dece2eedb23e04324824e015e8f05eee7ea7433e5b61e65814c57dca6fa,2025-01-22T18:15:20.530000 +CVE-2025-21530,0,1,5acf6e339ccb7e518b28b3b1dd72423eccb0a9ebb7d08da09f9b674845742584,2025-01-22T18:15:20.687000 CVE-2025-21531,0,0,05583607adcc4d4c1f5c21da7bcc586fe5f8c25ce507d29f621b92441abaffaf,2025-01-21T21:15:18.980000 -CVE-2025-21532,0,0,9c8bcaf2febc6dd4502b03d3bac1406db45d2021c13ab48418368e0510a8e028,2025-01-21T21:15:19.107000 +CVE-2025-21532,0,1,61bd07d7e623e187e03aa7a8276cfe4862ba5c8664acc8b414eb63edf98a5a15,2025-01-22T18:15:20.840000 CVE-2025-21533,0,0,0e73ca347c1bccbcfa5b0114439c34cf447c8decaea87ec708047ce0cab24e68,2025-01-21T21:15:19.240000 CVE-2025-21534,0,0,03408716008ecbf7274b5ee90fd932a561fa9c1186d8aeb89e271323b41d06a2,2025-01-21T21:15:19.363000 CVE-2025-21535,0,0,5f8ab705da684bfcef3cf73b25303bade485cb8e90984bf30e2ab8f373eae322,2025-01-21T21:15:19.477000 @@ -277785,12 +277791,12 @@ CVE-2025-21540,0,0,a677255ca0340145840eef8554a5d83bf902feb6fe53fe76a600cf4e42355 CVE-2025-21541,0,0,a50b405ff1aaa510d317eb443baf2dd76816d89d3c8852136e6c5478491907c7,2025-01-21T21:15:20.287000 CVE-2025-21542,0,0,fb967ef81bac37c85d2ecd845467310abf52fed221f69b921601619ed47c2c97,2025-01-21T21:15:20.420000 CVE-2025-21543,0,0,79456000d85a5a73e09022be586f5740aca37f551067a947377f53a1dad40cdd,2025-01-21T21:15:20.550000 -CVE-2025-21544,0,0,db94661863923b43f7427d5e13e34d02fd682ab24395dc6fe0b5fc37caad4cd7,2025-01-21T21:15:20.690000 -CVE-2025-21545,0,0,e985e8bdc3807270f986a50c5f7d1ac1f486ba399c5a3908db873855785fc717,2025-01-21T21:15:20.860000 -CVE-2025-21546,0,0,741c4ebd0a8890162cf5859981e215b57b223ab0c32ae9e2fbc645d8a383597b,2025-01-21T21:15:20.987000 -CVE-2025-21547,0,0,4b97c223dc6be760058a1fdba3ca7bf53c67bbad6fc286cbbda65649c312918a,2025-01-21T21:15:21.110000 -CVE-2025-21548,0,0,093b6cec9fc419d5ef29ffaa06e07b9d70a5955d19cdff1d970ef9cc57bab624,2025-01-21T21:15:21.240000 -CVE-2025-21549,0,0,4666c1cc8036b126f1f8d1d6f1c07aabb6296aeb314492dd20faf8fc1c05d873,2025-01-21T21:15:21.377000 +CVE-2025-21544,0,1,980b23066e2438b2ca08079f7db43e8e73ce5aa9b8984f4251d41d219739f055,2025-01-22T18:15:20.993000 +CVE-2025-21545,0,1,ce990f26df4d184dca2eac3e2b8d470bf1f75305d23136acbe2549326cb60340,2025-01-22T18:15:21.117000 +CVE-2025-21546,0,1,7b354cb639455f7b79dee856fae258a04fad8d3adfc2f13721943e45f8530c36,2025-01-22T18:15:21.270000 +CVE-2025-21547,0,1,1ad1ab17972a6f4c685ea681af58cb7a2e8f77c6fa0cb4e31d27bc90763cf5b2,2025-01-22T18:15:21.433000 +CVE-2025-21548,0,1,b5fe9c2065c67db5ec39b9f4d48c3c9b9dc1e5eb6eb9c70252399ff45425b5d2,2025-01-22T18:15:21.583000 +CVE-2025-21549,0,1,9516fee84da3e6782710c423fcb70a88cfe6b1a5953c8090349aba05fb0d6897,2025-01-22T18:15:21.740000 CVE-2025-21550,0,0,88bee3fde00b32aae760f5450a9a7991244cb321f331d0b969b610293eab5ff8,2025-01-21T21:15:21.510000 CVE-2025-21551,0,0,6723f5bc41c6fc44ce87ea6a2a5266f1be465c8b310d568051e0a77054454e6d,2025-01-21T21:15:21.637000 CVE-2025-21552,0,0,8b4c650dfe6daad3d9cce9104d88ef85d802e8adf195e3ffee6e10ec48772c3a,2025-01-21T21:15:21.763000 @@ -278134,7 +278140,7 @@ CVE-2025-22764,0,0,bb4ba9e4fde2400f152116cd1aad7bbbdbb7d640219a8e01ca47cc112eba4 CVE-2025-22765,0,0,05da1bdc9e7167edf5387de0586b61a1995a9741b623487d7015cbf79f0a61e1,2025-01-15T16:15:39.543000 CVE-2025-22766,0,0,343e87bbd358f52869bf43f77788e51e9a96e6bce59424af557599ac7a821c7c,2025-01-15T16:15:39.700000 CVE-2025-22769,0,0,4e6d679e63f8fe706c18670ecdd89233f779b3c6dadefbabc9659ff336c0b4a9,2025-01-15T16:15:39.860000 -CVE-2025-22772,1,1,3a00e89ad909c68ba2b86c31324220231310a44e7a9d8f09a57bfe4d0193ce08,2025-01-22T15:15:14.990000 +CVE-2025-22772,0,0,3a00e89ad909c68ba2b86c31324220231310a44e7a9d8f09a57bfe4d0193ce08,2025-01-22T15:15:14.990000 CVE-2025-22773,0,0,fcf097b5a8bf8f017de7fe5f8a18a77369aacf0486c55459d6bb76d657f29d3d,2025-01-15T16:15:40.027000 CVE-2025-22776,0,0,3a44d2ed038c8fcf2a82ed573a85678c06e1f13008a49c36e4d4a59c650fa83c,2025-01-15T16:15:40.193000 CVE-2025-22777,0,0,6e361a5228daa020e40ee58c141da823e7968148e70048924a6df32b9ceb16ce,2025-01-13T18:15:22 @@ -278194,7 +278200,7 @@ CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11b CVE-2025-22964,0,0,e69aed1923aea3897411457b44976dbc204f41e7c2ec36d989f628a69185179c,2025-01-15T23:15:10.650000 CVE-2025-22968,0,0,41c7a798ef1cac51f67409788e09403bf1c73ade164309e1bf03d8de0a22a69b,2025-01-16T16:15:35.917000 CVE-2025-22976,0,0,7635385bbb1168f03f689653f73812b5306e7c676072ca854591d831ffee9997,2025-01-15T23:15:10.783000 -CVE-2025-22980,1,1,1b650497280c100d9e87200d77a5d79d3f284742776a6c05fc5e9f294577aa3c,2025-01-22T15:15:15.130000 +CVE-2025-22980,0,0,1b650497280c100d9e87200d77a5d79d3f284742776a6c05fc5e9f294577aa3c,2025-01-22T15:15:15.130000 CVE-2025-22983,0,0,a4325d671f457e3a88359f4b166998f53b22f358b22808393b6eeb33cff62cc1,2025-01-14T16:15:35.603000 CVE-2025-22984,0,0,c374cc7c54df2dedb6ecac62cfd3186e913633b44b128647ebb7edc501f96a0c,2025-01-14T16:15:35.710000 CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000 @@ -278207,6 +278213,7 @@ CVE-2025-23022,0,0,bb805305ea96825569d9891ea5d8911d64b95f766e73f0709e01ab6077884 CVE-2025-23025,0,0,a430643fad54c298ac56c82186034eeeea39626036838a2f98e7e7672f4b6ffd,2025-01-14T18:16:05.650000 CVE-2025-23026,0,0,b268119f7916ba3a282a082a7a4e3bccaa70c542061d608ad26e1251c19332fd,2025-01-13T21:15:15.897000 CVE-2025-23027,0,0,21e7f0bf367301f9d9767775ff2fd1e8d057729c5ff745babdc630ff49bcccd7,2025-01-13T20:15:30.150000 +CVE-2025-23028,1,1,c633b45b1b4ee4fc0d4fe25566085043d900e838c5881e023fc6519e95918038,2025-01-22T17:15:13.487000 CVE-2025-23030,0,0,5f5488f3db88e8c895880e2de98df446e60223d5e62859723fef77413b8f908c,2025-01-14T01:15:17.690000 CVE-2025-23031,0,0,2703053b13ed5e9a113496ca6487c0768e722bf303bd843f213558ab4f1e3cfe,2025-01-14T01:15:17.833000 CVE-2025-23032,0,0,de6528be93400e7c6a12523068c65ae2de0c74bc389f9c5ab57be51bbf210243,2025-01-14T01:15:17.980000 @@ -278221,6 +278228,7 @@ CVE-2025-23040,0,0,d4de7a8421c067a3dee1e4828d031dbc8cced140cb9649eae08cdfa2830d8 CVE-2025-23041,0,0,ffbaafde38ecaf1d57db26f1ec7a4a20e702b6709b42f775e18048cdcef4b867,2025-01-14T19:15:44.713000 CVE-2025-23042,0,0,92005faa00456aa5afa950bd4ab8b8a8c4ca330b482d221fa1133fac47b2b1ec,2025-01-14T19:15:44.863000 CVE-2025-23044,0,0,bbbddc46c89dc84198e8ef72e664aac6dd19db0a67a15b707c4dde56a230e7bb,2025-01-20T16:15:28.170000 +CVE-2025-23047,1,1,1e42dbcadfbef3a0550a8212afe692278e219ab28b49b7f1aa815f315b176299,2025-01-22T18:15:21.893000 CVE-2025-23051,0,0,ead28ea498e407b35677db2fede84778fbf7362b4c34bf925c1b3ec9947a64af,2025-01-14T18:16:05.813000 CVE-2025-23052,0,0,b3ec00cf9abf09fc23b8acce2e1e1cc722adc57628431f397d03db4729b24d0f,2025-01-14T18:16:05.960000 CVE-2025-23061,0,0,b4f49d5cfe4a6ddd334224104c930dfc4f06696fe9671dfd7fb46829caa69bfb,2025-01-15T05:15:10.517000 @@ -278250,8 +278258,8 @@ CVE-2025-23126,0,0,aec9ca15332b86ad22382c8419cfef8190ae4b723f5c3088974b31a1f5dd4 CVE-2025-23127,0,0,ef1aeaee3e917139d62386eaa309c28fa46e54be8ed45ecdaab4f9d4f96931db,2025-01-11T15:15:09.173000 CVE-2025-23128,0,0,856260a69fb4f1bb5d13296c47ffc7dac686c7ca9a44fff8151b1b7f11a740a9,2025-01-11T15:15:09.250000 CVE-2025-23184,0,0,85dc0b5143649e34450a3676900e6e40d3e1c3056b6e1dfc30b9a36cadde4291,2025-01-21T10:15:08.110000 -CVE-2025-23195,0,1,330ec078db97e6dc3fdb7cdbe57f6450c92255b88a9b52bc02ab0cb6754204fa,2025-01-22T15:15:15.237000 -CVE-2025-23196,0,1,c86901772359f4512fdd147449b9ed6294fa0f580a5b9af77dfe2551cf2e530c,2025-01-22T15:15:15.390000 +CVE-2025-23195,0,0,330ec078db97e6dc3fdb7cdbe57f6450c92255b88a9b52bc02ab0cb6754204fa,2025-01-22T15:15:15.237000 +CVE-2025-23196,0,0,c86901772359f4512fdd147449b9ed6294fa0f580a5b9af77dfe2551cf2e530c,2025-01-22T15:15:15.390000 CVE-2025-23198,0,0,8821b8df90adb16cf3625e528f68c391c0bcfa1c8e1e079b50c30f527c621897,2025-01-16T23:15:08.410000 CVE-2025-23199,0,0,3b82f03297e12f7b25649af5d3a8aa211e1441848bb66c00094132bcfe252a94,2025-01-16T23:15:08.567000 CVE-2025-23200,0,0,76f8b53439f8a2997652c579cc0769759091077ab1b58d306f6ddac70c67ff17,2025-01-16T23:15:08.720000 @@ -278283,89 +278291,89 @@ CVE-2025-23438,0,0,d5b99d41ae258b81c318d76badc751e3c16a7fbfb5848a85ee9570d47579e CVE-2025-23442,0,0,ff778f6541faf895ad64165d80b689e528bc89a7807a8adddefabde77d4edffa,2025-01-16T20:15:35.210000 CVE-2025-23444,0,0,bd139aa5f0d5452b293e56da4268a8dc616b5f5ec3a0335035b071fc8609deb1,2025-01-16T20:15:35.360000 CVE-2025-23445,0,0,641133bc0863203a2790eaa4ca8b7599bd8c7c6922be0e426f2e225feec309f9,2025-01-16T20:15:35.513000 -CVE-2025-23449,1,1,6bbcc9886e2c670b577a3a18178e87df9ed4a131fd95c3706bc4c5f073e90961,2025-01-22T15:15:15.650000 +CVE-2025-23449,0,0,6bbcc9886e2c670b577a3a18178e87df9ed4a131fd95c3706bc4c5f073e90961,2025-01-22T15:15:15.650000 CVE-2025-23452,0,0,9ae20555b511c9e710c7a052682906033b9071856145809833c544b191d171ae,2025-01-16T20:15:35.730000 CVE-2025-23453,0,0,559af2b40776602b954faf6eb051d0ee733c24375fc61f4efde0fb69b854694c,2025-01-16T20:15:35.883000 CVE-2025-23454,0,0,378302c8707f6fd96559ef4a7f4efc3726f47806c14b509deb4db543cb645290,2025-01-21T18:15:16.223000 CVE-2025-23455,0,0,b68e42bf1b83a50e0ae3f133160e0d1ee1a7c47161ff1547208b101f38e9ccf6,2025-01-16T20:15:36.033000 CVE-2025-23456,0,0,b9d69f441ecef487989469cbcdd543bce473422ca06c51c0b02404c7506af3d0,2025-01-16T20:15:36.247000 CVE-2025-23461,0,0,579c786c500a65f7aa3e7a2033668428f43b1c94463c7a65645aeaa42575698b,2025-01-21T18:15:16.387000 -CVE-2025-23462,1,1,c83da6f92808e55252781daa2b8102b2a0626a82ecff91e0a94155a57a6af52b,2025-01-22T15:15:15.800000 +CVE-2025-23462,0,0,c83da6f92808e55252781daa2b8102b2a0626a82ecff91e0a94155a57a6af52b,2025-01-22T15:15:15.800000 CVE-2025-23463,0,0,98d57f4a46d47d157b5ed19edc615443bfb511b5852b7cb0045c98e9789a1faf,2025-01-16T20:15:36.397000 CVE-2025-23467,0,0,2bf367475f14e1f3924f0a4f22a4aea1a79671e1b9e87972e80793a0f370189e,2025-01-16T20:15:36.547000 CVE-2025-23470,0,0,8848375424af5ed790014076bbf48be372e428fab979e2d67fe4f034138fca32,2025-01-16T20:15:36.700000 CVE-2025-23471,0,0,8559e2ce78e3acc0fab057aadfea445292e3f0c4980827d748c143f09c30fffa,2025-01-16T20:15:36.840000 -CVE-2025-23475,1,1,abfa8175f15a8c73c768247625e270489041dc5b6e8d664338de8f476db8dfb7,2025-01-22T15:15:15.950000 +CVE-2025-23475,0,0,abfa8175f15a8c73c768247625e270489041dc5b6e8d664338de8f476db8dfb7,2025-01-22T15:15:15.950000 CVE-2025-23476,0,0,2e73d00e315595f7a053681ff301d905967319719056a5b9f811682d4d934c03,2025-01-16T20:15:36.990000 CVE-2025-23477,0,0,c7489baa6f69ef0bb4b1b7eaf1230c06dad483f56b09a6c00a2b524d2ba86b48,2025-01-21T18:15:16.570000 CVE-2025-23483,0,0,4bc6ad2f14d9de9a0797c4da2efee9475ed740963c9329c34f76f07dc090372d,2025-01-16T20:15:37.133000 -CVE-2025-23486,1,1,a151744ace0baf7355a35feb751799851f8129e7da75e14c50722636b3d28eae,2025-01-22T15:15:16.093000 +CVE-2025-23486,0,0,a151744ace0baf7355a35feb751799851f8129e7da75e14c50722636b3d28eae,2025-01-22T15:15:16.093000 CVE-2025-23489,0,0,3a3896d255f4929b2a6075498e324095380c69536d4ce827a6f668f6ee92ce2a,2025-01-21T18:15:16.740000 -CVE-2025-23495,1,1,e624f14289c8ce911d08e4eb390eac71a09062a20dafcdb0b721551249a2164f,2025-01-22T15:15:16.230000 +CVE-2025-23495,0,0,e624f14289c8ce911d08e4eb390eac71a09062a20dafcdb0b721551249a2164f,2025-01-22T15:15:16.230000 CVE-2025-23497,0,0,e94acfea44c4d198d5a805782578eef8be632de6ca980583b81a625d10980e86,2025-01-16T20:15:37.293000 -CVE-2025-23498,1,1,2268e6bec17a5f4f64ae99a91e6f95b642dd60a2ee00673b34d1dc59aa5200c1,2025-01-22T15:15:16.370000 +CVE-2025-23498,0,0,2268e6bec17a5f4f64ae99a91e6f95b642dd60a2ee00673b34d1dc59aa5200c1,2025-01-22T15:15:16.370000 CVE-2025-23499,0,0,18de021795ada6e9003ac109fee0e567e9be54c39a2e050c169b423a62e8fca7,2025-01-16T20:15:37.440000 -CVE-2025-23500,1,1,91a82946fab21967d3b6dbee527f97915154ff38de1323f9bf60075ab19bd6a9,2025-01-22T15:15:16.500000 +CVE-2025-23500,0,0,91a82946fab21967d3b6dbee527f97915154ff38de1323f9bf60075ab19bd6a9,2025-01-22T15:15:16.500000 CVE-2025-23501,0,0,2ca3004ea38a2bebeea912643e9114dc05292b671294dc56e8b3bf1f4edc5f4c,2025-01-16T20:15:37.593000 -CVE-2025-23503,1,1,80be664a3eb5b76d13393576ef7abb61c375e9c1bc129f0052ec70eef733c7b3,2025-01-22T15:15:16.633000 -CVE-2025-23506,1,1,30310ef26b26ecaa96c1cd04907444f802ebcf0b7098d704f1603f14c78f517e,2025-01-22T15:15:16.777000 -CVE-2025-23507,1,1,812d4a62b581f6dd4957734d246921934999b28ae76f67f125c6191e54d589d3,2025-01-22T15:15:16.910000 +CVE-2025-23503,0,0,80be664a3eb5b76d13393576ef7abb61c375e9c1bc129f0052ec70eef733c7b3,2025-01-22T15:15:16.633000 +CVE-2025-23506,0,0,30310ef26b26ecaa96c1cd04907444f802ebcf0b7098d704f1603f14c78f517e,2025-01-22T15:15:16.777000 +CVE-2025-23507,0,0,812d4a62b581f6dd4957734d246921934999b28ae76f67f125c6191e54d589d3,2025-01-22T15:15:16.910000 CVE-2025-23508,0,0,790c1f1efcbcf318bf4001598b0da1f3fe803cd0e7ef29b63714b6cf9d49876c,2025-01-16T20:15:37.737000 -CVE-2025-23509,1,1,cb6c2b1174641777b3b8be8152dda4c81a20345e9ee36c211fce6f5f55ac5e1b,2025-01-22T15:15:17.043000 +CVE-2025-23509,0,0,cb6c2b1174641777b3b8be8152dda4c81a20345e9ee36c211fce6f5f55ac5e1b,2025-01-22T15:15:17.043000 CVE-2025-23510,0,0,0551a63cb17b341b73a80a568037ce1923b810839cf988e2aae99d670ecbccb1,2025-01-16T20:15:37.890000 CVE-2025-23511,0,0,996d3c261b7453d558ae9e3bf08bfd98e9228b013a71ca7506bf459ee4c525d6,2025-01-16T20:15:38.040000 -CVE-2025-23512,1,1,25ea34cdd44b3fec289362e17617e718f5bd0062d0fb236a44d671db855c3fcf,2025-01-22T15:15:17.160000 +CVE-2025-23512,0,0,25ea34cdd44b3fec289362e17617e718f5bd0062d0fb236a44d671db855c3fcf,2025-01-22T15:15:17.160000 CVE-2025-23513,0,0,b49e0ef03f655c5857bfec7a9b723b31c64932dc8261d0e026a3117175ad4f06,2025-01-16T20:15:38.193000 CVE-2025-23514,0,0,34e07e624b89702dfcb5b7bfffc35f3e8691ecd3b879348a43ce40f20c111b68,2025-01-16T20:15:38.337000 CVE-2025-23528,0,0,12168907b0864434d8a4020bcee1f63e4e5adfac10d77e79ea19c426fc40d9ce,2025-01-16T20:15:38.480000 CVE-2025-23530,0,0,8ec89260a35cc3a80dc4111e53382b9b64fc77741f1d33c294cb6047b2afd7ab,2025-01-16T20:15:38.630000 CVE-2025-23532,0,0,deffa93a5742d05598342f489a5313af6567bbdcc8641635c5652a151952e2c9,2025-01-16T20:15:38.783000 CVE-2025-23533,0,0,2feaf795f1df273221ac6faa2b92c08d09ccb79103144b0efc3eedd5b4158baa,2025-01-16T20:15:38.930000 -CVE-2025-23535,1,1,8c6c7853932dc86cad261901d628618e5a1cd59da8c0402b855e776a2dfe5b87,2025-01-22T15:15:17.290000 +CVE-2025-23535,0,0,8c6c7853932dc86cad261901d628618e5a1cd59da8c0402b855e776a2dfe5b87,2025-01-22T15:15:17.290000 CVE-2025-23537,0,0,79e57ef42623bfacf08bcf48f182a917b206d07a7014897deba86aa5721ba1be,2025-01-16T20:15:39.070000 CVE-2025-23547,0,0,6f6ff07f3f424280073fce42bfdec78cd39e7aff8dc91e913640e544d32ed50a,2025-01-16T20:15:39.220000 -CVE-2025-23548,1,1,c721dc1137d98fc07da1935fe1c35885f96adfba5f6a1ac31f8a89ee20a0c5cc,2025-01-22T15:15:17.423000 +CVE-2025-23548,0,0,c721dc1137d98fc07da1935fe1c35885f96adfba5f6a1ac31f8a89ee20a0c5cc,2025-01-22T15:15:17.423000 CVE-2025-23551,0,0,3a2e7c6f8f024397a3482b683af17f9f32814f81bbc6ca9c38c2f9e9c6fffb26,2025-01-21T18:15:16.927000 CVE-2025-23557,0,0,4948e4f74dc87131949549d056234a4050a760fc1ac3fba66738bd84c832aa2e,2025-01-16T20:15:39.363000 CVE-2025-23558,0,0,4291468aaa8c22c74e0bbb0da124051b4e99d0d01c1849f5de31eebeb38c94a6,2025-01-16T20:15:39.503000 CVE-2025-23559,0,0,f107280d0e32fb23f5905ab5f11f98c3b724795adfc26ea0537d5d8ff93e33a0,2025-01-16T20:15:39.650000 CVE-2025-23560,0,0,19b166e58f91145a20070e52b1a91deda6a79a11328a651eb2f155e7b5e396b0,2025-01-16T20:15:39.797000 -CVE-2025-23562,1,1,0821333113da319954bd091c14293df487d7cd138f4dba1eca4a09fb86aeda7e,2025-01-22T15:15:17.557000 +CVE-2025-23562,0,0,0821333113da319954bd091c14293df487d7cd138f4dba1eca4a09fb86aeda7e,2025-01-22T15:15:17.557000 CVE-2025-23566,0,0,88ff034c0930eb7962346da8f31a94b9eca19a480252f7930366050551ebf8fd,2025-01-16T20:15:39.947000 CVE-2025-23567,0,0,a5334e3a1104d1d3b6196126e4f57ba74f8e92384c039079a9ba04e3f6d27982,2025-01-16T20:15:40.090000 CVE-2025-23569,0,0,e1a856fd806178c29488dac0d174aee24c02bc663bf84b5b8e41189ca4debaaf,2025-01-16T20:15:40.230000 CVE-2025-23572,0,0,de6082afe4a128b0f4da24928b9919e3a956306fd340d20a91397a5cf127b9da,2025-01-16T20:15:40.403000 CVE-2025-23573,0,0,47a2bcb665ab1e714c4b6c92d3ce819a124f5bc1e2f376db1bb99620f62cdb15,2025-01-16T20:15:40.740000 CVE-2025-23577,0,0,3b4af4e716479b74840f3095c9fd247d1229a5054ee21299e6427c4aa395d98c,2025-01-16T20:15:40.877000 -CVE-2025-23578,1,1,f708e31c6de5a86dea38d33547975de66c336e6d0303dec1b150fe8cc9302e08,2025-01-22T15:15:17.687000 +CVE-2025-23578,0,0,f708e31c6de5a86dea38d33547975de66c336e6d0303dec1b150fe8cc9302e08,2025-01-22T15:15:17.687000 CVE-2025-23580,0,0,9eddf1eaf4a2583c5b20fc89e10aebe5e5cb76e2c48e48f723b868a0c186ea78,2025-01-21T18:15:17.133000 -CVE-2025-23583,1,1,89446bd1812e0bd45f0d3294b52f4322c4c517986038f3f90e76266ea92928eb,2025-01-22T15:15:17.820000 -CVE-2025-23589,1,1,74a757f601230eab4ee58c1089b93c9544751015dd8e4966bae8697ffb0cab88,2025-01-22T15:15:17.950000 -CVE-2025-23592,1,1,c87dc130bbf66b4c6a0968a3ed7dad715e6675098d8720b6f32bed0c19f7b3cc,2025-01-22T15:15:18.097000 -CVE-2025-23597,1,1,fc06c679d2a2b40c5e7f08a2d7abf6951e495ca8370aefad9cccc8430369bcef,2025-01-22T15:15:18.230000 -CVE-2025-23601,1,1,06c8c2a2a7ecfa69abe997380c981772165bf082de61b014b970f7589c636a06,2025-01-22T15:15:18.363000 -CVE-2025-23602,1,1,11e799a3cab86aa8163996cf13c6d2ad675df72a6f091c99c4bdf1bfb38ccaf5,2025-01-22T15:15:18.503000 -CVE-2025-23603,1,1,ed9daa648d35ef25153f47c4fad725ce6887686049499acb86c08fde0ba99a0f,2025-01-22T15:15:18.667000 -CVE-2025-23604,1,1,84fd112feffc0131ff3c203ca73c4af398db56f66a61c6d2835f3e2756ed98b2,2025-01-22T15:15:18.810000 -CVE-2025-23605,1,1,ae4fec196d1dc1b832453ea9215414736d1e98d98f373b6a2c7903b1d88cb17a,2025-01-22T15:15:18.937000 -CVE-2025-23606,1,1,0ee5355fde41d2bc73e2c4e9c6d390169df372d7a41f6d3a93a1090161861862,2025-01-22T15:15:19.073000 -CVE-2025-23607,1,1,c0547b75766f509223c1e036dccb8deb3606ab189e01667115b20b19b0f124f2,2025-01-22T15:15:19.200000 -CVE-2025-23609,1,1,df23a2919c94b2b16eb8d0e3352f2b745fe5bd0958b662e7f3acf295ea100218,2025-01-22T15:15:19.343000 -CVE-2025-23610,1,1,fded1830d43565dcaa6303361612e26a6faee72e05634f88161f185c38060986,2025-01-22T15:15:19.473000 -CVE-2025-23611,1,1,0fa9fe31de6eb13601640e8aa16e79063806ee87d181a3afe85dbc669bdecd23,2025-01-22T15:15:19.610000 +CVE-2025-23583,0,0,89446bd1812e0bd45f0d3294b52f4322c4c517986038f3f90e76266ea92928eb,2025-01-22T15:15:17.820000 +CVE-2025-23589,0,0,74a757f601230eab4ee58c1089b93c9544751015dd8e4966bae8697ffb0cab88,2025-01-22T15:15:17.950000 +CVE-2025-23592,0,0,c87dc130bbf66b4c6a0968a3ed7dad715e6675098d8720b6f32bed0c19f7b3cc,2025-01-22T15:15:18.097000 +CVE-2025-23597,0,0,fc06c679d2a2b40c5e7f08a2d7abf6951e495ca8370aefad9cccc8430369bcef,2025-01-22T15:15:18.230000 +CVE-2025-23601,0,0,06c8c2a2a7ecfa69abe997380c981772165bf082de61b014b970f7589c636a06,2025-01-22T15:15:18.363000 +CVE-2025-23602,0,0,11e799a3cab86aa8163996cf13c6d2ad675df72a6f091c99c4bdf1bfb38ccaf5,2025-01-22T15:15:18.503000 +CVE-2025-23603,0,0,ed9daa648d35ef25153f47c4fad725ce6887686049499acb86c08fde0ba99a0f,2025-01-22T15:15:18.667000 +CVE-2025-23604,0,0,84fd112feffc0131ff3c203ca73c4af398db56f66a61c6d2835f3e2756ed98b2,2025-01-22T15:15:18.810000 +CVE-2025-23605,0,0,ae4fec196d1dc1b832453ea9215414736d1e98d98f373b6a2c7903b1d88cb17a,2025-01-22T15:15:18.937000 +CVE-2025-23606,0,0,0ee5355fde41d2bc73e2c4e9c6d390169df372d7a41f6d3a93a1090161861862,2025-01-22T15:15:19.073000 +CVE-2025-23607,0,0,c0547b75766f509223c1e036dccb8deb3606ab189e01667115b20b19b0f124f2,2025-01-22T15:15:19.200000 +CVE-2025-23609,0,0,df23a2919c94b2b16eb8d0e3352f2b745fe5bd0958b662e7f3acf295ea100218,2025-01-22T15:15:19.343000 +CVE-2025-23610,0,0,fded1830d43565dcaa6303361612e26a6faee72e05634f88161f185c38060986,2025-01-22T15:15:19.473000 +CVE-2025-23611,0,0,0fa9fe31de6eb13601640e8aa16e79063806ee87d181a3afe85dbc669bdecd23,2025-01-22T15:15:19.610000 CVE-2025-23617,0,0,87ef3623aa25e2331adb93f67250ff54cd8c0a9d97a9df407392635eb142408e,2025-01-16T20:15:41.027000 CVE-2025-23618,0,0,2b70f46c9d14af7d7f45645689d4bdb93fcf0d60e0c8dbeddd3d561041eb97d6,2025-01-16T20:15:41.193000 CVE-2025-23620,0,0,09647c5f995fa9db6ccd9597829259959bc90db907c440ccec24baf4752a0b99,2025-01-16T20:15:41.340000 CVE-2025-23623,0,0,3a19bc13049e6280f5b56d5b01402a56d91485d47ecc589213c73480465da52e,2025-01-16T20:15:41.480000 -CVE-2025-23625,1,1,217e6ef7081bd7c0b9ba662afee4b1c58fb2a9d65b968b7120bc7c3250e2e5fd,2025-01-22T15:15:19.747000 +CVE-2025-23625,0,0,217e6ef7081bd7c0b9ba662afee4b1c58fb2a9d65b968b7120bc7c3250e2e5fd,2025-01-22T15:15:19.747000 CVE-2025-23627,0,0,a0e2c69c295a72f80218793a17c28928376cacd73ebedddc83b23cca208996f3,2025-01-16T20:15:41.617000 -CVE-2025-23630,1,1,b208c37b8385004cf5b9ab8d1ec82d31a1f5c74f6a94ffaf184ddae9429cddca,2025-01-22T15:15:19.877000 -CVE-2025-23631,1,1,02f6d9465957d5054c431116ffffa3869b38bff6e84764dd8de2115daaa0a23a,2025-01-22T15:15:20.013000 +CVE-2025-23630,0,0,b208c37b8385004cf5b9ab8d1ec82d31a1f5c74f6a94ffaf184ddae9429cddca,2025-01-22T15:15:19.877000 +CVE-2025-23631,0,0,02f6d9465957d5054c431116ffffa3869b38bff6e84764dd8de2115daaa0a23a,2025-01-22T15:15:20.013000 CVE-2025-23639,0,0,b5e6c8257038b7490893c42ae7e3121aaccdfc060b9557b2c3eb27b9ad45934a,2025-01-16T20:15:41.763000 CVE-2025-23640,0,0,118e59034a736b15100f4213d9ad0026082135513d4f080af852d559dd80b4a0,2025-01-16T20:15:41.900000 CVE-2025-23641,0,0,7d997794a239066a0b1939bc772f48c377254fbba43ec4f01793fcc89efd7a16,2025-01-16T20:15:42.037000 CVE-2025-23642,0,0,6e64755b7ebe6355ada34a7729dd7046343f3faf18763fdbff82b45cfa37662e,2025-01-16T20:15:42.190000 -CVE-2025-23643,1,1,9f37a10364f980bad82780c689fdd78a0deaa3ad1e962d401a820b194b2472df,2025-01-22T15:15:20.153000 +CVE-2025-23643,0,0,9f37a10364f980bad82780c689fdd78a0deaa3ad1e962d401a820b194b2472df,2025-01-22T15:15:20.153000 CVE-2025-23644,0,0,326651915de9287cf85320be6c8601ed58c356f5737bd31685f6785764f50a52,2025-01-16T20:15:42.323000 CVE-2025-23649,0,0,a43a99cf921270df6f54630a1d678841e6741ab04c2bf8f250e77ecaecfc577f,2025-01-16T20:15:42.463000 CVE-2025-23654,0,0,e18c9b36c57bb400d64806c75d784772ed09a49c73653ec930b121712ce380df,2025-01-16T20:15:42.607000 @@ -278375,68 +278383,68 @@ CVE-2025-23661,0,0,1f7f57e7bde62e643387dd0bb1448a0354f6c08b04d2c093fc9523e9645f7 CVE-2025-23662,0,0,551ab5d2ddda20a665b042bd77267fd330911bfdaae473af13983770c49d1a4c,2025-01-16T20:15:43.167000 CVE-2025-23664,0,0,5eaae3d9bb9680e71179473e67178d8041daabfe633ea61ccf7a551976bb9be7,2025-01-16T20:15:43.320000 CVE-2025-23665,0,0,df3a85fb9b6ff519cb09c58b53e0bb17cb58cc0d047b57ae4c9ab7778577a02d,2025-01-16T20:15:43.460000 -CVE-2025-23672,1,1,c3fb91af1806348814c63d2074cf691c867e564aacd74a17c71282cea64e38ad,2025-01-22T15:15:20.287000 +CVE-2025-23672,0,0,c3fb91af1806348814c63d2074cf691c867e564aacd74a17c71282cea64e38ad,2025-01-22T15:15:20.287000 CVE-2025-23673,0,0,29cefcd5e33b42efd9dd838456a4202e1ca110aefe8c270bd5abccdd213d0d3b,2025-01-16T20:15:43.620000 -CVE-2025-23674,1,1,564e59b5646963f90da8d6de7e570117f5c77d33a4ef7b8468aaa60a3e08443e,2025-01-22T15:15:20.420000 +CVE-2025-23674,0,0,564e59b5646963f90da8d6de7e570117f5c77d33a4ef7b8468aaa60a3e08443e,2025-01-22T15:15:20.420000 CVE-2025-23675,0,0,458c1564a7ab6b017d8c9eba76dd37a8a1853b4061aa5abc64dc3ca26db82593,2025-01-16T20:15:43.753000 -CVE-2025-23676,1,1,18be2b13b1b7ba91a99e0a34f4f28cd978a6f344061f3dcc8948012463f56f04,2025-01-22T15:15:20.563000 +CVE-2025-23676,0,0,18be2b13b1b7ba91a99e0a34f4f28cd978a6f344061f3dcc8948012463f56f04,2025-01-22T15:15:20.563000 CVE-2025-23677,0,0,4f1d78d3726e731bfdb135ac6135bd5100b5ae0cb26c60d465015a36da99e6d2,2025-01-16T20:15:43.900000 -CVE-2025-23678,1,1,b3410bde97a95c9b9a03a0d369341d6c5658893135b851378c1d8f847642358e,2025-01-22T15:15:20.703000 -CVE-2025-23679,1,1,93895d1870d3adabcbd4fb28c2e5720cc79a9c04168bf33764d6520ba310bea0,2025-01-22T15:15:20.840000 -CVE-2025-23681,1,1,509cb0a613eb557f8ea195c8e72dfbcf0e8aa99589c2537e75cb3ffcf5700059,2025-01-22T15:15:20.977000 -CVE-2025-23682,1,1,bc0c141099979b7d253776b5d6bad67fbb952b19a1f94f525728324058074ac4,2025-01-22T15:15:21.123000 -CVE-2025-23683,1,1,a3fdbbfed0d3ea240d77190a49def75faa2f7492b32723bbf199bee3e981e548,2025-01-22T15:15:21.260000 -CVE-2025-23684,1,1,c46bc8e9bf9aa909760560cbfad6d08ccb9bc0c607ac7315a88722fbc67f3ef9,2025-01-22T16:15:30.260000 -CVE-2025-23686,1,1,0c58b3a3ffe3be2de9ae3d7864ede303d49849d5b1b75d6d89318e30ed12a089,2025-01-22T16:15:30.433000 +CVE-2025-23678,0,0,b3410bde97a95c9b9a03a0d369341d6c5658893135b851378c1d8f847642358e,2025-01-22T15:15:20.703000 +CVE-2025-23679,0,0,93895d1870d3adabcbd4fb28c2e5720cc79a9c04168bf33764d6520ba310bea0,2025-01-22T15:15:20.840000 +CVE-2025-23681,0,0,509cb0a613eb557f8ea195c8e72dfbcf0e8aa99589c2537e75cb3ffcf5700059,2025-01-22T15:15:20.977000 +CVE-2025-23682,0,0,bc0c141099979b7d253776b5d6bad67fbb952b19a1f94f525728324058074ac4,2025-01-22T15:15:21.123000 +CVE-2025-23683,0,0,a3fdbbfed0d3ea240d77190a49def75faa2f7492b32723bbf199bee3e981e548,2025-01-22T15:15:21.260000 +CVE-2025-23684,0,0,c46bc8e9bf9aa909760560cbfad6d08ccb9bc0c607ac7315a88722fbc67f3ef9,2025-01-22T16:15:30.260000 +CVE-2025-23686,0,0,0c58b3a3ffe3be2de9ae3d7864ede303d49849d5b1b75d6d89318e30ed12a089,2025-01-22T16:15:30.433000 CVE-2025-23689,0,0,3a077a022662cdd0d4798ac2d9b9685961bbdf05d3a8d2e748b53124c3ed929b,2025-01-16T20:15:44.040000 CVE-2025-23690,0,0,b9e8b4ce7cf418df7c2c552d6aa61f7715b27609fc2dbb370252e45d7528a647,2025-01-16T20:15:44.197000 CVE-2025-23691,0,0,8bccb2407b1830314e082c5ccc8a74914d5f3fb937895330615769bfb1ba0062,2025-01-16T20:15:44.353000 CVE-2025-23692,0,0,2e17dc09b58fdef7a64a307b9ebb3a4288c1a3ecd370c86b93c09184b7a088a4,2025-01-16T20:15:44.503000 CVE-2025-23693,0,0,35d2dbe83503ee70f28839300571a6bba777b599f92d984a8e0b4e211b5751b4,2025-01-16T20:15:44.637000 CVE-2025-23694,0,0,47fbe05d2104a10812a77806de68baefc74a15965356e2e1bafbd830b42b3650,2025-01-16T20:15:44.780000 -CVE-2025-23695,1,1,f166deda11b61054e0bf2058755f5b277ea75f7862850941337d49e768180aab,2025-01-22T16:15:30.597000 -CVE-2025-23696,1,1,216d48c3dd3286b58b62c74d3ad46886e08eb98e8b8830dc9f3fa8e90f181895,2025-01-22T16:15:30.757000 -CVE-2025-23697,1,1,4d7f30807308f17eb9712be7127e9c310d0f80a00ab56a911f3a4a58863881a2,2025-01-22T16:15:30.923000 +CVE-2025-23695,0,0,f166deda11b61054e0bf2058755f5b277ea75f7862850941337d49e768180aab,2025-01-22T16:15:30.597000 +CVE-2025-23696,0,0,216d48c3dd3286b58b62c74d3ad46886e08eb98e8b8830dc9f3fa8e90f181895,2025-01-22T16:15:30.757000 +CVE-2025-23697,0,0,4d7f30807308f17eb9712be7127e9c310d0f80a00ab56a911f3a4a58863881a2,2025-01-22T16:15:30.923000 CVE-2025-23698,0,0,b0aad547409e3d2f2bb0d70a09a8547f4cac544665b4cf85000d48948b843e58,2025-01-16T20:15:44.910000 CVE-2025-23699,0,0,21e2b4434b6bbb2f1d160ef769c9fc35e826158249f91b861f8551b4bb2b9f2f,2025-01-16T20:15:45.060000 -CVE-2025-23700,1,1,86fab3e7b6c454fa73ec1009deff6ac4bf723429159a48741efb53d8e2023bc6,2025-01-22T16:15:31.097000 -CVE-2025-23701,1,1,be658b156f070fc8a4b1f52018bd898578f0d64f4fdda903c2aded4c368a4ad6,2025-01-22T15:15:22.250000 +CVE-2025-23700,0,0,86fab3e7b6c454fa73ec1009deff6ac4bf723429159a48741efb53d8e2023bc6,2025-01-22T16:15:31.097000 +CVE-2025-23701,0,0,be658b156f070fc8a4b1f52018bd898578f0d64f4fdda903c2aded4c368a4ad6,2025-01-22T15:15:22.250000 CVE-2025-23702,0,0,c6087cb20ed5d5e18a0f143ed78da44b9304f988bd02c1f96e1ffd07550520eb,2025-01-16T20:15:45.213000 CVE-2025-23703,0,0,80d20080ae636ff64d3abc90ff0d9b20e73943a9d0425a8d457e36c9952ac466,2025-01-16T20:15:45.350000 -CVE-2025-23706,1,1,8f7d835b9ae16e615e772d050f78aaa9773417aeee4d038d87e360deb07104fc,2025-01-22T15:15:22.387000 +CVE-2025-23706,0,0,8f7d835b9ae16e615e772d050f78aaa9773417aeee4d038d87e360deb07104fc,2025-01-22T15:15:22.387000 CVE-2025-23708,0,0,eca4a26e61bfe7d5a4e9902977260b188ae344ef1b45725f171e324e5412b97a,2025-01-16T20:15:45.493000 -CVE-2025-23709,1,1,f5d5ed235fe031776e79eb893b7377cf13833832d5a076b93cfc7d39097e51e6,2025-01-22T15:15:22.510000 +CVE-2025-23709,0,0,f5d5ed235fe031776e79eb893b7377cf13833832d5a076b93cfc7d39097e51e6,2025-01-22T15:15:22.510000 CVE-2025-23710,0,0,45dbc592fe3473641cdbf2e1a14db4016a63a47b44096e0e2c864d61e4448449,2025-01-16T20:15:45.643000 CVE-2025-23712,0,0,94aa96484213156f9d49bbdc6963c4fd02ab0d8cdee27a020eca5b412a516f8b,2025-01-16T20:15:45.800000 CVE-2025-23713,0,0,e91ea4a4691cd6ea54cef5c014a380cbfb6e447d22416c2178d1e94d8d5e41a9,2025-01-16T20:15:45.940000 CVE-2025-23715,0,0,0640be33a6d521fa9ce6237978250a0e811e0054ca0a5799459a317b8874e4f3,2025-01-16T20:15:46.083000 CVE-2025-23717,0,0,79ec33c46c47146faede274dbb2e9b9df8747f6c2068f93e33c80d094e53ab2c,2025-01-16T20:15:46.247000 CVE-2025-23720,0,0,4f4258f5d82ee9a1c0adeb945db0c0e48cfc2254164386bb711744a2792e3be7,2025-01-16T20:15:46.397000 -CVE-2025-23732,1,1,f9c2c6f51463d41e0549eb7ece41c4bdf20f17f0aaca7cc5f9b2be741123ae8a,2025-01-22T15:15:22.640000 +CVE-2025-23732,0,0,f9c2c6f51463d41e0549eb7ece41c4bdf20f17f0aaca7cc5f9b2be741123ae8a,2025-01-22T15:15:22.640000 CVE-2025-23743,0,0,803f800009872449a18217dc53667bf2ed09ca71991d264f6860698994827cf0,2025-01-16T20:15:46.550000 CVE-2025-23745,0,0,09ea8b53d4365edcfe38eb3fcbe51bfbcfdfed88a9df4c2f4d1f35c6770b51bd,2025-01-16T20:15:46.687000 -CVE-2025-23746,1,1,7dbcfbc8753c7d90992ff04e5fd6d512faf8dd958e556fda8c0f424e0b99fb1e,2025-01-22T15:15:22.783000 +CVE-2025-23746,0,0,7dbcfbc8753c7d90992ff04e5fd6d512faf8dd958e556fda8c0f424e0b99fb1e,2025-01-22T15:15:22.783000 CVE-2025-23749,0,0,6aa13db4e4c786d5dfaed7476f7ecb15c17aa377119bb300a3e3bb269b753986,2025-01-16T20:15:46.830000 -CVE-2025-23758,1,1,004cddbb7fcbf8d1b137f59bee4ff830f62d28795451287aaac51385f35e31d2,2025-01-22T15:15:22.907000 +CVE-2025-23758,0,0,004cddbb7fcbf8d1b137f59bee4ff830f62d28795451287aaac51385f35e31d2,2025-01-22T15:15:22.907000 CVE-2025-23760,0,0,c926328276013ba4c92054487020a2c00b6299d54746739ff21a4a2b0e4582aa,2025-01-16T21:15:18.257000 CVE-2025-23761,0,0,54955953ddba7da6b8dc6db7af99134b4479d6ff349ea65bc12f9e3c7ac517a4,2025-01-16T21:15:18.410000 CVE-2025-23764,0,0,7f32d20a1e65ecaa3e33bea3553398156868c7ff8731a49a86f2b21b51701ff3,2025-01-16T21:15:18.550000 CVE-2025-23765,0,0,2796d242b4e694c96282a5c8ffeecba3b80388403b475a6ae706c6a35a37e943,2025-01-16T21:15:18.700000 CVE-2025-23767,0,0,76b955d01b413ad0d12074ad466dc5f46f00daa50de12aab124eaa31dd6c7055,2025-01-16T20:15:46.967000 -CVE-2025-23768,1,1,8a37b10750c0d8a9113da1349b6a5ac4b04213b749ef3d87a2eb18f4ebec01f4,2025-01-22T15:15:23.040000 -CVE-2025-23769,1,1,0205226b5568a6b8100dae57f65820a5a6c06790e358e13a78c3fed89ee846f3,2025-01-22T15:15:23.177000 -CVE-2025-23770,1,1,b80dd0a1eb611aff8eee8b8d24e1a997632aea8da27ccb5f8e9b6a5f01a62c02,2025-01-22T15:15:23.303000 +CVE-2025-23768,0,0,8a37b10750c0d8a9113da1349b6a5ac4b04213b749ef3d87a2eb18f4ebec01f4,2025-01-22T15:15:23.040000 +CVE-2025-23769,0,0,0205226b5568a6b8100dae57f65820a5a6c06790e358e13a78c3fed89ee846f3,2025-01-22T15:15:23.177000 +CVE-2025-23770,0,0,b80dd0a1eb611aff8eee8b8d24e1a997632aea8da27ccb5f8e9b6a5f01a62c02,2025-01-22T15:15:23.303000 CVE-2025-23772,0,0,982ec2219b56005812368f626d4b56d161e9940f6a430166e5a95ac8a677bf4d,2025-01-16T21:15:18.860000 -CVE-2025-23774,1,1,c9a419831e646d53a11d0e9bd0c3d52e6869c5009556ab9fd6a114e7e32a616a,2025-01-22T15:15:23.440000 +CVE-2025-23774,0,0,c9a419831e646d53a11d0e9bd0c3d52e6869c5009556ab9fd6a114e7e32a616a,2025-01-22T15:15:23.440000 CVE-2025-23775,0,0,881e3af0467c920e3a0da1ed882de028f641d7f31ac26735099153067f58bff2,2025-01-16T21:15:19.007000 CVE-2025-23776,0,0,37de3b2b14e271fcfbb20da8692ccd78a75aacda39d2827a4094c19b2c20520c,2025-01-16T21:15:19.160000 CVE-2025-23777,0,0,4a326f48ab7f72fda28a2029d2e8fcff1eb6ecc0b79f9b4a29e6b77da3703898,2025-01-16T21:15:19.323000 CVE-2025-23778,0,0,ec507f7d7972e2e40560045a380302593c7d0acc005e784a6facac59ad9068bf,2025-01-16T21:15:19.483000 CVE-2025-23779,0,0,529f2e7055a40628327b34353ab55d9e33e7bfdf9dee62cd6c791680554374f9,2025-01-16T21:15:19.640000 CVE-2025-23780,0,0,8e8a5a259b47149e41183320f4a6badd26f64cf46f39776b5541a103424e4292,2025-01-16T21:15:19.800000 -CVE-2025-23781,1,1,953665edb2cfe0730ade6a83e3c5162e57665918533376ee8284ca911772d51c,2025-01-22T15:15:23.573000 +CVE-2025-23781,0,0,953665edb2cfe0730ade6a83e3c5162e57665918533376ee8284ca911772d51c,2025-01-22T15:15:23.573000 CVE-2025-23783,0,0,87e60e041b1b360cdc15ef5034f69c2a2df8e80bf19196341df29f91771cdf1c,2025-01-16T20:15:47.100000 -CVE-2025-23784,1,1,22611a9b377599282030ad7b3a02cc917eec46e262e8b35598e213806a71df0c,2025-01-22T15:15:23.713000 +CVE-2025-23784,0,0,22611a9b377599282030ad7b3a02cc917eec46e262e8b35598e213806a71df0c,2025-01-22T15:15:23.713000 CVE-2025-23785,0,0,8fa57e244fde111a8cf011b78b0ec1aa32722f2ffac730a959e493b1a51f13a5,2025-01-16T21:15:19.967000 CVE-2025-23791,0,0,0a4e14fe20d5edd4b851b0fffb1f61f6e7f8fd7d1002fde34a1dd39504f5e9f6,2025-01-16T21:15:20.113000 CVE-2025-23793,0,0,75d4eba66871712d0a39959a57f39e10c86950a377381e50afae76d31dc84af5,2025-01-16T21:15:20.267000 @@ -278444,20 +278452,20 @@ CVE-2025-23794,0,0,8097f4da128cc9925b9ca616a7ea5eba076c4b40e08f589897a5a808ba282 CVE-2025-23795,0,0,f110438d2af14e24d173b3605ff2ed725867872c4e87dee92040f4ebb58e5378,2025-01-16T21:15:20.567000 CVE-2025-23796,0,0,0a3fabd756343760fb9fd7ea1faf1fd87c92ac1431e709162d1ddbc10e973b0c,2025-01-16T21:15:20.727000 CVE-2025-23797,0,0,082b5b5ea2fb63d11c655fbf0b483df0d8fb7cfd44eb169c32045a13b0f3b570,2025-01-16T21:15:20.877000 -CVE-2025-23798,1,1,ce8844ff13833d2ff14d80124c81af5080575f19c0ea76d8b6850f5fe5b0fd21,2025-01-22T15:15:23.873000 +CVE-2025-23798,0,0,ce8844ff13833d2ff14d80124c81af5080575f19c0ea76d8b6850f5fe5b0fd21,2025-01-22T15:15:23.873000 CVE-2025-23800,0,0,878d719ae1f903e32e2d6add2209886c141de252f651652314e69251a4a34fb9,2025-01-16T21:15:21.040000 CVE-2025-23801,0,0,f35c3b1c7ca35d2725621e19aa2aa2edc970115b0f68db658f0c8dc9dcb2d2ec,2025-01-16T21:15:21.190000 CVE-2025-23802,0,0,c4f195bb87a3033611183b9369b140030963b1f0853d1ac42f2e5edb0b688d0d,2025-01-16T21:15:21.350000 -CVE-2025-23803,1,1,3bec4e0296fc9b80fb78e337cd054888f35cdcf565a99368252ca2182f0e0715,2025-01-22T15:15:24.020000 +CVE-2025-23803,0,0,3bec4e0296fc9b80fb78e337cd054888f35cdcf565a99368252ca2182f0e0715,2025-01-22T15:15:24.020000 CVE-2025-23804,0,0,f01e041339f930aed71b2815914fa94f4834913754ef387be79590cf4f99c081,2025-01-16T21:15:21.497000 CVE-2025-23805,0,0,3a5cec6a0d5f7ce2298f7397b6ff24f9044aef89b62bccf77a5ee52165d1206a,2025-01-16T21:15:21.643000 -CVE-2025-23806,1,1,d38ed68a9aa60596739d524b627f715144aa11c9d723e7cd418c21a919641003,2025-01-22T15:15:24.163000 +CVE-2025-23806,0,0,d38ed68a9aa60596739d524b627f715144aa11c9d723e7cd418c21a919641003,2025-01-22T15:15:24.163000 CVE-2025-23807,0,0,c8793edd44edeaeef736793be45847bc259f064ecf1054a483762c7668919c71,2025-01-16T21:15:21.800000 CVE-2025-23808,0,0,bc9ac4b7d3fac9a3e82e2e48ff9c8301d6a5068db6fc11c17fa56f429c0d18b5,2025-01-16T21:15:21.957000 -CVE-2025-23809,1,1,3d3652094253c29220e58add24ab29cd5b4e555858960cd6abf015b210e62e31,2025-01-22T16:15:31.437000 +CVE-2025-23809,0,0,3d3652094253c29220e58add24ab29cd5b4e555858960cd6abf015b210e62e31,2025-01-22T16:15:31.437000 CVE-2025-23810,0,0,3d886969fb81b13e95f7725e8aa5117b9c91c9b06310f0521237e64ca9eef400,2025-01-16T21:15:22.107000 -CVE-2025-23811,1,1,5630eea83a5805f16e1709ace6299319b1266cd947390180af8b627ebbac2c1e,2025-01-22T15:15:24.297000 -CVE-2025-23812,1,1,ebb6347b04bfb0418781d264a972d27c27171f0118a07bd3e7a70b67c1f80315,2025-01-22T15:15:24.437000 +CVE-2025-23811,0,0,5630eea83a5805f16e1709ace6299319b1266cd947390180af8b627ebbac2c1e,2025-01-22T15:15:24.297000 +CVE-2025-23812,0,0,ebb6347b04bfb0418781d264a972d27c27171f0118a07bd3e7a70b67c1f80315,2025-01-22T15:15:24.437000 CVE-2025-23815,0,0,4a53eeb2a80c868296a8df4afc48475dd10d854a2810a22ebcb90f3a1fb7faf3,2025-01-16T21:15:22.257000 CVE-2025-23816,0,0,99e7a2982284cfe1c4b342546ab2ac7819e99932258e5aada2c1a28f9b0c569b,2025-01-16T21:15:22.407000 CVE-2025-23817,0,0,64c5a2eba1c8283bdb068da6e45257681009c02912f79237808c3a614cc30aa9,2025-01-16T21:15:22.560000 @@ -278478,7 +278486,7 @@ CVE-2025-23833,0,0,4c637caa193ae54ea0fefd3799a58624823ed2bc221582b8c4c01c5796d42 CVE-2025-23841,0,0,c097c459c2277c131514a3ea078b91eba98a25a334eaa639de34719734a5222a,2025-01-16T21:15:24.793000 CVE-2025-23842,0,0,2b0139d7daa7e9dee90c237d483621e8535d39bd8efb9a3ce143d2d5a6b0d36f,2025-01-16T21:15:24.940000 CVE-2025-23844,0,0,86105cb76b38d6ea0728b9c1232799c3e34ea63adb94598d263dfa4f4d3924ce,2025-01-16T21:15:25.080000 -CVE-2025-23846,1,1,efd4cbcf5a4ed00b418bc131812d8a0a511c669fd47459d9a748c96f746200d4,2025-01-22T15:15:24.570000 +CVE-2025-23846,0,0,efd4cbcf5a4ed00b418bc131812d8a0a511c669fd47459d9a748c96f746200d4,2025-01-22T15:15:24.570000 CVE-2025-23848,0,0,89a987df9d0bbdbc45b1ea1fdc383b4ea7fa77b656809c9e88d08eb1cb2905d0,2025-01-16T21:15:25.220000 CVE-2025-23854,0,0,d260b02665c562e6c59db554faa1d37d019f8ad115df9a55a6f95eb87b662a62,2025-01-16T21:15:25.357000 CVE-2025-23856,0,0,a5c5728227279c4b26e1b13f4ba8f4d185c4e16a374fd50014963dfe066d3a3b,2025-01-16T21:15:25.507000 @@ -278489,21 +278497,21 @@ CVE-2025-23862,0,0,43e455fddf90f3c34447a467c3335ac8042fb5f9707f4b791661628b9dcec CVE-2025-23863,0,0,d95616b48be55928594c24e61ae94fcfcf2463e7aaa3a762196667a8aa388657,2025-01-16T21:15:26.290000 CVE-2025-23864,0,0,1556074f6c47d6d73c0cc3aa4d602a6ab24890828b110133a498f4cdba0dea65,2025-01-16T21:15:26.430000 CVE-2025-23865,0,0,0f3c21c1c89d126d4283426d805a410361dee62541d9cde4b5cadf45f81c85ed,2025-01-16T21:15:26.583000 -CVE-2025-23866,1,1,30af30071ed15c62f01419cbc9bde4bf3883cc229504ebdc59ec189a68b97367,2025-01-22T15:15:24.707000 -CVE-2025-23867,1,1,03bf8ec767c5797644c323e1664c08a3c8b5ece2036bd5159b145eb3c55a998a,2025-01-22T15:15:24.847000 +CVE-2025-23866,0,0,30af30071ed15c62f01419cbc9bde4bf3883cc229504ebdc59ec189a68b97367,2025-01-22T15:15:24.707000 +CVE-2025-23867,0,0,03bf8ec767c5797644c323e1664c08a3c8b5ece2036bd5159b145eb3c55a998a,2025-01-22T15:15:24.847000 CVE-2025-23868,0,0,f054cc8161a63226e2f01ef4b9a1ba0ad43bff6340146631c56121e88c3bba58,2025-01-16T21:15:26.730000 CVE-2025-23869,0,0,4ff4bed04cf3b4deb5ef6b86c7b6e6145ded54a8b4752207bd266af492da5b3e,2025-01-16T21:15:26.893000 CVE-2025-23870,0,0,aa54609d2783feb35973271834ffff0b27116b97fe710c44aedeaea0cd9f042a,2025-01-16T21:15:27.040000 CVE-2025-23871,0,0,d9dbe04e8340ac78b18cddcea5b8bfc0e9baf12244cfae716035b32809abf62b,2025-01-16T21:15:27.200000 CVE-2025-23872,0,0,ad5d143e05278154fbef8060b107468b95d0105b74d84c1bd9fc37a9fe01c905,2025-01-16T21:15:27.357000 CVE-2025-23873,0,0,21fcc6c8e584e8c276265223255a97771a21324b69d85135cc089e2cd5c60517,2025-01-16T21:15:27.863000 -CVE-2025-23874,1,1,4e6b5a8a04f9e8846aff5d4043c5940f9c2943dd7d57278b4aee387d7e4be759,2025-01-22T15:15:24.980000 +CVE-2025-23874,0,0,4e6b5a8a04f9e8846aff5d4043c5940f9c2943dd7d57278b4aee387d7e4be759,2025-01-22T15:15:24.980000 CVE-2025-23875,0,0,16f54e792dc7d4a56ea38d4496bd3b79642a5531dd27f8c7625708b8f89725af,2025-01-16T21:15:28.323000 CVE-2025-23876,0,0,f11fbcf0ce95bac97cefd73d61ac714e53732fcd35e4b468f025890b159066c2,2025-01-16T21:15:28.763000 CVE-2025-23877,0,0,67025350455285a68998b55a0ec477bcc912252817d20c216ea4c1dcc27f2fb9,2025-01-16T21:15:28.963000 CVE-2025-23878,0,0,807177fe8c69371ec7b74f4303cca26584dc822ecc32e3bde8ff81af05f082df,2025-01-16T21:15:29.140000 CVE-2025-23880,0,0,71a75ff3204104210dc427f5d046fe7419ca87cd3fedcae98d2508e2784497e7,2025-01-16T21:15:29.310000 -CVE-2025-23882,1,1,36131ddac86e672871dd2b6d7d5797bc0de4549602be74e627aabd01b0c3e405,2025-01-22T15:15:25.123000 +CVE-2025-23882,0,0,36131ddac86e672871dd2b6d7d5797bc0de4549602be74e627aabd01b0c3e405,2025-01-22T15:15:25.123000 CVE-2025-23884,0,0,2def982b7cbe8992747b18233289c0f945bb92c66265a1e1ac9f76f2473c47c3,2025-01-16T21:15:29.730000 CVE-2025-23886,0,0,5adc366069b87d101e00a6524456b5154407eae636225dee1ada8aae236060c3,2025-01-16T21:15:29.927000 CVE-2025-23887,0,0,a17bdf8e65f60d3c4a1321c98888258c25a1548bb756f03e22626cb0bf3ab535,2025-01-16T21:15:30.087000 @@ -278522,17 +278530,17 @@ CVE-2025-23902,0,0,991c47a865a929869add2c8c1b94dc787e70c9818f90cecd06fc91fb70230 CVE-2025-23907,0,0,62f2d830555983225c93d67a33766339f0b5f5b8104b470ef809680dd862709a,2025-01-16T21:15:32.333000 CVE-2025-23908,0,0,4b396a8852131d43d79fe1137cb49df2e0d52a86fdb32e54e4afe34ce1d8d3d5,2025-01-16T21:15:32.480000 CVE-2025-23909,0,0,076770cf61637e2194048d503e6efbb5af30e3d945de88d9df8b24a008808b14,2025-01-16T21:15:32.637000 -CVE-2025-23910,1,1,0f01cddabcd226a245f97586cb95708d55b6526dc92dab0fad836d5a46f1c064,2025-01-22T15:15:25.267000 +CVE-2025-23910,0,0,0f01cddabcd226a245f97586cb95708d55b6526dc92dab0fad836d5a46f1c064,2025-01-22T15:15:25.267000 CVE-2025-23911,0,0,c84f3c03cbebcde516d9e7d2eb31121dc76cbe9eae3d6a160197ca5c801b3a0a,2025-01-16T21:15:32.780000 CVE-2025-23912,0,0,71f7ed0446b35740cd65fa0532ba539441677e227c9d6f0291e2824b2aeca7a5,2025-01-16T21:15:32.930000 CVE-2025-23913,0,0,1c0db589efde0430efbdd4fb08728bf77f22a5c19824f1868ffb6f7669d99839,2025-01-16T21:15:33.100000 -CVE-2025-23914,1,1,2d2a2d14a68c9ee5dd22c22c387a4bef0cd7dfcabd105c27d5e8551bcf567463,2025-01-22T16:15:31.780000 +CVE-2025-23914,0,0,2d2a2d14a68c9ee5dd22c22c387a4bef0cd7dfcabd105c27d5e8551bcf567463,2025-01-22T16:15:31.780000 CVE-2025-23915,0,0,fa24c11495785c31783d19f6d79202d5ec4bca34e91b58aa8e740d106f4a1d45,2025-01-16T21:15:33.253000 CVE-2025-23916,0,0,df230f94ac1ab867fbfdcf489fe576668e9fd039e54487be35c133ed2b81a0af,2025-01-16T21:15:33.433000 CVE-2025-23917,0,0,7adbd4e05f39d3ad757642f9dc07ad1eff7d27e478b9d8ca9b60045924a3a9d1,2025-01-16T21:15:33.580000 -CVE-2025-23918,1,1,0d64455764f99b6b2c96575cf79204b4b446db5619bb01e1367593ac54e3a919,2025-01-22T15:15:25.403000 +CVE-2025-23918,0,0,0d64455764f99b6b2c96575cf79204b4b446db5619bb01e1367593ac54e3a919,2025-01-22T15:15:25.403000 CVE-2025-23919,0,0,530a6f7b84536027ccf362bf86724781949239704cbb67f8ff6c932f12c95e60,2025-01-16T21:15:33.743000 -CVE-2025-23921,1,1,a9b5a7d55bac4c4dd84bffab829dcd3cbad96c80a5346c205b57ed5d74cb12d0,2025-01-22T15:15:25.547000 +CVE-2025-23921,0,0,a9b5a7d55bac4c4dd84bffab829dcd3cbad96c80a5346c205b57ed5d74cb12d0,2025-01-22T15:15:25.547000 CVE-2025-23922,0,0,bb97fee5262b013c016123296c4a3d7cf40c3875e8a2ea8b79c5b398ca7c549f,2025-01-16T21:15:33.890000 CVE-2025-23924,0,0,d12978221d16424d8c65d853599bf7bdb6e6b9e944d35a5a447045d9d423687a,2025-01-16T21:15:34.040000 CVE-2025-23925,0,0,147c33496e609cb0b342453122e8ad0181b83b87a4b33c441f136e208bcf4a46,2025-01-16T21:15:34.187000 @@ -278541,36 +278549,36 @@ CVE-2025-23927,0,0,8d9bc571b10adf5f0a5277b4afea3bff2ef4c187801274cc14acbeffd320c CVE-2025-23928,0,0,dda7521d0ca3a1016d24ef4001c08678b9721ea4cf47bd8a5c455160651349dd,2025-01-16T21:15:34.663000 CVE-2025-23929,0,0,7a78b750dcc7312313e19411143a886e72bc0ae48e8c8ee26d293e169e386b25,2025-01-16T21:15:34.817000 CVE-2025-23930,0,0,6ba6d73f7443c4991c12a7db93d08a3afb46e790500ca2b79d23bef6b9715d9d,2025-01-16T21:15:34.987000 -CVE-2025-23931,1,1,596bebb7e224b34cc7b6e2bda8402ebf761bce6b9747b26d0d8ab532ac0ee7ff,2025-01-22T15:15:25.687000 -CVE-2025-23932,1,1,43f9a9748d7a3614d7f11338bc0dbaa5c54c23077d555c8c17b25f14f0cdfba7,2025-01-22T15:15:25.827000 +CVE-2025-23931,0,0,596bebb7e224b34cc7b6e2bda8402ebf761bce6b9747b26d0d8ab532ac0ee7ff,2025-01-22T15:15:25.687000 +CVE-2025-23932,0,0,43f9a9748d7a3614d7f11338bc0dbaa5c54c23077d555c8c17b25f14f0cdfba7,2025-01-22T15:15:25.827000 CVE-2025-23933,0,0,5314812bb5bb73b3b9600ea0aa8e888771464c5c0299b578bc9a093b69f0f8ef,2025-01-16T21:15:35.210000 CVE-2025-23934,0,0,a8cb5365e4d11290f220de8207cb9b17a94fa7b952841219eee098e5e9d7f9bb,2025-01-16T21:15:35.367000 CVE-2025-23935,0,0,9d94e38cc5252425c16e22bbae5e8fd55332ed37693e2532154d3f3758f684a5,2025-01-16T21:15:35.513000 CVE-2025-23936,0,0,98ce9dfbd803e0feff46465ce5ff38cf3522df4082c1a68d72eabd4f11de5228,2025-01-16T21:15:35.677000 -CVE-2025-23938,1,1,19bf844e8ac0ee6a4d7788a637a5409669c34a0cffa27f702b4cd496e92edd50,2025-01-22T15:15:25.967000 +CVE-2025-23938,0,0,19bf844e8ac0ee6a4d7788a637a5409669c34a0cffa27f702b4cd496e92edd50,2025-01-22T15:15:25.967000 CVE-2025-23939,0,0,b227fdb5ca72e62491a5d98a4ab01cce82bbd9f83860732763526745b1f362c4,2025-01-16T21:15:35.910000 CVE-2025-23940,0,0,9e516bed5aa526650bb86798b45bda26374c4c5498fa69a2ccaa76e3d1fb0ffa,2025-01-16T21:15:36.087000 CVE-2025-23941,0,0,1c0020dfccb64dc56163de9642fbb38130446635c08bc70e04e868e60ee25c62,2025-01-16T21:15:36.230000 -CVE-2025-23942,1,1,ecfe313cb6b825f55ce425b59b448fe4a36734d2197b057491ebea76cca1aaf6,2025-01-22T15:15:26.103000 +CVE-2025-23942,0,0,ecfe313cb6b825f55ce425b59b448fe4a36734d2197b057491ebea76cca1aaf6,2025-01-22T15:15:26.103000 CVE-2025-23943,0,0,b11e5fd30a25f84e994f31d10cb8bcc269623009eb1bca3cbe37db51ed9b30fe,2025-01-16T21:15:36.373000 -CVE-2025-23944,1,1,15b1932ae6c8038ca12f3ca2f2547db955e4b5b16b65d6f01ad320413325aa0a,2025-01-22T15:15:26.240000 +CVE-2025-23944,0,0,15b1932ae6c8038ca12f3ca2f2547db955e4b5b16b65d6f01ad320413325aa0a,2025-01-22T15:15:26.240000 CVE-2025-23946,0,0,9de3ccf4350f51c6d8e67eab9fdaace2b0128c36302335bbd7ddc29cf4115806,2025-01-16T21:15:36.520000 CVE-2025-23947,0,0,b918dd9018ba545f112604d29f16795478738d9868aa76eb24c352a7a4e3c4ec,2025-01-16T21:15:36.670000 -CVE-2025-23948,1,1,9aa38eedf8129d161855f1e2750a1f175a3eac2c0905506069f7c571d6484cdf,2025-01-22T15:15:26.383000 -CVE-2025-23949,1,1,5eecf838b220be3c1c102991b178db23ad071d86b150ba2b59c089f05bceccb6,2025-01-22T15:15:26.527000 +CVE-2025-23948,0,0,9aa38eedf8129d161855f1e2750a1f175a3eac2c0905506069f7c571d6484cdf,2025-01-22T15:15:26.383000 +CVE-2025-23949,0,0,5eecf838b220be3c1c102991b178db23ad071d86b150ba2b59c089f05bceccb6,2025-01-22T15:15:26.527000 CVE-2025-23950,0,0,4ac29c4dd1a428d4afa0ee44a692bfd3a045bfda7b0c1933c7ec004bbdec77a8,2025-01-16T21:15:36.817000 CVE-2025-23951,0,0,2d32c1931f285be8ff0de2b01cdf7652c918f38bc79b845ac3d321ee8c1bb84b,2025-01-16T21:15:36.983000 -CVE-2025-23953,1,1,81292523bdc4ad689b105f905d2a58bfc25055e222d5fe31359e6aaed6770d15,2025-01-22T15:15:26.670000 +CVE-2025-23953,0,0,81292523bdc4ad689b105f905d2a58bfc25055e222d5fe31359e6aaed6770d15,2025-01-22T15:15:26.670000 CVE-2025-23954,0,0,c0b532e328dfa85d7de261ede6d898c1c93d187c5ff87f67c3d88a90ff144287,2025-01-16T21:15:37.133000 CVE-2025-23955,0,0,b35ff47ed4400b2edb51393bc234d7c4ad9797e847fec68985488245984a054d,2025-01-16T21:15:37.277000 CVE-2025-23957,0,0,40b759ae20a341b30b3caf9db81dbe00398828638d81ba3346ad7f7cf25fc424,2025-01-16T21:15:37.420000 -CVE-2025-23959,1,1,2b2438fe3b4602dbb82e2518e6b22fd87132fb61763724b02645b4f69574a537,2025-01-22T15:15:26.810000 +CVE-2025-23959,0,0,2b2438fe3b4602dbb82e2518e6b22fd87132fb61763724b02645b4f69574a537,2025-01-22T15:15:26.810000 CVE-2025-23961,0,0,36c0da688ed3e8548f86716b57ea278db435c869e71f4caf3f9de5e6869464d4,2025-01-16T21:15:37.573000 CVE-2025-23962,0,0,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96317,2025-01-16T21:15:37.730000 CVE-2025-23963,0,0,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000 CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000 -CVE-2025-23966,1,1,fc7e5999f530a14a10296c13e28375f3f98dfdb4b4ec37b22cf284eaa57194f2,2025-01-22T15:15:26.950000 -CVE-2025-23992,1,1,b353942bf3f0d4eb4ddb991ecb2094a0114d56869df6885590beeb621557c514,2025-01-22T16:15:32.120000 +CVE-2025-23966,0,0,fc7e5999f530a14a10296c13e28375f3f98dfdb4b4ec37b22cf284eaa57194f2,2025-01-22T15:15:26.950000 +CVE-2025-23992,0,0,b353942bf3f0d4eb4ddb991ecb2094a0114d56869df6885590beeb621557c514,2025-01-22T16:15:32.120000 CVE-2025-23994,0,0,70f6bae30845c345a2a47659ac6161a5d38902de51586bdd3566df0acd6686b4,2025-01-21T18:15:17.313000 CVE-2025-23996,0,0,ae90e408390ff598631802aba137fcf08482552e78b237e33cc88a7d0fe325b3,2025-01-21T18:15:17.503000 CVE-2025-23997,0,0,24391beabeac13aaabf73ec76c7bfade06e22f6f0a4bfa6ee1b706ec5c838819,2025-01-21T14:15:13.230000 @@ -278586,8 +278594,15 @@ CVE-2025-24018,0,0,253cb165de2151aa99c00e094e395864d5f28218ab550c9418de5b539f47c CVE-2025-24019,0,0,d677e8b4264557b8de91d13cc1839d782f81c7838cdf1014e4423ff0e2378420,2025-01-21T18:15:17.933000 CVE-2025-24020,0,0,d1d82909cc1d36cd28a38444ff637a664659fd65670255997925f7aeb54551d2,2025-01-21T18:15:18.157000 CVE-2025-24024,0,0,cc1a55cdc4aa0884265065c04ec8fcbe647c671a5eda489d6e2b90242b0234c1,2025-01-21T20:15:46.617000 -CVE-2025-24027,1,1,b4b9d72fc8e3425a087a0a1486908f265d010b0a775752f732c367a7acbbe48d,2025-01-22T15:15:27.090000 +CVE-2025-24027,0,0,b4b9d72fc8e3425a087a0a1486908f265d010b0a775752f732c367a7acbbe48d,2025-01-22T15:15:27.090000 CVE-2025-24337,0,0,07d30bbea6dfa209bcd4c6bc43756d477d6586721f50f7d7909041753d5deb68,2025-01-20T14:15:27.130000 +CVE-2025-24397,1,1,d430d6aa8f08fd4c26e342c2b09b90b4f880b934adb5c18e9134d1e933ec60ad,2025-01-22T17:15:13.670000 +CVE-2025-24398,1,1,48c31aa301bd0a48a78b3e6eba3bfa7b566cf7d156802a7875229bb9babc97ca,2025-01-22T17:15:13.760000 +CVE-2025-24399,1,1,5bb8a64b49d724b79c48ceeb609cc850dc8c108ea274d980a8a900a1bde032be,2025-01-22T17:15:13.853000 +CVE-2025-24400,1,1,f8ab734939ea6b97fabcc534fd1a831052706c8e2ee809846bc3f127307e057b,2025-01-22T17:15:13.943000 +CVE-2025-24401,1,1,40468684796e31fbf9aed5ce3e931a1fec92250b05bb09b39b932b5c0b3895ac,2025-01-22T17:15:14.027000 +CVE-2025-24402,1,1,61a441b8accaabd61cac3ab1e0196fdf648793b5cc4795c5f3be3d8707fcec1f,2025-01-22T17:15:14.123000 +CVE-2025-24403,1,1,bc2346c7581eaac0002782f8107a5554db86b793625d4fa4e5ceb82e296bb787,2025-01-22T17:15:14.220000 CVE-2025-24456,0,0,5fe51cb996c5e88ea28ff025771c6fdd6bead7226d83716177b689e9ee536362,2025-01-21T18:15:18.320000 CVE-2025-24457,0,0,0d337221a417a095ea0eb470ff71de9036b70c5502b7158bdb2ff26e48b1123e,2025-01-21T18:15:18.520000 CVE-2025-24458,0,0,d40186eb9e20b87dbfe22ca8e82230b8c5ca63ed2b27afa922d0acbf4a5a6df1,2025-01-21T18:15:18.697000