diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3393.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3393.json index 2a84182e4fa..94d4f127a4b 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3393.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3393.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3393", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-12-27T10:15:17.270", - "lastModified": "2024-12-31T02:00:01.807", + "lastModified": "2025-01-04T02:00:01.597", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -64,7 +64,7 @@ "cisaExploitAdd": "2024-12-30", "cisaActionDue": "2025-01-20", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", - "cisaVulnerabilityName": "Palo Alto Networks PAN-OS Malformed DNS Packet Vulnerability", + "cisaVulnerabilityName": "Palo Alto Networks PAN-OS Malicious DNS Packet Vulnerability", "weaknesses": [ { "source": "psirt@paloaltonetworks.com", diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8066.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8066.json index c6b12d3fbb7..e1edfb90477 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8066.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8066.json @@ -2,13 +2,13 @@ "id": "CVE-2024-8066", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-28T09:15:05.547", - "lastModified": "2024-11-28T09:15:05.547", + "lastModified": "2025-01-04T02:15:06.670", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The File Manager Pro \u2013 Filester plugin for WordPress is vulnerable to arbitrary file uploads due to missing validation in the 'fsConnector' function in all versions up to, and including, 1.8.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an Administrator, to upload a new .htaccess file allowing them to subsequently upload arbitrary files on the affected site's server which may make remote code execution possible." + "value": "The File Manager Pro \u2013 Filester plugin for WordPress is vulnerable to arbitrary file uploads due to missing validation in the 'fsConnector' function in all versions up to, and including, 1.8.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an Administrator, to upload a new .htaccess file allowing them to subsequently upload arbitrary files on the affected site's server which may make remote code execution possible." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22383.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22383.json new file mode 100644 index 00000000000..cdd4e2f2208 --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22383.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-22383", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-04T02:15:06.797", + "lastModified": "2025-01-04T02:15:06.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity input validation issue exists in the Commerce B2B application, affecting the Contact Us functionality. This allows visitors to send e-mail messages that could contain unfiltered HTML markup in specific scenarios." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://support.optimizely.com/hc/en-us/articles/32694923652493-Configured-Commerce-Security-Advisory-COM-2024-03", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22384.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22384.json new file mode 100644 index 00000000000..b16bc51710e --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22384.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-22384", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-04T02:15:06.937", + "lastModified": "2025-01-04T02:15:06.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue concerning business logic exists in the Commerce B2B application, which allows storefront visitors to purchase discontinued products in specific scenarios where requests are altered before reaching the server." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-472" + } + ] + } + ], + "references": [ + { + "url": "https://support.optimizely.com/hc/en-us/articles/32694560473741-Configured-Commerce-Security-Advisory-COM-2024-02", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22385.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22385.json new file mode 100644 index 00000000000..9451726dd78 --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22385.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-22385", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-04T02:15:07.080", + "lastModified": "2025-01-04T02:15:07.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. For newly created accounts, the Commerce B2B application does not require email confirmation. This medium-severity issue allows the mass creation of accounts. This could affect database storage; also, non-requested storefront accounts can be created on behalf of visitors." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://support.optimizely.com/hc/en-us/articles/32695419706637-Configured-Commerce-Security-Advisory-COM-2024-05", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22386.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22386.json new file mode 100644 index 00000000000..bedc3e67cca --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22386.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-22386", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-04T02:15:07.230", + "lastModified": "2025-01-04T02:15:07.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity session issue exists in the Commerce B2B application, affecting the longevity of active sessions in the storefront. This allows session tokens tied to logged-out sessions to still be active and usable." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.optimizely.com/hc/en-us/articles/32695284701069-Configured-Commerce-Security-Advisory-COM-2024-04", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22387.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22387.json new file mode 100644 index 00000000000..994f748e442 --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22387.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-22387", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-04T02:15:07.343", + "lastModified": "2025-01-04T02:15:07.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue exists in requests for resources where the session token is submitted as a URL parameter. This exposes information about the authenticated session, which can be leveraged for session hijacking." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.optimizely.com/hc/en-us/articles/32695551034893-Configured-Commerce-Security-Advisory-COM-2024-06", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22388.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22388.json new file mode 100644 index 00000000000..d4ae1d2914f --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22388.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-22388", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-04T02:15:07.480", + "lastModified": "2025-01-04T02:15:07.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.22.0. A high-severity Stored Cross-Site Scripting (XSS) vulnerability exists in the CMS, allowing malicious actors to inject and execute arbitrary JavaScript code, potentially compromising user data, escalating privileges, or executing unauthorized actions. The issue exists in multiple areas, including content editing, link management, and file uploads." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.optimizely.com/hc/en-us/articles/33182047260557-Content-Management-System-CMS-Security-Advisory-CMS-2025-01", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22389.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22389.json new file mode 100644 index 00000000000..9bc6c837a36 --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22389.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-22389", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-04T02:15:07.600", + "lastModified": "2025-01-04T02:15:07.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS, where the application does not properly validate uploaded files. This allows the upload of potentially malicious file types, including .docm .html. When accessed by application users, these files can be used to execute malicious actions or compromise users' systems." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.optimizely.com/hc/en-us/articles/33182404079629-Content-Management-System-CMS-Security-Advisory-CMS-2025-03", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22390.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22390.json new file mode 100644 index 00000000000..b275aa52d5f --- /dev/null +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22390.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-22390", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-04T02:15:07.747", + "lastModified": "2025-01-04T02:15:07.747", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS due to insufficient enforcement of password complexity requirements. The application permits users to set passwords with a minimum length of 6 characters, lacking adequate complexity to resist modern attack techniques such as password spraying or offline password cracking." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.optimizely.com/hc/en-us/articles/33182255281293-Content-Management-System-CMS-Security-Advisory-CMS-2025-02", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 1e9460db074..4adae4c7372 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-04T00:55:19.776186+00:00 +2025-01-04T03:00:19.556938+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-04T00:15:06.207000+00:00 +2025-01-04T02:15:07.747000+00:00 ``` ### Last Data Feed Release @@ -27,46 +27,35 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-01-03T01:00:04.355427+00:00 +2025-01-04T01:00:04.341651+00:00 ``` ### Total Number of included CVEs ```plain -275678 +275686 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `8` -- [CVE-2024-11733](CVE-2024/CVE-2024-117xx/CVE-2024-11733.json) (`2025-01-03T23:15:06.313`) -- [CVE-2024-12237](CVE-2024/CVE-2024-122xx/CVE-2024-12237.json) (`2025-01-03T23:15:06.473`) -- [CVE-2024-55896](CVE-2024/CVE-2024-558xx/CVE-2024-55896.json) (`2025-01-03T23:15:08.437`) -- [CVE-2024-55897](CVE-2024/CVE-2024-558xx/CVE-2024-55897.json) (`2025-01-03T23:15:08.573`) -- [CVE-2025-0199](CVE-2025/CVE-2025-01xx/CVE-2025-0199.json) (`2025-01-03T23:15:08.707`) +- [CVE-2025-22383](CVE-2025/CVE-2025-223xx/CVE-2025-22383.json) (`2025-01-04T02:15:06.797`) +- [CVE-2025-22384](CVE-2025/CVE-2025-223xx/CVE-2025-22384.json) (`2025-01-04T02:15:06.937`) +- [CVE-2025-22385](CVE-2025/CVE-2025-223xx/CVE-2025-22385.json) (`2025-01-04T02:15:07.080`) +- [CVE-2025-22386](CVE-2025/CVE-2025-223xx/CVE-2025-22386.json) (`2025-01-04T02:15:07.230`) +- [CVE-2025-22387](CVE-2025/CVE-2025-223xx/CVE-2025-22387.json) (`2025-01-04T02:15:07.343`) +- [CVE-2025-22388](CVE-2025/CVE-2025-223xx/CVE-2025-22388.json) (`2025-01-04T02:15:07.480`) +- [CVE-2025-22389](CVE-2025/CVE-2025-223xx/CVE-2025-22389.json) (`2025-01-04T02:15:07.600`) +- [CVE-2025-22390](CVE-2025/CVE-2025-223xx/CVE-2025-22390.json) (`2025-01-04T02:15:07.747`) ### CVEs modified in the last Commit -Recently modified CVEs: `16` +Recently modified CVEs: `2` -- [CVE-2023-32221](CVE-2023/CVE-2023-322xx/CVE-2023-32221.json) (`2025-01-04T00:15:06.207`) -- [CVE-2024-11624](CVE-2024/CVE-2024-116xx/CVE-2024-11624.json) (`2025-01-03T23:15:06.157`) -- [CVE-2024-43767](CVE-2024/CVE-2024-437xx/CVE-2024-43767.json) (`2025-01-03T23:15:06.627`) -- [CVE-2024-43768](CVE-2024/CVE-2024-437xx/CVE-2024-43768.json) (`2025-01-03T23:15:06.767`) -- [CVE-2024-43769](CVE-2024/CVE-2024-437xx/CVE-2024-43769.json) (`2025-01-03T23:15:06.903`) -- [CVE-2024-47032](CVE-2024/CVE-2024-470xx/CVE-2024-47032.json) (`2025-01-03T23:15:07.047`) -- [CVE-2024-53834](CVE-2024/CVE-2024-538xx/CVE-2024-53834.json) (`2025-01-03T23:15:07.190`) -- [CVE-2024-53835](CVE-2024/CVE-2024-538xx/CVE-2024-53835.json) (`2025-01-03T23:15:07.333`) -- [CVE-2024-53836](CVE-2024/CVE-2024-538xx/CVE-2024-53836.json) (`2025-01-03T23:15:07.470`) -- [CVE-2024-53837](CVE-2024/CVE-2024-538xx/CVE-2024-53837.json) (`2025-01-03T23:15:07.620`) -- [CVE-2024-53838](CVE-2024/CVE-2024-538xx/CVE-2024-53838.json) (`2025-01-03T23:15:07.747`) -- [CVE-2024-53839](CVE-2024/CVE-2024-538xx/CVE-2024-53839.json) (`2025-01-03T23:15:07.883`) -- [CVE-2024-53840](CVE-2024/CVE-2024-538xx/CVE-2024-53840.json) (`2025-01-03T23:15:08.020`) -- [CVE-2024-53841](CVE-2024/CVE-2024-538xx/CVE-2024-53841.json) (`2025-01-03T23:15:08.153`) -- [CVE-2024-53842](CVE-2024/CVE-2024-538xx/CVE-2024-53842.json) (`2025-01-03T23:15:08.293`) -- [CVE-2025-22376](CVE-2025/CVE-2025-223xx/CVE-2025-22376.json) (`2025-01-03T23:15:08.897`) +- [CVE-2024-3393](CVE-2024/CVE-2024-33xx/CVE-2024-3393.json) (`2025-01-04T02:00:01.597`) +- [CVE-2024-8066](CVE-2024/CVE-2024-80xx/CVE-2024-8066.json) (`2025-01-04T02:15:06.670`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5882043717c..af25a496eb4 100644 --- a/_state.csv +++ b/_state.csv @@ -224921,7 +224921,7 @@ CVE-2023-32218,0,0,f4668f6dec2ad787cba45f10fd52cbffde113c4295d5e52527a0a3bed9829 CVE-2023-32219,0,0,5016bb311111e2171cad0226da9875250b1431f46d617615133b7b54b63a5333,2024-11-21T08:02:55.563000 CVE-2023-3222,0,0,7d57eac9a2b5e14a32fbb1633baffee38ba9604df950673d8180481bf98f3795,2024-11-21T08:16:43.900000 CVE-2023-32220,0,0,7a8e9a38143bd8064ad289215094e013695d95e6076448cf1074f8c028ef2b55,2024-11-21T08:02:55.670000 -CVE-2023-32221,0,1,1bb9ec77a45c6795dd7cc048448a8dd2a2768ee4ce6488cb5a868e5cc39185b0,2025-01-04T00:15:06.207000 +CVE-2023-32221,0,0,1bb9ec77a45c6795dd7cc048448a8dd2a2768ee4ce6488cb5a868e5cc39185b0,2025-01-04T00:15:06.207000 CVE-2023-32222,0,0,628471b60fe838500aed372d2bdccfc395d9e95fc54bc2874983f952d5f04ce1,2024-11-21T08:02:55.893000 CVE-2023-32223,0,0,917c1b5258b903e7b790f68cd6060630779eb688b3bea354bbc98d7b17f4b584,2024-11-27T17:15:05.937000 CVE-2023-32224,0,0,7c5c385f9388cab92c949ae1ed149caba7d8c92dca8e737241ce6522dad13863,2024-11-21T08:02:56.113000 @@ -244502,7 +244502,7 @@ CVE-2024-11619,0,0,17535dfba9741d471fadae0fb91280b5ae16dfa5d4f7978c2708116e3a1ee CVE-2024-1162,0,0,3088f9ddfe31234409eeca0c6733f6625e00a303f5f7e9ffe94fe1a6782630d7,2024-11-21T08:49:56.270000 CVE-2024-11620,0,0,ead70690aa114308aae0c5f2f4d204a542be8af8676c2ad1b4207bb367ac689c,2024-11-28T11:15:48.533000 CVE-2024-11622,0,0,28607ca43edf19c5b150264789340f2f339c16fe9934fd58cd66cc9c45bc71df,2024-12-12T19:52:24.527000 -CVE-2024-11624,0,1,2fbadf82b86c601ba5e3c164ddb11cdb07fbf96914b2d5fb97e205c966153970,2025-01-03T23:15:06.157000 +CVE-2024-11624,0,0,2fbadf82b86c601ba5e3c164ddb11cdb07fbf96914b2d5fb97e205c966153970,2025-01-03T23:15:06.157000 CVE-2024-1163,0,0,3534cb0564ba7e08015dfddf52a975a19f7b672cf09e3f78e469f84e669f2cea,2024-11-21T08:49:56.403000 CVE-2024-11630,0,0,602de6590967350fd7f3827b1a11ce4a1c578a1994d3c132149d73cf61dca0eb,2024-11-22T22:15:13.637000 CVE-2024-11631,0,0,ec063b412cc8e1fc69f64e54e806f8de997f3af353f8bd5c4b78d65e3cccfe32,2024-11-25T16:54:46.333000 @@ -244602,7 +244602,7 @@ CVE-2024-11729,0,0,efdcf50f70e4aaed57e8feef0a7a962846d2881b2d7c26550ce5bf699f2f4 CVE-2024-1173,0,0,c4d4cdf7c6a3868eb9e98cb8ff74e2d000c2d6f84447d896138ac8342670c9eb,2024-11-21T08:49:57.650000 CVE-2024-11730,0,0,8b97f2620613ee8f1fad8f89fdaf2fb138dbc90ea591ed763e6c771986c201aa,2024-12-06T11:15:08.033000 CVE-2024-11732,0,0,6786f7c223dbf5c7abf2566386e4c9fbb35edf5a2ada6569df25893c7ff24b7c,2024-12-03T08:15:06.383000 -CVE-2024-11733,1,1,5fbecc5531d69a0d2ffc426edbd6573fb38d88d5bfbaa1a7120ba352ee22cf2b,2025-01-03T23:15:06.313000 +CVE-2024-11733,0,0,5fbecc5531d69a0d2ffc426edbd6573fb38d88d5bfbaa1a7120ba352ee22cf2b,2025-01-03T23:15:06.313000 CVE-2024-11737,0,0,82b4de15247bbd822a2abb2f56467686fd4a6957a6b87fe1370247ce71679d0b,2024-12-11T10:15:06.677000 CVE-2024-11738,0,0,f587c97dbd4b1ce8e0f6a611dd679c71e26fa6d4305ce8c0e3ca3797b0619379,2024-12-06T15:15:07.723000 CVE-2024-1174,0,0,6b46be4d722ab187c094170b7547b36656d9ec8ed90fcec0cd49c5c30bebda75,2024-11-21T08:49:57.790000 @@ -244941,7 +244941,7 @@ CVE-2024-12233,0,0,d89c9263a4f22f201b1dce8be51578aec307181a11a72f57d5d6a093a5589 CVE-2024-12234,0,0,25d3aa7d45ccf0539b66121de3bcd155bbef1f8925f8aad4f69521eed8a998f2,2024-12-10T23:25:36.387000 CVE-2024-12235,0,0,92689efaa37165c78224efb1efe409523be7fb3f3558d4576511504eb96aac91,2024-12-05T18:15:21.660000 CVE-2024-12236,0,0,390d11985338138a2913d618c1818ae388b2b2c32249174c40691687eabfe343,2024-12-10T15:15:07.147000 -CVE-2024-12237,1,1,f56cec9b9a8561960e0bd6e6b1543c245e67760db1999f8a3bac457cc9192e98,2025-01-03T23:15:06.473000 +CVE-2024-12237,0,0,f56cec9b9a8561960e0bd6e6b1543c245e67760db1999f8a3bac457cc9192e98,2025-01-03T23:15:06.473000 CVE-2024-12238,0,0,4bf6bf8d9d561e93dab20ec932a5f35fe4b6b4442d292c9962ed57407d619434,2024-12-29T06:15:05.487000 CVE-2024-12239,0,0,6402c790bc7203c11dca14fab5982d0c29c8034f8baef3a6d7c350a55d38d141,2024-12-17T03:15:06.710000 CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000 @@ -256661,7 +256661,7 @@ CVE-2024-33926,0,0,ba3b0b5d452557f451f073e7051635f20935a7d4b0bf1e31891232c3b0d24 CVE-2024-33927,0,0,47a33c5c8d9c813c7e0792969b9d2c7f5a02e1e804addbde5e0fd6efc0070e34,2024-11-21T09:17:45.063000 CVE-2024-33928,0,0,5485d29b9f1f54b48807c0a7fab77f8660a3f6f005966e3d555ef2b3d42ff3b8,2024-11-21T09:17:45.170000 CVE-2024-33929,0,0,9250b6acc401d14df60daf091a118dd6e90efe6072ae5814267d257083c00a7c,2024-11-21T09:17:45.277000 -CVE-2024-3393,0,0,b48542ef6904dd8c7115e5c27bb4a2e96704783642e34a95b81a006de0382425,2024-12-31T02:00:01.807000 +CVE-2024-3393,0,1,82cdef2f436f428aba3983cae5ad6f97d68af7fb27faba094e0b6f6eebad4246,2025-01-04T02:00:01.597000 CVE-2024-33930,0,0,352e81bce8bffcdd250f3e4cc8b8032938f93f842babfe72361bc9938c4c9ff9,2024-11-21T09:17:45.387000 CVE-2024-33931,0,0,02797798e9c898cf0c4c463d6fab582aa710f3a0cf7c63a98df878120217d686,2024-11-21T09:17:45.490000 CVE-2024-33932,0,0,a959ef4dc107f5a5fd9667e1036684cdb3d2d4571d8d1f2cc49022d8aa2387fc,2024-11-21T09:17:45.610000 @@ -264013,9 +264013,9 @@ CVE-2024-4376,0,0,54ab76d9fd6742e25c4ca941b8688277ccbde54c93ac0337a04e833897b0d9 CVE-2024-43760,0,0,0699b036c3a09290ea9d3ac93f3f512789df4a5bccdc81b41420a254e04019cc,2024-09-13T17:00:30.440000 CVE-2024-43762,0,0,b8dfe10bc41a54941c91e23f33f7c446be6ae8c1200d07b09e86c0c499c65832,2025-01-03T22:15:07.640000 CVE-2024-43764,0,0,b8a70c9b4bf3da07474f063814c421df50a0a0e7358525550868f9c97beac2b0,2025-01-03T22:15:07.783000 -CVE-2024-43767,0,1,af155cf93cc328c05c081440c1f007ae01c3d33d1458fc2c3459ea52a0cc31d8,2025-01-03T23:15:06.627000 -CVE-2024-43768,0,1,d63d3ffccaf584eee421ee122021fb0ca8d78148254dd26c8ab21528b275e51d,2025-01-03T23:15:06.767000 -CVE-2024-43769,0,1,13983ee3cb62290dd1770f68b2a21cae6948e8a4eebfe4f723c6f963b63155be,2025-01-03T23:15:06.903000 +CVE-2024-43767,0,0,af155cf93cc328c05c081440c1f007ae01c3d33d1458fc2c3459ea52a0cc31d8,2025-01-03T23:15:06.627000 +CVE-2024-43768,0,0,d63d3ffccaf584eee421ee122021fb0ca8d78148254dd26c8ab21528b275e51d,2025-01-03T23:15:06.767000 +CVE-2024-43769,0,0,13983ee3cb62290dd1770f68b2a21cae6948e8a4eebfe4f723c6f963b63155be,2025-01-03T23:15:06.903000 CVE-2024-4377,0,0,9e469d2c6e38c9024d3118d881da3bdecf42eee078f84183253e0517e0cefe8c,2024-11-21T09:42:43.760000 CVE-2024-43772,0,0,63f7dc411da3ded034b2d2ffb4e0bad8e95b60c318b3d1e644db504bb5e5c6e9,2024-09-04T12:11:13.073000 CVE-2024-43773,0,0,826b7c5200d245cfd0c67f5d1708290c5274b8ea410b663d2bc4e8259de07c4c,2024-09-04T12:26:08.270000 @@ -266099,7 +266099,7 @@ CVE-2024-47029,0,0,dee30063661ea67866801cfb2ecb7654f2218f2ce68d1de08a24516b75279 CVE-2024-4703,0,0,8dae3b499efe136db7f398d4c41a1bfd4bf3b9aac5a043a02f530bb618a966e5,2024-11-21T09:43:24.660000 CVE-2024-47030,0,0,2dfbd4a7868cc0b2ce9fa4921a019a022ddf4de093912df68c067097e504d63d,2024-10-28T20:35:16.973000 CVE-2024-47031,0,0,9f628d7d133c819b06ff3de82f92bb7205005b4a410eced9d57c7a79d43f1b1d,2024-10-28T20:35:17.223000 -CVE-2024-47032,0,1,076184930f346804876fe8563cdb7177daeee4d33dda02193fbb41b28949d924,2025-01-03T23:15:07.047000 +CVE-2024-47032,0,0,076184930f346804876fe8563cdb7177daeee4d33dda02193fbb41b28949d924,2025-01-03T23:15:07.047000 CVE-2024-47033,0,0,55edc3ae29717e555bfd0e3e7b6b8889d14495fe139b3a950485b7473e7a9dca,2024-10-28T17:57:30.110000 CVE-2024-47034,0,0,25c2ef9ecb4e73ca1fa8dabb5e685185efaa515e35621fde72c2d30b8491c723,2024-10-28T17:56:51.787000 CVE-2024-47035,0,0,a7a178fa9ebc80aea368dd0425eaa85245240ba008a832e23a0cba77ab278738,2024-10-31T00:05:18.113000 @@ -270629,16 +270629,16 @@ CVE-2024-53826,0,0,0b04b1b5846f39442507bbeb125d0ae4870d599699b329db9d8ecf7c2429b CVE-2024-5383,0,0,093acdd4201567d005275d52c1174349cc9fb95effb23b8b65de339d75e5f1d2,2024-11-21T09:47:32.963000 CVE-2024-53832,0,0,1b2ce5c4938b0e1ecf47a9786c83880b95c4a4c43364160d8ae6a9eea87843bf,2024-12-10T14:30:46.853000 CVE-2024-53833,0,0,83c2cd6c738c3b63237afc3b0a6973df3ebd3dd1be66df5ff62c4687f53f40a1,2025-01-03T04:15:06.227000 -CVE-2024-53834,0,1,f772be6a6b7318016d93e00bbab730f9e5090ffcca9973fc1b51d0f863c6079d,2025-01-03T23:15:07.190000 -CVE-2024-53835,0,1,1738259f50e1a13907bddecfb4df1723018cc354975bc160261abe6109d648b3,2025-01-03T23:15:07.333000 -CVE-2024-53836,0,1,2cbfd30f09c54112dbd3816407bb73044cb7653f40cd6cff2fd0a50442342b4b,2025-01-03T23:15:07.470000 -CVE-2024-53837,0,1,f41af45311ad1bb885024e938f5dd0283c1cb94b0c08f83d203f8491fac68ffd,2025-01-03T23:15:07.620000 -CVE-2024-53838,0,1,392a823cc6a1952d1acd20e30cddfb92a6889451bd907c5666f408cbdfe8e068,2025-01-03T23:15:07.747000 -CVE-2024-53839,0,1,f65317495801cff20541ac718a9f26747a8df7faf061323c9d11e324e4d26033,2025-01-03T23:15:07.883000 +CVE-2024-53834,0,0,f772be6a6b7318016d93e00bbab730f9e5090ffcca9973fc1b51d0f863c6079d,2025-01-03T23:15:07.190000 +CVE-2024-53835,0,0,1738259f50e1a13907bddecfb4df1723018cc354975bc160261abe6109d648b3,2025-01-03T23:15:07.333000 +CVE-2024-53836,0,0,2cbfd30f09c54112dbd3816407bb73044cb7653f40cd6cff2fd0a50442342b4b,2025-01-03T23:15:07.470000 +CVE-2024-53837,0,0,f41af45311ad1bb885024e938f5dd0283c1cb94b0c08f83d203f8491fac68ffd,2025-01-03T23:15:07.620000 +CVE-2024-53838,0,0,392a823cc6a1952d1acd20e30cddfb92a6889451bd907c5666f408cbdfe8e068,2025-01-03T23:15:07.747000 +CVE-2024-53839,0,0,f65317495801cff20541ac718a9f26747a8df7faf061323c9d11e324e4d26033,2025-01-03T23:15:07.883000 CVE-2024-5384,0,0,8d376a2ca7902f4602c393c8e22120c83f3a08831ccd742c2d440f44affa2cad,2024-11-21T09:47:33.103000 -CVE-2024-53840,0,1,5a68e56ca18880b684acf85af94e13342de4c159ea66263c82861f03b2fcb290,2025-01-03T23:15:08.020000 -CVE-2024-53841,0,1,62ff2515a5c055bf7059847a5dc1f7cb41127e9f90e2360a3c63316668562633,2025-01-03T23:15:08.153000 -CVE-2024-53842,0,1,fbef0b0e07e65be6623298279f9a4f845fdf9f741f681b6904541542384fe4d2,2025-01-03T23:15:08.293000 +CVE-2024-53840,0,0,5a68e56ca18880b684acf85af94e13342de4c159ea66263c82861f03b2fcb290,2025-01-03T23:15:08.020000 +CVE-2024-53841,0,0,62ff2515a5c055bf7059847a5dc1f7cb41127e9f90e2360a3c63316668562633,2025-01-03T23:15:08.153000 +CVE-2024-53842,0,0,fbef0b0e07e65be6623298279f9a4f845fdf9f741f681b6904541542384fe4d2,2025-01-03T23:15:08.293000 CVE-2024-53843,0,0,c44c99ef4402ecef78ac8c1b113f8d73cb64b635f31482723ce78cbb921e8259,2024-11-26T00:15:07.430000 CVE-2024-53844,0,0,b0e1409716740a79089a588f0454ff38097ac555d54020c4c21a59c02d9d74a3,2024-11-26T19:15:31.463000 CVE-2024-53845,0,0,6016d80f197703cecce3c68f8c667ba88f504a297b5ec5a264d36bac2815592b,2024-12-12T02:15:29.087000 @@ -271414,8 +271414,8 @@ CVE-2024-55888,0,0,2dd59816688a6ea0fa98f443aa3b9b64966d8d29cc6ba2efa912b5e16a3e3 CVE-2024-55889,0,0,4fe80ccef310d79116a068c6ac228ca3c43ec868733cbb7b1340936879db80bb,2024-12-13T21:15:13.483000 CVE-2024-5589,0,0,f5444edd52a970169072d34e3475e47df466a0f4e4d6a1a900b9eeb8173a84e0,2024-11-21T09:47:58.880000 CVE-2024-55890,0,0,ed415926f81e15a00d962b0a92626356ed0642a3e51df83526b3e0e3894d9e2b,2024-12-13T18:15:22.373000 -CVE-2024-55896,1,1,58f855d897602f0ddd25272da3b6accb2a00ce40a285c9003204ef42399d7775,2025-01-03T23:15:08.437000 -CVE-2024-55897,1,1,965b449aed633549369e65253663c8ef0d14436fec1119cd03952115edc2e4cf,2025-01-03T23:15:08.573000 +CVE-2024-55896,0,0,58f855d897602f0ddd25272da3b6accb2a00ce40a285c9003204ef42399d7775,2025-01-03T23:15:08.437000 +CVE-2024-55897,0,0,965b449aed633549369e65253663c8ef0d14436fec1119cd03952115edc2e4cf,2025-01-03T23:15:08.573000 CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c898145206740,2024-11-21T09:47:59.020000 CVE-2024-5591,0,0,ff8d1cdc789b69475beac70a994291467b1640cdafedbde74dd787145239b1f1,2025-01-03T15:15:10.813000 CVE-2024-55917,0,0,1f325af2a96e8ad41709dbd189d0ddfc8263df5691046d9ed51f18d85360c21b,2024-12-31T17:15:09.140000 @@ -274086,7 +274086,7 @@ CVE-2024-8056,0,0,0063e3259bfec678c90e65014b514e3fc5b53335b06f114b8add8272bc670d CVE-2024-8058,0,0,6f6e6d86a899b2d6ecf84c7bb695389cf6cd8969a74da9d0894bff6a25056e1b,2024-12-16T18:15:12.540000 CVE-2024-8059,0,0,1cb4facf7c91a3d9a97ccb8a1f3191711112656d77de35de0353c495e40da8b5,2024-09-14T11:47:14.677000 CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000 -CVE-2024-8066,0,0,23914c4c07a72976bf77323f8c8c88f9f1b5c360164b6197b2a6c72e85e345f6,2024-11-28T09:15:05.547000 +CVE-2024-8066,0,1,86e49e9ca40f562dbb4349de8b035fa3bdbe2dc1ec58956bfe10f073117de36c,2025-01-04T02:15:06.670000 CVE-2024-8067,0,0,9a8e02c70e3cf1101161df0e8347c65b1eb92673227d1760f0da98254917cf93,2024-11-21T17:15:25.793000 CVE-2024-8068,0,0,33e344edbab124895a17cddeaed3b528914de950dbd4d2b9e3d629e050b587d5,2024-11-22T16:15:34.680000 CVE-2024-8069,0,0,5c41f789c536dcfcd2017a15e49ab4ab636220d759c413ecaaf2045ac3fb4188,2024-11-13T17:01:16.850000 @@ -275671,9 +275671,17 @@ CVE-2025-0195,0,0,3a317c51726170702316fa33d45de8f3fef3184ae45ef5e02dd449cbd27af8 CVE-2025-0196,0,0,fb71521e255dd853610214509345a55ba2b3e12d37e32c94fc1c20cb4b643ab6,2025-01-03T19:15:12.793000 CVE-2025-0197,0,0,8050294c8ecdc49228ce7833915570638c5758146d0bd01628204a571b88b989,2025-01-03T20:15:28.873000 CVE-2025-0198,0,0,968dd1b493127f8e631dd345bdaa3f8c9507ccd8a35d54e73951fabb2c2ecd77,2025-01-03T21:15:14.053000 -CVE-2025-0199,1,1,57de8d567970e2c3ac2428151686deec2058a3256dee56257a4a398a50eeca44,2025-01-03T23:15:08.707000 +CVE-2025-0199,0,0,57de8d567970e2c3ac2428151686deec2058a3256dee56257a4a398a50eeca44,2025-01-03T23:15:08.707000 CVE-2025-21609,0,0,debac97612532639eda73000ed423c6055a43cea29689a043be2143f9409c2e8,2025-01-03T17:15:09.147000 CVE-2025-21610,0,0,91f58e52c41e26ee8c782751f380f5e6f82b9b51c281135ca06080d1bc5407a4,2025-01-03T17:15:09.290000 CVE-2025-22214,0,0,e2cc6e4f91ccc0784ce6c5e7f203a7b7ecf1116a49ea9d5798e3ff93276eaeec,2025-01-02T04:15:06.277000 CVE-2025-22275,0,0,ae7bb36b063c3378386b214c3e5016593366cb52d21141261157b091c3ceba6a,2025-01-03T07:15:25.297000 -CVE-2025-22376,0,1,5718c706cab54399c824e81247fa8725e0b2da3334acc9f4e812565255340de1,2025-01-03T23:15:08.897000 +CVE-2025-22376,0,0,5718c706cab54399c824e81247fa8725e0b2da3334acc9f4e812565255340de1,2025-01-03T23:15:08.897000 +CVE-2025-22383,1,1,727a6fbe61cca6de96af4712e67ef7192921a2b367f0ec5a2db18fdf8d56a82e,2025-01-04T02:15:06.797000 +CVE-2025-22384,1,1,a34785f0ea77d1051462b06f3ba284ff30a622cd8e76e1c21ab8185ab758455f,2025-01-04T02:15:06.937000 +CVE-2025-22385,1,1,aff43c38155cb74cf81c638cfbc47b94018f167ea3f906c5fd31515dc6bc6d9e,2025-01-04T02:15:07.080000 +CVE-2025-22386,1,1,bbd7d8fc803c2934a2149fbb2deed4c9778625ec10cb1d2872244e9e5659fbeb,2025-01-04T02:15:07.230000 +CVE-2025-22387,1,1,b838244d0996dc03ebb8dffc9dabf702184ba4e49a7a5c57230e9efc416d9467,2025-01-04T02:15:07.343000 +CVE-2025-22388,1,1,9a8402292ef769e12d5885e75d6e64bf98efa2678784b842f9e9e7cbfb0895ec,2025-01-04T02:15:07.480000 +CVE-2025-22389,1,1,20998ea8161eeddffb076f7aaa13e80cc68375bfd9b91c246ad1e89981e76302,2025-01-04T02:15:07.600000 +CVE-2025-22390,1,1,9330b7c3a49d9fbd80ec7f6397cf44e8e49827d6961d879ecb2fb7c19857a86c,2025-01-04T02:15:07.747000