From af73869ac361289ad7b331e0c662a9f9f8b89e1a Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 28 Jan 2025 16:09:16 +0000 Subject: [PATCH] Auto-Update: 2025-01-28T16:05:42.333138+00:00 --- CVE-2017/CVE-2017-102xx/CVE-2017-10271.json | 4 +- CVE-2017/CVE-2017-121xx/CVE-2017-12149.json | 4 +- CVE-2017/CVE-2017-201xx/CVE-2017-20196.json | 16 ++- CVE-2017/CVE-2017-50xx/CVE-2017-5070.json | 4 +- CVE-2017/CVE-2017-63xx/CVE-2017-6327.json | 4 +- CVE-2017/CVE-2017-98xx/CVE-2017-9822.json | 4 +- CVE-2018/CVE-2018-23xx/CVE-2018-2380.json | 10 +- CVE-2021/CVE-2021-217xx/CVE-2021-21731.json | 10 +- CVE-2022/CVE-2022-40xx/CVE-2022-4008.json | 22 ++- CVE-2023/CVE-2023-223xx/CVE-2023-22361.json | 22 ++- CVE-2023/CVE-2023-224xx/CVE-2023-22441.json | 32 ++++- CVE-2023/CVE-2023-239xx/CVE-2023-23901.json | 32 ++++- CVE-2023/CVE-2023-245xx/CVE-2023-24586.json | 32 ++++- CVE-2023/CVE-2023-250xx/CVE-2023-25070.json | 32 ++++- CVE-2023/CVE-2023-250xx/CVE-2023-25072.json | 32 ++++- CVE-2023/CVE-2023-251xx/CVE-2023-25184.json | 32 ++++- CVE-2023/CVE-2023-256xx/CVE-2023-25648.json | 10 +- CVE-2023/CVE-2023-256xx/CVE-2023-25650.json | 10 +- CVE-2023/CVE-2023-273xx/CVE-2023-27385.json | 32 ++++- CVE-2023/CVE-2023-275xx/CVE-2023-27510.json | 22 ++- CVE-2023/CVE-2023-275xx/CVE-2023-27527.json | 32 ++++- CVE-2023/CVE-2023-417xx/CVE-2023-41776.json | 10 +- CVE-2023/CVE-2023-417xx/CVE-2023-41779.json | 10 +- CVE-2023/CVE-2023-417xx/CVE-2023-41780.json | 10 +- CVE-2023/CVE-2023-417xx/CVE-2023-41782.json | 10 +- CVE-2023/CVE-2023-417xx/CVE-2023-41783.json | 10 +- CVE-2024/CVE-2024-119xx/CVE-2024-11954.json | 149 ++++++++++++++++++++ CVE-2024/CVE-2024-119xx/CVE-2024-11956.json | 149 ++++++++++++++++++++ CVE-2024/CVE-2024-220xx/CVE-2024-22062.json | 62 +++++++- CVE-2024/CVE-2024-235xx/CVE-2024-23591.json | 76 +++++++++- CVE-2024/CVE-2024-239xx/CVE-2024-23953.json | 39 ++++- CVE-2024/CVE-2024-544xx/CVE-2024-54478.json | 45 +++++- CVE-2024/CVE-2024-545xx/CVE-2024-54507.json | 45 +++++- CVE-2024/CVE-2024-545xx/CVE-2024-54518.json | 45 +++++- CVE-2024/CVE-2024-545xx/CVE-2024-54519.json | 33 ++++- CVE-2024/CVE-2024-545xx/CVE-2024-54523.json | 33 ++++- CVE-2024/CVE-2024-545xx/CVE-2024-54539.json | 33 ++++- CVE-2024/CVE-2024-545xx/CVE-2024-54542.json | 45 +++++- CVE-2024/CVE-2024-551xx/CVE-2024-55195.json | 45 +++++- CVE-2024/CVE-2024-63xx/CVE-2024-6351.json | 90 ++++++++++++ CVE-2024/CVE-2024-78xx/CVE-2024-7881.json | 21 +++ CVE-2025/CVE-2025-241xx/CVE-2025-24102.json | 33 ++++- CVE-2025/CVE-2025-241xx/CVE-2025-24106.json | 45 +++++- CVE-2025/CVE-2025-241xx/CVE-2025-24121.json | 45 +++++- CVE-2025/CVE-2025-241xx/CVE-2025-24126.json | 33 ++++- CVE-2025/CVE-2025-241xx/CVE-2025-24130.json | 33 ++++- CVE-2025/CVE-2025-241xx/CVE-2025-24146.json | 45 +++++- CVE-2025/CVE-2025-241xx/CVE-2025-24151.json | 33 ++++- README.md | 40 +++++- _state.csv | 94 ++++++------ 50 files changed, 1582 insertions(+), 177 deletions(-) create mode 100644 CVE-2024/CVE-2024-119xx/CVE-2024-11954.json create mode 100644 CVE-2024/CVE-2024-119xx/CVE-2024-11956.json create mode 100644 CVE-2024/CVE-2024-63xx/CVE-2024-6351.json create mode 100644 CVE-2024/CVE-2024-78xx/CVE-2024-7881.json diff --git a/CVE-2017/CVE-2017-102xx/CVE-2017-10271.json b/CVE-2017/CVE-2017-102xx/CVE-2017-10271.json index 7d1fbb50afd..666baabb76b 100644 --- a/CVE-2017/CVE-2017-102xx/CVE-2017-10271.json +++ b/CVE-2017/CVE-2017-102xx/CVE-2017-10271.json @@ -2,8 +2,8 @@ "id": "CVE-2017-10271", "sourceIdentifier": "secalert_us@oracle.com", "published": "2017-10-19T17:29:01.747", - "lastModified": "2024-11-21T03:05:47.717", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T15:28:27.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-121xx/CVE-2017-12149.json b/CVE-2017/CVE-2017-121xx/CVE-2017-12149.json index 28ec7f1a503..e143a9199d6 100644 --- a/CVE-2017/CVE-2017-121xx/CVE-2017-12149.json +++ b/CVE-2017/CVE-2017-121xx/CVE-2017-12149.json @@ -2,8 +2,8 @@ "id": "CVE-2017-12149", "sourceIdentifier": "secalert@redhat.com", "published": "2017-10-04T21:01:00.180", - "lastModified": "2024-11-21T03:08:56.070", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T15:28:21.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20196.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20196.json index a8ad274b959..12c9163cecd 100644 --- a/CVE-2017/CVE-2017-201xx/CVE-2017-20196.json +++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20196.json @@ -2,13 +2,17 @@ "id": "CVE-2017-20196", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-26T18:15:27.443", - "lastModified": "2025-01-26T18:15:27.443", - "vulnStatus": "Received", + "lastModified": "2025-01-28T15:15:08.267", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Itechscripts School Management Software 2.75. It has been classified as critical. This affects an unknown part of the file /notice-edit.php. The manipulation of the argument aid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Itechscripts School Management Software 2.75. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /notice-edit.php. La manipulaci\u00f3n del argumento aid provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://www.exploit-db.com/exploits/41034/", "source": "cna@vuldb.com" + }, + { + "url": "https://www.exploit-db.com/exploits/41034", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2017/CVE-2017-50xx/CVE-2017-5070.json b/CVE-2017/CVE-2017-50xx/CVE-2017-5070.json index b62480ac6e1..42ee66cfdad 100644 --- a/CVE-2017/CVE-2017-50xx/CVE-2017-5070.json +++ b/CVE-2017/CVE-2017-50xx/CVE-2017-5070.json @@ -2,8 +2,8 @@ "id": "CVE-2017-5070", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2017-10-27T05:29:00.847", - "lastModified": "2024-11-21T03:26:59.100", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T15:28:33.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-63xx/CVE-2017-6327.json b/CVE-2017/CVE-2017-63xx/CVE-2017-6327.json index 9472f375ffb..d591da7b108 100644 --- a/CVE-2017/CVE-2017-63xx/CVE-2017-6327.json +++ b/CVE-2017/CVE-2017-63xx/CVE-2017-6327.json @@ -2,8 +2,8 @@ "id": "CVE-2017-6327", "sourceIdentifier": "secure@symantec.com", "published": "2017-08-11T20:29:00.207", - "lastModified": "2024-11-21T03:29:34.190", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T15:28:15.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-98xx/CVE-2017-9822.json b/CVE-2017/CVE-2017-98xx/CVE-2017-9822.json index 98886457379..d0894e0de59 100644 --- a/CVE-2017/CVE-2017-98xx/CVE-2017-9822.json +++ b/CVE-2017/CVE-2017-98xx/CVE-2017-9822.json @@ -2,8 +2,8 @@ "id": "CVE-2017-9822", "sourceIdentifier": "security-alert@hpe.com", "published": "2017-07-20T12:29:00.233", - "lastModified": "2024-11-21T03:36:55.967", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T15:06:15.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-23xx/CVE-2018-2380.json b/CVE-2018/CVE-2018-23xx/CVE-2018-2380.json index 4913ce740db..4e5898aa226 100644 --- a/CVE-2018/CVE-2018-23xx/CVE-2018-2380.json +++ b/CVE-2018/CVE-2018-23xx/CVE-2018-2380.json @@ -2,8 +2,8 @@ "id": "CVE-2018-2380", "sourceIdentifier": "cna@sap.com", "published": "2018-03-01T17:29:00.413", - "lastModified": "2024-11-21T04:03:42.830", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T15:28:44.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L", "baseScore": 6.6, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", diff --git a/CVE-2021/CVE-2021-217xx/CVE-2021-21731.json b/CVE-2021/CVE-2021-217xx/CVE-2021-21731.json index b2d6dc9a51b..39bb59fe59f 100644 --- a/CVE-2021/CVE-2021-217xx/CVE-2021-21731.json +++ b/CVE-2021/CVE-2021-217xx/CVE-2021-21731.json @@ -2,7 +2,7 @@ "id": "CVE-2021-21731", "sourceIdentifier": "psirt@zte.com.cn", "published": "2021-04-13T16:15:12.513", - "lastModified": "2024-11-21T05:48:53.910", + "lastModified": "2025-01-28T15:36:03.663", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -86,9 +86,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.03.04", - "matchCriteriaId": "652DD454-0693-4A0A-BAA5-A4905146B41D" + "matchCriteriaId": "9EFAC29A-DE5B-42C6-9A48-8AE6419DB37C" } ] }, @@ -98,8 +98,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6D48BE8C-7C78-41D7-87F1-22BFB91E3A5C" + "criteria": "cpe:2.3:a:zte:zxcloud_irai:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96352962-7748-44B8-9490-B95202771469" } ] } diff --git a/CVE-2022/CVE-2022-40xx/CVE-2022-4008.json b/CVE-2022/CVE-2022-40xx/CVE-2022-4008.json index 6df5d852cc5..388c5ca41b2 100644 --- a/CVE-2022/CVE-2022-40xx/CVE-2022-4008.json +++ b/CVE-2022/CVE-2022-40xx/CVE-2022-4008.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4008", "sourceIdentifier": "security@octopus.com", "published": "2023-05-10T06:15:09.000", - "lastModified": "2024-11-21T07:34:26.293", + "lastModified": "2025-01-28T15:15:09.060", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22361.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22361.json index fc841e66e8d..e1b90e7dbfe 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22361.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22361.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22361", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-10T06:15:10.800", - "lastModified": "2024-11-21T07:44:38.030", + "lastModified": "2025-01-28T15:15:09.247", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-224xx/CVE-2023-22441.json b/CVE-2023/CVE-2023-224xx/CVE-2023-22441.json index c0479879437..fcab481b505 100644 --- a/CVE-2023/CVE-2023-224xx/CVE-2023-22441.json +++ b/CVE-2023/CVE-2023-224xx/CVE-2023-22441.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22441", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-10T06:15:11.160", - "lastModified": "2024-11-21T07:44:48.567", + "lastModified": "2025-01-28T15:15:09.467", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-239xx/CVE-2023-23901.json b/CVE-2023/CVE-2023-239xx/CVE-2023-23901.json index a5dd15cb6c4..4719d5c7358 100644 --- a/CVE-2023/CVE-2023-239xx/CVE-2023-23901.json +++ b/CVE-2023/CVE-2023-239xx/CVE-2023-23901.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23901", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-10T06:15:11.727", - "lastModified": "2024-11-21T07:47:03.867", + "lastModified": "2025-01-28T15:15:09.657", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-295" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24586.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24586.json index 1ad67d45f44..7836288c1e2 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24586.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24586.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24586", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-10T06:15:12.310", - "lastModified": "2024-11-21T07:48:11.063", + "lastModified": "2025-01-28T15:15:09.850", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-312" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25070.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25070.json index cd5fca14782..dc21a53b461 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25070.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25070.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25070", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-10T06:15:12.497", - "lastModified": "2024-11-21T07:49:02.733", + "lastModified": "2025-01-28T15:15:10.043", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-319" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25072.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25072.json index ea24a42acae..a2fc02dfe5e 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25072.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25072.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25072", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-10T06:15:13.030", - "lastModified": "2024-11-21T07:49:02.997", + "lastModified": "2025-01-28T15:15:10.233", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-521" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-521" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25184.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25184.json index d86090c3d4e..edada96deeb 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25184.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25184.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25184", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-10T06:15:13.427", - "lastModified": "2024-11-21T07:49:16.303", + "lastModified": "2025-01-28T15:15:10.423", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-521" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-521" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25648.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25648.json index ee5c9e74be8..438f3f18717 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25648.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25648.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25648", "sourceIdentifier": "psirt@zte.com.cn", "published": "2023-12-14T07:15:07.180", - "lastModified": "2024-11-21T07:49:51.883", + "lastModified": "2025-01-28T15:36:03.663", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -91,9 +91,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*", "versionEndExcluding": "7.23.21", - "matchCriteriaId": "7D77687B-1273-46FC-8753-F7D351F3A9A3" + "matchCriteriaId": "497C2303-E079-4E7B-B9F4-F8720ACA2A7C" } ] }, @@ -103,8 +103,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6D48BE8C-7C78-41D7-87F1-22BFB91E3A5C" + "criteria": "cpe:2.3:a:zte:zxcloud_irai:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96352962-7748-44B8-9490-B95202771469" } ] } diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25650.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25650.json index 8fb1ac87bca..aa99283259e 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25650.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25650.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25650", "sourceIdentifier": "psirt@zte.com.cn", "published": "2023-12-14T07:15:07.783", - "lastModified": "2024-11-21T07:49:52.140", + "lastModified": "2025-01-28T15:36:03.663", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -91,9 +91,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*", "versionEndExcluding": "7.23.30", - "matchCriteriaId": "07F5720E-BB8D-4E13-B24B-A5C61E435BDC" + "matchCriteriaId": "66470CAB-0FEF-44FD-8158-5A37238C3BAA" } ] }, @@ -103,8 +103,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6D48BE8C-7C78-41D7-87F1-22BFB91E3A5C" + "criteria": "cpe:2.3:a:zte:zxcloud_irai:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96352962-7748-44B8-9490-B95202771469" } ] } diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27385.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27385.json index 81a3e0ceb45..6d0a5602195 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27385.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27385.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27385", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-10T06:15:13.680", - "lastModified": "2024-11-21T07:52:48.053", + "lastModified": "2025-01-28T15:15:10.607", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27510.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27510.json index aa3e6575c91..0de11a93d70 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27510.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27510.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27510", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-10T06:15:13.807", - "lastModified": "2024-11-21T07:53:03.877", + "lastModified": "2025-01-28T15:15:10.787", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27527.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27527.json index 7c57d1e7bb6..675a990e800 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27527.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27527.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27527", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-10T06:15:13.953", - "lastModified": "2024-11-21T07:53:06.160", + "lastModified": "2025-01-28T15:15:10.947", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 2.5, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.0, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41776.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41776.json index 63108efcd86..5fd78e14c95 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41776.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41776.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41776", "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-01-03T02:15:42.993", - "lastModified": "2024-11-21T08:21:40.043", + "lastModified": "2025-01-28T15:36:03.663", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -91,9 +91,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*", "versionEndExcluding": "7.23.32", - "matchCriteriaId": "FC0DCC6B-32B8-4C28-BDAF-37604BA1ABFC" + "matchCriteriaId": "8E5C0A67-F7F1-40F3-BC1A-0F4F67495FB0" } ] }, @@ -103,8 +103,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6D48BE8C-7C78-41D7-87F1-22BFB91E3A5C" + "criteria": "cpe:2.3:a:zte:zxcloud_irai:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96352962-7748-44B8-9490-B95202771469" } ] } diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41779.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41779.json index 64a9d94c4e5..2a1395adc94 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41779.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41779.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41779", "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-01-03T02:15:43.217", - "lastModified": "2024-11-21T08:21:40.183", + "lastModified": "2025-01-28T15:36:03.663", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -91,9 +91,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*", "versionEndExcluding": "7.23.32", - "matchCriteriaId": "FC0DCC6B-32B8-4C28-BDAF-37604BA1ABFC" + "matchCriteriaId": "8E5C0A67-F7F1-40F3-BC1A-0F4F67495FB0" } ] }, @@ -103,8 +103,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6D48BE8C-7C78-41D7-87F1-22BFB91E3A5C" + "criteria": "cpe:2.3:a:zte:zxcloud_irai:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96352962-7748-44B8-9490-B95202771469" } ] } diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41780.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41780.json index db948d13ed4..ec8449392c4 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41780.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41780.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41780", "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-01-03T02:15:43.403", - "lastModified": "2024-11-21T08:21:40.320", + "lastModified": "2025-01-28T15:36:03.663", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -91,9 +91,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*", "versionEndExcluding": "7.23.32", - "matchCriteriaId": "FC0DCC6B-32B8-4C28-BDAF-37604BA1ABFC" + "matchCriteriaId": "8E5C0A67-F7F1-40F3-BC1A-0F4F67495FB0" } ] }, @@ -103,8 +103,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6D48BE8C-7C78-41D7-87F1-22BFB91E3A5C" + "criteria": "cpe:2.3:a:zte:zxcloud_irai:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96352962-7748-44B8-9490-B95202771469" } ] } diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41782.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41782.json index a9822e165c9..7b52955fd38 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41782.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41782.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41782", "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-01-05T02:15:07.147", - "lastModified": "2024-11-21T08:21:40.590", + "lastModified": "2025-01-28T15:36:03.663", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -91,9 +91,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*", "versionEndExcluding": "7.23.30", - "matchCriteriaId": "07F5720E-BB8D-4E13-B24B-A5C61E435BDC" + "matchCriteriaId": "66470CAB-0FEF-44FD-8158-5A37238C3BAA" } ] }, @@ -103,8 +103,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6D48BE8C-7C78-41D7-87F1-22BFB91E3A5C" + "criteria": "cpe:2.3:a:zte:zxcloud_irai:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96352962-7748-44B8-9490-B95202771469" } ] } diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41783.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41783.json index 321f0394237..f78a49ed14f 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41783.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41783.json @@ -2,7 +2,7 @@ "id": "CVE-2023-41783", "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-01-03T02:15:43.573", - "lastModified": "2024-11-21T08:21:40.743", + "lastModified": "2025-01-28T15:36:03.663", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -91,9 +91,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:zte:zxcloud_irai_firmware:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*", "versionEndExcluding": "7.23.32", - "matchCriteriaId": "FC0DCC6B-32B8-4C28-BDAF-37604BA1ABFC" + "matchCriteriaId": "8E5C0A67-F7F1-40F3-BC1A-0F4F67495FB0" } ] }, @@ -103,8 +103,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:zte:zxcloud_irai:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6D48BE8C-7C78-41D7-87F1-22BFB91E3A5C" + "criteria": "cpe:2.3:a:zte:zxcloud_irai:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96352962-7748-44B8-9490-B95202771469" } ] } diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11954.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11954.json new file mode 100644 index 00000000000..7b5b2ff4a7a --- /dev/null +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11954.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2024-11954", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-28T14:15:29.070", + "lastModified": "2025-01-28T15:15:11.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in Pimcore 11.4.2. Affected by this vulnerability is an unknown functionality of the component Search Document. The manipulation leads to basic cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "baseScore": 3.3, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-xr3m-6gq6-22cg", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293905", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293905", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.451774", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-xr3m-6gq6-22cg", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://vuldb.com/?submit.451774", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11956.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11956.json new file mode 100644 index 00000000000..0e0d12050a2 --- /dev/null +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11956.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2024-11956", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-28T14:15:29.803", + "lastModified": "2025-01-28T14:15:29.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in Pimcore customer-data-framework up to 4.2.0. Affected by this issue is some unknown functionality of the file /admin/customermanagementframework/customers/list. The manipulation of the argument filterDefinition/filter leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "baseScore": 5.8, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/pimcore/customer-data-framework/releases/tag/v4.2.1", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-q53r-9hh9-w277", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293906", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293906", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.451863", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-q53r-9hh9-w277", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22062.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22062.json index 65abebe3f3c..1f86093f522 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22062.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22062.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22062", "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-07-09T07:15:03.157", - "lastModified": "2024-11-21T08:55:29.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T15:29:07.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 5.3 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-346" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.23.40", + "matchCriteriaId": "FC098522-79A9-4B6F-A851-D0BF87A783D7" + } + ] + } + ] } ], "references": [ { "url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1036204", - "source": "psirt@zte.com.cn" + "source": "psirt@zte.com.cn", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1036204", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23591.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23591.json index 659d26c173a..adc996c2b08 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23591.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23591.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23591", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-02-16T17:15:08.800", - "lastModified": "2024-11-21T08:57:58.127", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T14:28:25.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.6, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 1.4 } ] }, @@ -49,16 +69,64 @@ "value": "CWE-1269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:lenovo:thinksystem_sr670_v2_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "u8e126i-2.20", + "matchCriteriaId": "3AA53CBF-969A-44F9-9514-6198FEB20636" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:lenovo:thinksystem_sr670_v2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E97E5B4D-0E6F-49B0-8466-54A818517965" + } + ] + } + ] } ], "references": [ { "url": "https://https://support.lenovo.com/us/en/product_security/LEN-150020", - "source": "psirt@lenovo.com" + "source": "psirt@lenovo.com", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] }, { "url": "https://https://support.lenovo.com/us/en/product_security/LEN-150020", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23953.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23953.json index 9477762a2d8..99d139d6b90 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23953.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23953.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23953", "sourceIdentifier": "security@apache.org", "published": "2025-01-28T09:15:09.187", - "lastModified": "2025-01-28T09:15:09.187", - "vulnStatus": "Received", + "lastModified": "2025-01-28T15:15:11.330", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "Use of Arrays.equals() in LlapSignerImpl in\u00a0Apache Hive to compare message signatures\u00a0allows attacker to forge a valid signature for an arbitrary message byte by byte. The attacker should be an authorized user of the product to perform this attack.\u00a0Users are recommended to upgrade to version 4.0.0, which fixes this issue.\n\nThe problem occurs when an application doesn\u2019t use a constant-time algorithm for validating a signature.\u00a0The method Arrays.equals()\u00a0returns false\u00a0right away when it sees that one of the input\u2019s bytes are different. It means that the comparison time depends on the contents of the arrays. This little thing may allow an attacker to forge a valid signature for an arbitrary message byte by byte.\u00a0So it might allow malicious users to submit splits/work with selected signatures to LLAP without running as a privileged user, potentially leading to DDoS attack.\n\nMore details in the reference section." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -22,6 +45,16 @@ "value": "CWE-208" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54478.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54478.json index 7053a123956..907c8d056ea 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54478.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54478.json @@ -2,16 +2,55 @@ "id": "CVE-2024-54478", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:12.377", - "lastModified": "2025-01-27T22:15:12.377", - "vulnStatus": "Received", + "lastModified": "2025-01-28T15:15:11.520", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in iPadOS 17.7.4, visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sonoma 14.7.2, macOS Sequoia 15.2. Processing maliciously crafted web content may lead to an unexpected process crash." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de acceso a fuera de los l\u00edmites mejorando la verificaci\u00f3n de l\u00edmites. Este problema se solucion\u00f3 en iPadOS 17.7.4, visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 y iPadOS 18.2, macOS Sonoma 14.7.2 y macOS Sequoia 15.2. El procesamiento malintencionado de contenido web manipulado puede provocar un bloqueo inesperado del proceso." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/121837", diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54507.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54507.json index 0ac11fad4d9..fb8d58120dd 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54507.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54507.json @@ -2,16 +2,55 @@ "id": "CVE-2024-54507", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:12.777", - "lastModified": "2025-01-27T22:15:12.777", - "vulnStatus": "Received", + "lastModified": "2025-01-28T15:15:11.723", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A type confusion issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2. An attacker with user privileges may be able to read kernel memory." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de confusi\u00f3n de tipos mejorando la gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en macOS Sequoia 15.2, iOS 18.2 y iPadOS 18.2. Un atacante con privilegios de usuario podr\u00eda leer la memoria del n\u00facleo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/121837", diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54518.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54518.json index 12252bcaf4c..b6aa0e46a7c 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54518.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54518.json @@ -2,16 +2,55 @@ "id": "CVE-2024-54518", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:13.260", - "lastModified": "2025-01-27T22:15:13.260", - "vulnStatus": "Received", + "lastModified": "2025-01-28T15:15:11.900", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.2, watchOS 11.2, tvOS 18.2, iOS 18.2 and iPadOS 18.2. An app may be able to corrupt coprocessor memory." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sequoia 15.2, watchOS 11.2, tvOS 18.2, iOS 18.2 y iPadOS 18.2. Es posible que una aplicaci\u00f3n pueda da\u00f1ar la memoria del coprocesador." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/121837", diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54519.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54519.json index f686db2bc34..2c5155c5b4b 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54519.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54519.json @@ -2,16 +2,43 @@ "id": "CVE-2024-54519", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:13.367", - "lastModified": "2025-01-27T22:15:13.367", - "vulnStatus": "Received", + "lastModified": "2025-01-28T15:15:12.050", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was resolved by sanitizing logging. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2. An app may be able to read sensitive location information." + }, + { + "lang": "es", + "value": "El problema se resolvi\u00f3 con el registro de desinfectando. Este problema se solucion\u00f3 en macOS Sonoma 14.7.2 y macOS Sequoia 15.2. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial sobre la ubicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/121839", diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54523.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54523.json index 1252db70366..986a3cbc0de 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54523.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54523.json @@ -2,16 +2,43 @@ "id": "CVE-2024-54523", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:13.660", - "lastModified": "2025-01-27T22:15:13.660", - "vulnStatus": "Received", + "lastModified": "2025-01-28T15:15:12.190", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.2, watchOS 11.2, tvOS 18.2, iOS 18.2 and iPadOS 18.2. An app may be able to corrupt coprocessor memory." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sequoia 15.2, watchOS 11.2, tvOS 18.2, iOS 18.2 y iPadOS 18.2. Es posible que una aplicaci\u00f3n pueda da\u00f1ar la memoria del coprocesador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/121837", diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54539.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54539.json index dd044b30e5a..450db38bd10 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54539.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54539.json @@ -2,16 +2,43 @@ "id": "CVE-2024-54539", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:14.037", - "lastModified": "2025-01-27T22:15:14.037", - "vulnStatus": "Received", + "lastModified": "2025-01-28T15:15:12.340", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed through improved state management. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An app may be able to capture keyboard events from the lock screen." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mediante con una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en macOS Sonoma 14.7.2, macOS Sequoia 15.2 y macOS Ventura 13.7.2. Es posible que una aplicaci\u00f3n pueda capturar eventos del teclado desde la pantalla de bloqueo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/121839", diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54542.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54542.json index 19904c088e2..f8464f91749 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54542.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54542.json @@ -2,16 +2,55 @@ "id": "CVE-2024-54542", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:14.217", - "lastModified": "2025-01-27T22:15:14.217", - "vulnStatus": "Received", + "lastModified": "2025-01-28T15:15:12.477", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authentication issue was addressed with improved state management. This issue is fixed in Safari 18.2, macOS Sequoia 15.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2. Private Browsing tabs may be accessed without authentication." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de autenticaci\u00f3n con con una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en Safari 18.2, macOS Sequoia 15.2, watchOS 11.2, iOS 18.2 y iPadOS 18.2. Se puede acceder a las pesta\u00f1as de Navegaci\u00f3n privada sin autenticaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/121837", diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55195.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55195.json index ad038a77457..b8fc46fb7d5 100644 --- a/CVE-2024/CVE-2024-551xx/CVE-2024-55195.json +++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55195.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55195", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T22:15:14.690", - "lastModified": "2025-01-23T22:15:14.690", - "vulnStatus": "Received", + "lastModified": "2025-01-28T15:15:12.647", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,11 +15,50 @@ "value": "Un error de tama\u00f1o de asignaci\u00f3n demasiado grande en el componente /imagebuf.cpp de OpenImageIO v3.1.0.0dev puede provocar una denegaci\u00f3n de servicio (DoS) cuando el programa solicita asignar demasiado espacio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4553", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4553", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6351.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6351.json new file mode 100644 index 00000000000..03e167e3486 --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6351.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2024-6351", + "sourceIdentifier": "product-security@silabs.com", + "published": "2025-01-28T14:15:30.007", + "lastModified": "2025-01-28T14:15:30.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A malformed packet can cause a buffer overflow in the NWK/APS layer of the Ember ZNet stack and lead to an assert" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://community.silabs.com/069Vm00000HtvDgIAJ", + "source": "product-security@silabs.com" + }, + { + "url": "https://github.com/SiliconLabs/simplicity_sdk/releases", + "source": "product-security@silabs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7881.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7881.json new file mode 100644 index 00000000000..0b095d91173 --- /dev/null +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7881.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-7881", + "sourceIdentifier": "arm-security@arm.com", + "published": "2025-01-28T15:15:12.847", + "lastModified": "2025-01-28T15:15:12.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unprivileged context can trigger a data\nmemory-dependent prefetch engine to fetch the contents of a privileged location\nand consume those contents as an address that is also dereferenced." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://developer.arm.com/Arm%20Security%20Center/Arm%20CPU%20Vulnerability%20CVE-2024-7881", + "source": "arm-security@arm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24102.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24102.json index 8d7f359943d..c50653daace 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24102.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24102.json @@ -2,16 +2,43 @@ "id": "CVE-2025-24102", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:15.807", - "lastModified": "2025-01-27T22:15:15.807", - "vulnStatus": "Received", + "lastModified": "2025-01-28T15:15:13.303", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to determine a user\u2019s current location." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sequoia 15.3, macOS Sonoma 14.7.3 y macOS Ventura 13.7.3. Es posible que una aplicaci\u00f3n pueda determinar la ubicaci\u00f3n actual de un usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/122067", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24106.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24106.json index fd4046bd5e1..e6648d51040 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24106.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24106.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24106", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:16.070", - "lastModified": "2025-01-27T22:15:16.070", - "vulnStatus": "Received", + "lastModified": "2025-01-28T15:15:13.450", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Parsing a file may lead to an unexpected app termination." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. El an\u00e1lisis de un archivo puede provocar la finalizaci\u00f3n inesperada de la aplicaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24121.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24121.json index be3e654cd1f..679948f97df 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24121.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24121.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24121", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:17.230", - "lastModified": "2025-01-27T22:15:17.230", - "vulnStatus": "Received", + "lastModified": "2025-01-28T15:15:13.600", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to modify protected parts of the file system." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de l\u00f3gica con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del archivo sistema." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24126.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24126.json index 8dbc694d628..c531eb21a6f 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24126.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24126.json @@ -2,16 +2,43 @@ "id": "CVE-2025-24126", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:17.603", - "lastModified": "2025-01-27T22:15:17.603", - "vulnStatus": "Received", + "lastModified": "2025-01-28T15:15:13.743", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An input validation issue was addressed. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. An attacker on the local network may be able to cause unexpected system termination or corrupt process memory." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de validaci\u00f3n de entrada. Este problema se solucion\u00f3 en visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. Un atacante en la red local podr\u00eda provocar la finalizaci\u00f3n inesperada de sistema o da\u00f1ar la memoria del proceso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/122066", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json index bac97103cd0..4f5ba74a743 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json @@ -2,16 +2,43 @@ "id": "CVE-2025-24130", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:17.977", - "lastModified": "2025-01-27T22:15:17.977", - "vulnStatus": "Received", + "lastModified": "2025-01-28T15:15:13.890", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to modify protected parts of the file system." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del archivo sistema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24146.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24146.json index 178799da629..f9dd50d65fe 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24146.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24146.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24146", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:19.077", - "lastModified": "2025-01-27T22:15:19.077", - "vulnStatus": "Received", + "lastModified": "2025-01-28T15:15:14.013", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Deleting a conversation in Messages may expose user contact information in system logging." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Eliminar una conversaci\u00f3n en Mensajes puede exponer la informaci\u00f3n de contacto del usuario en el registro sistema." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24151.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24151.json index a8cf35a4e3c..9ef63ffe22a 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24151.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24151.json @@ -2,16 +2,43 @@ "id": "CVE-2025-24151", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:19.360", - "lastModified": "2025-01-27T22:15:19.360", - "vulnStatus": "Received", + "lastModified": "2025-01-28T15:15:14.150", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to cause unexpected system termination or corrupt kernel memory." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con una gesti\u00f3n mejorada de la memoria. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Es posible que una aplicaci\u00f3n pueda provocar la finalizaci\u00f3n inesperada de sistema o da\u00f1ar la memoria del kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/README.md b/README.md index f517ece1937..f9c2a9896c8 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-28T13:00:27.930499+00:00 +2025-01-28T16:05:42.333138+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-28T11:15:07.413000+00:00 +2025-01-28T15:36:03.663000+00:00 ``` ### Last Data Feed Release @@ -33,20 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -279281 +279285 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `4` -- [CVE-2025-0065](CVE-2025/CVE-2025-00xx/CVE-2025-0065.json) (`2025-01-28T11:15:07.413`) +- [CVE-2024-11954](CVE-2024/CVE-2024-119xx/CVE-2024-11954.json) (`2025-01-28T14:15:29.070`) +- [CVE-2024-11956](CVE-2024/CVE-2024-119xx/CVE-2024-11956.json) (`2025-01-28T14:15:29.803`) +- [CVE-2024-6351](CVE-2024/CVE-2024-63xx/CVE-2024-6351.json) (`2025-01-28T14:15:30.007`) +- [CVE-2024-7881](CVE-2024/CVE-2024-78xx/CVE-2024-7881.json) (`2025-01-28T15:15:12.847`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `44` +- [CVE-2023-27510](CVE-2023/CVE-2023-275xx/CVE-2023-27510.json) (`2025-01-28T15:15:10.787`) +- [CVE-2023-27527](CVE-2023/CVE-2023-275xx/CVE-2023-27527.json) (`2025-01-28T15:15:10.947`) +- [CVE-2023-41776](CVE-2023/CVE-2023-417xx/CVE-2023-41776.json) (`2025-01-28T15:36:03.663`) +- [CVE-2023-41779](CVE-2023/CVE-2023-417xx/CVE-2023-41779.json) (`2025-01-28T15:36:03.663`) +- [CVE-2023-41780](CVE-2023/CVE-2023-417xx/CVE-2023-41780.json) (`2025-01-28T15:36:03.663`) +- [CVE-2023-41782](CVE-2023/CVE-2023-417xx/CVE-2023-41782.json) (`2025-01-28T15:36:03.663`) +- [CVE-2023-41783](CVE-2023/CVE-2023-417xx/CVE-2023-41783.json) (`2025-01-28T15:36:03.663`) +- [CVE-2024-22062](CVE-2024/CVE-2024-220xx/CVE-2024-22062.json) (`2025-01-28T15:29:07.970`) +- [CVE-2024-23591](CVE-2024/CVE-2024-235xx/CVE-2024-23591.json) (`2025-01-28T14:28:25.570`) +- [CVE-2024-23953](CVE-2024/CVE-2024-239xx/CVE-2024-23953.json) (`2025-01-28T15:15:11.330`) +- [CVE-2024-54478](CVE-2024/CVE-2024-544xx/CVE-2024-54478.json) (`2025-01-28T15:15:11.520`) +- [CVE-2024-54507](CVE-2024/CVE-2024-545xx/CVE-2024-54507.json) (`2025-01-28T15:15:11.723`) +- [CVE-2024-54518](CVE-2024/CVE-2024-545xx/CVE-2024-54518.json) (`2025-01-28T15:15:11.900`) +- [CVE-2024-54519](CVE-2024/CVE-2024-545xx/CVE-2024-54519.json) (`2025-01-28T15:15:12.050`) +- [CVE-2024-54523](CVE-2024/CVE-2024-545xx/CVE-2024-54523.json) (`2025-01-28T15:15:12.190`) +- [CVE-2024-54539](CVE-2024/CVE-2024-545xx/CVE-2024-54539.json) (`2025-01-28T15:15:12.340`) +- [CVE-2024-54542](CVE-2024/CVE-2024-545xx/CVE-2024-54542.json) (`2025-01-28T15:15:12.477`) +- [CVE-2024-55195](CVE-2024/CVE-2024-551xx/CVE-2024-55195.json) (`2025-01-28T15:15:12.647`) +- [CVE-2025-24102](CVE-2025/CVE-2025-241xx/CVE-2025-24102.json) (`2025-01-28T15:15:13.303`) +- [CVE-2025-24106](CVE-2025/CVE-2025-241xx/CVE-2025-24106.json) (`2025-01-28T15:15:13.450`) +- [CVE-2025-24121](CVE-2025/CVE-2025-241xx/CVE-2025-24121.json) (`2025-01-28T15:15:13.600`) +- [CVE-2025-24126](CVE-2025/CVE-2025-241xx/CVE-2025-24126.json) (`2025-01-28T15:15:13.743`) +- [CVE-2025-24130](CVE-2025/CVE-2025-241xx/CVE-2025-24130.json) (`2025-01-28T15:15:13.890`) +- [CVE-2025-24146](CVE-2025/CVE-2025-241xx/CVE-2025-24146.json) (`2025-01-28T15:15:14.013`) +- [CVE-2025-24151](CVE-2025/CVE-2025-241xx/CVE-2025-24151.json) (`2025-01-28T15:15:14.150`) ## Download and Usage diff --git a/_state.csv b/_state.csv index e9495bed04d..236fb4f8423 100644 --- a/_state.csv +++ b/_state.csv @@ -94429,7 +94429,7 @@ CVE-2017-10268,0,0,2fd5a1eba64da42734fa123762b9bdbc48dafe91212c8b13796188a23db53 CVE-2017-10269,0,0,99a602881bab7d0a9c272d62e9be296209d4d681131d96516b1eec020fb0a691,2024-11-21T03:05:47.420000 CVE-2017-1027,0,0,a722572dd9e4e8a2c22d0d11f87337325cef2446e18a9c5891b511e41dd44047,2023-11-07T02:42:06.330000 CVE-2017-10270,0,0,314dbf27c930f7b4944cd4faf568f51090481b6e725424179383d35be21c1e30,2024-11-21T03:05:47.560000 -CVE-2017-10271,0,0,14922a22b3e13ba9a751ea1222fa30df24e11e2f5f03c317ff596ab737c3753b,2024-11-21T03:05:47.717000 +CVE-2017-10271,0,1,c2d4b2b186e17f9651b878fc1780de25faa245106177d0fdaa914468faba8a52,2025-01-28T15:28:27.123000 CVE-2017-10272,0,0,a8ae74e9650948ede1f5ebe3ddebb7fd281d93476bc1061c2a2e80feb18d65ca,2024-11-21T03:05:47.970000 CVE-2017-10273,0,0,3125f38a9aaff799139d27e2e5503e4ec327e522e3537b85981648fd4e32ca16,2024-11-21T03:05:48.103000 CVE-2017-10274,0,0,79cd866f1671fcd1359498782f0a43047229bb288cc35d6385182e3e883df299,2024-11-21T03:05:48.267000 @@ -95945,7 +95945,7 @@ CVE-2017-12144,0,0,c5b9588793956a2147e0ffe6a0a8ea4044bdbc460981fa91a393837b5667a CVE-2017-12145,0,0,f6a628c2da158e01f2bd77047cabe907d22b412b56697c26a6a70ed3add26eac,2024-11-21T03:08:55.653000 CVE-2017-12146,0,0,64a79706ee2c8f72ac2fa403a3a37e2a64b996372ffde19ee16afea92b1f5425,2024-11-21T03:08:55.787000 CVE-2017-12148,0,0,1a1262ec79e3b069ae03d2b5af93248fb69a31a3840409bd1f8c8fdfea443f3b,2024-11-21T03:08:55.947000 -CVE-2017-12149,0,0,2344fb981b14e958f056d2b21f759fb905d6638e4e136a219d99193ac7fa37e9,2024-11-21T03:08:56.070000 +CVE-2017-12149,0,1,504c9ebe5af230b35911f826077b55642dff9025c82b1f3968dccfaf1d8493ed,2025-01-28T15:28:21.047000 CVE-2017-12150,0,0,6ebd77c4fb4f62bdfba4689b6d5d24e668fd3f79a1f423844567f9af316b16d5,2024-11-21T03:08:56.200000 CVE-2017-12151,0,0,e7ec109e39d5943758f1e76f429b6a87e21f784ab8b7a2059b50534825d3cbb1,2024-11-21T03:08:56.363000 CVE-2017-12152,0,0,b30a644384c1e46a7ccab8059ee04d0b040f8f2170f5b86f797bdf0545b0b474,2023-11-07T02:38:22.517000 @@ -102558,7 +102558,7 @@ CVE-2017-20192,0,0,62ca05a0a6895e670da34ea053fd80d19f2fb06d6c55730f577c1845fb514 CVE-2017-20193,0,0,78f33a28785b6834207e6952bd57c135d5a9420af5c916cc0c38f6d255c4ca38,2024-10-30T20:46:34.060000 CVE-2017-20194,0,0,2ef68f420c7767e9da26d58c0322a3b0184d3e0f958f630f006b5a75255314e6,2024-10-30T21:00:25.973000 CVE-2017-20195,0,0,038824b0765b4962b51714c1d9dd9e3ad2eebba7a76824674181910d889a0075,2024-10-29T14:34:04.427000 -CVE-2017-20196,0,0,14152e3e97ab24a76d49e12c81d611876b27423d888c54801b3c354324913bd2,2025-01-26T18:15:27.443000 +CVE-2017-20196,0,1,dd8c4d642ecaa4043a036480f99edf77027b1358976e3ddf38724f7850320fd2,2025-01-28T15:15:08.267000 CVE-2017-2020,0,0,0176f89e76e77d17aff44beb265bbd6290607491912cdad54f562216e17fef40,2023-11-07T02:43:30.943000 CVE-2017-2021,0,0,76f10f5cd36e75a57c68367deb797f3f6432a879d0c98ef2f911f8615c163241,2023-11-07T02:43:31.170000 CVE-2017-2022,0,0,9f249157715bb01a33c6885e22f286efa78b6a3306959a78f30cb9dd84a9f46c,2023-11-07T02:43:31.413000 @@ -105455,7 +105455,7 @@ CVE-2017-5066,0,0,9f5c2db614b32a678fdd9232bf96577d4474ace1459543d090a572f1f93f7c CVE-2017-5067,0,0,2ad162add6cbb32a510fab0bef6721d8082bbf537ce0c72472a58068a607f20d,2024-11-21T03:26:58.730000 CVE-2017-5068,0,0,9d3ca8511d9e49adbc729771915a5711f48fc24f691507c7e4ce24512d6e6220,2024-11-21T03:26:58.850000 CVE-2017-5069,0,0,4c6f0e28aa3e2ae29a418ffac89a0640856c7571f8819fd880192061f88a95e7,2024-11-21T03:26:58.977000 -CVE-2017-5070,0,0,615a11d3c3fcfda037a63767a33a59e4e5a8d648020bec496404db799180523e,2024-11-21T03:26:59.100000 +CVE-2017-5070,0,1,56f466c1ebccca8af0585c2ba3ac042f7c4082528934ada9fbcfb8e0e5fa8971,2025-01-28T15:28:33.153000 CVE-2017-5071,0,0,f5410941818e677c4e6d6a02b68726701eff5212f53fd7443f7b0b365d607e7b,2024-11-21T03:26:59.240000 CVE-2017-5072,0,0,35f02b5f2a282cbaf303df9a2725e772dc9c96fe8c0511537b449848ccae02cc,2024-11-21T03:26:59.377000 CVE-2017-5073,0,0,398bd66ebf7a3e98cb53bb4d3120ac66281a7438a4ab776997a78de490a8b102,2024-11-21T03:26:59.497000 @@ -106503,7 +106503,7 @@ CVE-2017-6323,0,0,adf010d4a39e345b824cee6fcca9c2195697b5d7a97b0a9c5082468040c4f8 CVE-2017-6324,0,0,77722cfc809cdfadcd278c7b890ec0d070a04bba29126e6eb8a3655dc3f57a0d,2024-11-21T03:29:33.847000 CVE-2017-6325,0,0,7a6ccf0f51e269d2f444f7b191f021e32f282c2136c57deb80e01f1e8d699d30,2024-11-21T03:29:33.960000 CVE-2017-6326,0,0,1cb4eafe71d9ead884f6be63876fd968575791113118974a1f5830ebff169d54,2024-11-21T03:29:34.073000 -CVE-2017-6327,0,0,41d22cc19320a12f7dcaf53924e4b464e17def5611434a084cf3e8251b5a2913,2024-11-21T03:29:34.190000 +CVE-2017-6327,0,1,f5137ddd3b7008bd5a7e5566450db5cc4e7889845027f4452902295d920f7b6d,2025-01-28T15:28:15.097000 CVE-2017-6328,0,0,ed8b8081c67d23f8eecca6e7147a999aa9cca89e11d27e3aee197caa7faaefd0,2024-11-21T03:29:34.303000 CVE-2017-6329,0,0,11dea170ad86b94cced8f348027330ceaae6c40482cdb228f11d6206d2a1c7e0,2024-11-21T03:29:34.407000 CVE-2017-6330,0,0,9daec3b7d68726ab69bb0475e153ee0c9e277dd5f36b71e86c17e73a8d02c9da,2024-11-21T03:29:34.507000 @@ -109621,7 +109621,7 @@ CVE-2017-9818,0,0,b6c4054d5b5049e3521fc8b75f1a35037c7f3f9f724c80ca337865cdf69237 CVE-2017-9819,0,0,faf21bdf8f0e34aafaa891fba94824a6473cfa61d27c736db383bbcbdce2c17f,2024-11-21T03:36:55.533000 CVE-2017-9820,0,0,7862875c350e3e138d964ecc42041d08185dd8f2fdb5177d7874767918fc30b8,2024-11-21T03:36:55.683000 CVE-2017-9821,0,0,9edcdf1513f9cfdea6252be124b0f5583c44c4f42d815730ab21a392e103550a,2024-11-21T03:36:55.827000 -CVE-2017-9822,0,0,2a27c3d2d96b3658088ac342db13376385a6888df412e1b9e9c14cff53de4789,2024-11-21T03:36:55.967000 +CVE-2017-9822,0,1,78900d0d72f4530c8717e337b284a335707d071f2a59b2d5e48136064130e800,2025-01-28T15:06:15.417000 CVE-2017-9828,0,0,2b1e28db4b016e8fb7bdd2cc6f79600538f2b592068c76006835c1fac2325341,2024-11-21T03:36:56.083000 CVE-2017-9829,0,0,372ab7e7648f5f60d61ef574d04b751584127dfa75a5ad90d9128c1af879828f,2024-11-21T03:36:56.230000 CVE-2017-9830,0,0,4cd364c25f0ee5800e54fd20ae0a246ea31115fac47546d43b7d7cf16b0f7f67,2024-11-21T03:36:56.373000 @@ -121219,7 +121219,7 @@ CVE-2018-2376,0,0,e771b541c65e6806171bcc422e600aca172b087deb9dd5f5e737a93cf9d9f7 CVE-2018-2377,0,0,b04a53dcd2a7c4e3bde1bc95de37f89b624fe76c7f42e976e59ba78d02042064,2024-11-21T04:03:42.500000 CVE-2018-2378,0,0,6e7cb99020826e5b0b1ca2ba05f327e149ae716b95c81e67b5888d29cee56ae2,2024-11-21T04:03:42.600000 CVE-2018-2379,0,0,545016da27a917d202ae506081b74d70ca17d37d883617818c076a919dd65dae,2024-11-21T04:03:42.710000 -CVE-2018-2380,0,0,07efae4ad9e4f53097d410b5073da10fe7fb99ae780c882598acbb7fe38beeb9,2024-11-21T04:03:42.830000 +CVE-2018-2380,0,1,89f20a5568655a4427b158f57cdef08e1e8571f92507f2ba7d1cd40d931aff9a,2025-01-28T15:28:44.097000 CVE-2018-2381,0,0,e7d64f84b1c5ec6d295ffea64bca75c347b5b6b30638db6a64bacaaf2df5bb36,2024-11-21T04:03:42.943000 CVE-2018-2382,0,0,823133cb343551eea73f306ff47ae4e9c9885b62bd380bcca1bfd86b89ce21f8,2024-11-21T04:03:43.057000 CVE-2018-2383,0,0,869e1b7bb73e140ec24fd821163219e771a40a1bb114253bba8f85f4ce182998,2024-11-21T04:03:43.170000 @@ -168266,7 +168266,7 @@ CVE-2021-21728,0,0,abfcfb35e980ce0ce123fceadeabb11de2a6565aa607cfe8decaede24d231 CVE-2021-21729,0,0,5c8c6ff8ced38561b4fb5213780ae73d6d2e4ee4d4bd3497a9224cefdbf3446b,2024-11-21T05:48:53.660000 CVE-2021-2173,0,0,cbad9191d79c8dacc7e443e9fe440f30f6648d01ca2a701c6c89364b5fa6a3f8,2024-11-21T06:02:32.263000 CVE-2021-21730,0,0,805546dac7c11db2476efc02242c7c7b94ea7d54741ed53fcc38f5426004b5fa,2024-11-21T05:48:53.793000 -CVE-2021-21731,0,0,a012a858c7ba64008f6d6563ef1dd4dfeee502c3341004cce8f746e969e8fd4c,2024-11-21T05:48:53.910000 +CVE-2021-21731,0,1,fc1fb4be750c2eb9506732466b41ca60b0e17c2259773af292cd02fbe48da9a7,2025-01-28T15:36:03.663000 CVE-2021-21732,0,0,4a59c0d26af0a341d194bb0bfae954d2dc535569840fc62c58a3f0cafa422cb6,2024-11-21T05:48:54.023000 CVE-2021-21733,0,0,d39f86fdb8abfb7f331c613fcef01ccdb1e34d1f0405dbae49159b55f7cc1469,2024-11-21T05:48:54.137000 CVE-2021-21734,0,0,e560ea57bd7301969ff07503d3a9d383ce9ebb441e347c6ec57d4f8a75176222,2024-11-21T05:48:54.243000 @@ -206362,7 +206362,7 @@ CVE-2022-40073,0,0,e70cb5d8371fd7f2d3adb545818d1342b3d91ca78a490d67a70ba3cef3b61 CVE-2022-40074,0,0,e6681222f196869647c103fb04c2071fb9eb5b2878fc4661c5940517bffb4565,2024-11-21T07:20:48.497000 CVE-2022-40075,0,0,528238a21c223c94fd7e677a83885dfb032391305d3ea4dd2958f5640e7c5ad2,2024-11-21T07:20:48.647000 CVE-2022-40076,0,0,c046b91313e33d852e787506d4c9c3b2814c879e207d5c27f199fbb28002715c,2024-11-21T07:20:48.800000 -CVE-2022-4008,0,0,36ebc1c4d3491863d042b22625651b5c3b771429dfe12c891c55777923e3dbe5,2024-11-21T07:34:26.293000 +CVE-2022-4008,0,1,28c0600c4c80574bd433740004937a0bb4ed140166e2773d99506a9fae24173e,2025-01-28T15:15:09.060000 CVE-2022-40080,0,0,0b19a6ef973056f75152ce2a1f048e7f1573677c516306567b89503bb7ee2bef,2024-11-21T07:20:48.960000 CVE-2022-40082,0,0,56e76875663e98850cea47c91ae372970f7a80cab7e0f217ec87951590fd2597,2024-11-21T07:20:49.127000 CVE-2022-40083,0,0,00c52ecc769d6134409ef73ebc9833bdb81527bec230aa202b259398d890e40a,2024-11-21T07:20:49.287000 @@ -217169,7 +217169,7 @@ CVE-2023-22358,0,0,09ff79227052928b381e631d0f489785ad692293414de7e2e8eb67f1f3794 CVE-2023-22359,0,0,58d1dc33c81d8bd629482ca7b7450932882d318efd86a7b0c1d4e5d00f2e46e8,2024-11-21T07:44:37.807000 CVE-2023-2236,0,0,7a218227d81da1e3f369ef4b8f9cd06e52cc34b359f143c1afab0c2fd8539745,2024-11-21T07:58:12.760000 CVE-2023-22360,0,0,fd39a65648711ab8fca8410196aa194e55218a4b817fbfbb522e25878ac6b54a,2024-11-21T07:44:37.927000 -CVE-2023-22361,0,0,50decacf6926470c1c50024779cb6f7527ae8efb50590f3551b530adfd0ce45f,2024-11-21T07:44:38.030000 +CVE-2023-22361,0,1,0cdc99c29ecc300ec4b2048c09068ad6ac529e2fbb208ea9fd4e2f017283aaa6,2025-01-28T15:15:09.247000 CVE-2023-22362,0,0,c3ba0f65014999f63dd9643dd347ae876cd94a8ac19156266e3221f4ca257c83,2024-11-21T07:44:38.150000 CVE-2023-22363,0,0,de07bb4b036cf6ff79a6504913d43191e2b7c104a9b17e7f2fa43e052f16ac60,2024-11-21T07:44:38.263000 CVE-2023-22365,0,0,202bbd9474e90d2a6515b0632953e7d0a7b156128ee3449a1dac18492385178c,2024-11-21T07:44:38.383000 @@ -217247,7 +217247,7 @@ CVE-2023-22438,0,0,5703d0c4eb5aa393e07fb85a45fb079e2501bb28ea84b28790691f2382e31 CVE-2023-22439,0,0,ca68d33d01cfaf8fae9ea4cc43a47b0f92b3a227512f3203fc183a193b04683b,2024-11-21T07:44:48.323000 CVE-2023-2244,0,0,9025fdc5a6a759ed98b80fd24d007a79e81c2dab5fc8cbc2e2ac71984ae522d5,2024-11-21T07:58:13.680000 CVE-2023-22440,0,0,c5ec718ecf01186f250ace3719ba2ad09a9b09feb1366a6ca10e80d692ebffb0,2024-11-21T07:44:48.453000 -CVE-2023-22441,0,0,b644cb46aa77022eab8d67ef94a7dbbdab9f479d32b7915dde982c03161eebf5,2024-11-21T07:44:48.567000 +CVE-2023-22441,0,1,2898bedf7d84a75fbffb3257a0b64b59beb510464dcd708b8ad2644e6820cf10,2025-01-28T15:15:09.467000 CVE-2023-22442,0,0,29a9cdca2e21aa6d398bb690de439ba4d4d2ddb0ea81a01806255dac3a21ff10,2024-11-21T07:44:48.687000 CVE-2023-22443,0,0,9fddab8612d3067f0d4cebc1a90128c8533756620471b9c208288be6aa2f41d8,2024-11-21T07:44:48.817000 CVE-2023-22444,0,0,20b223dec4ff7bd0b8efd2978a9b7375e7a68fedd8b267f92dd20c6f584cb0c1,2024-11-21T07:44:48.947000 @@ -218407,7 +218407,7 @@ CVE-2023-23898,0,0,9ecfb01461ecd6312b4518b202f3038ac3a534c6446a51be6a481ac412fca CVE-2023-23899,0,0,83c684d5a0c0153ca536e41b4b1ec7ab525d48af8abf9c727f10c646f36b7714,2024-11-21T07:47:03.583000 CVE-2023-2390,0,0,0b3933c68aac4c6dd381bee40c06fb4fbff5d2442ca411a48ccacdd9579faa67,2024-11-21T07:58:31.300000 CVE-2023-23900,0,0,bcb049b1d07fa99f1c9c7b07a1a1e31428f3d9389488a84b2a6b57255ec7a77d,2024-11-21T07:47:03.723000 -CVE-2023-23901,0,0,9530cf0cf49055b387909ac241e076288f2ebc12455bad5d4ea0c957b189d88e,2024-11-21T07:47:03.867000 +CVE-2023-23901,0,1,344c9b14eaafed66deb1aaa0c65d5ef4cdc05f637a8487121a44a1e9ce5838cb,2025-01-28T15:15:09.657000 CVE-2023-23902,0,0,a31c827d3e2fa5446e634865420275a55f7452fd17cd9c80d50dac6f7835b71f,2024-11-21T07:47:03.990000 CVE-2023-23903,0,0,9fe01002f68287d61dec7d5aff1f25809735a4f8bd044b98cd8aba89a80c2007,2024-11-21T07:47:04.113000 CVE-2023-23904,0,0,ad6cc32bebdd6972b54f01035b888089f4021c96fb0041b93db1421a564e8dfc,2024-09-16T18:03:16.707000 @@ -218968,7 +218968,7 @@ CVE-2023-24582,0,0,30a0c61419bb9a4c1447518f5b7252c86e2ba4d52a1c7be132bdc03f3b5d4 CVE-2023-24583,0,0,9752b96da8d4a11b508b6d3d3fc4f5f2ca2ddc50efdd58c21b0e2586505f1055,2024-11-21T07:48:10.653000 CVE-2023-24584,0,0,450b8fe4752031bc85f08e6e3249bd441ebacea296c3154e9791a18ef187d89e,2024-11-21T07:48:10.787000 CVE-2023-24585,0,0,8daffcf761a5e332fbb31dd00952f08646614a1fe870f4d740df8552f3a0ab79,2024-11-21T07:48:10.920000 -CVE-2023-24586,0,0,31befe82361b303f1ed20d27f3ff9dfd45424e53457df0133b9c10e2cef3817d,2024-11-21T07:48:11.063000 +CVE-2023-24586,0,1,7819b9ab11bc0dc6646cb03a5b6c7b5bf8382c6c54bb827784c56d7737b42e15,2025-01-28T15:15:09.850000 CVE-2023-24587,0,0,292e05491f18fcd1c7e0ecb44788f9081cc8b8543f871a74f452e2948d572e7f,2024-11-21T07:48:11.237000 CVE-2023-24588,0,0,4a357365b75707750f9002dd1d54b5c251abd9b6ecad45bb39848b8c6c0c240a,2024-11-21T07:48:11.380000 CVE-2023-24589,0,0,098dfca42c558b814e364ffb8a37e58cbd9b62cb01477fa4e47746b32480f74b,2024-11-21T07:48:11.503000 @@ -219354,9 +219354,9 @@ CVE-2023-25066,0,0,9fd4d21f9f87bb444e665efd0d48ba86eb99e37aac7673be5a79a3a7a2b57 CVE-2023-25067,0,0,6ee55e97fa7054de1cfb0e958d38df776cb2a1824dea0f5315ab298b89f915e2,2024-12-09T13:15:23.200000 CVE-2023-25069,0,0,249c3b4a3b20cdd1631995386e688e0dd272bcb83da1502d4142c0969f6a631b,2024-11-21T07:49:02.610000 CVE-2023-2507,0,0,fd94d1512aa25b7f0c85d521ddea312fc16ff137a967f9987d743b0f1911256a,2024-11-21T07:58:44.577000 -CVE-2023-25070,0,0,95c90078ac53551cdda0941e41174ac16f21d603c474b6a376eb05dec1a9bc4b,2024-11-21T07:49:02.733000 +CVE-2023-25070,0,1,eda19d3bd60740d2fc3d85ab0b297e1fad1499cea44c1a0e54f65d4c3fee91ad,2025-01-28T15:15:10.043000 CVE-2023-25071,0,0,e4fa2c8e71ed3ebf0e69731ddfba75b34ec50abf37f9a0a35ca7af0e752253ae,2024-11-21T07:49:02.867000 -CVE-2023-25072,0,0,23ed540857e07aba005060d845e67c8c2607ffb1abd77c521ba564b772dc837f,2024-11-21T07:49:02.997000 +CVE-2023-25072,0,1,65be3cfcbffd1de6f50e4b6397d4663f216d73e863f76f20966dd1d1d128e0e5,2025-01-28T15:15:10.233000 CVE-2023-25073,0,0,faa56cf615949f57edd90ef85627d225940d3db6a28bd01dd46fbace2f38bd3f,2024-11-21T07:49:03.120000 CVE-2023-25074,0,0,f9fc176b6b7e8915167411663c245628ea6a10ef6d26394f4ea82c7839d24074,2024-11-21T07:49:03.247000 CVE-2023-25075,0,0,25335c7983447de1bb2c448769548c7ebd749f93baae0786465db7e2ad0a1e95,2024-11-21T07:49:03.390000 @@ -219475,7 +219475,7 @@ CVE-2023-25180,0,0,9c594a57ef3362d5c7f529a93ac159a56bac306f4849dec68b36e434e1827 CVE-2023-25181,0,0,29d437748b5b0b1191ee76bfc7f9056117c6702ccb85aae9719438ec4611f4c4,2024-11-21T07:49:15.940000 CVE-2023-25182,0,0,a11de1df0cacaf51b756500b43ba70b812535157065deee5df3b307e1abe5a62,2024-11-21T07:49:16.057000 CVE-2023-25183,0,0,9dc08ea2e0bd8f00745279ad28938358f2df63ccf7df8fba93b0e55bb61f5733,2024-11-21T07:49:16.180000 -CVE-2023-25184,0,0,eabf0bd0bce1ed230047c247f587947ea85e21e30f81679124affe739b88c859,2024-11-21T07:49:16.303000 +CVE-2023-25184,0,1,b86df3e4429fd235ecb52ecf8a74161f42790ef6b3333074a019f5a834aa8fdf,2025-01-28T15:15:10.423000 CVE-2023-25185,0,0,654ebd21078f1c5996fb55f66ebecc642265579f6eb0f98fcb3a07307e5d9a80,2024-12-12T22:15:06.247000 CVE-2023-25186,0,0,ec4420d7c1ea5324e6f0bd6478cba82abfdf0c84215571aee85ba5a2b42cb753,2024-11-21T07:49:16.570000 CVE-2023-25187,0,0,d19d0068cef419b7b1f2d261c4666d21e822db83b39c37d7957fec0cce6817a9,2024-12-12T21:15:06.680000 @@ -219797,10 +219797,10 @@ CVE-2023-25644,0,0,a4f88a37d35e605b1f0492a6c2ec708d7d2332f5e5b6f5e49f56d8f443aac CVE-2023-25645,0,0,5971b455e899b1d3192f6c06dac11e92f37ed6c39bbac621845ec9b5e49aaa99,2024-12-12T18:15:22.180000 CVE-2023-25646,0,0,f3df344e7fecbac85039741e3b8fe1dc255e21c01fc6669b5be4a9d0a0785cff,2024-11-21T07:49:51.623000 CVE-2023-25647,0,0,7b1c868f46c5f32ee966cfc709fda46069aaf7aa60b29dede6ea0844dfbe373b,2024-11-21T07:49:51.750000 -CVE-2023-25648,0,0,5ebf0c6bb0a99027cbcc90aec48b6710f6157bed7ee854be7136d73e69ee4562,2024-11-21T07:49:51.883000 +CVE-2023-25648,0,1,f10fe255946e532f5b570bfa2fc45f2451a9786afd3807f2088418b485069318,2025-01-28T15:36:03.663000 CVE-2023-25649,0,0,170bd5ee89e1922adae21ce884129bf85fa5f80f537155aaf71b34f9ea1c8369,2024-11-21T07:49:52.010000 CVE-2023-2565,0,0,b533c314e7bdbee51b7919f7d466927cc9624d83669f7284a3c70d8e5a7890eb,2024-11-21T07:58:50.483000 -CVE-2023-25650,0,0,28e48f8b0cd60886e7e639d265b3ee6e1491a0cef9017a797cd1870c905e5ea0,2024-11-21T07:49:52.140000 +CVE-2023-25650,0,1,e8f38c397ada3ca711e54603048fe607f886ae391508ec5d62648729c3fd904d,2025-01-28T15:36:03.663000 CVE-2023-25651,0,0,8041ab7732534a3f15abe3d8b3c1a9f1432cc679b3c9dabd96eb7471cf125d9a,2024-11-21T07:49:52.290000 CVE-2023-25652,0,0,9a2af3222703b12c596f16fed6f83ee7a9f2704131e4c9d1c16f143419251b78,2024-11-21T07:49:52.417000 CVE-2023-25653,0,0,c79c2b8a5628263bd2bb95a4a5d5f1d09456b445a09ad3bb8cd4d64fe5f77c3b,2024-11-21T07:49:52.583000 @@ -221155,7 +221155,7 @@ CVE-2023-27380,0,0,67014c4fe3f5d5e70301815925d527e1ceaf695a18f615266d79465043d9d CVE-2023-27382,0,0,3af1284ca3cc9a9ef6f32f436a11e87b1e2c39e9aa793f75ed35fd294e60c763,2024-11-21T07:52:47.700000 CVE-2023-27383,0,0,ff72c34031f2d18b8438601938a0c6cd6898ab303a6a45cd5796a58c389b624a,2024-11-21T07:52:47.817000 CVE-2023-27384,0,0,4d39f2e607eae5191b52976973be66e2202d9c4d33b95ac5e065f7ecb16e0a5d,2025-01-17T18:15:20.547000 -CVE-2023-27385,0,0,c68ecdf016bf2281f407cb9610cd4bbaeed3891f5aa2195ad6bf2208b3c782a6,2024-11-21T07:52:48.053000 +CVE-2023-27385,0,1,782eda715fd8756591f56a3d1143e02211cf2741fde6e76c4ae3af490fba67bc,2025-01-28T15:15:10.607000 CVE-2023-27386,0,0,04cd58b2a7b3b5431e9205e8c5b5282f85ecb0f9bb508ed9a544058afccfa782,2024-11-21T07:52:48.180000 CVE-2023-27387,0,0,bf6b4d9d64ff88918b16bb6ff92e30a6f67f5bfd7030fde047df0bee3ad6f8ff,2024-11-21T07:52:48.300000 CVE-2023-27388,0,0,babade5ee72b4a62433a15e67cf1834c920450228e834f6e3e9898e20dbeffa8,2024-11-21T07:52:48.430000 @@ -221284,7 +221284,7 @@ CVE-2023-27506,0,0,c67ffbc0a2ef6d9e4c781ab5d0b1f865bcbb541bfbbb1a3e6167bba2babb0 CVE-2023-27507,0,0,d212027721cbcd9742fad26a49808d345c2144b49a36319d4ac08fd0d29b7cb7,2024-11-21T07:53:02.993000 CVE-2023-27509,0,0,cfa719798081e3abb1671501052e27fd46f2e54b1f87245801600aadd7df048d,2024-11-21T07:53:03.743000 CVE-2023-2751,0,0,935ca6acf60fe5a752c3b3927a722efa9fc1ec980f0bd7b1b523331ca22160b9,2024-12-12T01:20:40.913000 -CVE-2023-27510,0,0,6f959761032f230455e8bf272eebaab9228d33fdd1038574e4ed1d2c95e2943b,2024-11-21T07:53:03.877000 +CVE-2023-27510,0,1,6447bc81c67c0bb1a3c220b67c1e58b2d0e0f7a420a3644b79fce9919fca1fff,2025-01-28T15:15:10.787000 CVE-2023-27512,0,0,25209505182de0dc1de45b47cf57db0abc13b19730e87c50fc22c314cf5305d6,2024-11-21T07:53:04.003000 CVE-2023-27513,0,0,c9fbd584e51c51b70e2e0cc07b756cefd3914b4ced409ad8d42a8da7c34f791c,2024-11-21T07:53:04.147000 CVE-2023-27514,0,0,fa8070be4b10f5741aae673be622be3e7d98ffcb2a84bdd30ae540dbca14459c,2025-01-16T20:15:31.333000 @@ -221301,7 +221301,7 @@ CVE-2023-27523,0,0,48d65b1b60e72b6b957e4e81bdb57c693b01fe4c633feb2b71dd230365829 CVE-2023-27524,0,0,a7c3b99f330b1fc001dbf1dd41768a9c621861c1561254a2a58d79c83db6710d,2024-11-21T07:53:05.773000 CVE-2023-27525,0,0,83fe0dbadcffe7d39f05a9dfbd4c3a59f2d9caa44fe722f2a22cf318d60bfff2,2024-11-21T07:53:05.913000 CVE-2023-27526,0,0,d7a1d434e76959c028190d433010fe08e597ff596a3d2824503093c4d017a38e,2024-11-21T07:53:06.033000 -CVE-2023-27527,0,0,ef895853842493f6d6e428aef03b5f2da5176173f94982e6fa7ef668485ee536,2024-11-21T07:53:06.160000 +CVE-2023-27527,0,1,4018cf151ca143ca301506e976fdddc86a504d7a900cffded0ee7f8ce9e2b807,2025-01-28T15:15:10.947000 CVE-2023-27529,0,0,688313a7c2d2ac3cbccb9b02f0a2482a012371b810941312b8acbfdb379df9c2,2025-01-16T16:15:28.460000 CVE-2023-2753,0,0,07c6e809a42ad3b510370047ca6a9af0cbf43d74dbab18486dd49105dce46294,2024-11-21T07:59:13.583000 CVE-2023-27530,0,0,b38d60292378b01f02071b1a709b01b4844b4ce61f4f988722b92fc121e4966a,2024-11-21T07:53:06.430000 @@ -232490,13 +232490,13 @@ CVE-2023-41772,0,0,1ddb563420388cdf4028fe5f7f0902afcd0308e525b54d79870aa60f416e6 CVE-2023-41773,0,0,faee020eb5f5b671b82678a516460fcff37a133fe28b8d985829a1b43b710d3a,2024-11-21T08:21:39.633000 CVE-2023-41774,0,0,24bcac0406809b3faea5bf1336407f0ed9b2369176dc7415fba33b9cfd1354f3,2024-11-21T08:21:39.780000 CVE-2023-41775,0,0,9f89db4df785067cdd4e9d4b7c2e7a6cfedbba830667dfee19afb2a96c9cd0ea,2024-11-21T08:21:39.923000 -CVE-2023-41776,0,0,20f40858a9672381a8a9085848c5ece660aa82097d9a080cc208337180331642,2024-11-21T08:21:40.043000 -CVE-2023-41779,0,0,00ec8dde9f3fe82c60cb3c7c6476547c2784ac010a84a48be230e9d34f1bf968,2024-11-21T08:21:40.183000 +CVE-2023-41776,0,1,c2cbfc3029356604701bef39201980d5e5b4ed30cbcc1c96050f192b69cb693f,2025-01-28T15:36:03.663000 +CVE-2023-41779,0,1,50af9c5ec1d8b932ef3bf9f6600b347c56933eec6652e3c842f3b5be91ca5f34,2025-01-28T15:36:03.663000 CVE-2023-4178,0,0,1141fd40ba18bee37e1c42fae821d1b64549ca6cc2a33d2a55286ccb58509271,2024-11-21T08:34:33.433000 -CVE-2023-41780,0,0,2ac91b1ba972e8c6aa41dbcb1218fe590cfc8938a83b7941de42b75c5d5cdc2b,2024-11-21T08:21:40.320000 +CVE-2023-41780,0,1,b2d1e58ef9b92e2b8a79f05b4c46292e67bad1424381e27274ccfbe1c8ca9295,2025-01-28T15:36:03.663000 CVE-2023-41781,0,0,19fc06020fc9ee508abcb1f4254ac105cd846b8768551d2051e133fcf7cc9f16,2024-11-21T08:21:40.457000 -CVE-2023-41782,0,0,051be590a41fe8be6729ced213351f8b297a5fb3d83c248e652f00fd675bf67d,2024-11-21T08:21:40.590000 -CVE-2023-41783,0,0,839aa66af32c7261b29d7163e7d850fd078812132f9bcf4fa7c809a75f6ebf78,2024-11-21T08:21:40.743000 +CVE-2023-41782,0,1,9213ce0f1e1156eb8620254e92d1f6f23ad123040208313cc83088fa5dba8c12,2025-01-28T15:36:03.663000 +CVE-2023-41783,0,1,e64420ede5771bbddb2d10af4ebf3cc64b5f3921d5f636daf560a43299a0e39a,2025-01-28T15:36:03.663000 CVE-2023-41784,0,0,a8ebf61f8b77dfe47b65c2a49d655477006d0f22c6688955b05553cef45f4c1c,2024-11-21T08:21:40.887000 CVE-2023-41786,0,0,679e1ab2a11d5095960d26f95e0bea184bf9a762765b891d0eb540ee9417bb2c,2024-11-21T08:21:41.023000 CVE-2023-41787,0,0,538197acdb53a2536c302129254e1b8e381ed654db4bfe21b17f47a8b5eaa3d2,2024-11-21T08:21:41.150000 @@ -245073,6 +245073,8 @@ CVE-2024-11949,0,0,8c8ca0b9d255f5a6445ed2a115142b5d13432f7081db7ee9affe350ed098a CVE-2024-1195,0,0,3368bf518c27a729a23598a4bc9bc8456794ebbc8ed421e1b9fb54311a27af0c,2024-11-21T08:50:00.723000 CVE-2024-11950,0,0,df36014500ed7b6f7946ef04cfd4a777d6bd62d2ab461c18fe6d382ea2d08354,2024-12-12T01:40:21.820000 CVE-2024-11952,0,0,8be0c69e3107fa6f3273f59b11ff511450df70a157d0236a300dd71a0356b941,2024-12-04T09:15:04.637000 +CVE-2024-11954,1,1,491378d6502c9e7b20e26b0eb2e0effc34131c0308f3b0fd5de5e67d17d5c192,2025-01-28T15:15:11.130000 +CVE-2024-11956,1,1,499c811bd3c73bd649be29d9bd1c57db501dd4891d184a0d9122af3b8e2f459c,2025-01-28T14:15:29.803000 CVE-2024-11959,0,0,8e4c044a79a34553dacc3bbf68fddd2b6e5f24a72d4b7a0c2b06bf8643853e87,2024-12-04T16:52:55.150000 CVE-2024-1196,0,0,4b0eccfc085f9fcf5d1d563f67df6edef95e40ef1d03548e58cd26db6bec54a2,2024-11-21T08:50:00.883000 CVE-2024-11960,0,0,bd9138e92373cf0f2d64cabaf1c792eb3475a5676b172a9be24a4ae943f1b162,2024-12-04T16:52:34.413000 @@ -248687,7 +248689,7 @@ CVE-2024-22059,0,0,5dd2797f8651084c7003283486cf668dfd7e91a1374f395778195e44226a6 CVE-2024-2206,0,0,5cd23aee739a1ecf37ee5d3e204017ea16f7e42bf349d33e84a18d1c29954640,2024-11-21T09:09:15.203000 CVE-2024-22060,0,0,ed9ba15c4f298a42f28462f758b92465c987f6953d9ba6f5dbcd801f1adca5dc,2024-11-21T08:55:28.887000 CVE-2024-22061,0,0,4e49e7ee2ac0573d3a15781d9f6f6ecd7315900601a66368e5ff6a2c6b1140a1,2024-11-21T08:55:29.030000 -CVE-2024-22062,0,0,8f0ab471e668cd03b7a1b3138c26a2962a23ff1e52eff23da6e303d3cb6a8e23,2024-11-21T08:55:29.160000 +CVE-2024-22062,0,1,da1c4f953be52e42b827ad2ec6c6d58ba39e293c190ae3c2d554c8747cf109b8,2025-01-28T15:29:07.970000 CVE-2024-22063,0,0,7d585c54d344b35c25b14dd6e4b594e16f46eff3d63d49f66743e986349f5ec9,2024-12-30T10:15:05.867000 CVE-2024-22064,0,0,2be78486e8e3524e7e8b54bc8f0a5b3a271a4cb62525cfad97a606fa124e9d55,2025-01-27T18:36:59.497000 CVE-2024-22065,0,0,8a400892fb4ac3179312529b18e607bbeae86e4a03e4887764863d7ef61cbee4,2024-10-29T14:34:04.427000 @@ -249791,7 +249793,7 @@ CVE-2024-23586,0,0,c502bc9b7c2b6af5f29de7b2d6d88cf75e4aed9d064587993c85e2b92f277 CVE-2024-23588,0,0,c896bd9b8289657f23ce61f2b7bc0d6a9b21890ffc09a248ae27bab09f369a62,2024-11-21T08:57:57.760000 CVE-2024-2359,0,0,f8a16aff6b690ef0a387e0bd83c3d967a7f54dab13e1526a35b1308feb8246a0,2024-11-21T09:09:35.413000 CVE-2024-23590,0,0,aa2d0bee53a4e6db1324113f2976ef5c3ac355214ede701fea4ecfdbf40994ad,2024-11-21T08:57:57.913000 -CVE-2024-23591,0,0,f8fe557392c309a8c4c67baf521b401b3ce05c427a283115f72d735179f77238,2024-11-21T08:57:58.127000 +CVE-2024-23591,0,1,73e5c8e9559de251c033aa091f318ad51a29efd0bdc50ce9f12daf1770233266,2025-01-28T14:28:25.570000 CVE-2024-23592,0,0,ef014cbf8808263f731f61b0bea284cf199deacfcf795438ec07cedc3d97e15d,2024-11-21T08:57:58.270000 CVE-2024-23593,0,0,1669104ef0f6d536595a3f0242aea2e399af734f766398709f067343dd11f88d,2024-11-21T08:57:58.400000 CVE-2024-23594,0,0,1f0e1d4dfefab44adcf5b5a1aea994e7319979d868c10f29cf8eb184905dd76b,2024-11-21T08:57:58.520000 @@ -250129,7 +250131,7 @@ CVE-2024-2395,0,0,af5ee44ed4e5a55dc7cee72e73dd87c7eca19f4fdfa76a380a7f63de620cfa CVE-2024-23950,0,0,fc22aca121744540088f0a682a9a12e51b13e88920d5f4c103703a8401d15b2a,2024-11-21T08:58:44.840000 CVE-2024-23951,0,0,90949de6749d1342df813fafd173be208f7c748b51ad2522c41738d2f7a7174f,2024-11-21T08:58:44.960000 CVE-2024-23952,0,0,d956573f944b52b54178c073558282ca45131f0d187b6cc2538746038d148592,2024-11-21T08:58:45.077000 -CVE-2024-23953,0,0,49aa3f2b3a62119ebea22a50941aa7dcb20a92225938b66a01059260250f4584,2025-01-28T09:15:09.187000 +CVE-2024-23953,0,1,5e84b7924123d14a264b393eb4da6361d93a72e1da6196c1079ab89dc3d46162,2025-01-28T15:15:11.330000 CVE-2024-23957,0,0,ccb57b4ba0507fbac13ac2445d2cac9760854f91ae7da4707e72f394ea98e263,2024-10-03T17:37:47.743000 CVE-2024-23958,0,0,6fe18b86fa35472f01534c3eeba14711dd9e2cdb206262a323b3a33e5af27e3a,2024-10-03T17:42:05.553000 CVE-2024-23959,0,0,55515de9820dc00037a0b8188d9aae2673ee68b5d649634b981bc6ce6024af1f,2024-10-03T17:42:03.650000 @@ -272474,7 +272476,7 @@ CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a CVE-2024-54475,0,0,87d26c3b3268a9dac1bad7ca875893ab9f7febfa8af0d89b64297a67a12caf98,2025-01-27T22:15:12.283000 CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000 CVE-2024-54477,0,0,214101ca192690cd0de3dcf911bea71815c143b3087e79543d2b05745eb4fbe2,2024-12-13T19:15:09.067000 -CVE-2024-54478,0,0,ca9222501c8ff71998fe35f19a222058c9cf55bc86a2bf0f4510fee0bf6b8a8e,2025-01-27T22:15:12.377000 +CVE-2024-54478,0,1,26ecc10f75c75719e02f1d36ae16e317df04c0225bcfe9e5f27f374de9f166e2,2025-01-28T15:15:11.520000 CVE-2024-54479,0,0,bcd74f535cd6ff4dd05141776c66e2cae8469ec75af86bbc030e3e4a250fca63,2024-12-20T19:15:07.707000 CVE-2024-5448,0,0,fb51af8aa43452e6336e86308a3b6b8f94eaece6d7d51fb1e15ce1d675c555ee,2024-11-21T09:47:42.227000 CVE-2024-54484,0,0,6d8d44a97a2da2b3786c6a98b981454364bb44396885bb6b7514efbff5689d25,2024-12-13T19:15:09.227000 @@ -272500,7 +272502,7 @@ CVE-2024-54503,0,0,e82e1cc53ce4edc412c3815492fda2911d5e300ada63831244d44df64c1df CVE-2024-54504,0,0,bb03ec612268af63063ae51e589216e30653413b6baaf8d7e8860c5e5b629ab1,2024-12-16T18:15:11.317000 CVE-2024-54505,0,0,a90c7f848a0c4214637edeae9c3a0316f06e116644b32639b5ba817d96b2ce78,2024-12-13T18:43:13.217000 CVE-2024-54506,0,0,a8ea16e075a3a1901ca752b63878f0142a1c9eb2961c986c53a0691601fc1217,2024-12-20T19:15:08.467000 -CVE-2024-54507,0,0,41b68f670df8d592abf37382aa9998423dab14e12876b2aa44eeafbe2a355fc3,2025-01-27T22:15:12.777000 +CVE-2024-54507,0,1,45091b6ed1a10c4f376d77f50c9de6cff4c36ecf5e025eecbb841eeb28a3dfdd,2025-01-28T15:15:11.723000 CVE-2024-54508,0,0,d56b4a8254b12af7295bad2aeed77ff208b735dc12ecbae90c5116eeac15d339,2024-12-16T19:15:09.160000 CVE-2024-54509,0,0,53736b1dd1fd5989dac72c9603bb5aabbd31f93601860e643cc7c49c6a2e80bd,2025-01-27T22:15:12.867000 CVE-2024-5451,0,0,20c45f860616b7f2fb649e3fe37f7d2b12e76160bf7131f2da5e11d5d4dbf253,2024-11-21T09:47:42.677000 @@ -272511,12 +272513,12 @@ CVE-2024-54514,0,0,6d1b7501f54b581c9fad4ccbc7c7ec7f90e2e83a8a1d8bac1a1733a97e309 CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0eac,2024-12-13T18:15:31.650000 CVE-2024-54516,0,0,a6e4b7cc9da6564b2d221f96642b3d272c58385dca5951ae300025c74bdcff7a,2025-01-27T22:15:13.063000 CVE-2024-54517,0,0,93b0960a5cca6ca652546e4259a2a5ab8d449f09280201dc7b78cc63ff2d6611,2025-01-27T22:15:13.160000 -CVE-2024-54518,0,0,7411ea9a68e200c83720e5af50b2272219e991e23b0c824cc594dd4c274931e5,2025-01-27T22:15:13.260000 -CVE-2024-54519,0,0,ca67072233fa48a610cf937e58682a242acd977aafc923d31a31345ed7800be8,2025-01-27T22:15:13.367000 +CVE-2024-54518,0,1,7a38e22038aeb7be612ecab9809efec16de7547dea2675297852eea4d4788df5,2025-01-28T15:15:11.900000 +CVE-2024-54519,0,1,a2d7e4325c7cc6e4b1f41b5f5dbd8b804a1888ca49f38f1232adb57ece7ff9bb,2025-01-28T15:15:12.050000 CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000 CVE-2024-54520,0,0,63feb3f520db2ab5f2572ad556f5d2c96deac43a09e959db1ba221929f955f49,2025-01-27T22:15:13.473000 CVE-2024-54522,0,0,254203780d93309fd4a94a766ceeefc3a15f47ac705858173a230c9721b02371,2025-01-27T22:15:13.560000 -CVE-2024-54523,0,0,99b867f52d51b534bffec672c1deb43f18457bee1964fb07df8adadfe170068d,2025-01-27T22:15:13.660000 +CVE-2024-54523,0,1,0155da17dd45eb46f59a34af33d3d9dca19539b7cc1d7ed919dc688ff4a61f33,2025-01-28T15:15:12.190000 CVE-2024-54524,0,0,f1841b79a984dc339395e420615a7246f02aaa993793861427c269ef59ff9324,2024-12-18T13:59:47.450000 CVE-2024-54526,0,0,aefe7086f2d764fc872d00eaa2f2173838af254c5b93971d556108953f443875,2024-12-16T22:15:07.320000 CVE-2024-54527,0,0,0bdb505436860de3001c9f8bc7d8b06aed949a47878b0053a48f86090c332969,2024-12-16T19:15:09.313000 @@ -272530,10 +272532,10 @@ CVE-2024-54535,0,0,93cfc2e3f7ef6acbc5dbb1cc184a51f7781d104271fc6b2624d565551722e CVE-2024-54536,0,0,1573e356a10b2569b40afaa0fca34596b260ce05149e5dfaa014069d5147d348,2025-01-27T22:15:13.853000 CVE-2024-54537,0,0,8f560140598572c49e6bc041c8bffbe9a4fc5b7e227b44f85619d31b6126d2c5,2025-01-27T22:15:13.940000 CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000 -CVE-2024-54539,0,0,d28c340ca6d55c0526182ae66e2e4d8dd88614a5d079ef3088c377bc3597911b,2025-01-27T22:15:14.037000 +CVE-2024-54539,0,1,d443ac2c79222e082d02f106d93c7bfeec685245a030b828bd36881aee762e21,2025-01-28T15:15:12.340000 CVE-2024-54540,0,0,9f4df0a7b4384df86d380577ed349e05a61099c20d2e88a431caab43d2fcb14b,2025-01-16T15:15:13.697000 CVE-2024-54541,0,0,cea7a1749fc1912ec1f5d208cc41a0f81501fd375b3ac0841bb9f851a0901c92,2025-01-27T22:15:14.117000 -CVE-2024-54542,0,0,b595df3e83392fa393fa516edf28b5df358cc28f5c3be33ee006fc5cdb1520f3,2025-01-27T22:15:14.217000 +CVE-2024-54542,0,1,5ad130ce9e277d22fc91c3233fe937da0da4adfd421c85dcbe10a8d46f3e6746,2025-01-28T15:15:12.477000 CVE-2024-54543,0,0,9ccb05eacf536094f44f6f2cff506029e79de4d0eb5995625e0c2e89e1f5b3b9,2025-01-27T22:15:14.307000 CVE-2024-54547,0,0,961d3254116d82f56a842bdcaeaaf3316f1fed06dfdfc1f9db79add594d84b93,2025-01-27T22:15:14.400000 CVE-2024-54549,0,0,f9da7f3379bec36f69e8c241addd0f7e6ea5db00b71e9a2e90d5b4adeefc241b,2025-01-27T22:15:14.490000 @@ -272702,7 +272704,7 @@ CVE-2024-5519,0,0,8f24512a902c7b13458f945742cb7fe1d59be3b3655c7a61619611df90263e CVE-2024-55192,0,0,578bf5cd95b055e6f8fe1927d392f06ecc291e7aec5d564d1ff85089ed561a72,2025-01-23T22:15:14.333000 CVE-2024-55193,0,0,90629f8274796f894b01b17f5a7ef0934dbb53d009417deff7ad371f489b7b38,2025-01-24T22:15:33.730000 CVE-2024-55194,0,0,804005f6f22f8eb7b3daff5cc3dacd38f1b9547678c0f9c5fac19784b314cc6e,2025-01-23T22:15:14.560000 -CVE-2024-55195,0,0,7deb8159637db6659b96d42dc9114dc77a022ffe3e95e7d421e2db44f5b66e21,2025-01-23T22:15:14.690000 +CVE-2024-55195,0,1,3d6a6b502efecaed9d3ad6b8e5977b4cdb9be52138440fb5894e677fa50c7906,2025-01-28T15:15:12.647000 CVE-2024-55196,0,0,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000 CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1ac4,2024-11-21T09:47:51.540000 CVE-2024-5521,0,0,2b6f458ccb1380159b254eccc510c8e2cee9041e86f89c2477b6805e666cde62,2024-11-21T09:47:51.653000 @@ -274534,6 +274536,7 @@ CVE-2024-6347,0,0,ead9b349654f8c1b56b42b60b3e21504af84ff862f187d8c4f01052391405f CVE-2024-6348,0,0,f8ec53a55d7061e6e616a9d49e72c1cd9f0282aa80090fa0b8e8fbc34eed5872,2024-08-20T16:17:03.810000 CVE-2024-6349,0,0,427eeb1c49748085f9d6a97a6add4281bc215342d4df9759ae2f609f0d24cf9a,2024-06-26T15:15:20.690000 CVE-2024-6350,0,0,1fc124e07d9714607d8d4610b064f72d1361319398d6b6baa75420c813d318c6,2025-01-08T18:15:19.880000 +CVE-2024-6351,1,1,4552732c0a95d33ac703c064d41085611d7d4029415fd3a3520d40b500d64e37,2025-01-28T14:15:30.007000 CVE-2024-6352,0,0,a7bafbc1d8328d5f15d5a5137955133b68580e90db03290cb1e5de9d8211b944,2025-01-13T18:15:19.887000 CVE-2024-6353,0,0,d4c4115348071ea0df993e53207fed00124ba29370e36d0bee2aef495fa28299,2024-11-21T09:49:28.547000 CVE-2024-6354,0,0,b2dccb6ff0cf7d4d778c16d437a8f334569c687ad872e701936b9155052ef539,2024-11-21T09:49:28.670000 @@ -275875,6 +275878,7 @@ CVE-2024-7876,0,0,3fa210c454e1479da57bd044cc92245618d1df797eb59430f1d236834861ac CVE-2024-7877,0,0,6229d0686b2135c115931a8adb7bb599ba3c9fa39dd41de2235cac4eac25c2bc,2024-11-06T15:42:19.343000 CVE-2024-7878,0,0,f3aacb78819bf5257796dd52707f03191f35499ea76d867711e5a5bb4db2045a,2024-10-02T17:41:44.133000 CVE-2024-7879,0,0,e70a28f428035ac900263e3578341f19769c09bd9b5a6d26a2fa46e14daf4866,2024-11-06T18:17:17.287000 +CVE-2024-7881,1,1,e855308bed8d8b58731de8d725356e9a8d59124b2b66933a9bfb459cc6da30a8,2025-01-28T15:15:12.847000 CVE-2024-7882,0,0,b5c42de5e52c278ea04660fcca138342ebdc5cf6a193722d2d8e37faac1f4a56,2024-11-26T13:15:16.430000 CVE-2024-7883,0,0,0fe05f5c235184a9378943a8ba395bb993464cf40f0c149f508c0664d21adb87,2024-11-01T12:57:03.417000 CVE-2024-7884,0,0,b7fc6693cf34d63278a8b8aeec24a1860c381de4a1b67124c745f170d4444fd2,2024-09-12T20:47:13.387000 @@ -277636,7 +277640,7 @@ CVE-2025-0059,0,0,6416879787f54d6a44b6599a708532154a0b00797493957584bb4d5ef53916 CVE-2025-0060,0,0,1cd7402c377fe0eb71c687af689b0d9a4160c668897128edffbfc7ea6f4b4145,2025-01-14T01:15:16.350000 CVE-2025-0061,0,0,1b8599d27b3c8b95785284a43802c929098c42ac59855f759f4dd597f002bfd5,2025-01-14T01:15:16.500000 CVE-2025-0063,0,0,e52e2556ff38cc25592bde9486fa1da35995f2773770ff25a347e7df36a48b0b,2025-01-14T01:15:16.633000 -CVE-2025-0065,1,1,c0dd666fa87469cf3baf924c77b06b6a74be0e048b00b2b062e3702e6a59ac12,2025-01-28T11:15:07.413000 +CVE-2025-0065,0,0,c0dd666fa87469cf3baf924c77b06b6a74be0e048b00b2b062e3702e6a59ac12,2025-01-28T11:15:07.413000 CVE-2025-0066,0,0,41773dd06eda78c1806c873ae42cd1b5433608a0fe1510b7dc5de4c2fa1f4080,2025-01-14T01:15:16.783000 CVE-2025-0067,0,0,595fadc08a33537ee967fb524f132a140bd7562627c52fe87a8f7e09b94969e8,2025-01-14T01:15:16.950000 CVE-2025-0068,0,0,335ecdc06a29db245188288060d2d78b12fd2ca685b50ec8e17c976ac125be2f,2025-01-14T01:15:17.107000 @@ -279052,10 +279056,10 @@ CVE-2025-24094,0,0,59a24348762f08a7a6a9a7ba14204943732471e195893ec6923019d312e46 CVE-2025-24096,0,0,ff0eb39ec972c347a3c0a0787305a6334b5bff1171b3b7d4772bf4aea79562d8,2025-01-27T22:15:15.533000 CVE-2025-24100,0,0,75e73635599b4509a17f731a139b9a6c3a7cc7a39585e7d21d191c67ba12039b,2025-01-27T22:15:15.627000 CVE-2025-24101,0,0,01cfec662abdf104dc23ad0fede873bdb9ee4880d82c270176d0683e43902459,2025-01-27T22:15:15.717000 -CVE-2025-24102,0,0,5c4a84a122c29025995eba7d95b97d930375890c4a75d2d7918884442f5c8787,2025-01-27T22:15:15.807000 +CVE-2025-24102,0,1,27709925e34384324bf4c5617df8dd3339c2c366be8f6454a622120cea48a67f,2025-01-28T15:15:13.303000 CVE-2025-24103,0,0,4aa7645d51e5d9def580dce1be4240d94c119b9da01c277b75cd01d6cb9a37a7,2025-01-27T22:15:15.900000 CVE-2025-24104,0,0,351dd0767ea1e0a62d16f31e3ae17dcdaea5e43456ae60a0663e0c3eddd31608,2025-01-27T22:15:15.983000 -CVE-2025-24106,0,0,b245e38c1f94d7b46ca1b3f515a5a13ed160b150bbff059be2d801d4ea2f7ac7,2025-01-27T22:15:16.070000 +CVE-2025-24106,0,1,7c93b388567b51d6f143e70f744f5ae7544ea89bf54f3268ef6794b4a77e5c65,2025-01-28T15:15:13.450000 CVE-2025-24107,0,0,7ca3d7f81320182c649b00d895907fc6b5250f4fb4b53d6d1fb700021d5bcabb,2025-01-27T22:15:16.170000 CVE-2025-24108,0,0,4d95f39fa858f2c81a21a53e2387c549b356e3f1b0570eb20318f4d1399f17f9,2025-01-27T22:15:16.263000 CVE-2025-24109,0,0,d6d09305ae07e87ffe22f22ff6fa1a7e3f2ad80ac74c1bb092007933af9ec661,2025-01-27T22:15:16.347000 @@ -279067,15 +279071,15 @@ CVE-2025-24116,0,0,e6ceba0096997558b2d5ca595ab37f9878cfa1b3b2e9029c7e5b0c8682e22 CVE-2025-24117,0,0,970922565486aa8d6f1ca36f8bfb0c00c07d7bafdfc77a93ffb2741563c567fd,2025-01-27T22:15:16.900000 CVE-2025-24118,0,0,496adb4c35900b6c60ef061d9f11ab773cf8a6d42636a3263344a147cc68ebdb,2025-01-27T22:15:17.033000 CVE-2025-24120,0,0,0c85d32bdccf1fd825ec3f359d7dab1218c89687e6fb7a4f438397ca0e75a18a,2025-01-27T22:15:17.140000 -CVE-2025-24121,0,0,fe209164caf65ae125cf4039035b5825ca59d466cf68f29e85f4fe986422b336,2025-01-27T22:15:17.230000 +CVE-2025-24121,0,1,727d0b449e1735b73e6c0fd4e75eac265ea0d2ba3dd19ef8c37af20d3260a32c,2025-01-28T15:15:13.600000 CVE-2025-24122,0,0,7c74782607fd5946bbbbf0d83e056c4f6d8cb8dd900ff270a520bdd3b617f9b0,2025-01-27T22:15:17.323000 CVE-2025-24123,0,0,359ed2a80e856083fd50ad4ac70d2b2e8d9c1d2b80e4fa4236ccd98c4fa4cf69,2025-01-27T22:15:17.413000 CVE-2025-24124,0,0,676fbfbd6cac8498e5293747177b08c97e3bc6c776453e8797e5d62d4cd47e81,2025-01-27T22:15:17.510000 -CVE-2025-24126,0,0,1ca267086598e6d13484388122418c9e1026dc7b8bc4026384b3d1ef931801ef,2025-01-27T22:15:17.603000 +CVE-2025-24126,0,1,c32206f3165722bc91a067de07475d8db8a95d2b871ddebbac4703ed5b0f16fb,2025-01-28T15:15:13.743000 CVE-2025-24127,0,0,2e78204f6778e94438e7603b1c02f2ad3cd90e7bc92de33e7103f746be3bb5f1,2025-01-27T22:15:17.703000 CVE-2025-24128,0,0,9892e31db1a83578f6a40523b367dee079507189438bf865d0722923a9d81a77,2025-01-27T22:15:17.793000 CVE-2025-24129,0,0,9cf0643200e175163fd642215edb594dcf88af74d04f4493db604482a3ba40e9,2025-01-27T22:15:17.887000 -CVE-2025-24130,0,0,4866392f6c0e1eb81decc004ed98cd38de37862d801a3eb7fcd60a37aaf44138,2025-01-27T22:15:17.977000 +CVE-2025-24130,0,1,2353be8fa558560d4d339540a6553b90072d4dd0bb9db553de46ea9799aed0a6,2025-01-28T15:15:13.890000 CVE-2025-24131,0,0,492b4d07fecf4242d99445d22ec2b604c4752abdb9655e15b1f5b48aa5d3c65a,2025-01-27T22:15:18.070000 CVE-2025-24134,0,0,fd70407a6072da3e322135cb4de894a34b4d2618db8771b24277f2c27ead3cdb,2025-01-27T22:15:18.153000 CVE-2025-24135,0,0,1cc538384de6ba43cf36ae671a49458676cb9887e03121351ea33c8aba51a643,2025-01-27T22:15:18.247000 @@ -279087,10 +279091,10 @@ CVE-2025-24140,0,0,64cd79c453bd015139aff243e9bda4d70b37899b275a2f0befe19b92cbbc6 CVE-2025-24141,0,0,0a8778b6a61a091021b1c4aa6cbe2f55d5b1eb88fc8a5dbe6948da45514a06f4,2025-01-27T22:15:18.800000 CVE-2025-24143,0,0,a7b1790daee6715fcfb4a8ec265c15396394f8873f98cb9665892aeb6ddb757f,2025-01-27T22:15:18.893000 CVE-2025-24145,0,0,acb97008672a0c755df834a4caa987c97f98272938ea803364a6f78ebf10517d,2025-01-27T22:15:18.990000 -CVE-2025-24146,0,0,770bc8c733ea70c0b9a3beecc559ce8c7ca03653ce71daa08e03b7f15296a298,2025-01-27T22:15:19.077000 +CVE-2025-24146,0,1,dd8207ffc2b4fe69547e7d8344749ffd8d34e24e17e6fd990a937da22c8b9841,2025-01-28T15:15:14.013000 CVE-2025-24149,0,0,386112f84b4bdbacd34eff2005b711b1ae0681beaada9e7800758db3a9f13a75,2025-01-27T22:15:19.173000 CVE-2025-24150,0,0,09acba2826b7df3f8ebfa0d368cb24a977e4e05b23689ba04ae5892d23b40c54,2025-01-27T22:15:19.270000 -CVE-2025-24151,0,0,ab646694adf5efce849ec3bc02e5553fbff81ec9e6260a5844c257e0ce332077,2025-01-27T22:15:19.360000 +CVE-2025-24151,0,1,3b90ee302fbacfd0127254bdfe696d59abb92aacf4dcc8e99b49cae621366e49,2025-01-28T15:15:14.150000 CVE-2025-24152,0,0,9875511f91869e98c63cef2f35db10cd0155ee0f27be472f10837aa54dc5c773,2025-01-27T22:15:19.443000 CVE-2025-24153,0,0,59d669342a492b9d2d8a609c8e00e457983b611fbf4a79373f564b00b215da7e,2025-01-27T22:15:19.537000 CVE-2025-24154,0,0,a58a5ec201b5af92f8447d88c6e4477c33fc5c5effd09619793664e2cf9c8968,2025-01-27T22:15:19.620000