diff --git a/CVE-2020/CVE-2020-196xx/CVE-2020-19678.json b/CVE-2020/CVE-2020-196xx/CVE-2020-19678.json index bbb565a7acd..3a9f7ff4509 100644 --- a/CVE-2020/CVE-2020-196xx/CVE-2020-19678.json +++ b/CVE-2020/CVE-2020-196xx/CVE-2020-19678.json @@ -2,7 +2,7 @@ "id": "CVE-2020-19678", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-06T18:15:08.210", - "lastModified": "2024-11-21T05:09:19.213", + "lastModified": "2025-02-12T16:15:31.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-34xx/CVE-2020-3432.json b/CVE-2020/CVE-2020-34xx/CVE-2020-3432.json index eb7d19cffb6..fb1e9b9afd8 100644 --- a/CVE-2020/CVE-2020-34xx/CVE-2020-3432.json +++ b/CVE-2020/CVE-2020-34xx/CVE-2020-3432.json @@ -2,7 +2,7 @@ "id": "CVE-2020-3432", "sourceIdentifier": "psirt@cisco.com", "published": "2025-02-12T00:15:07.670", - "lastModified": "2025-02-12T00:15:07.670", + "lastModified": "2025-02-12T15:15:10.460", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -12,6 +12,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 4.2 + } + ], "cvssMetricV30": [ { "source": "psirt@cisco.com", @@ -45,6 +67,16 @@ "value": "CWE-59" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] } ], "references": [ diff --git a/CVE-2020/CVE-2020-360xx/CVE-2020-36071.json b/CVE-2020/CVE-2020-360xx/CVE-2020-36071.json index db800bdba2b..f22fabb8f0c 100644 --- a/CVE-2020/CVE-2020-360xx/CVE-2020-36071.json +++ b/CVE-2020/CVE-2020-360xx/CVE-2020-36071.json @@ -2,7 +2,7 @@ "id": "CVE-2020-36071", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-06T15:15:08.543", - "lastModified": "2024-11-21T05:28:43.697", + "lastModified": "2025-02-12T16:15:32.337", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-360xx/CVE-2020-36072.json b/CVE-2020/CVE-2020-360xx/CVE-2020-36072.json index 2d1cc3666b5..5a779e942c8 100644 --- a/CVE-2020/CVE-2020-360xx/CVE-2020-36072.json +++ b/CVE-2020/CVE-2020-360xx/CVE-2020-36072.json @@ -2,7 +2,7 @@ "id": "CVE-2020-36072", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-06T15:15:08.587", - "lastModified": "2024-11-21T05:28:43.910", + "lastModified": "2025-02-12T16:15:32.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-360xx/CVE-2020-36074.json b/CVE-2020/CVE-2020-360xx/CVE-2020-36074.json index b6df33af17d..0d76a7db3bb 100644 --- a/CVE-2020/CVE-2020-360xx/CVE-2020-36074.json +++ b/CVE-2020/CVE-2020-360xx/CVE-2020-36074.json @@ -2,7 +2,7 @@ "id": "CVE-2020-36074", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-06T15:15:08.667", - "lastModified": "2024-11-21T05:28:44.210", + "lastModified": "2025-02-12T16:15:32.700", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-360xx/CVE-2020-36077.json b/CVE-2020/CVE-2020-360xx/CVE-2020-36077.json index 487db8d2f65..0aa10498e27 100644 --- a/CVE-2020/CVE-2020-360xx/CVE-2020-36077.json +++ b/CVE-2020/CVE-2020-360xx/CVE-2020-36077.json @@ -2,7 +2,7 @@ "id": "CVE-2020-36077", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-10T13:15:06.843", - "lastModified": "2024-11-21T05:28:44.360", + "lastModified": "2025-02-12T15:15:09.483", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-459xx/CVE-2021-45985.json b/CVE-2021/CVE-2021-459xx/CVE-2021-45985.json index fcc3f819413..199f4c06f4c 100644 --- a/CVE-2021/CVE-2021-459xx/CVE-2021-45985.json +++ b/CVE-2021/CVE-2021-459xx/CVE-2021-45985.json @@ -2,7 +2,7 @@ "id": "CVE-2021-45985", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-10T09:15:07.250", - "lastModified": "2024-11-21T06:33:25.743", + "lastModified": "2025-02-12T16:15:33.000", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-31xx/CVE-2022-3180.json b/CVE-2022/CVE-2022-31xx/CVE-2022-3180.json index 6f6250f2bab..f8f9b676938 100644 --- a/CVE-2022/CVE-2022-31xx/CVE-2022-3180.json +++ b/CVE-2022/CVE-2022-31xx/CVE-2022-3180.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3180", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-11T22:15:24.180", - "lastModified": "2025-02-11T22:15:24.180", + "lastModified": "2025-02-12T15:15:10.730", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The WPGateway Plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 3.5. This allows unauthenticated attackers to create arbitrary malicious administrator accounts." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@wordfence.com", @@ -22,6 +45,16 @@ "value": "CWE-290" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "references": [ diff --git a/CVE-2022/CVE-2022-325xx/CVE-2022-32599.json b/CVE-2022/CVE-2022-325xx/CVE-2022-32599.json index 91598ae67c9..99aba9f92e8 100644 --- a/CVE-2022/CVE-2022-325xx/CVE-2022-32599.json +++ b/CVE-2022/CVE-2022-325xx/CVE-2022-32599.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32599", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:08.293", - "lastModified": "2024-11-21T07:06:42.767", + "lastModified": "2025-02-12T16:15:33.257", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-424xx/CVE-2022-42452.json b/CVE-2022/CVE-2022-424xx/CVE-2022-42452.json index 28737d34b51..f95200e9ec3 100644 --- a/CVE-2022/CVE-2022-424xx/CVE-2022-42452.json +++ b/CVE-2022/CVE-2022-424xx/CVE-2022-42452.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42452", "sourceIdentifier": "psirt@hcl.com", "published": "2023-04-02T21:15:08.183", - "lastModified": "2024-11-21T07:24:59.450", + "lastModified": "2025-02-12T15:15:10.903", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-467xx/CVE-2022-46781.json b/CVE-2022/CVE-2022-467xx/CVE-2022-46781.json index b15449f0f3c..272a9fb7429 100644 --- a/CVE-2022/CVE-2022-467xx/CVE-2022-46781.json +++ b/CVE-2022/CVE-2022-467xx/CVE-2022-46781.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46781", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-06T16:15:07.613", - "lastModified": "2024-11-21T07:31:02.250", + "lastModified": "2025-02-12T16:15:33.610", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0805.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0805.json index a99bce5ed04..998fa1c13c2 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0805.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0805.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0805", "sourceIdentifier": "cve@gitlab.com", "published": "2023-05-03T22:15:16.553", - "lastModified": "2024-11-21T07:37:52.330", + "lastModified": "2025-02-12T16:15:34.123", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1522.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1522.json index 3947faa1a26..e8efa7c2f9e 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1522.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1522.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1522", "sourceIdentifier": "security@genetec.com", "published": "2023-04-05T19:15:07.737", - "lastModified": "2024-11-21T07:39:21.427", + "lastModified": "2025-02-12T16:15:34.290", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1855.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1855.json index 5f01eb97c3b..d2aa2941f53 100644 --- a/CVE-2023/CVE-2023-18xx/CVE-2023-1855.json +++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1855.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1855", "sourceIdentifier": "secalert@redhat.com", "published": "2023-04-05T20:15:07.817", - "lastModified": "2024-11-21T07:40:01.733", + "lastModified": "2025-02-12T16:15:34.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.2 } ] }, diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20676.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20676.json index af5b90b1dc9..6d1c5393662 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20676.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20676.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20676", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:09.313", - "lastModified": "2024-11-21T07:41:20.067", + "lastModified": "2025-02-12T16:15:35.000", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20679.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20679.json index 6708fe2ec8c..e07238289d1 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20679.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20679.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20679", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:09.400", - "lastModified": "2024-11-21T07:41:20.437", + "lastModified": "2025-02-12T16:15:35.183", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20680.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20680.json index 14fac32187f..ab042af954e 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20680.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20680.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20680", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:09.443", - "lastModified": "2024-11-21T07:41:20.577", + "lastModified": "2025-02-12T16:15:35.410", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20681.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20681.json index c8adaef0be3..e5014ac9ce2 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20681.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20681.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20681", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:09.497", - "lastModified": "2024-11-21T07:41:20.690", + "lastModified": "2025-02-12T16:15:35.610", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20682.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20682.json index 9be7bd9bb79..5abbdbd4faf 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20682.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20682.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20682", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:09.560", - "lastModified": "2024-11-21T07:41:20.807", + "lastModified": "2025-02-12T16:15:35.787", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20684.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20684.json index 04a67b99334..a516654275f 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20684.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20684.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20684", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:09.617", - "lastModified": "2024-11-21T07:41:20.937", + "lastModified": "2025-02-12T16:15:35.960", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20685.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20685.json index 8f70d15715b..1bb1b99a7e3 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20685.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20685.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20685", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:09.663", - "lastModified": "2024-11-21T07:41:21.053", + "lastModified": "2025-02-12T16:15:36.130", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20686.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20686.json index 62a657d62d2..0e4ea5e2b9e 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20686.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20686.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20686", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:09.710", - "lastModified": "2024-11-21T07:41:21.160", + "lastModified": "2025-02-12T16:15:36.297", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20687.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20687.json index c023814cc88..ae75b872320 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20687.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20687.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20687", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:09.757", - "lastModified": "2024-11-21T07:41:21.267", + "lastModified": "2025-02-12T16:15:36.453", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20688.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20688.json index 3bd7147fd59..4e63ef2f927 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20688.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20688.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20688", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:09.810", - "lastModified": "2024-11-21T07:41:21.377", + "lastModified": "2025-02-12T16:15:36.617", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26991.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26991.json index 6f9c1a8a0f7..f6859eacef3 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26991.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26991.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26991", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:09.183", - "lastModified": "2024-11-21T07:52:09.787", + "lastModified": "2025-02-12T16:15:37.270", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-277xx/CVE-2023-27727.json b/CVE-2023/CVE-2023-277xx/CVE-2023-27727.json index 9e08d06cf71..78d80975e02 100644 --- a/CVE-2023/CVE-2023-277xx/CVE-2023-27727.json +++ b/CVE-2023/CVE-2023-277xx/CVE-2023-27727.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27727", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-09T20:15:56.650", - "lastModified": "2024-11-21T07:53:23.520", + "lastModified": "2025-02-12T16:15:37.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-277xx/CVE-2023-27729.json b/CVE-2023/CVE-2023-277xx/CVE-2023-27729.json index f485773b3d8..5850434adfc 100644 --- a/CVE-2023/CVE-2023-277xx/CVE-2023-27729.json +++ b/CVE-2023/CVE-2023-277xx/CVE-2023-27729.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27729", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-09T20:15:56.740", - "lastModified": "2024-11-21T07:53:23.817", + "lastModified": "2025-02-12T16:15:37.867", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28726.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28726.json index 86161465b68..9dfcbfa712a 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28726.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28726.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28726", "sourceIdentifier": "product-security@gg.jp.panasonic.com", "published": "2023-03-31T07:15:06.503", - "lastModified": "2024-11-21T07:55:52.873", + "lastModified": "2025-02-12T15:15:11.567", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28727.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28727.json index cf42aae2416..5932505aed8 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28727.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28727.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28727", "sourceIdentifier": "product-security@gg.jp.panasonic.com", "published": "2023-03-31T07:15:06.687", - "lastModified": "2024-11-21T07:55:53.000", + "lastModified": "2025-02-12T15:15:11.747", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-305" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29375.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29375.json index eceb24cb191..757d7d32b38 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29375.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29375.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29375", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-10T15:15:07.310", - "lastModified": "2024-11-21T07:56:57.613", + "lastModified": "2025-02-12T15:15:11.883", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29389.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29389.json index eb3b0e1d6a2..e1df52e09c4 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29389.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29389.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29389", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-05T16:15:08.100", - "lastModified": "2024-11-21T07:56:59.087", + "lastModified": "2025-02-12T16:15:38.110", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35949.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35949.json index 02418734944..870d36f73cb 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35949.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35949.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35949", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T14:15:08.420", - "lastModified": "2024-11-21T08:09:02.477", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:10:50.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,24 +49,76 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "00680208-AE67-4A4C-9512-53D47F04C096" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35950.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35950.json index bc907f57800..ebdd55f5751 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35950.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35950.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35950", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T14:15:08.697", - "lastModified": "2024-11-21T08:09:02.610", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:10:35.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,24 +49,76 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "00680208-AE67-4A4C-9512-53D47F04C096" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35951.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35951.json index 2be476eeff8..bde7f2cb947 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35951.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35951.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35951", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T14:15:08.920", - "lastModified": "2024-11-21T08:09:02.737", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:10:26.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,24 +49,76 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "00680208-AE67-4A4C-9512-53D47F04C096" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35952.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35952.json index a6f789f53cb..a41ad2e036c 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35952.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35952.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35952", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T14:15:09.313", - "lastModified": "2024-11-21T08:09:02.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:10:13.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,24 +49,74 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "00680208-AE67-4A4C-9512-53D47F04C096" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35953.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35953.json index 6ad1090092f..9a307162584 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35953.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35953.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35953", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T14:15:09.540", - "lastModified": "2024-11-21T08:09:02.973", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:10:01.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,24 +49,76 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libigl:libigl:2.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "00680208-AE67-4A4C-9512-53D47F04C096" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1784", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-496xx/CVE-2023-49600.json b/CVE-2023/CVE-2023-496xx/CVE-2023-49600.json index 27125395e75..fdfc41796bb 100644 --- a/CVE-2023/CVE-2023-496xx/CVE-2023-49600.json +++ b/CVE-2023/CVE-2023-496xx/CVE-2023-49600.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49600", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T14:15:09.763", - "lastModified": "2024-11-21T08:33:37.493", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:14:59.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,24 +69,67 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1879", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1879", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1879", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1879", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49780.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49780.json index ad15f08ad26..97bd1d9594d 100644 --- a/CVE-2023/CVE-2023-497xx/CVE-2023-49780.json +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49780.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49780", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-02-12T08:15:08.013", - "lastModified": "2025-02-12T08:15:08.013", + "lastModified": "2025-02-12T15:15:12.077", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -12,6 +12,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "vultures@jpcert.or.jp", @@ -45,6 +67,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4947.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4947.json index ef2944ed487..2420dcb0be7 100644 --- a/CVE-2023/CVE-2023-49xx/CVE-2023-4947.json +++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4947.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4947", "sourceIdentifier": "security@wordfence.com", "published": "2023-10-20T07:15:16.740", - "lastModified": "2024-11-21T08:36:19.570", - "vulnStatus": "Modified", + "lastModified": "2025-02-12T16:02:11.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wpfactory:ean_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:yanco:woocommerce_ean_payment_gateway:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "6.1.0", - "matchCriteriaId": "C044AC86-0734-435F-9C68-30946167FF3F" + "matchCriteriaId": "CC8AD8DD-12D3-4CC9-B977-F3072D24A61F" } ] } diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6533.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6533.json index 37a7ba65aa6..d1322964b58 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6533.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6533.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6533", "sourceIdentifier": "product-security@silabs.com", "published": "2024-02-21T20:15:46.283", - "lastModified": "2024-11-21T08:44:02.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:57:31.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -53,16 +73,50 @@ "value": "CWE-419" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:silabs:z-wave_pc-based_controller:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.54", + "matchCriteriaId": "0ACB7BA3-6720-44E9-A822-F4673C4B81A9" + } + ] + } + ] } ], "references": [ { "url": "https://community.silabs.com/068Vm000001HdNm", - "source": "product-security@silabs.com" + "source": "product-security@silabs.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://community.silabs.com/068Vm000001HdNm", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6640.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6640.json index a7682639f31..3def86117a9 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6640.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6640.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6640", "sourceIdentifier": "product-security@silabs.com", "published": "2024-02-21T20:15:46.497", - "lastModified": "2024-11-21T08:44:16.297", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:52:28.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-248" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:silabs:z-wave_pc-based_controller:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.54", + "matchCriteriaId": "0ACB7BA3-6720-44E9-A822-F4673C4B81A9" + } + ] + } + ] } ], "references": [ { "url": "https://community.silabs.com/068Vm000001HdNm", - "source": "product-security@silabs.com" + "source": "product-security@silabs.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://community.silabs.com/068Vm000001HdNm", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11343.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11343.json new file mode 100644 index 00000000000..5c9d69e370a --- /dev/null +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11343.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-11343", + "sourceIdentifier": "security@progress.com", + "published": "2025-02-12T16:15:39.100", + "lastModified": "2025-02-12T16:15:39.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Progress\u00ae Telerik\u00ae Document Processing Libraries, versions prior to 2025 Q1 (2025.1.205), unzipping an archive can lead to arbitrary file system access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://docs.telerik.com/devtools/document-processing/knowledge-base/kb-security-path-traversal-cve-2024-11343", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11651.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11651.json index 8cc087f8607..46f44a4f5d0 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11651.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11651.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11651", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-25T03:15:07.973", - "lastModified": "2024-12-10T23:12:34.057", + "lastModified": "2025-02-12T15:33:04.513", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -191,8 +191,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F" + "criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788" } ] }, @@ -202,8 +202,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724" + "criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F" } ] } @@ -218,8 +218,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788" + "criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F" } ] }, @@ -229,8 +229,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F" + "criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0" } ] } diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11652.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11652.json index 73b872c8c6e..3a620dffe40 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11652.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11652.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11652", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-25T03:15:08.533", - "lastModified": "2024-12-10T23:13:23.947", + "lastModified": "2025-02-12T15:32:54.593", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -202,8 +202,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724" + "criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0" } ] } diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11653.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11653.json index ac01d74dd17..9b7d1842564 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11653.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11653.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11653", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-25T04:15:05.337", - "lastModified": "2024-12-10T23:13:40.990", + "lastModified": "2025-02-12T15:33:07.360", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -191,8 +191,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F" + "criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788" } ] }, @@ -202,8 +202,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724" + "criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F" } ] } @@ -218,8 +218,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788" + "criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F" } ] }, @@ -229,8 +229,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F" + "criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0" } ] } diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11654.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11654.json index 531fc23e34b..d8b087d8474 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11654.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11654.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11654", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-25T04:15:05.577", - "lastModified": "2024-12-10T23:13:58.150", + "lastModified": "2025-02-12T15:32:56.980", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -191,8 +191,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F" + "criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788" } ] }, @@ -202,8 +202,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724" + "criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F" } ] } @@ -218,8 +218,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788" + "criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F" } ] }, @@ -229,8 +229,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F" + "criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0" } ] } diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11655.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11655.json index e3d883c315e..db6057a8767 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11655.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11655.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11655", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-25T05:15:09.447", - "lastModified": "2024-12-10T23:14:37.130", + "lastModified": "2025-02-12T15:33:09.620", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -191,8 +191,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F" + "criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788" } ] }, @@ -202,8 +202,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724" + "criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F" } ] } @@ -218,8 +218,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788" + "criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F" } ] }, @@ -229,8 +229,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F" + "criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0" } ] } diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11656.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11656.json index 439a17fbcac..b0905a1ac89 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11656.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11656.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11656", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-25T05:15:10.387", - "lastModified": "2024-12-10T23:14:44.037", + "lastModified": "2025-02-12T15:32:59.883", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -191,8 +191,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F" + "criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788" } ] }, @@ -202,8 +202,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724" + "criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F" } ] } @@ -218,8 +218,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788" + "criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F" } ] }, @@ -229,8 +229,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F" + "criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0" } ] } diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11657.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11657.json index 57e1d9f3a3f..41d525d55de 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11657.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11657.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11657", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-25T06:15:06.073", - "lastModified": "2024-12-10T23:14:54.933", + "lastModified": "2025-02-12T15:33:12.003", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -191,8 +191,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F" + "criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788" } ] }, @@ -202,8 +202,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724" + "criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F" } ] } @@ -218,8 +218,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788" + "criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F" } ] }, @@ -229,8 +229,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F" + "criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0" } ] } diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11658.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11658.json index 35c7ded0030..23ec0267a26 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11658.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11658.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11658", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-25T06:15:06.593", - "lastModified": "2024-12-10T23:15:02.890", + "lastModified": "2025-02-12T15:33:02.140", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -191,8 +191,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F" + "criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788" } ] }, @@ -202,8 +202,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724" + "criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F" } ] } @@ -218,8 +218,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788" + "criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F" } ] }, @@ -229,8 +229,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F" + "criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0" } ] } diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11659.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11659.json index bc022beb461..36f4a96da9b 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11659.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11659.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11659", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-25T07:15:04.837", - "lastModified": "2024-12-10T23:15:14.893", + "lastModified": "2025-02-12T15:33:14.057", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -191,8 +191,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F" + "criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788" } ] }, @@ -202,8 +202,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*", - "matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724" + "criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F" } ] } @@ -218,8 +218,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788" + "criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F" } ] }, @@ -229,8 +229,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F" + "criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0" } ] } diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12251.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12251.json new file mode 100644 index 00000000000..968d732d885 --- /dev/null +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12251.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12251", + "sourceIdentifier": "security@progress.com", + "published": "2025-02-12T15:15:12.370", + "lastModified": "2025-02-12T15:15:12.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Progress\u00ae Telerik\u00ae UI for WinUI versions prior to 2025 Q1 (3.0.0), a command injection attack is possible through improper neutralization of hyperlink elements." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://docs.telerik.com/devtools/winui/security/kb-security-command-injection-cve-2024-12251", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12315.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12315.json index 8751c1334d8..eddf640699f 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12315.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12315.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12315", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T09:15:08.247", - "lastModified": "2025-02-12T09:15:08.247", + "lastModified": "2025-02-12T15:15:12.527", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,27 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -45,6 +65,16 @@ "value": "CWE-922" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12379.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12379.json new file mode 100644 index 00000000000..8346abe1e03 --- /dev/null +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12379.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-12379", + "sourceIdentifier": "cve@gitlab.com", + "published": "2025-02-12T15:15:12.707", + "lastModified": "2025-02-12T15:15:12.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A denial of service vulnerability in GitLab CE/EE affecting all versions from 14.1 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to impact the availability of GitLab via unbounded symbol creation via the scopes parameter in a Personal Access Token." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/508559", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2871791", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12629.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12629.json new file mode 100644 index 00000000000..fc9217f07d4 --- /dev/null +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12629.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12629", + "sourceIdentifier": "security@progress.com", + "published": "2025-02-12T16:15:39.810", + "lastModified": "2025-02-12T16:15:39.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Progress\u00ae Telerik\u00ae KendoReact versions v3.5.0 through v9.4.0, an attacker can introduce or modify properties within the global prototype chain which can result in denial of service or command injection." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], + "references": [ + { + "url": "https://www.telerik.com/kendo-react-ui/components/knowledge-base/kb-security-protoype-pollution-2024-12629", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13365.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13365.json index 9714bc7d0fe..ee1b9c989f4 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13365.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13365.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13365", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:10.547", - "lastModified": "2025-02-12T10:15:10.547", + "lastModified": "2025-02-12T15:15:12.860", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,27 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13435.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13435.json index 61815aaf45c..15ea501be45 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13435.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13435.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13435", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:10.727", - "lastModified": "2025-02-12T10:15:10.727", + "lastModified": "2025-02-12T15:15:13.093", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,27 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13473.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13473.json index 4db6b9a4dde..af2a9b8b38e 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13473.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13473.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13473", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:11.610", - "lastModified": "2025-02-12T10:15:11.610", + "lastModified": "2025-02-12T15:15:13.270", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,27 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13794.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13794.json index f7a2b742558..97ef763876f 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13794.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13794.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13794", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T08:15:08.430", - "lastModified": "2025-02-12T08:15:08.430", + "lastModified": "2025-02-12T15:15:14.040", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,27 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -45,6 +65,16 @@ "value": "CWE-693" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13821.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13821.json index 31e6fa2753a..0be0f0100f3 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13821.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13821.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13821", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T08:15:08.660", - "lastModified": "2025-02-12T08:15:08.660", + "lastModified": "2025-02-12T15:15:14.643", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,27 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", @@ -45,6 +65,16 @@ "value": "CWE-285" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1700.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1700.json index b2510afaac1..735a824a612 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1700.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1700.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1700", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-21T16:15:49.707", - "lastModified": "2024-11-21T08:51:06.933", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:58:29.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,30 +96,65 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:keerti1924:php_mysql_user_signup_login_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C400362C-F44F-4C21-ADA4-E1547FFAF327" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/omarexala/PHP-MYSQL-User-Login-System---Stored-XSS", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.254388", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.254388", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/omarexala/PHP-MYSQL-User-Login-System---Stored-XSS", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.254388", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.254388", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1701.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1701.json index c1e65fb972b..a75f5f77dbd 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1701.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1701.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1701", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-21T16:15:50.013", - "lastModified": "2024-11-21T08:51:07.080", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:57:05.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,32 +94,77 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:keerti1924:php_mysql_user_signup_login_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C400362C-F44F-4C21-ADA4-E1547FFAF327" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/omarexala/PHP-MYSQL-User-Login-System---Broken-Access-Control", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.254389", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.254389", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/omarexala/PHP-MYSQL-User-Login-System---Broken-Access-Control", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.254389", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.254389", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21891.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21891.json index 1f17a07babe..be860829b84 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21891.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21891.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21891", "sourceIdentifier": "support@hackerone.com", "published": "2024-02-20T02:15:50.347", - "lastModified": "2024-11-21T08:55:12.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T15:08:32.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -39,30 +61,89 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", + "versionStartIncluding": "20.0.0", + "versionEndExcluding": "20.11.1", + "matchCriteriaId": "1C20DA8F-2F0C-4323-B67D-8ADF50D5983A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", + "versionStartIncluding": "21.0.0", + "versionEndExcluding": "21.6.2", + "matchCriteriaId": "211B62F4-4CC3-41CA-91FA-E14C5AC0335A" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/11/1", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://hackerone.com/reports/2259914", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240315-0005/", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/11/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://hackerone.com/reports/2259914", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240315-0005/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21892.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21892.json index 9dc921119bc..6a55420cfc6 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21892.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21892.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21892", "sourceIdentifier": "support@hackerone.com", "published": "2024-02-20T02:15:50.567", - "lastModified": "2024-11-21T08:55:12.463", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T15:17:34.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -39,30 +61,109 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0.0", + "versionEndExcluding": "18.19.1", + "matchCriteriaId": "D2FD72E7-64E4-4F5C-B39D-3DBB87CF8675" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", + "versionStartIncluding": "20.0.0", + "versionEndExcluding": "20.11.1", + "matchCriteriaId": "1C20DA8F-2F0C-4323-B67D-8ADF50D5983A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", + "versionStartIncluding": "21.0.0", + "versionEndExcluding": "21.6.2", + "matchCriteriaId": "211B62F4-4CC3-41CA-91FA-E14C5AC0335A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/11/1", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://hackerone.com/reports/2237545", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240322-0003/", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/03/11/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://hackerone.com/reports/2237545", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240322-0003/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22181.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22181.json index 51b0e817a11..8fa651d79f5 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22181.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22181.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22181", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T14:15:09.997", - "lastModified": "2024-11-21T08:55:44.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:15:53.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,24 +49,67 @@ "value": "CWE-129" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1930", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1930", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1930", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1930", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22235.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22235.json index 6c8a22973b4..e8197cea368 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22235.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22235.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22235", "sourceIdentifier": "security@vmware.com", "published": "2024-02-21T05:15:08.880", - "lastModified": "2024-11-21T08:55:51.637", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:59:46.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,17 +36,81 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:aria_operations:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.6.0", + "versionEndExcluding": "8.16.0", + "matchCriteriaId": "7C91C3D9-96EE-4A38-B722-B629014DC9E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0", + "versionEndIncluding": "5.2", + "matchCriteriaId": "BC8A0BB4-A21B-4914-8F4B-37D300A4BBB9" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.vmware.com/security/advisories/VMSA-2024-0004.html", - "source": "security@vmware.com" + "source": "security@vmware.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.vmware.com/security/advisories/VMSA-2024-0004.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22473.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22473.json index 85354f90ad1..fb0d89e4c81 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22473.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22473.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22473", "sourceIdentifier": "product-security@silabs.com", "published": "2024-02-21T19:15:08.813", - "lastModified": "2024-11-21T08:56:20.573", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:52:42.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -53,16 +73,50 @@ "value": "CWE-1279" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-331" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:silabs:gecko_software_development_kit:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.4.0", + "matchCriteriaId": "F8DA3192-03D2-4218-9561-641A2E54C46F" + } + ] + } + ] } ], "references": [ { "url": "https://community.silabs.com/068Vm000001FrjT", - "source": "product-security@silabs.com" + "source": "product-security@silabs.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://community.silabs.com/068Vm000001FrjT", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23949.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23949.json index a6ddf5fcb57..8f492a7e474 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23949.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23949.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23949", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T14:15:10.687", - "lastModified": "2024-11-21T08:58:44.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T15:27:09.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23950.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23950.json index e7861cce8e1..dfbd7c465f8 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23950.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23950.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23950", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T14:15:10.907", - "lastModified": "2024-11-21T08:58:44.840", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T15:27:11.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23951.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23951.json index 3d900664a4e..7d47579609a 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23951.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23951.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23951", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-05-28T14:15:11.133", - "lastModified": "2024-11-21T08:58:44.960", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T15:27:18.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "91BC184E-2C02-40C5-BA95-B2ADCF16C366" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1926", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2338.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2338.json index 0676e71804e..ce97d3fbecb 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2338.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2338.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2338", "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2024-03-08T20:15:45.960", - "lastModified": "2024-11-21T09:09:32.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:44:27.073", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -49,16 +69,49 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dalibo:anonymizer:1.2.0:*:*:*:*:postgresql:*:*", + "matchCriteriaId": "502E5DD4-11FB-47F1-8F8C-ECA6C02130B6" + } + ] + } + ] } ], "references": [ { "url": "https://gitlab.com/dalibo/postgresql_anonymizer/-/commit/f55daadba3fa8226029687964aa8889d01a79778", - "source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007" + "source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", + "tags": [ + "Patch" + ] }, { "url": "https://gitlab.com/dalibo/postgresql_anonymizer/-/commit/f55daadba3fa8226029687964aa8889d01a79778", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2339.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2339.json index f488cfb3382..30a5d720f64 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2339.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2339.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2339", "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2024-03-08T20:15:46.170", - "lastModified": "2024-11-21T09:09:32.830", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:44:09.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,49 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dalibo:anonymizer:1.2.0:*:*:*:*:postgresql:*:*", + "matchCriteriaId": "502E5DD4-11FB-47F1-8F8C-ECA6C02130B6" + } + ] + } + ] } ], "references": [ { "url": "https://gitlab.com/dalibo/postgresql_anonymizer/-/commit/e517b38e62e50871b04011598e73a7308bdae9d9", - "source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007" + "source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", + "tags": [ + "Patch" + ] }, { "url": "https://gitlab.com/dalibo/postgresql_anonymizer/-/commit/e517b38e62e50871b04011598e73a7308bdae9d9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-252xx/CVE-2024-25249.json b/CVE-2024/CVE-2024-252xx/CVE-2024-25249.json index 38a597477c3..0fe884e264d 100644 --- a/CVE-2024/CVE-2024-252xx/CVE-2024-25249.json +++ b/CVE-2024/CVE-2024-252xx/CVE-2024-25249.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25249", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T20:15:46.670", - "lastModified": "2024-11-21T09:00:31.800", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:44:43.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,101 @@ "value": "Un problema en la aplicaci\u00f3n He3 para macOS versi\u00f3n 2.0.17 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de la configuraci\u00f3n RunAsNode y enableNodeClilnspectArguments." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:he3app:he3_app:2.0.17:*:*:*:*:macos:*:*", + "matchCriteriaId": "E66913F9-7434-4A4F-BC50-048A4AB71F46" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/intbjw", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/intbjw/CVE-2024-25249", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.electronjs.org/blog/statement-run-as-node-cves", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Technical Description" + ] }, { "url": "https://github.com/intbjw", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/intbjw/CVE-2024-25249", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.electronjs.org/blog/statement-run-as-node-cves", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28194.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28194.json index ae173032d2f..e9ffaf670fc 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28194.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28194.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28194", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T19:15:47.110", - "lastModified": "2024-11-21T09:06:00.183", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T15:19:53.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-798" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yooooomi:your_spotify:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.0", + "matchCriteriaId": "4B8BF8EC-918E-446C-B00C-345B7A707F07" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-gvcr-g265-j827", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-gvcr-g265-j827", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28195.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28195.json index 9c20ef12e74..f942981792c 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28195.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28195.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28195", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T18:15:07.360", - "lastModified": "2024-11-21T09:06:00.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T15:16:31.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,24 +69,66 @@ "value": "CWE-352" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yooooomi:your_spotify:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.9.0", + "matchCriteriaId": "D4D16B98-81FE-426E-BD95-42B155B9C613" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Yooooomi/your_spotify/commit/c3ae87673910c9903bb53088c8b71ed2c9aa54e4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-hfgf-99p3-6fjj", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/Yooooomi/your_spotify/commit/c3ae87673910c9903bb53088c8b71ed2c9aa54e4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-hfgf-99p3-6fjj", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28196.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28196.json index e0dfa27ff8d..865f0c71db0 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28196.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28196.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28196", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T18:15:07.620", - "lastModified": "2024-11-21T09:06:00.430", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T15:18:34.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-1021" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yooooomi:your_spotify:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.9.0", + "matchCriteriaId": "D4D16B98-81FE-426E-BD95-42B155B9C613" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-m5x2-6hjm-cggq", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-m5x2-6hjm-cggq", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28868.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28868.json index 0b3e9d97fd0..587be030b99 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28868.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28868.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28868", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-20T20:15:09.110", - "lastModified": "2024-11-21T09:07:04.723", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T15:23:09.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,24 +69,65 @@ "value": "CWE-204" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.8.5", + "matchCriteriaId": "CF8F4945-0845-4C1C-B088-CA288F15583A" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/umbraco/Umbraco-CMS/commit/7e1d1a1968000226cd882fff078b122b8d46c44d", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-552f-97wf-pmpq", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/commit/7e1d1a1968000226cd882fff078b122b8d46c44d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-552f-97wf-pmpq", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29035.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29035.json index 764edb8f5b3..84e157ed342 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29035.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29035.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29035", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-17T15:15:07.037", - "lastModified": "2024-11-21T09:07:25.233", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T15:26:10.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,24 +69,65 @@ "value": "CWE-918" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.0", + "versionEndExcluding": "13.1.1", + "matchCriteriaId": "070BDE45-92F3-4C27-BDDF-BD98E344B2B8" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/umbraco/Umbraco-CMS/commit/6b8067815c02ae43161966a8075a3585e1bc4de0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-74p6-39f2-23v3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/commit/6b8067815c02ae43161966a8075a3585e1bc4de0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-74p6-39f2-23v3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33891.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33891.json index 112d0e4b643..4b7ec167879 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33891.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33891.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33891", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-28T23:15:07.200", - "lastModified": "2024-11-21T09:17:40.487", + "lastModified": "2025-02-12T15:15:14.827", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -83,6 +83,10 @@ { "url": "https://trust.delinea.com/?tcuUid=17aaf4ef-ada9-46d5-bf97-abd3b07daae3", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/straightblast/My-PoC-Exploits/blob/master/CVE-2024-33891.py", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34071.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34071.json index 74f92dd8c2e..caf7b7be272 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34071.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34071.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34071", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-21T14:15:11.783", - "lastModified": "2024-11-21T09:18:01.820", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T15:39:05.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,48 +69,128 @@ "value": "CWE-601" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.18.5", + "versionEndExcluding": "8.18.14", + "matchCriteriaId": "DD5C0BF1-29AF-4606-B02A-F73EE2DD71A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.5.0", + "versionEndExcluding": "10.8.6", + "matchCriteriaId": "6B804252-12EB-4EA3-A14A-F45375164046" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.0", + "versionEndExcluding": "12.3.10", + "matchCriteriaId": "891B2FBA-B687-4028-9832-B3B71EBA74D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0.0", + "versionEndExcluding": "13.3.1", + "matchCriteriaId": "76E06544-41C1-4D73-A8AA-BA1FE815D02A" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/umbraco/Umbraco-CMS/commit/5f24de308584b9771240a6db1a34630a5114c450", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/commit/c17d4e1a600098ec524e4126f4395255476bc33f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/commit/c8f71af646171074c13e5c34f74312def4512031", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/commit/d8df405db4ea884bb4b96f088d10d9a2070cf024", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-j74q-mv2c-rxmp", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/commit/5f24de308584b9771240a6db1a34630a5114c450", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/commit/c17d4e1a600098ec524e4126f4395255476bc33f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/commit/c8f71af646171074c13e5c34f74312def4512031", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/commit/d8df405db4ea884bb4b96f088d10d9a2070cf024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-j74q-mv2c-rxmp", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34370.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34370.json index 816e82f7f76..37d00ad4f99 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34370.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34370.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34370", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T09:15:43.753", - "lastModified": "2024-11-21T09:18:31.687", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T15:42:09.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpfactory:ean_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.9.0", + "matchCriteriaId": "8EEB00E2-F8F0-4F51-9DAF-5EB4F0BBE741" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ean-for-woocommerce/wordpress-ean-for-woocommerce-plugin-4-8-9-arbitrary-option-update-to-privilege-escalation-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/ean-for-woocommerce/wordpress-ean-for-woocommerce-plugin-4-8-9-arbitrary-option-update-to-privilege-escalation-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3460.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3460.json index 2a7ea1db9b4..a2e83eeed6e 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3460.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3460.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3460", "sourceIdentifier": "cvd@cert.pl", "published": "2024-05-14T15:41:12.850", - "lastModified": "2024-11-21T09:29:38.773", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T15:36:15.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.4, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ] }, @@ -49,32 +69,82 @@ "value": "CWE-424" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kioware:kioware:*:*:*:*:*:windows:*:*", + "versionEndIncluding": "8.34", + "matchCriteriaId": "08120DB6-BEF8-4C1E-B969-3F661CB25C70" + } + ] + } + ] } ], "references": [ { "url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/04/CVE-2024-3459", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "https://www.kioware.com/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Product" + ] }, { "url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/04/CVE-2024-3459", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "https://www.kioware.com/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3461.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3461.json index 8e3128f1681..779df5334f7 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3461.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3461.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3461", "sourceIdentifier": "cvd@cert.pl", "published": "2024-05-14T15:41:13.350", - "lastModified": "2024-11-21T09:29:38.900", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T15:37:59.677", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,32 +69,82 @@ "value": "CWE-307" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kioware:kioware:*:*:*:*:*:windows:*:*", + "versionEndIncluding": "8.35", + "matchCriteriaId": "FA48DE1E-8A39-439D-BE91-A8FA7E84C1D7" + } + ] + } + ] } ], "references": [ { "url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/04/CVE-2024-3459", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "https://www.kioware.com/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Product" + ] }, { "url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/04/CVE-2024-3459", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "https://www.kioware.com/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3943.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3943.json index 6c27855ae27..e89c95f90ed 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3943.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3943.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3943", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-30T05:15:55.373", - "lastModified": "2024-11-21T09:30:45.133", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:26:27.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:delower:wp_to_do:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.0", + "matchCriteriaId": "48CF09FC-8FBD-4B6D-97E0-91F39CD1B51F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L225", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/406f6bd7-f57f-4725-a36f-9846ac04f945?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L225", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/406f6bd7-f57f-4725-a36f-9846ac04f945?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3945.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3945.json index 0af1a2c564e..aa6d16dec53 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3945.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3945.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3945", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-30T05:15:55.590", - "lastModified": "2024-11-21T09:30:45.320", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:26:04.993", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:delower:wp_to_do:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.0", + "matchCriteriaId": "48CF09FC-8FBD-4B6D-97E0-91F39CD1B51F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L273", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/69475bec-1f27-4793-8697-1132ac701c62?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L273", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/69475bec-1f27-4793-8697-1132ac701c62?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3946.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3946.json index 05871802226..16c2bed1c09 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3946.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3946.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3946", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-30T05:15:55.800", - "lastModified": "2024-11-21T09:30:45.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:25:25.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 1.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:delower:wp_to_do:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.0", + "matchCriteriaId": "48CF09FC-8FBD-4B6D-97E0-91F39CD1B51F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L304", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de648bea-35c5-4611-aa2f-79e37a0299bb?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L304", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de648bea-35c5-4611-aa2f-79e37a0299bb?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3947.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3947.json index 9a2beb4df01..f57551ea8f6 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3947.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3947.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3947", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-30T05:15:55.993", - "lastModified": "2024-11-21T09:30:45.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:23:45.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:delower:wp_to_do:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.0", + "matchCriteriaId": "48CF09FC-8FBD-4B6D-97E0-91F39CD1B51F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L304", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c132cfc1-03b3-4616-9a66-871e88c857cb?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L304", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c132cfc1-03b3-4616-9a66-871e88c857cb?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4317.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4317.json index c64e5aa704a..60120ea4387 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4317.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4317.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4317", "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2024-05-14T15:43:16.473", - "lastModified": "2024-11-21T09:42:36.813", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:17:31.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,16 +69,67 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.12", + "matchCriteriaId": "7AC0DA70-323D-4C0A-9993-9155CC2E0898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.7", + "matchCriteriaId": "A7C08BC1-1F35-48B5-A159-87988C64EED1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0", + "versionEndExcluding": "16.3", + "matchCriteriaId": "30634752-81D1-43A4-9BAF-329307A5B9AD" + } + ] + } + ] } ], "references": [ { "url": "https://www.postgresql.org/support/security/CVE-2024-4317/", - "source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007" + "source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.postgresql.org/support/security/CVE-2024-4317/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4422.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4422.json index 311c9eeeea7..ab28cc370eb 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4422.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4422.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4422", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-30T09:15:10.020", - "lastModified": "2024-11-21T09:42:47.860", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:29:48.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:comparisonslider:comparison_slider:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.5", + "matchCriteriaId": "0500397E-8876-4712-BF58-A58E5E041877" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/comparison-slider/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0907c74e-0bb8-4761-aabf-79d880c78415?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wordpress.org/plugins/comparison-slider/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0907c74e-0bb8-4761-aabf-79d880c78415?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4426.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4426.json index 8114747a713..16cb5842885 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4426.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4426.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4426", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-30T09:15:10.230", - "lastModified": "2024-11-21T09:42:48.490", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:29:15.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:comparisonslider:comparison_slider:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.5", + "matchCriteriaId": "0500397E-8876-4712-BF58-A58E5E041877" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/comparison-slider/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5a9b284a-2af9-4d20-9663-a40b9330da35?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wordpress.org/plugins/comparison-slider/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5a9b284a-2af9-4d20-9663-a40b9330da35?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4427.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4427.json index 4d547ec000e..ba5f2775571 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4427.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4427.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4427", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-30T09:15:10.453", - "lastModified": "2024-11-21T09:42:48.593", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T16:28:31.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:comparisonslider:comparison_slider:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.5", + "matchCriteriaId": "0500397E-8876-4712-BF58-A58E5E041877" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/comparison-slider/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab68a08d-a6d4-4424-a7bf-219951f752fa?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wordpress.org/plugins/comparison-slider/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab68a08d-a6d4-4424-a7bf-219951f752fa?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54160.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54160.json new file mode 100644 index 00000000000..69bcbce5ead --- /dev/null +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54160.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-54160", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T15:15:15.050", + "lastModified": "2025-02-12T15:15:15.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "dashboards-reporting (aka Dashboards Reports) before 2.19.0.0, as shipped in OpenSearch before 2.19, allows XSS because Markdown is not sanitized when previewing a header or footer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Jflye/CVE-2024-54160--Opensearch-HTML-Injection", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/opensearch-project/dashboards-reporting/compare/2.18.0.0...2.19.0.0", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/opensearch-project/dashboards-reporting/pull/476", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/opensearch-project/opensearch-build/blob/main/release-notes/opensearch-release-notes-2.19.0.md", + "source": "cve@mitre.org" + }, + { + "url": "https://opensearch.org/releases.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54909.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54909.json index ac0a05f73ad..696c016ecc0 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54909.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54909.json @@ -2,7 +2,7 @@ "id": "CVE-2024-54909", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T22:15:38.250", - "lastModified": "2025-02-11T22:15:28.733", + "lastModified": "2025-02-12T15:15:15.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", - "baseScore": 5.3, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", + "privilegesRequired": "LOW", + "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" }, - "exploitabilityScore": 1.8, - "impactScore": 3.4 + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-22" } ] } diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54916.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54916.json index 6c1d8889902..2fc6cc0209f 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54916.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54916.json @@ -2,7 +2,7 @@ "id": "CVE-2024-54916", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T23:15:09.227", - "lastModified": "2025-02-11T23:15:09.227", + "lastModified": "2025-02-12T16:15:42.160", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue in the SharedConfig class of Telegram Android APK v.11.7.0 allows a physically proximate attacker to bypass authentication and escalate privileges by manipulating the return value of the checkPasscode method." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1knf8-_fFUSLd3ZmbEpy0_OVzSN1UR1JR/view?usp=sharing", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57000.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57000.json index fb301382f4d..462cba74bef 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57000.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57000.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57000", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T23:15:09.337", - "lastModified": "2025-02-11T23:15:09.337", + "lastModified": "2025-02-12T16:15:42.317", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue in Anyscale Inc Ray between v.2.9.3 and v.2.40.0 allows a remote attacker to execute arbitrary code via a crafted script." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/honysyang/Ray.git", diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9870.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9870.json new file mode 100644 index 00000000000..3172f30ccf9 --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9870.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9870", + "sourceIdentifier": "cve@gitlab.com", + "published": "2025-02-12T16:15:42.563", + "lastModified": "2025-02-12T16:15:42.563", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An external service interaction vulnerability in GitLab EE affecting all versions from 15.11 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to send requests from the GitLab server to unintended services." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-441" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/498911", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2734142", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0332.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0332.json new file mode 100644 index 00000000000..147b0ffc018 --- /dev/null +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0332.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0332", + "sourceIdentifier": "security@progress.com", + "published": "2025-02-12T16:15:42.703", + "lastModified": "2025-02-12T16:15:42.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Progress\u00ae Telerik\u00ae UI for WinForms, versions prior to 2025 Q1 (2025.1.211), using the improper limitation of a target path can lead to decompressing an archive's content into a restricted directory." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://docs.telerik.com/devtools/winforms/knowledge-base/kb-security-path-traversal-cve-2025-0332", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0376.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0376.json new file mode 100644 index 00000000000..0328d6d53cb --- /dev/null +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0376.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-0376", + "sourceIdentifier": "cve@gitlab.com", + "published": "2025-02-12T15:15:15.477", + "lastModified": "2025-02-12T15:15:15.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An XSS vulnerability exists in GitLab CE/EE affecting all versions from 13.3 prior to 17.6.5, 17.7 prior to 17.7.4 and 17.8 prior to 17.8.2 that allows an attacker to execute unauthorized actions via a change page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/512603", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2930243", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0506.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0506.json index b67c5e8d7e1..ac3c684358e 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0506.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0506.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0506", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:14.360", - "lastModified": "2025-02-12T10:15:14.360", + "lastModified": "2025-02-12T15:15:15.613", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,27 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0516.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0516.json new file mode 100644 index 00000000000..091b5c321f9 --- /dev/null +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0516.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-0516", + "sourceIdentifier": "cve@gitlab.com", + "published": "2025-02-12T16:15:42.883", + "lastModified": "2025-02-12T16:15:42.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Authorization in GitLab CE/EE affecting all versions from 17.7 prior to 17.7.4, 17.8 prior to 17.8.2 allow users with limited permissions to perform unauthorized actions on critical project data." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/513540", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2914644", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0556.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0556.json new file mode 100644 index 00000000000..060aee9dd8f --- /dev/null +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0556.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0556", + "sourceIdentifier": "security@progress.com", + "published": "2025-02-12T16:15:43.030", + "lastModified": "2025-02-12T16:15:43.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Progress\u00ae Telerik\u00ae Report Server, versions prior to 2025 Q1 (11.0.25.211) when using the older .NET Framework implementation, communication of non-sensitive information between the service agent process and app host process occurs over an unencrypted tunnel, which can be subjected to local network traffic sniffing." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://docs.telerik.com/report-server/knowledge-base/kb-security-cleartext-transmission-cve-2025-0556", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1042.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1042.json new file mode 100644 index 00000000000..43a9d47aa16 --- /dev/null +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1042.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-1042", + "sourceIdentifier": "cve@gitlab.com", + "published": "2025-02-12T15:15:16.230", + "lastModified": "2025-02-12T15:15:16.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An insecure direct object reference vulnerability in GitLab EE affecting all versions from 15.7 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to view repositories in an unauthorized way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/50849943", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2886976", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1183.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1183.json index ed308d7842d..7749dd3cb0f 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1183.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1183.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1183", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T07:15:07.863", - "lastModified": "2025-02-12T07:15:07.863", + "lastModified": "2025-02-12T15:15:16.520", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,27 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -118,6 +138,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1184.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1184.json index 26b76e0a3d8..32bc69530b1 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1184.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1184.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1184", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T07:15:08.410", - "lastModified": "2025-02-12T07:15:08.410", + "lastModified": "2025-02-12T15:15:16.723", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,27 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -118,6 +138,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1185.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1185.json index b4839c23f1c..4692b3c351f 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1185.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1185.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1185", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T08:15:08.870", - "lastModified": "2025-02-12T08:15:08.870", + "lastModified": "2025-02-12T15:15:16.917", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,27 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -118,6 +138,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1186.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1186.json index 34ca76e2565..aece19af6e7 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1186.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1186.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1186", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T08:15:09.153", - "lastModified": "2025-02-12T08:15:09.153", + "lastModified": "2025-02-12T15:15:17.140", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,27 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -118,6 +138,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1188.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1188.json index bb9e75877ed..24f920829cd 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1188.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1188.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1188", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T09:15:08.803", - "lastModified": "2025-02-12T09:15:08.803", + "lastModified": "2025-02-12T15:15:17.407", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,27 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -118,6 +138,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json index 43de4690b11..aba0a79b7d8 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1197.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1197", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T13:15:08.983", - "lastModified": "2025-02-12T13:15:08.983", + "lastModified": "2025-02-12T15:15:17.670", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,27 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -118,6 +138,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1202.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1202.json new file mode 100644 index 00000000000..66ad2093a12 --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1202.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-1202", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-12T15:15:17.920", + "lastModified": "2025-02-12T15:15:17.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in SourceCodester Best Church Management Software 1.1. Affected is an unknown function of the file /admin/edit_slider.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Yesec/Best-church-management-software/blob/main/edit_slider.php.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295110", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295110", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.496954", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1206.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1206.json new file mode 100644 index 00000000000..8f4ab4e5f6d --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1206.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-1206", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-12T15:15:18.093", + "lastModified": "2025-02-12T15:15:18.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Codezips Gym Management System 1.0. It has been classified as critical. This affects an unknown part of the file /dashboard/admin/viewdetailroutine.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/sekaino-sakura/CVE/blob/main/CVE_1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295143", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295143", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.496961", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1207.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1207.json new file mode 100644 index 00000000000..68cbb0be7b3 --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1207.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-1207", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-12T16:15:44.393", + "lastModified": "2025-02-12T16:15:44.393", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in phjounin TFTPD64 4.64. It has been declared as problematic. This vulnerability affects unknown code of the component DNS Handler. The manipulation leads to denial of service. The attack needs to be done within the local network. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "ADJACENT", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:H/Au:N/C:N/I:N/A:P", + "baseScore": 1.8, + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "HIGH", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 3.2, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/DMCERTCE/TFTPD64_DOS", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/DMCERTCE/TFTPD64_DOS/blob/main/poc.py", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295144", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295144", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.497249", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1208.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1208.json new file mode 100644 index 00000000000..8d0adcdb535 --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1208.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-1208", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-12T16:15:44.613", + "lastModified": "2025-02-12T16:15:44.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Wazifa System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /Profile.php. The manipulation of the argument postcontent leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/nanguawuming/CVE2/blob/main/cve1.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.295145", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.295145", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.497355", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1212.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1212.json new file mode 100644 index 00000000000..f5d940c4bbe --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1212.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1212", + "sourceIdentifier": "cve@gitlab.com", + "published": "2025-02-12T15:15:18.290", + "lastModified": "2025-02-12T15:15:18.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An information disclosure vulnerability in GitLab CE/EE affecting all versions from 8.3 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to send a crafted request to a backend server to reveal sensitive information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/502196", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1244.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1244.json new file mode 100644 index 00000000000..e14dcd8e80a --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1244.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-1244", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-02-12T15:15:18.430", + "lastModified": "2025-02-12T15:15:18.430", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in the Emacs text editor. Improper handling of custom \"man\" URI schemes allows attackers to execute arbitrary shell commands by tricking users into visiting a specially crafted website or an HTTP URL with a redirect." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-1244", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345150", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23093.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23093.json index 8dc76aea79c..0ef599b55a2 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23093.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23093.json @@ -2,7 +2,7 @@ "id": "CVE-2025-23093", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-06T20:15:40.587", - "lastModified": "2025-02-11T22:15:30.427", + "lastModified": "2025-02-12T15:15:18.597", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", - "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" }, - "exploitabilityScore": 3.9, - "impactScore": 3.4 + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23798.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23798.json index 3542e2af807..a7c6563d5a8 100644 --- a/CVE-2025/CVE-2025-237xx/CVE-2025-23798.json +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23798.json @@ -2,7 +2,7 @@ "id": "CVE-2025-23798", "sourceIdentifier": "audit@patchstack.com", "published": "2025-01-22T15:15:23.873", - "lastModified": "2025-01-22T15:15:23.873", + "lastModified": "2025-02-12T16:15:45.630", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25349.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25349.json new file mode 100644 index 00000000000..c614d2115c1 --- /dev/null +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25349.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25349", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T16:15:46.323", + "lastModified": "2025-02-12T16:15:46.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPGurukul Daily Expense Tracker System v1.1 is vulnerable to SQL Injection in /dets/add-expense.php via the costitem parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/vkcyberexpert/CVE-Writeup/blob/main/PHPGurukul/Daily%20Expense%20Tracker%20System/SQL%20Injection%20item%20add-expense%20costitem%20parameter.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25351.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25351.json new file mode 100644 index 00000000000..3324aa69d28 --- /dev/null +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25351.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25351", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-12T16:15:46.453", + "lastModified": "2025-02-12T16:15:46.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPGurukul Daily Expense Tracker System v1.1 is vulnerable to SQL Injection in /dets/add-expense.php via the dateexpense parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/vkcyberexpert/CVE-Writeup/blob/main/PHPGurukul/Daily%20Expense%20Tracker%20System/SQL%20Injection%20dateexpense%20daily%20expense.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26344.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26344.json index 012545806e5..2cec75f4cb4 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26344.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26344.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26344", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:34.273", - "lastModified": "2025-02-12T14:15:34.273", + "lastModified": "2025-02-12T15:15:18.757", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-263xx/CVE-2025-26345.json b/CVE-2025/CVE-2025-263xx/CVE-2025-26345.json index 8eec1627a85..f45753ec8ef 100644 --- a/CVE-2025/CVE-2025-263xx/CVE-2025-26345.json +++ b/CVE-2025/CVE-2025-263xx/CVE-2025-26345.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26345", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2025-02-12T14:15:34.407", - "lastModified": "2025-02-12T14:15:34.407", + "lastModified": "2025-02-12T15:15:18.930", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "references": [ diff --git a/README.md b/README.md index 19cdd4bdd84..9077f45a28b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-12T15:01:51.308621+00:00 +2025-02-12T17:00:21.136541+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-12T14:59:58.097000+00:00 +2025-02-12T16:59:46.897000+00:00 ``` ### Last Data Feed Release @@ -33,64 +33,63 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -281043 +281062 ``` ### CVEs added in the last Commit -Recently added CVEs: `57` +Recently added CVEs: `19` -- [CVE-2025-26354](CVE-2025/CVE-2025-263xx/CVE-2025-26354.json) (`2025-02-12T14:15:35.727`) -- [CVE-2025-26355](CVE-2025/CVE-2025-263xx/CVE-2025-26355.json) (`2025-02-12T14:15:35.870`) -- [CVE-2025-26356](CVE-2025/CVE-2025-263xx/CVE-2025-26356.json) (`2025-02-12T14:15:36.017`) -- [CVE-2025-26357](CVE-2025/CVE-2025-263xx/CVE-2025-26357.json) (`2025-02-12T14:15:36.160`) -- [CVE-2025-26358](CVE-2025/CVE-2025-263xx/CVE-2025-26358.json) (`2025-02-12T14:15:36.297`) -- [CVE-2025-26359](CVE-2025/CVE-2025-263xx/CVE-2025-26359.json) (`2025-02-12T14:15:36.437`) -- [CVE-2025-26360](CVE-2025/CVE-2025-263xx/CVE-2025-26360.json) (`2025-02-12T14:15:36.577`) -- [CVE-2025-26361](CVE-2025/CVE-2025-263xx/CVE-2025-26361.json) (`2025-02-12T14:15:36.717`) -- [CVE-2025-26362](CVE-2025/CVE-2025-263xx/CVE-2025-26362.json) (`2025-02-12T14:15:36.847`) -- [CVE-2025-26363](CVE-2025/CVE-2025-263xx/CVE-2025-26363.json) (`2025-02-12T14:15:36.983`) -- [CVE-2025-26364](CVE-2025/CVE-2025-263xx/CVE-2025-26364.json) (`2025-02-12T14:15:37.123`) -- [CVE-2025-26365](CVE-2025/CVE-2025-263xx/CVE-2025-26365.json) (`2025-02-12T14:15:37.267`) -- [CVE-2025-26366](CVE-2025/CVE-2025-263xx/CVE-2025-26366.json) (`2025-02-12T14:15:37.397`) -- [CVE-2025-26367](CVE-2025/CVE-2025-263xx/CVE-2025-26367.json) (`2025-02-12T14:15:37.533`) -- [CVE-2025-26368](CVE-2025/CVE-2025-263xx/CVE-2025-26368.json) (`2025-02-12T14:15:37.660`) -- [CVE-2025-26369](CVE-2025/CVE-2025-263xx/CVE-2025-26369.json) (`2025-02-12T14:15:37.800`) -- [CVE-2025-26370](CVE-2025/CVE-2025-263xx/CVE-2025-26370.json) (`2025-02-12T14:15:37.940`) -- [CVE-2025-26371](CVE-2025/CVE-2025-263xx/CVE-2025-26371.json) (`2025-02-12T14:15:38.077`) -- [CVE-2025-26372](CVE-2025/CVE-2025-263xx/CVE-2025-26372.json) (`2025-02-12T14:15:38.227`) -- [CVE-2025-26373](CVE-2025/CVE-2025-263xx/CVE-2025-26373.json) (`2025-02-12T14:15:38.360`) -- [CVE-2025-26374](CVE-2025/CVE-2025-263xx/CVE-2025-26374.json) (`2025-02-12T14:15:38.500`) -- [CVE-2025-26375](CVE-2025/CVE-2025-263xx/CVE-2025-26375.json) (`2025-02-12T14:15:38.633`) -- [CVE-2025-26376](CVE-2025/CVE-2025-263xx/CVE-2025-26376.json) (`2025-02-12T14:15:38.777`) -- [CVE-2025-26377](CVE-2025/CVE-2025-263xx/CVE-2025-26377.json) (`2025-02-12T14:15:38.933`) -- [CVE-2025-26378](CVE-2025/CVE-2025-263xx/CVE-2025-26378.json) (`2025-02-12T14:15:39.163`) +- [CVE-2024-11343](CVE-2024/CVE-2024-113xx/CVE-2024-11343.json) (`2025-02-12T16:15:39.100`) +- [CVE-2024-12251](CVE-2024/CVE-2024-122xx/CVE-2024-12251.json) (`2025-02-12T15:15:12.370`) +- [CVE-2024-12379](CVE-2024/CVE-2024-123xx/CVE-2024-12379.json) (`2025-02-12T15:15:12.707`) +- [CVE-2024-12629](CVE-2024/CVE-2024-126xx/CVE-2024-12629.json) (`2025-02-12T16:15:39.810`) +- [CVE-2024-54160](CVE-2024/CVE-2024-541xx/CVE-2024-54160.json) (`2025-02-12T15:15:15.050`) +- [CVE-2024-9870](CVE-2024/CVE-2024-98xx/CVE-2024-9870.json) (`2025-02-12T16:15:42.563`) +- [CVE-2025-0332](CVE-2025/CVE-2025-03xx/CVE-2025-0332.json) (`2025-02-12T16:15:42.703`) +- [CVE-2025-0376](CVE-2025/CVE-2025-03xx/CVE-2025-0376.json) (`2025-02-12T15:15:15.477`) +- [CVE-2025-0516](CVE-2025/CVE-2025-05xx/CVE-2025-0516.json) (`2025-02-12T16:15:42.883`) +- [CVE-2025-0556](CVE-2025/CVE-2025-05xx/CVE-2025-0556.json) (`2025-02-12T16:15:43.030`) +- [CVE-2025-1042](CVE-2025/CVE-2025-10xx/CVE-2025-1042.json) (`2025-02-12T15:15:16.230`) +- [CVE-2025-1202](CVE-2025/CVE-2025-12xx/CVE-2025-1202.json) (`2025-02-12T15:15:17.920`) +- [CVE-2025-1206](CVE-2025/CVE-2025-12xx/CVE-2025-1206.json) (`2025-02-12T15:15:18.093`) +- [CVE-2025-1207](CVE-2025/CVE-2025-12xx/CVE-2025-1207.json) (`2025-02-12T16:15:44.393`) +- [CVE-2025-1208](CVE-2025/CVE-2025-12xx/CVE-2025-1208.json) (`2025-02-12T16:15:44.613`) +- [CVE-2025-1212](CVE-2025/CVE-2025-12xx/CVE-2025-1212.json) (`2025-02-12T15:15:18.290`) +- [CVE-2025-1244](CVE-2025/CVE-2025-12xx/CVE-2025-1244.json) (`2025-02-12T15:15:18.430`) +- [CVE-2025-25349](CVE-2025/CVE-2025-253xx/CVE-2025-25349.json) (`2025-02-12T16:15:46.323`) +- [CVE-2025-25351](CVE-2025/CVE-2025-253xx/CVE-2025-25351.json) (`2025-02-12T16:15:46.453`) ### CVEs modified in the last Commit -Recently modified CVEs: `20` +Recently modified CVEs: `101` -- [CVE-2022-23439](CVE-2022/CVE-2022-234xx/CVE-2022-23439.json) (`2025-02-12T13:39:42.107`) -- [CVE-2024-21890](CVE-2024/CVE-2024-218xx/CVE-2024-21890.json) (`2025-02-12T14:59:58.097`) -- [CVE-2025-20881](CVE-2025/CVE-2025-208xx/CVE-2025-20881.json) (`2025-02-12T13:42:58.443`) -- [CVE-2025-20882](CVE-2025/CVE-2025-208xx/CVE-2025-20882.json) (`2025-02-12T13:43:13.267`) -- [CVE-2025-20883](CVE-2025/CVE-2025-208xx/CVE-2025-20883.json) (`2025-02-12T13:43:37.743`) -- [CVE-2025-20884](CVE-2025/CVE-2025-208xx/CVE-2025-20884.json) (`2025-02-12T13:44:06.350`) -- [CVE-2025-20885](CVE-2025/CVE-2025-208xx/CVE-2025-20885.json) (`2025-02-12T13:45:19.913`) -- [CVE-2025-20886](CVE-2025/CVE-2025-208xx/CVE-2025-20886.json) (`2025-02-12T13:45:48.443`) -- [CVE-2025-20887](CVE-2025/CVE-2025-208xx/CVE-2025-20887.json) (`2025-02-12T13:46:17.187`) -- [CVE-2025-20888](CVE-2025/CVE-2025-208xx/CVE-2025-20888.json) (`2025-02-12T13:46:35.857`) -- [CVE-2025-20889](CVE-2025/CVE-2025-208xx/CVE-2025-20889.json) (`2025-02-12T13:46:49.193`) -- [CVE-2025-20890](CVE-2025/CVE-2025-208xx/CVE-2025-20890.json) (`2025-02-12T13:47:05.413`) -- [CVE-2025-20891](CVE-2025/CVE-2025-208xx/CVE-2025-20891.json) (`2025-02-12T13:47:21.220`) -- [CVE-2025-20892](CVE-2025/CVE-2025-208xx/CVE-2025-20892.json) (`2025-02-12T13:47:40.283`) -- [CVE-2025-20893](CVE-2025/CVE-2025-208xx/CVE-2025-20893.json) (`2025-02-12T13:48:39.090`) -- [CVE-2025-20904](CVE-2025/CVE-2025-209xx/CVE-2025-20904.json) (`2025-02-12T13:48:47.607`) -- [CVE-2025-20905](CVE-2025/CVE-2025-209xx/CVE-2025-20905.json) (`2025-02-12T13:49:26.310`) -- [CVE-2025-20907](CVE-2025/CVE-2025-209xx/CVE-2025-20907.json) (`2025-02-12T13:49:49.460`) -- [CVE-2025-21135](CVE-2025/CVE-2025-211xx/CVE-2025-21135.json) (`2025-02-12T13:38:26.103`) -- [CVE-2025-22936](CVE-2025/CVE-2025-229xx/CVE-2025-22936.json) (`2025-02-12T14:15:33.187`) +- [CVE-2024-34370](CVE-2024/CVE-2024-343xx/CVE-2024-34370.json) (`2025-02-12T15:42:09.867`) +- [CVE-2024-3460](CVE-2024/CVE-2024-34xx/CVE-2024-3460.json) (`2025-02-12T15:36:15.813`) +- [CVE-2024-3461](CVE-2024/CVE-2024-34xx/CVE-2024-3461.json) (`2025-02-12T15:37:59.677`) +- [CVE-2024-3943](CVE-2024/CVE-2024-39xx/CVE-2024-3943.json) (`2025-02-12T16:26:27.347`) +- [CVE-2024-3945](CVE-2024/CVE-2024-39xx/CVE-2024-3945.json) (`2025-02-12T16:26:04.993`) +- [CVE-2024-3946](CVE-2024/CVE-2024-39xx/CVE-2024-3946.json) (`2025-02-12T16:25:25.547`) +- [CVE-2024-3947](CVE-2024/CVE-2024-39xx/CVE-2024-3947.json) (`2025-02-12T16:23:45.067`) +- [CVE-2024-4317](CVE-2024/CVE-2024-43xx/CVE-2024-4317.json) (`2025-02-12T16:17:31.043`) +- [CVE-2024-4422](CVE-2024/CVE-2024-44xx/CVE-2024-4422.json) (`2025-02-12T16:29:48.533`) +- [CVE-2024-4426](CVE-2024/CVE-2024-44xx/CVE-2024-4426.json) (`2025-02-12T16:29:15.587`) +- [CVE-2024-4427](CVE-2024/CVE-2024-44xx/CVE-2024-4427.json) (`2025-02-12T16:28:31.400`) +- [CVE-2024-54909](CVE-2024/CVE-2024-549xx/CVE-2024-54909.json) (`2025-02-12T15:15:15.220`) +- [CVE-2024-54916](CVE-2024/CVE-2024-549xx/CVE-2024-54916.json) (`2025-02-12T16:15:42.160`) +- [CVE-2024-57000](CVE-2024/CVE-2024-570xx/CVE-2024-57000.json) (`2025-02-12T16:15:42.317`) +- [CVE-2025-0506](CVE-2025/CVE-2025-05xx/CVE-2025-0506.json) (`2025-02-12T15:15:15.613`) +- [CVE-2025-1183](CVE-2025/CVE-2025-11xx/CVE-2025-1183.json) (`2025-02-12T15:15:16.520`) +- [CVE-2025-1184](CVE-2025/CVE-2025-11xx/CVE-2025-1184.json) (`2025-02-12T15:15:16.723`) +- [CVE-2025-1185](CVE-2025/CVE-2025-11xx/CVE-2025-1185.json) (`2025-02-12T15:15:16.917`) +- [CVE-2025-1186](CVE-2025/CVE-2025-11xx/CVE-2025-1186.json) (`2025-02-12T15:15:17.140`) +- [CVE-2025-1188](CVE-2025/CVE-2025-11xx/CVE-2025-1188.json) (`2025-02-12T15:15:17.407`) +- [CVE-2025-1197](CVE-2025/CVE-2025-11xx/CVE-2025-1197.json) (`2025-02-12T15:15:17.670`) +- [CVE-2025-23093](CVE-2025/CVE-2025-230xx/CVE-2025-23093.json) (`2025-02-12T15:15:18.597`) +- [CVE-2025-23798](CVE-2025/CVE-2025-237xx/CVE-2025-23798.json) (`2025-02-12T16:15:45.630`) +- [CVE-2025-26344](CVE-2025/CVE-2025-263xx/CVE-2025-26344.json) (`2025-02-12T15:15:18.757`) +- [CVE-2025-26345](CVE-2025/CVE-2025-263xx/CVE-2025-26345.json) (`2025-02-12T15:15:18.930`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 0430b402d22..f28f1c203b7 100644 --- a/_state.csv +++ b/_state.csv @@ -152550,7 +152550,7 @@ CVE-2020-1967,0,0,9ec23729b1dc39221d1091ee477697472a019d1ed969dfd8fdfdcaa5e626c3 CVE-2020-19670,0,0,2161e4a21f3ac2b81dbdae55ce7ee3c65f8a54f8a55de9ac9adaa2f3e2cecd29,2024-11-21T05:09:18.787000 CVE-2020-19672,0,0,478a2fab4de1bf97e06779751f54c11c30f6f4287ef0113647c8dba7b14ef9ea,2024-11-21T05:09:18.930000 CVE-2020-19676,0,0,4c4184f77cbb374cf3fac913100af7a99db8235fb57378a0fbf04d7db88c5259,2024-11-21T05:09:19.070000 -CVE-2020-19678,0,0,9f68400e3916611af93f49961607473ddaf94aa08a80481f68424dd910d96089,2024-11-21T05:09:19.213000 +CVE-2020-19678,0,1,edf7f0ec3186d7a70404f6ca5b37d9814c1cada800c7098b8af18090766ac193,2025-02-12T16:15:31.977000 CVE-2020-1968,0,0,8dd45388ec44ac321a681ada3d189da03e0f02708f423eea3f20161ccd817fa6,2024-11-21T05:11:45.367000 CVE-2020-19682,0,0,de66eb60c1808d6e5a0bb64c9eacab68989f40295ec6db0a880e367b55f61674,2024-11-21T05:09:19.373000 CVE-2020-19683,0,0,cc3ef760683550ca9495211e2f4f0c869863e6903472df986067de653efaf561,2024-11-21T05:09:19.530000 @@ -158131,7 +158131,7 @@ CVE-2020-3428,0,0,1d203dfb64afc88635ecdea956d4e399018ec66b0845e3a3c519582ad91af9 CVE-2020-3429,0,0,101e53f438fdaab4d8036c36641c0ed4e00559faf42044f1ad2ece55c0b4650a,2024-11-21T05:31:03.167000 CVE-2020-3430,0,0,98eeb5229dfeae10e40545efe1765338b1e8931dcbdcc810929adf0530704da8,2024-11-21T05:31:03.293000 CVE-2020-3431,0,0,cd6d3bac32cfd8857a644f1078f419fb235151f316f0943be1e4e9e1b0583c53,2024-11-18T17:11:17.393000 -CVE-2020-3432,0,0,9b69615c3842cce8448bfa4502eb2b040fae2656051ffa06bd712b3dcf30a12d,2025-02-12T00:15:07.670000 +CVE-2020-3432,0,1,d412eb5285fce19b5be4c24fe9afbd23141c78b30a40e65a3645d0c49b8256ad,2025-02-12T15:15:10.460000 CVE-2020-3433,0,0,0e0fb5bb51a05c6c75a030d839f72e158a7c69e2a7cb7718d94fd50b680f41ff,2024-11-21T05:31:03.480000 CVE-2020-3434,0,0,c8995b33bcde31c655667c0230d7d58e1c0dd14cc20aaace02cd27edf751de36,2024-11-21T05:31:03.617000 CVE-2020-3435,0,0,42896a56717af6cb678dbb4889e2a239138d23b959eef5d7c82a355eef30417a,2024-11-21T05:31:03.753000 @@ -158946,11 +158946,11 @@ CVE-2020-36065,0,0,36cafc2b7b41c95eca0119f13bcc706947d3ae310a9bded6797e87ab10dbb CVE-2020-36066,0,0,974012e7f4cd6c05a726bca33784345eb95e8c7ffd9bbeaa1a2138f1037c6009,2024-11-21T05:28:43.150000 CVE-2020-36067,0,0,89b7cf9d7124b10737712c705b84fd3e805dce1779bd6505930513f2364b9f9e,2024-11-21T05:28:43.320000 CVE-2020-36070,0,0,5161892d1ed961f9619de603debf1cb6d65d645fe3ba70d1237fe172dedd8b9e,2025-02-03T17:15:11.693000 -CVE-2020-36071,0,0,cacbea5b3eabfe24a7a57a86a9b4ee200a0d36c4df1b0eeb10b0a9fe8791e379,2024-11-21T05:28:43.697000 -CVE-2020-36072,0,0,2207afbcd25cb1799eaca83666ae135bef4fcd52cf306bade539f9504244c527,2024-11-21T05:28:43.910000 +CVE-2020-36071,0,1,dc346b43cc07612947c608efccccfe6d65b06608a93037c598f42bc3540e4c0e,2025-02-12T16:15:32.337000 +CVE-2020-36072,0,1,47de15fba14a4fad3914acbdf2b2470a99ad505464318df6e6f8f6ec42f6e942,2025-02-12T16:15:32.520000 CVE-2020-36073,0,0,8d73ea235b937c80f022f14872cb81c1863d61c4ee218db0bb4a6e59bfb0063d,2025-02-11T20:15:30.403000 -CVE-2020-36074,0,0,88dff016ec877e6d3f7a83cfb5fa17ab15d453d5ba227447d7e349ed57059a64,2024-11-21T05:28:44.210000 -CVE-2020-36077,0,0,bb319e2884ff7716108fb63b33b10385bec03b4870ffec9e65c17731177b1f7b,2024-11-21T05:28:44.360000 +CVE-2020-36074,0,1,d205b675a3efe7e7fb1b1e1c476ca7d6a3001fa79a7fc0b5a6b197c571eea3d6,2025-02-12T16:15:32.700000 +CVE-2020-36077,0,1,c240000e69b4f06b68caa6416f5238ea39ea02d91ef33b4b6d596448ad0aa246,2025-02-12T15:15:09.483000 CVE-2020-36079,0,0,230b6994faf4d070027f0fa1f6a4a9c852d30612849d7686d59f6cb4641b67dc,2024-11-21T05:28:44.537000 CVE-2020-36082,0,0,6ec0c94eb23b0553d02910ab3688c529fc1c8e8fabff9d4e2868532cbe311ae3,2024-11-21T05:28:44.733000 CVE-2020-36084,0,0,bbb5fb1b641a03bae0a01b445a9c084ae4812633cffc67513679ede67a5bf67e,2025-02-06T16:15:28.517000 @@ -186534,7 +186534,7 @@ CVE-2021-45980,0,0,f8f2f37f4a6203ec70045d070925b72d05a11e390af6d97d4dd6909f02232 CVE-2021-45981,0,0,3fb61d192fcdf03c4e482a6f480291b6b4cf6a1c6b5f0d96897a2b2f98863b60,2024-11-21T06:33:25.317000 CVE-2021-45982,0,0,722f12ed419e6b40ff534e919992de734fcef2d85f76ef61756675a8abe7c7d3,2024-11-21T06:33:25.463000 CVE-2021-45983,0,0,27e69690d9d191816bcb545e6e4d4a356487e88778575d5d79ed848c0882fc5f,2024-11-21T06:33:25.603000 -CVE-2021-45985,0,0,7a596c549d4752b09d6a853116070ae95fd947c5de3a1fc1e9fed78bd31cbdb1,2024-11-21T06:33:25.743000 +CVE-2021-45985,0,1,a6f49e1af84b57e32c9f150a01af30fb8164f87fad5eff331b1e0b676337f5e1,2025-02-12T16:15:33 CVE-2021-45986,0,0,07cb2076c889a9f5cc47d30541cc529afb9f9df95b088a267f0c6d85b5b0700a,2024-11-21T06:33:25.893000 CVE-2021-45987,0,0,6146314797d834f557e34fc5c76cfc65c1d92bfd05de0b9af25f579274408f1c,2024-11-21T06:33:26.037000 CVE-2021-45988,0,0,d33f41dcca6a050503a5a3cda9ca5b8a9efe656b8feea1e4d2c29dee75e79cfd,2024-11-21T06:33:26.180000 @@ -192996,7 +192996,7 @@ CVE-2022-23434,0,0,3dc3dcfab060966d4ee5730ecc3968c62af77fd3914b7b88f24d05aeb1c52 CVE-2022-23435,0,0,bbc2fa491afdf27dcea833104c1712ef1a9af57671ef24fe139f90482bfe982f,2024-11-21T06:48:33.113000 CVE-2022-23437,0,0,46a7eb8a60ec3c48463c4980ec56bd032a751d98dc658c7d9a2007c5b118554e,2024-11-21T06:48:33.283000 CVE-2022-23438,0,0,27feabfcd8a11bb61133f497f37b040b226fa91f757689bbcefe4c666d27dfd0,2024-11-21T06:48:33.510000 -CVE-2022-23439,0,1,53a76e6406ebad55edfdc728cda97c34b5435a52c53dbb82efbdc5c8d678d8eb,2025-02-12T13:39:42.107000 +CVE-2022-23439,0,0,53a76e6406ebad55edfdc728cda97c34b5435a52c53dbb82efbdc5c8d678d8eb,2025-02-12T13:39:42.107000 CVE-2022-2344,0,0,6c243d20bbc7d779a6affd8aab92c8686492301e0bdb51c94b7832d826811099,2024-11-21T07:00:48.653000 CVE-2022-23440,0,0,c3f782ea02c313f0bbf86b9e35066960c1ca64ab9241240514e4d62cafdaa1c6,2024-11-21T06:48:33.670000 CVE-2022-23441,0,0,80ac54c9035b8a7c3e8a34006708493401d3cfc3100af1e79056564ef5f7095d,2024-11-21T06:48:33.810000 @@ -200040,7 +200040,7 @@ CVE-2022-31795,0,0,e87150b97c1595f70c15af39b375b9e3a356b56a2e94be20560be511f6e8d CVE-2022-31796,0,0,14e0f1b4cee5370b95f4e2647aeeffe69e5474ef0322e9f54b5182239dbd3879,2024-11-21T07:05:20.900000 CVE-2022-31798,0,0,e549cf30b2c66e83ee0fcd8c913e23d35c726aceb746d6eb9a6de0bb4572e411,2024-11-21T07:05:21.057000 CVE-2022-31799,0,0,b267b7ae01f62f80ffb0216b260fd93dca79abaa52716c5b918a57dad17ae0e3,2024-11-21T07:05:21.203000 -CVE-2022-3180,0,0,9b35ba0c8e91d5bbc9cc0d3deaf0760c56ca1109d9287bdd66ac13c67733e9a8,2025-02-11T22:15:24.180000 +CVE-2022-3180,0,1,7d81fc2d23e606d5a8f406e42f7f0265ed720114cb86bd78ec1b913d812bbc3f,2025-02-12T15:15:10.730000 CVE-2022-31800,0,0,6db4ef6ef8456fee479b75712875c618f6bf7e29ea191a42b8cb2155d6ab01f6,2024-11-21T07:05:21.370000 CVE-2022-31801,0,0,15a9fabf68274e7f2ba1fa15bae069bfe9e501270dca5df64319063297383989,2024-11-21T07:05:21.537000 CVE-2022-31802,0,0,930da7f9507ef8219beb1bd2fd7f97d299cec36695d5708783a3954bd5782360,2024-11-21T07:05:21.673000 @@ -200655,7 +200655,7 @@ CVE-2022-32595,0,0,acf1a9a19bfa61f57216d13ee96ed6e569cdc6e3b45206b8d78af1fca01a6 CVE-2022-32596,0,0,8d52ca4c1356aa2f18081d05df6c1a93ae21746b637421f4fa972d1ad3ab8073,2024-11-21T07:06:42.370000 CVE-2022-32597,0,0,c646ebd37548c9e9d77727cd02599ecb1a470c2cda2b98f6b13eac49ef555017,2024-11-21T07:06:42.500000 CVE-2022-32598,0,0,2841e560a3eff3784e68801643c17ac58aeb4121f4360c1cc0d68131c7e6f7ee,2024-11-21T07:06:42.643000 -CVE-2022-32599,0,0,7d141f2f6f0cc94ab89d6715a290eef2e5a9a605471c76dd5b9d47b6427a5ecd,2024-11-21T07:06:42.767000 +CVE-2022-32599,0,1,1f9ca761050cbfae01bd6b6ede1956b8629014f8c21d8160af6f67be08dfa23c,2025-02-12T16:15:33.257000 CVE-2022-3260,0,0,5f8e39b4c19d0605e8384f7a5f71b1e8f7050c3ec091c9f93169a46e92517323,2024-11-21T07:19:09.900000 CVE-2022-32601,0,0,a4d37317c0c125cd86271f6dc54b76b52ab410d0f09116b183eab8e03c79de8c,2024-11-21T07:06:42.913000 CVE-2022-32602,0,0,3d05011bf9f097860d6399278b4268095363d044909efd60f2c47e4265dbfbd5,2024-11-21T07:06:43.043000 @@ -208393,7 +208393,7 @@ CVE-2022-42446,0,0,42971664056387c462ee497f548a6df2aa4c23ac4c265a4511e389c929317 CVE-2022-42447,0,0,f7ef42af5c8cacb5fc0ea44780f55cb655e5af2c0cb4eb0afa493b27973c84d4,2024-11-21T07:24:59.133000 CVE-2022-4245,0,0,7305d9be07f9487c1c925b80efa0a1de65c9ce2ebf2d82dff49a350744824522,2024-11-21T07:34:51.700000 CVE-2022-42451,0,0,fac5780b2589fa4e5302e0f3e43b95825686711085e3865819f7625dc438191a,2024-11-21T07:24:59.253000 -CVE-2022-42452,0,0,577eab85a30a249f4e7ad7c53a1f80c16b5910ec4bf01284c234177fac1b2533,2024-11-21T07:24:59.450000 +CVE-2022-42452,0,1,4ae9a6da3248cc6cafa82d3fd707633ac3bc6886f08fe893b6abcd86f029c3f8,2025-02-12T15:15:10.903000 CVE-2022-42453,0,0,6efb2f3324a4ebb1a36d6eb4c118e6f5231faa0d0a3a0599ef663f4876b97dba,2024-11-21T07:24:59.570000 CVE-2022-42454,0,0,dc1c2309d8e52319695997954620c1223cab3041e006ca32b24e1b7568ef7ef5,2024-11-21T07:24:59.690000 CVE-2022-42455,0,0,badf4c23d6df82d324228f5c766d47f3602caca1944541d277c3e4fcc1e01ca4,2024-11-21T07:24:59.813000 @@ -211447,7 +211447,7 @@ CVE-2022-46771,0,0,e308702c33951cef86466c282c34e1181461d2bb96e55f9f561ffc5dafacd CVE-2022-46773,0,0,112a51786cdf13d9158cad82a332d5cff3510f2f906bfdaa552f009dbfab7f58,2024-11-21T07:31:01.957000 CVE-2022-46774,0,0,8de7e017c75431fee9f31bfc354280fda37c6993d65615e096ecbd0972beaaad,2024-11-21T07:31:02.107000 CVE-2022-4678,0,0,52001ae804b8f428d2f8b70574cf576158f516cd4006f670865a63bcae025ac5,2024-11-21T07:35:43.170000 -CVE-2022-46781,0,0,540958d35499a4f2bfb45db9c787d6b005d56aca93312dcd174d4ef4d9102d54,2024-11-21T07:31:02.250000 +CVE-2022-46781,0,1,62228cc8f38fe96453bb8fc7fad3a26b2677473f2ef3633b94e481524b089acb,2025-02-12T16:15:33.610000 CVE-2022-46782,0,0,83804d18333bf015864e344f6cdfe721ea90868e3b3d898827bbb4088c44ef47,2024-11-21T07:31:02.410000 CVE-2022-46783,0,0,45a54218286789c0e69cd7cbd020d6b41c963fe072d4c5980013d4c3323fd3d2,2024-11-21T07:31:02.563000 CVE-2022-46784,0,0,595755ae66baf8374b8ed12c9f84940baa92a649586445fbfa67e743c33ceed2,2024-11-21T07:31:02.727000 @@ -213957,7 +213957,7 @@ CVE-2023-0801,0,0,063d442888cfcb6c32c17c951b32ca646c408f2b7707b6358340ea4341b398 CVE-2023-0802,0,0,a0c0edc4970f5885409257e4b4c09fdc33b13dfdf517ca5c3e3ad9766499521f,2024-11-21T07:37:51.953000 CVE-2023-0803,0,0,6f4843b90310d3e74b2af185dd3f795e521dacf1b741c4dcc9216b5b77e8fe4e,2024-11-21T07:37:52.080000 CVE-2023-0804,0,0,4940bd10c9fb71770cfa170825223e709f4587d6fa98d8e2a2f5b0f4e312eedb,2024-11-21T07:37:52.203000 -CVE-2023-0805,0,0,d3018693d28b8286c4135212df2088c628fc3f72ad43303ef9733ef2db8fd3b4,2024-11-21T07:37:52.330000 +CVE-2023-0805,0,1,75614ad83ec01ebbf0b764d89e209da063dd1a80aebb21e97c589c9e711702ab,2025-02-12T16:15:34.123000 CVE-2023-0808,0,0,e85707e51b510e300366f58c6e01e5711ef161400e45bcc32bfc9bea6e14600b,2024-11-21T07:37:52.447000 CVE-2023-0809,0,0,ae5a66aa2d6f72e22dc793e86d3ac5a2a55c6b042b5824ab8dfd6f2d382dbe8f,2024-11-21T07:37:52.583000 CVE-2023-0810,0,0,54b05e186b1588a087cfe5dfe73312fe8ee9efc7a5bfd67a62f15cb94fef6fe9,2024-11-21T07:37:52.730000 @@ -214637,7 +214637,7 @@ CVE-2023-1516,0,0,54b45e15af970c41acd50b1a625c6f02df63d0d269668fdc1904c4c8e67698 CVE-2023-1517,0,0,02fd45c004ce1dc186b6d78aba8065b11fafc69073345d494eee2f8c98d96331,2024-11-21T07:39:21.180000 CVE-2023-1518,0,0,ff3bd1f1ef00c796b224d4b61b33ff6fd65f18a15330b54fd64399e65722958d,2024-11-21T07:39:21.297000 CVE-2023-1521,0,0,34ba7a16607d114cc465c9eda0277be53b7130d5847ae48ed5169503b7db47b0,2024-11-26T21:15:04.650000 -CVE-2023-1522,0,0,070dcf9d4bee913fff5d64a61e497177354768261de777323e89038b498e33ff,2024-11-21T07:39:21.427000 +CVE-2023-1522,0,1,81c42717bcdd0263fae8da95cd7975f6bc9fb3e662f1a3fe30a2965d81880e3b,2025-02-12T16:15:34.290000 CVE-2023-1523,0,0,e33d8037be249eb9c37a3baeaa357b5ce6cf643d512a05007dcdf784033b647c,2024-11-21T07:39:21.537000 CVE-2023-1524,0,0,f8b678f6be7ad1e8e7316c0ff029f2f0b1c061101505f9c1a3fb4ce2fdbd092d,2025-01-10T21:15:10.800000 CVE-2023-1525,0,0,87c70f3d61d61d75374dcd01bd6c995692b55b602d7e76a135e18fad1943c07f,2025-01-30T15:15:12.910000 @@ -214954,7 +214954,7 @@ CVE-2023-1851,0,0,f44f3f6504309385b4f8263763fcf7917371182c1b2db3b4c2e573863bb2de CVE-2023-1852,0,0,e765cf67395341f70bdd2c4eb9da5bf2e504c47d0b4788feae1083a580f83929,2024-11-21T07:40:01.360000 CVE-2023-1853,0,0,d7b0c11db155bafedd6ba2bf77404a33ab2b9b348bef98cdd50d598060c449a2,2024-11-21T07:40:01.480000 CVE-2023-1854,0,0,fb020e9221103020085ff3c7b993d52f2feb73032275d0b52a285404e7a10412,2024-11-21T07:40:01.610000 -CVE-2023-1855,0,0,95dc2cd0ab274ce06bf829b16b7b6f258dbfed2a293bf5879778f622ab9a890f,2024-11-21T07:40:01.733000 +CVE-2023-1855,0,1,a64a2ebfa7264eafd94e32382791f28346056726a93ae7e51f3bec555345fe20,2025-02-12T16:15:34.520000 CVE-2023-1856,0,0,f9af566e702d56338edf59b53bb8cfdccbf57fc3c827d54a91dde61961df4300,2024-11-21T07:40:01.847000 CVE-2023-1857,0,0,55cb03a7a1032c1834395536b9eba3913167eecde95bdd4c2ae2f2b93e3dcf21,2024-11-21T07:40:01.977000 CVE-2023-1858,0,0,df7325c01a486bc312639bb1f615f6ac0a26c25e7b26e6a183a5620e96094aac,2024-11-21T07:40:02.093000 @@ -215551,18 +215551,18 @@ CVE-2023-20670,0,0,e4e5ee151777987fef7de5981cab53d63b02c8c02f20668d5ebefff86242e CVE-2023-20673,0,0,29bae4906ec7c96c77c7c09aecc0e7fb7f495988834a892b933466c096361071,2025-01-24T17:15:09.203000 CVE-2023-20674,0,0,eb2146b7419e33779b6b00f43b6162659ce687b1b5ecf2b1d3b2ee2893270957,2024-11-21T07:41:19.830000 CVE-2023-20675,0,0,91492ea9a54e1bfc3d79a683f7dfb3a3f048f71ad7188ef164f152ebe8298300,2024-11-21T07:41:19.950000 -CVE-2023-20676,0,0,57ebf27440c8ce41ba6129a4fb74ae61cf5eb4cd96f4cc80a46de05aee46574d,2024-11-21T07:41:20.067000 +CVE-2023-20676,0,1,cac9e70e0811c0897af0048c023485fdde33f6815ec767fbb24f9b47cc3533c3,2025-02-12T16:15:35 CVE-2023-20677,0,0,16defb5b1d67b70811af504802d85fb22e6e7dc792efd018cc72d13dbf886b31,2024-11-21T07:41:20.183000 -CVE-2023-20679,0,0,ec6255e8a9edb3e0673d8ece0389aa596801be747b87f21b6c4bfc40276f57b2,2024-11-21T07:41:20.437000 +CVE-2023-20679,0,1,bc056dc1c31fbcb599ca8278730b2a5ae7f450cce065487c52635fab0636d2ba,2025-02-12T16:15:35.183000 CVE-2023-2068,0,0,e7b98f8c9f6042c5b50a34967c2d0a821e72430aa747c353ebe3326a8c3bf3bc,2024-11-21T07:57:52.570000 -CVE-2023-20680,0,0,905b231cb035dd076e3d978e0fdd2b8cd6d94b5942a128ae1f9a0222b297509c,2024-11-21T07:41:20.577000 -CVE-2023-20681,0,0,b6bfe088122e0993f55ea3f810892878236f4c323314ad9b06704cff90177c35,2024-11-21T07:41:20.690000 -CVE-2023-20682,0,0,0dfb6fd6a6e6c64db29cb12fdc277329f8e21f21facf514e0e0746f95b55ec08,2024-11-21T07:41:20.807000 -CVE-2023-20684,0,0,7db490280567ae3003e3647467a5e0e98d87268b81dccf5c9af7f35013b4bd92,2024-11-21T07:41:20.937000 -CVE-2023-20685,0,0,f79333d461b61c1a4593b26771fd7205d6f203b7294c17fed20d6823c3e67d95,2024-11-21T07:41:21.053000 -CVE-2023-20686,0,0,4c709f6284accdb6a5b31632a67733a573a056846d15123c65fecc91f0f17100,2024-11-21T07:41:21.160000 -CVE-2023-20687,0,0,29a0d517adb9a8003d560cf0ab8ea2205614f82e040ca186509ec291c33f784f,2024-11-21T07:41:21.267000 -CVE-2023-20688,0,0,b987b9414a47993c2bec98a2fc963efd4c9790ed0736b59bc9063358cec38551,2024-11-21T07:41:21.377000 +CVE-2023-20680,0,1,d4f4a5597f43acc74f02e21723ded35721b319bb49302a4ff1ba86dca8936c7f,2025-02-12T16:15:35.410000 +CVE-2023-20681,0,1,50ef0ec0c5dea933040bd1004bcab113016efd29b9ce4dbbda0b2ae46cb37611,2025-02-12T16:15:35.610000 +CVE-2023-20682,0,1,01a27450357cf525dc5be89369f8b34439f32fcffb503cac5de40f69cd87e9bf,2025-02-12T16:15:35.787000 +CVE-2023-20684,0,1,1dac3f81ba83c8fbb47163fbb84cc7d94d40f50ad2c55406d194ec2a4751a66b,2025-02-12T16:15:35.960000 +CVE-2023-20685,0,1,f26ee39d8dfb986170a6ba9f80d8987b45c63570316dcd1706bdba49dacad3e0,2025-02-12T16:15:36.130000 +CVE-2023-20686,0,1,d26ea0d24a4041415f7d5bf58e5a211d7b3d2a86f373d888057b61092ca984e2,2025-02-12T16:15:36.297000 +CVE-2023-20687,0,1,08d50695a173c975bdae9253b6a0ef708e8b408d6a946c0b0090fc7a48ebae36,2025-02-12T16:15:36.453000 +CVE-2023-20688,0,1,6a3a1ceb78c5ad77e4c78be95c20296e80f5ec1f0be5b70885164109db058aca,2025-02-12T16:15:36.617000 CVE-2023-20689,0,0,9c580cbe89febf776e40db5d60e6c51f9520660ccc5ce54a231ee85ab0b4a4b5,2024-11-21T07:41:21.487000 CVE-2023-2069,0,0,22ec0ee46ca6b75b55a8ab1a23a2bf3fef5b82a40c0d9ee7213ce468f2d17d73,2024-11-21T07:57:52.677000 CVE-2023-20690,0,0,3d03d920a4794261460a19bd833d33829f8c890aae919b89f1565f1727ddec3d,2024-11-21T07:41:21.613000 @@ -220893,7 +220893,7 @@ CVE-2023-26984,0,0,3b99ec789769ff958d010fdceb1bb0d916624b799ff3b877ca7adbc158bf4 CVE-2023-26986,0,0,94a9ca1cf50bdd19fafa94e5e971b449f42a846e0edee43ac0ab234f9a96a360,2025-02-11T18:15:25.667000 CVE-2023-26987,0,0,7e0a4eaa4d803abc17024cde6c193682bcccb5a7d9831d5d98e1851f634d4d3c,2025-01-30T17:15:13.323000 CVE-2023-2699,0,0,1c04a3cc51ebb405d698cee0fe2e32f286ab499340c1d6cc19532b802b686fe7,2024-11-21T07:59:06.680000 -CVE-2023-26991,0,0,bc9214a7877aa8bb477fb62bafde115ab21b561f5c8b6dcb774e044fa6a65647,2024-11-21T07:52:09.787000 +CVE-2023-26991,0,1,0ad8a895e031d4c9a4158a29415ca5b8b3237fd1895d18e017bf0b3958cb796c,2025-02-12T16:15:37.270000 CVE-2023-26998,0,0,70b29c0ae973491d7cc5b4fabac39d4344cee5de103e705010b9f8f4a253d792,2024-11-21T07:52:09.940000 CVE-2023-26999,0,0,0a6e26719d32d20a55674544c2b16e84e883bad504358330da63d67239bce96a,2024-11-21T07:52:10.107000 CVE-2023-2700,0,0,39eae528fab2c9005417e2728ba40351fd5c31be39110f823a95f3ceafdaaa56,2025-01-28T17:15:14.093000 @@ -221479,9 +221479,9 @@ CVE-2023-27718,0,0,f9f4a837797e1d81adf8b6bcbef4474a17838aac87d76451895c87444b2ee CVE-2023-27719,0,0,ad9a081259e586a44857be5d7d388546cc821d3e7f94553d9b77ce9db0e15866,2024-11-21T07:53:23.200000 CVE-2023-2772,0,0,371d0f43be59cbbbe5bc16860b9cc5b542f17f9f3db2e3bda7f801dd2dd6feef,2024-11-21T07:59:15.760000 CVE-2023-27720,0,0,7f295d1ca2cdc3ba7306dfe9cf9355b6d301941a4f45d7bebd788b84514c1672,2024-11-21T07:53:23.360000 -CVE-2023-27727,0,0,7c5dd8ab562c71a9abc950cc42e94edd36a7924dd294f59ec8a20f4d6173ccfa,2024-11-21T07:53:23.520000 +CVE-2023-27727,0,1,ba79f2d98be22c1d8fa3fdfb8a2dfd0f96b4fa63a8700b953207c8c58a20d253,2025-02-12T16:15:37.670000 CVE-2023-27728,0,0,17edf59ab9dd7a355efb990d3ae4ea48939f1ba1f8b42b89a235535d7b086577,2025-02-11T20:15:32.317000 -CVE-2023-27729,0,0,abaa96238948665d743574b8ba5f15b2c7300f09389609bbade3b84769d3d276,2024-11-21T07:53:23.817000 +CVE-2023-27729,0,1,7c31b222e84fc45a91ce56ab304b7ee08f217b5898423a6f251ed647b0b72509,2025-02-12T16:15:37.867000 CVE-2023-2773,0,0,7873dd9f74ed847c32c6f25a2b1ebc492d8ca86ced180ebe78f8b36faa6bda9b,2024-11-21T07:59:15.893000 CVE-2023-27730,0,0,c2d514200981ef741f314869d376e098eba05128ef93a150340ce4fe1b36472f,2025-02-11T22:15:26.463000 CVE-2023-27733,0,0,384025e35fc12373e2b3d4230ff964fe5ec331e83aaaff69635a84e8c28228a4,2025-02-06T16:15:34.587000 @@ -222436,8 +222436,8 @@ CVE-2023-28722,0,0,0197cba368cfa8b5f792e3f581bf72641d1d1d543c23749ec06924490cb0c CVE-2023-28723,0,0,7b254bb302fbb257f66674f78765f98e600565c72f7d162513acd5e3c9ee4af5,2024-11-21T07:55:52.463000 CVE-2023-28724,0,0,ec029f8f0ff9d0f37b7397f4ba5dcd1662964a1b709eb075c5b9f55ff6a3cb18,2024-11-21T07:55:52.593000 CVE-2023-28725,0,0,0fa27e0548bbbb90f2e5f5eb34d47caf7e8ade76cd43b6a37bba438346c0424d,2024-11-21T07:55:52.713000 -CVE-2023-28726,0,0,2602588cbf3337d7c961d4c697440943029fed031a80495e36e5d51b52c29cdb,2024-11-21T07:55:52.873000 -CVE-2023-28727,0,0,6f6eee66071fa984d4e070919a7c1bbf7a9327e72415a528269051709556be49,2024-11-21T07:55:53 +CVE-2023-28726,0,1,4560c129a70424e59a9e0ec9144c7f21498c12307fd7f20d442d10065e14a6c7,2025-02-12T15:15:11.567000 +CVE-2023-28727,0,1,78378bb9aa3aaf6db5bf3c0ec59fefff29006f7f3848c76556bc4caf615c2e86,2025-02-12T15:15:11.747000 CVE-2023-28728,0,0,877a20ac4146bd2c6f7a990ad91e5f70e2fa07084297c678d945a8a8c485ba15,2024-11-21T07:55:53.123000 CVE-2023-28729,0,0,019d2dfe312886a4fa8f2fbaf9e1a5d008b33878488a7e6fef273287b7359011,2024-11-21T07:55:53.257000 CVE-2023-2873,0,0,5612e265e2326f26f39e95aa8afb6976ffa61e700ebc2177b393fb48d5a84173,2024-11-21T07:59:28.100000 @@ -223019,7 +223019,7 @@ CVE-2023-29371,0,0,191e519a42a5df41f1023bf9ae4cf5523dea74950c0461050b0eb7e4427ad CVE-2023-29372,0,0,8115b339cca23a604fd3b3fa184a2dcefdc174f8cc9dcd53bc8c9ebc153d7263,2024-11-21T07:56:57.223000 CVE-2023-29373,0,0,270d476731a85cd63c291e58603c75d0ed7fc1e9b98fefc1fc724cd6a3e371fc,2024-11-21T07:56:57.347000 CVE-2023-29374,0,0,930a115a381ce3b53d56fc0e8d7eeb8e796c5679738528df6470c841a2b982e1,2024-11-21T07:56:57.473000 -CVE-2023-29375,0,0,418a75d525bc59a552a62e3394d5f3eeba826fa75fd7504a8ad79e98dc8a19b5,2024-11-21T07:56:57.613000 +CVE-2023-29375,0,1,c36a87ce03fed844189ada2f3d0d0b6776ce936ef348695cd06b1bb92f6222f0,2025-02-12T15:15:11.883000 CVE-2023-29376,0,0,ad99879985d5998c49f5d61784393df470a8be95a8f9d2de7f2e1321481e5789,2025-02-11T16:15:38.160000 CVE-2023-2938,0,0,ae1b1490f8e930d6c1e06430e6b60a57af33e3a4cef078f1253795138e4d4a5b,2024-11-21T07:59:36.437000 CVE-2023-29380,0,0,0711eb7be4f03fd1502a0ae9c381550f4ab3a7750f4aa9a76c30fe001c8d1f3c,2025-01-13T22:15:10.087000 @@ -223031,7 +223031,7 @@ CVE-2023-29385,0,0,0a76fe10e912204db8fb1def09cf5892bbfd1c15cb925ec61b58331f8f1f4 CVE-2023-29386,0,0,9dbcee483a89d7640924a14ce24cf0453936e8e4d2dd6a554e9a3f7aebd24455,2024-11-21T07:56:58.750000 CVE-2023-29387,0,0,b2b42cc1f6d822df4705f836910d448935eaf4a8ceb20ab6177ad26d4cc36bd5,2024-11-21T07:56:58.857000 CVE-2023-29388,0,0,b9d88f91ad2e793aacf5c8e6eccf028fea7b9c2660698f7be78bc69cb90463b2,2024-11-21T07:56:58.977000 -CVE-2023-29389,0,0,c0a5bc2996fa100a5d1d4dbba184a794dfb7e1a165cf887f98ddec59042a381f,2024-11-21T07:56:59.087000 +CVE-2023-29389,0,1,7a20f34d4d19d41c0aa5342ec58350f4f3268bb0d86016daffe03f54c70bddcd,2025-02-12T16:15:38.110000 CVE-2023-2939,0,0,5097b0f3fd177e801415b54d7716f4683fb54c1157f3dcb9725b8d5f368e5323,2024-11-21T07:59:36.560000 CVE-2023-2940,0,0,7ad5423ee87e68f755e2cd74221edf5f886bdd506499833f9705f0fa2df479b6,2024-11-21T07:59:36.687000 CVE-2023-29400,0,0,1e44a659f313ac7ea2eae366c8b5a4f17b500bbe5c336da0915df4967f9eda4a,2025-01-24T17:15:12.747000 @@ -227848,12 +227848,12 @@ CVE-2023-35945,0,0,964143f928c92bea6b7339b394c3f52b183ddc8b150fc3d1b4dde8fd3c0d2 CVE-2023-35946,0,0,f9a7a11dbb78b03e3e9af373b8f4eae2a401d11e9e75c0bed6486fe6eb92eeb3,2024-11-21T08:09:02.030000 CVE-2023-35947,0,0,1b2f10faecbf42a5b4b42b5db0c4ca826cffd757e3d217eec37c341fdcafa551,2024-11-21T08:09:02.180000 CVE-2023-35948,0,0,c8f862a664d40c2c195d314a7d98cb626df5c9c3c2aa672d9ee56efd7b245dbf,2024-11-21T08:09:02.327000 -CVE-2023-35949,0,0,66ee2c6b40b3df1edcaecbdf3221af3494aabb941ea8184228cd44dc3334feef,2024-11-21T08:09:02.477000 +CVE-2023-35949,0,1,c768c27adec5e9814e887c8513014a45d398a9c8f2521b73e217b9ebe59f7b5d,2025-02-12T16:10:50.810000 CVE-2023-3595,0,0,36c3a800e2fe77bd8d7f41a96cc3e08101edb93e582c3a777dfa2342e3a7af14,2024-11-21T08:17:37.710000 -CVE-2023-35950,0,0,90290594194fdcf57df29fb26084a0668de8f8a917793eed8e02df7a2907a2bd,2024-11-21T08:09:02.610000 -CVE-2023-35951,0,0,984ef598dc520ed079095a3830dd40b2951cf5bbc3d0631e97149466849d0b83,2024-11-21T08:09:02.737000 -CVE-2023-35952,0,0,6c7c8f9d6845e2573d887ffe32c1e3bf47b296d61bb6b2b1683c217891d58de3,2024-11-21T08:09:02.853000 -CVE-2023-35953,0,0,1f28de3e4137372ac784d2fa0af42559f4684b7b6321a6eddeec99a2efcb6e86,2024-11-21T08:09:02.973000 +CVE-2023-35950,0,1,32fe81d427d9545c5db05ae8e8c747a14c859fe4fdbc76c9212e447a934d27e5,2025-02-12T16:10:35.737000 +CVE-2023-35951,0,1,bb2cd00e6e53a4fa4b70bca1be1745a8e9ebd4b81ee8591a6feb01dc9ec936d5,2025-02-12T16:10:26.800000 +CVE-2023-35952,0,1,0eefb5de35b696359d8108b296eef393f67c4d20a074ff798ba34b0b0fe26e14,2025-02-12T16:10:13.873000 +CVE-2023-35953,0,1,49750bef093443385674327f8f884405d160aa0a7257f7483e10f982a6813013,2025-02-12T16:10:01.867000 CVE-2023-35955,0,0,91c0639a971c00780cac97b1cea018d17f2e427fd30c92e0afbdf80f037bb86d,2024-11-21T08:09:03.093000 CVE-2023-35956,0,0,d0d751f39f1298fdc704a74843149c039cb5f4bceb3641e76a34a61f3d75f97a,2024-11-21T08:09:03.223000 CVE-2023-35957,0,0,e00c1e2d59bde2aa34d3bf82890a934b6edf52786a89e4243452e75601637a3a,2024-11-21T08:09:03.350000 @@ -238144,7 +238144,7 @@ CVE-2023-49465,0,0,85f592ede9e33bbd79bbd2c850aba40ba963d29628783cdd102fc10419ee9 CVE-2023-49467,0,0,ccfdd8b4b4bed01d2a5cbf227c069582268c93a046efc506e0e66499b5a09dbd,2024-11-21T08:33:26.823000 CVE-2023-49468,0,0,b78f6929ceb3a35b940d92a0df230f857ead3378adc4638a3a8041f9db0307da,2024-11-21T08:33:26.970000 CVE-2023-49469,0,0,bd35c220b2e60cc8c4e4c44e295b6d92fa6ff932fd96afabc1e9909afe53041d,2024-11-21T08:33:27.197000 -CVE-2023-4947,0,0,1a0f473e6ecd31913cab58f73b4f5a20d560b15d8ea2a5d33130927cd094fd10,2024-11-21T08:36:19.570000 +CVE-2023-4947,0,1,e478da0e9c72e386dd9d21064d784c4aa16de46cf623691aff1d52bde7ec3fce,2025-02-12T16:02:11.947000 CVE-2023-49471,0,0,b3aedcdbf5c2c22919d5fe222006e48c8c22c32d80f1490d607aa2941a69482b,2024-11-21T08:33:27.343000 CVE-2023-49473,0,0,da24daebf1eb8ea092d68cac47bc80e47b66bc61f8b5fa69cd97defcfe685aea,2024-11-21T08:33:27.510000 CVE-2023-4948,0,0,8e5e91b593e9456690177fa740ac53095abc30a31cb01c0f0f8ab9ce7fd799e7,2024-11-21T08:36:19.700000 @@ -238216,7 +238216,7 @@ CVE-2023-49595,0,0,8fc65a47793fc32f84c0a744bf297f283dd69dcc2b15136a2e2fcd19c982b CVE-2023-49598,0,0,e758410bd290a11a398e846d4228fea614a25c82ab963e99462e14bdaa9d6db8,2024-11-21T08:33:37.250000 CVE-2023-49599,0,0,d1843241f8db11fafc599c0daba9e074b74894e48b5aec8ec283f1589c2f8286,2024-11-21T08:33:37.373000 CVE-2023-4960,0,0,4efdb33cc3b8c9e490e625ca3e4a0d80c52b3418324639edab36acb9b27c0262,2024-11-21T08:36:20.780000 -CVE-2023-49600,0,0,951712f25b1807fb7cbc715d2d52f9701c28ca721304e548114ef47bfdd81cda,2024-11-21T08:33:37.493000 +CVE-2023-49600,0,1,e8cd8de4b2ab88bf4f8aa920e4b463bde1ee47923e6fd2d0106580cacd664710,2025-02-12T16:14:59.787000 CVE-2023-49602,0,0,a12c06e1c2027365532346b2edbb24aca3a0ac358acd9f611803ef679cef3d63,2024-12-16T19:59:21.097000 CVE-2023-49606,0,0,de58395e940a854debd455905f39ce7fb5cb86ec9f5107aaa70b928793a75cdb,2024-11-21T08:33:37.743000 CVE-2023-49607,0,0,c1d47d2485033d1538c7cfb6f323c8c3e048cbbcf85417d72c0ec588b46db7a8,2024-11-21T08:33:37.887000 @@ -238344,7 +238344,7 @@ CVE-2023-49777,0,0,33c519d5a7962fa4046ad12f5cca27992322c652fb741caea4eb8367807f6 CVE-2023-49778,0,0,32696ac80ddb602c52e8fe776f284fb0ae6da43b7282b564f5a7f39ba2f17407,2024-11-21T08:33:49.730000 CVE-2023-49779,0,0,208a0c4daf9d511825be4208e7428526e848b797a262491bdae905a77266c88f,2024-11-21T08:33:49.890000 CVE-2023-4978,0,0,9bf211ab4eda87736cc28a34ba658d0ccd93638d5da330e5c54fe73d74302125,2024-11-21T08:36:23.437000 -CVE-2023-49780,0,0,60daf4253794893b3ee28669d55a4025930edb13bb38438bc9caba7bc4c994a6,2025-02-12T08:15:08.013000 +CVE-2023-49780,0,1,9013e7611cf6d23bf15ff23736b8d9b70a7f33951f5ae780b13c0eab1756b4bc,2025-02-12T15:15:12.077000 CVE-2023-49781,0,0,3563f4405dfa96098f4f59027cce7c23b059b81f69ad6687b4bbd7d42605bb73,2024-11-21T08:33:50.010000 CVE-2023-49782,0,0,d88bb5846ccf235986a34db8ee7ec2e7c4f993cc0c87f8a5d3589de125363ba3,2024-11-21T08:33:50.137000 CVE-2023-49783,0,0,cd66debb4e559f3c84e5128cc8085a7de9859741fad8a54e1384a18a6f8b2960,2024-11-21T08:33:50.277000 @@ -241844,7 +241844,7 @@ CVE-2023-6529,0,0,240c5593c284be620aaef4c418f20fc5ee1fe4c5e2d8935497486f145436ed CVE-2023-6530,0,0,6f6b7111ffff4aa2a32fd22d58df5a9d56d9283836487366f9b29be0cd631a98,2024-11-21T08:44:02.440000 CVE-2023-6531,0,0,2d6149ae0c8a10dbdb11207763b3720a41951691f853d6aae900ea62fb8245ce,2024-11-21T08:44:02.570000 CVE-2023-6532,0,0,d9926ad424c052962b5b1c19ee0cd594cdb74f71af8a29a173c2e62d0ede5027,2024-11-21T08:44:02.720000 -CVE-2023-6533,0,0,2d006d29bbd723670b0cabc2a69c1bf46b544c6ac279de71bc5619fb88355cc1,2024-11-21T08:44:02.853000 +CVE-2023-6533,0,1,94b2775938efdf62fa530a653e964befea9fc91d5aced53f66c24a709c90ad33,2025-02-12T16:57:31.787000 CVE-2023-6534,0,0,6efa39132533c0da6b2d4f0f7236d9f304ec2707e39c52e825f0a23c7bae1a70,2024-11-21T08:44:02.973000 CVE-2023-6535,0,0,7ab532f096d7a5921f719ab90c9f86b6521cd0a122f9d025fec0f5e300f695b6,2024-11-21T08:44:03.110000 CVE-2023-6536,0,0,f4f5a9ce6587d2c2129ebc948c72e4e0b510fb171991480bb24165dbefca0c68,2024-11-21T08:44:03.303000 @@ -241940,7 +241940,7 @@ CVE-2023-6635,0,0,7332f0b9ee677a2d4d54f0dc110098f72c21ae565ad7df8b623a13744c7d85 CVE-2023-6636,0,0,429cb004753d2958d8159d67d03a4c3da4034ff661609c524ad4820a55c5adc8,2024-11-21T08:44:15.893000 CVE-2023-6637,0,0,658a49059cae63311affd21fa1606543afd182ef89cebe04c989e779114ea7dd,2024-11-21T08:44:16.027000 CVE-2023-6638,0,0,f3b7729d9690cdf79e7af1a70f8733fc6e0ac86a16db8e9baa0550ae1589413e,2024-11-21T08:44:16.170000 -CVE-2023-6640,0,0,95f324706b92804bc6779161d3f58c8d21d2eec67a565089a0094336e6745291,2024-11-21T08:44:16.297000 +CVE-2023-6640,0,1,4c1de3385a32f286c0b75b0b253dae7e11e4d89cf203bb099ad3f58f6c385c6a,2025-02-12T16:52:28.897000 CVE-2023-6645,0,0,18d7b1db6d45d511489f0088fbcda1d70409d9803c5553814d8e2b60fd676b42,2024-11-21T08:44:16.430000 CVE-2023-6646,0,0,43309576514af4cb07e93f126e0f158d82b8629e3c47d5943302d08d30997d61,2024-11-21T08:44:16.600000 CVE-2023-6647,0,0,780302fda21e798fe5ca06edfdf1cebf880447e49cae48df60b9306a284f29c8,2024-11-21T08:44:16.793000 @@ -243718,7 +243718,7 @@ CVE-2024-10318,0,0,bb7ee1547db7509ffde7ebdf9a352a1b73dcda716ac26150d44206d2a71e3 CVE-2024-10319,0,0,68d02b703a0a786e535b0c06357fe7c6d9a4d92b566f67658115227be405d0f3,2024-11-08T15:25:16.317000 CVE-2024-1032,0,0,c6d8d12d638c10dd834e783d36f86ba17d33a36b799d5e13aadbdfedd22b0728,2024-11-21T08:49:38.587000 CVE-2024-10320,0,0,727a463e6d691153e4adf6d21dfba57d62d85f0e63e6347b0c5272cff36a9bf2,2024-12-06T09:15:04.710000 -CVE-2024-10322,1,1,b97ea147780bf4f5de2803298ddce50d18439c23932d3e2292213faa6a401b17,2025-02-12T13:15:07.997000 +CVE-2024-10322,0,0,b97ea147780bf4f5de2803298ddce50d18439c23932d3e2292213faa6a401b17,2025-02-12T13:15:07.997000 CVE-2024-10323,0,0,74c01ce4124a9449f0a3de143c2d6269eaaed2dcc05dfdfdac09c2b033a02614,2025-02-05T17:18:49.550000 CVE-2024-10324,0,0,cfaeca60a4f0aa309330a37a66e2005b2fce423bc7c33f12b5f1c3188e784a63,2025-02-04T19:41:41.250000 CVE-2024-10325,0,0,50164109bc79e97836e82121f62c8560adaed8b05d99b6cbe7e736c6f6cb196a,2024-11-13T20:01:05.097000 @@ -244627,6 +244627,7 @@ CVE-2024-11339,0,0,79f980d1c213f37a017402750a78ab5a89012c4a7d884549e17aee2fe1c2f CVE-2024-1134,0,0,3b9e316f9f09adef1cfd4f6b3383505dbc9180172570e63197eb1d9f1f72ee08,2024-11-21T08:49:52.330000 CVE-2024-11341,0,0,fe8cd85d684fa85647e91e6c807d0d3948596661a708a57f08c30a79715842f3,2024-12-05T10:31:39.520000 CVE-2024-11342,0,0,e5c7c30c6a212e83bae351facc5b11e3c8030751d949156ac2c5ae223532d502,2024-11-26T04:15:04.030000 +CVE-2024-11343,1,1,a869a0de2f9f6fb54c13515db8faa67b688fcfdf608d6e35180cbeee3b1374a7,2025-02-12T16:15:39.100000 CVE-2024-11348,0,0,ba9d86f6b53ac054d57d01c4d74e28819553b70bfa2bfa989e191e835487e4ec,2025-01-27T14:15:27.973000 CVE-2024-11349,0,0,3a64113bc68757a74fb5a818e6ed9b7f5872b000d4a6ffe30b5a9251cc55ef53,2024-12-21T05:15:07.017000 CVE-2024-1135,0,0,3aff273363b92899a6e2ea5d9bfb0816a0d4bc7746e2c028bcee049e0905b123,2024-12-20T07:15:12.590000 @@ -244919,15 +244920,15 @@ CVE-2024-11648,0,0,7767a97f87e6ac5b52c62a9ab3e06af98c54488fb6fa6db87ff57d4b59586 CVE-2024-11649,0,0,2e02a1b1ac73e9631e0d1a9797095a406b688cb0877d8f7698e9962760832419,2024-11-25T16:48:37.237000 CVE-2024-1165,0,0,147ae82fc7da12f28aa758dac0e9f077423e57773054525f0229107e43220ddb,2025-01-16T14:48:55.897000 CVE-2024-11650,0,0,c1a83adb5fe7f79d88eb6196b3c8ac6aa781d1511831a253d8e0e7484128306a,2024-11-25T03:15:06.707000 -CVE-2024-11651,0,0,1ab789c9eacaad7c175ddc8afa1992c793e015c3b6f49833dba9691422e781b4,2024-12-10T23:12:34.057000 -CVE-2024-11652,0,0,33668e06a8390aec93f01c5243e821060407052a728d8fc9cf77a157eb5f30ec,2024-12-10T23:13:23.947000 -CVE-2024-11653,0,0,4f0865d84dde581169e5fc4f057c95f93f00192712fe5392e0e3b1c1b53093c7,2024-12-10T23:13:40.990000 -CVE-2024-11654,0,0,13b950818c431c00e0ccfa7e4708e0621c51a74698f1f42c1f1d8ee79f24642d,2024-12-10T23:13:58.150000 -CVE-2024-11655,0,0,76a02b250b83551be6a13ebd60a95c6bfd1919484c18f40e8609059b505aebaf,2024-12-10T23:14:37.130000 -CVE-2024-11656,0,0,ae5d62f8089e5b420c86674ec5b9d797d90254a7516b5d1e5cc0e66373221a54,2024-12-10T23:14:44.037000 -CVE-2024-11657,0,0,893d6eae4e57947a06d3ac1fe3a26f703d0cc35b972b40317f35a6ea8903cc90,2024-12-10T23:14:54.933000 -CVE-2024-11658,0,0,262660ae934203477e09837b0ae58d534fbf787226668bfcc4278980ecb805e2,2024-12-10T23:15:02.890000 -CVE-2024-11659,0,0,73971f1a5bede07ed8180dfa7d34f0b3b27aba70b99e0b8d5b25787aef733c4c,2024-12-10T23:15:14.893000 +CVE-2024-11651,0,1,cec44f3b3826a002c3bc76942d1ad595ae20f3e224db724c688b3996e5fb1a6a,2025-02-12T15:33:04.513000 +CVE-2024-11652,0,1,caacbdfea328c0c43c47c3c3328fc88c5bc403f49f56c708cfeeab1a2a8ff78d,2025-02-12T15:32:54.593000 +CVE-2024-11653,0,1,12b60ca8872c73312f4aa317d6452baee1f0f4241adeaae02c8f362c7e157483,2025-02-12T15:33:07.360000 +CVE-2024-11654,0,1,2e41ecd40d167da85d8e68d46eeb3465a4ea85a15576219790bd5b19ed6e5c49,2025-02-12T15:32:56.980000 +CVE-2024-11655,0,1,259e216f1e6212d6db7898b9bb43176bc6ed5ac32efcfa7c40e1697332a96ca7,2025-02-12T15:33:09.620000 +CVE-2024-11656,0,1,202df9e981ceb4b057caed31f3094f775b1e3f6b776cbcb97854a746c3ae80fc,2025-02-12T15:32:59.883000 +CVE-2024-11657,0,1,44d0b826c4f6eb6824a07f05f5f0cf6cd650d559299918832f1a01de5a3497de,2025-02-12T15:33:12.003000 +CVE-2024-11658,0,1,94cbaf807b1e36ff9a394cb3943692f6547231d6f6d214a0189847fb5dd84398,2025-02-12T15:33:02.140000 +CVE-2024-11659,0,1,feff0758fe63ea6f53a4e11e497fb9afb310f52fb6cf92c788729b416c9f77fe,2025-02-12T15:33:14.057000 CVE-2024-1166,0,0,9a4043bccbd810fe27a7f1e35eefa8a5ff4605f22a20be37f65eb257e1506a5a,2024-11-21T08:49:56.773000 CVE-2024-11660,0,0,c69038363011e72870bf05ba1b77807b46b410512f645c7de24fbe53640bca7c,2024-12-04T17:49:09.103000 CVE-2024-11661,0,0,245f7af368d483b99968c06f6626bb5531f9195deb8e8301e7998f114936ec1c,2024-12-04T18:41:52.773000 @@ -245475,6 +245476,7 @@ CVE-2024-12248,0,0,e7cdbc5747de6d45abf0c689b43595399b382712b0a5e35e02147e9a51288 CVE-2024-12249,0,0,e2547863ff0e51895fdd9ac079296565876947375b7269d971dfde5e35972170,2025-01-09T11:15:12.683000 CVE-2024-1225,0,0,1335eabc5dc5752fbd7f31a11bdeda2f1be9be2c21abaca809140eabb8940f2a,2024-11-21T08:50:05.673000 CVE-2024-12250,0,0,e5f748db33ee246e1110b31eaf24b071ff8e9ad960657a91bc37454c3187e14e,2024-12-18T04:15:07.657000 +CVE-2024-12251,1,1,a7e8f48e925dc3d26a8ab48e5a089f2a8baa40b5e154b9242b9d105f912d40a8,2025-02-12T15:15:12.370000 CVE-2024-12252,0,0,f0cb19f49810803840f5ee985f8df8513974df82162830a7e3c14eaee14d9385,2025-01-07T05:15:16.660000 CVE-2024-12253,0,0,ddc85ae180bc30a65db67a43f7fe8d6c4299882333782166c00f6946fb3a98d4,2024-12-07T10:15:06.030000 CVE-2024-12254,0,0,3280f773a0ae5e7bd29340849e7be011f89e7cf22544cd6c884ec0f5814a1b90,2025-02-03T18:15:33.110000 @@ -245531,7 +245533,7 @@ CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654f CVE-2024-12311,0,0,3af6eab31cd30d4c0065a32bdb34b2964678187eb437151de7a1f6c0c5de09e2,2025-01-06T14:15:08.153000 CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b6052467b,2024-12-12T07:15:10.090000 CVE-2024-12313,0,0,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000 -CVE-2024-12315,0,0,a269ae6b9c70d5e4e29227595da8aae5a2d94a7a3da788fd09a6e80da0a226f9,2025-02-12T09:15:08.247000 +CVE-2024-12315,0,1,c81368421291799946c1993986f600ddb83244553db2c019eb5b39e19e5b1fb2,2025-02-12T15:15:12.527000 CVE-2024-12316,0,0,eca8691c5b3893d514ca6edc1aa6f96dd65d6266b3ab54367da0968d84fc6712,2025-01-22T17:16:27.977000 CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000 CVE-2024-12320,0,0,4634e0ec62d582413588701c85691767f88539a726ad91381c2adf94162c1cd5,2025-01-31T18:25:31.050000 @@ -245587,6 +245589,7 @@ CVE-2024-12370,0,0,d98e18bb49c3fbc75f1f7f6601e58a6353c9748a641846c6cbd7e3ecbf6b2 CVE-2024-12371,0,0,ad8806dfee353fdb9887f497d244b3ccfcec0ca669e819f5ec6c72aa1dddd27b,2024-12-18T20:15:21.193000 CVE-2024-12372,0,0,61d0814cd7351773a7f17ecab5c027fade58fdedeaf091e4269b15064d9c21b9,2024-12-18T20:15:22.167000 CVE-2024-12373,0,0,83b846beefe400aa9231cc84fd600de52fbf3fd7f422b967ec41c6b980048087,2024-12-18T20:15:22.280000 +CVE-2024-12379,1,1,7c6f0d0b2f16fe5189aa74951fea66b9c06c08bd48b3a0d0b83c0a9d5d2e2dd4,2025-02-12T15:15:12.707000 CVE-2024-1238,0,0,5414902a0008d4afb8cb32eb99f42faf6e277ff4edad81d014f1587296eaac4f,2025-01-16T21:19:46.607000 CVE-2024-12381,0,0,68b33f6b694aa45ef73ff06945e737e58ccb7b1c7ea2cfeb4d826136c48b3d1f,2024-12-13T19:25:33.143000 CVE-2024-12382,0,0,f70294886a1865641a484753f3298929660ab1bd7002caff75777615f01f2e87,2024-12-13T19:24:25.137000 @@ -245805,6 +245808,7 @@ CVE-2024-12624,0,0,5e7ff0728298740b51bc71547c6153c6f49e2311f395bfc0566af7f460143 CVE-2024-12626,0,0,dc01f58442ef4eb4425488c755c4a1d0852a1ed618c4541c829e9e2584781b84,2024-12-19T12:15:06.160000 CVE-2024-12627,0,0,022af0cec2036ad3cef4dfbe1da5009a76ffbe6b2f826e6feb835dd2d0810966,2025-01-11T03:15:21.587000 CVE-2024-12628,0,0,f48463b1ecdc4a2ff76d188b8ae44a2e0e32ef1e929dc806ea33e24839d1432f,2024-12-14T07:15:07.213000 +CVE-2024-12629,1,1,ec3e1b882941cc355ab466f5080549c5df178dc523a474039dc4ac567a86a536,2025-02-12T16:15:39.810000 CVE-2024-1263,0,0,1ded99eb7dd7c25043d30fb557b1a5799a79150045deb56dc782cc48f4b0c898,2024-11-21T08:50:11.303000 CVE-2024-12632,0,0,b2981d9ae0d79f88557270498f7d8919df56f26fc08631dba371165f9d0f4233,2024-12-13T21:15:09.317000 CVE-2024-12633,0,0,aa2de65b34cad526fad2ad4462ad560794d8e7fd2121b7b4323cbcbfceffb766,2025-01-07T06:15:17.417000 @@ -246413,7 +246417,7 @@ CVE-2024-13356,0,0,4c62ebf770eb8ffd31345cb0ef6c5025a9e134a147f2b545dcf049e579341 CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000 CVE-2024-13360,0,0,42c7ef7264873842b1b321dcb1d9eb02287e4b9dd082710569d0b72683473221,2025-01-24T18:58:46.177000 CVE-2024-13361,0,0,796ae81aa903e35e91be1aa59cd637cc5eee53bc205bb2f1ae10309102da0980,2025-01-24T18:55:22.577000 -CVE-2024-13365,0,0,833943d8f13200f1945429e054583c699c1742157d80d0f9cee8a86b98e7cb53,2025-02-12T10:15:10.547000 +CVE-2024-13365,0,1,f75700e6ee33a9e00b3278e7bccc8d0b2f27b23b1f758ef9ab41966511ac111b,2025-02-12T15:15:12.860000 CVE-2024-13366,0,0,4b12bd5212b118d30ff048db445e6d1c00e6cad223533401dbdc6a341b0a882c,2025-01-17T07:15:26.947000 CVE-2024-13367,0,0,28bc518effbeac20d5854322c01ceb858440caae6a5bae49591369a0a18ef4cb,2025-01-17T07:15:27.123000 CVE-2024-13368,0,0,dbbfa255c3d339e91eb07214cc7014e309e9bdb61391ed3e68917c31e101db69,2025-02-04T19:39:27.553000 @@ -246464,7 +246468,7 @@ CVE-2024-1343,0,0,7c2447499342d3573955d9e9545316db90429adf3b266826e2ed2754189f07 CVE-2024-13432,0,0,2420e31f27384cf3a3b972e6593316283200b18cb659242a854ce1e6ee4aeb4a,2025-01-18T07:15:08.983000 CVE-2024-13433,0,0,2a9d89514e9ca62330f67417cbd4f0a14554f70d781af736185219d7398dc564,2025-01-18T07:15:09.160000 CVE-2024-13434,0,0,292fbae0324c9bc0e0a4304860c64d8e4dabea0f0444b12419bd12eebd083320,2025-01-17T05:15:09.290000 -CVE-2024-13435,0,0,4060806b05dc19a584a0d9852c4337693011f1519912083540e24c06b76f3f55,2025-02-12T10:15:10.727000 +CVE-2024-13435,0,1,6836fa547d4932c702deb0657bdaa23c9b9d93c4dd8c924aedac3276df2cc3ed,2025-02-12T15:15:13.093000 CVE-2024-13437,0,0,503d6adff5da567fee536ffb324a5ccc786c3d759f53a9923743108aaa32218f,2025-02-12T10:15:10.920000 CVE-2024-1344,0,0,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000 CVE-2024-13440,0,0,549e7c3669e086bd81446d9710c683b16be57d85613f91aefe2f2a123a5522db,2025-02-11T18:02:02.523000 @@ -246489,7 +246493,7 @@ CVE-2024-13467,0,0,923a38005e4f33b4b00ab497e7b9124480dbc307e6f66ebdda4f5013f61f8 CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000 CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000 CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000 -CVE-2024-13473,0,0,ca5c941d54ea016e4da3c9a29909e71ffeef3af2854e9540262f8303241a7fc8,2025-02-12T10:15:11.610000 +CVE-2024-13473,0,1,0f99b6e2c0673e2e27c424ad6afa1fbe1c67cf81cd73e5628ef39646bf0f2643,2025-02-12T15:15:13.270000 CVE-2024-13475,0,0,58d8b87c302e2e66d53481676d4898485dca464c18876016c693f276944834c7,2025-02-12T10:15:11.777000 CVE-2024-13477,0,0,5921551f3a00d1e0f2abcb662326962b5a9eabe718bfa89afb4754cf920a7cfe,2025-02-12T12:15:28.660000 CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000 @@ -246629,7 +246633,7 @@ CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c CVE-2024-13775,0,0,1960bdf058198508440d85f951a3bd6116d9785e359b0700d7138122fee08aaa,2025-02-01T13:15:22.847000 CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000 CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000 -CVE-2024-13794,0,0,7d9dc720ed1b17f60d4475ce9f7785e093d0beb0d60109fa4ad6fb5c6dd9e9f7,2025-02-12T08:15:08.430000 +CVE-2024-13794,0,1,ba7ef0fca3cc69b7258b8ab7e3c3de5879491f3f931ecafb8b722ee17f4e0d5f,2025-02-12T15:15:14.040000 CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000 CVE-2024-13800,0,0,d24862aeca571805a2d7558bc0f1c00468e4df7532225a53769a89d86c445f41,2025-02-12T05:15:12.810000 CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000 @@ -246637,7 +246641,7 @@ CVE-2024-13813,0,0,6191208acb6a8a8377d4636aded0b7fea86db6b2ce6012bae163079aa1f69 CVE-2024-13814,0,0,66e4c5f712d0d3cac700cf324f2c7529d43feaa35c8e1c5e7d866503db95b7b9,2025-02-12T09:15:08.433000 CVE-2024-13817,0,0,b5a69d8e5693042f6213842e77c8ea5e9adad031b258d4d25f98e0b0bd22c27b,2025-01-31T03:15:10.910000 CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a5e,2025-01-21T17:04:33.737000 -CVE-2024-13821,0,0,99ee2f50b17f976ecdf6165ebfdad40599d47ebaeb5704438b3b907b44f1a5b6,2025-02-12T08:15:08.660000 +CVE-2024-13821,0,1,5b1ee3d380f6761fb93008f96f770c5f4e5b232778bb2785f2bf8699e79c82fa,2025-02-12T15:15:14.643000 CVE-2024-13829,0,0,b39aa81be1f98cadde5a8564db1794206153bbf387222b17a1b12873f0417acd,2025-02-05T06:15:31.257000 CVE-2024-1383,0,0,59b5f34a837fb68b850c9929786dc2e35071d4c4d7ba3d2784cb584749f9b1cc,2024-11-21T08:50:27.733000 CVE-2024-13830,0,0,134f69652329a8366ec7bf0f4f83ab58cf4e0130ba5b293cb74aa2d647f91906,2025-02-11T16:15:39.363000 @@ -246937,8 +246941,8 @@ CVE-2024-1695,0,0,1c5d560e9ce5c3fae0cb5230e680f68a2aeca2413e77781d5be99ab374e415 CVE-2024-1696,0,0,96c8303e535001c6c5d3b6e14d30079b9651c70dc730972b738df81a8696b09e,2024-11-21T08:51:06.550000 CVE-2024-1697,0,0,c470a81452f09db0e40146053a7ca6ac44c10328d8eb381864ced3a9cc5f2c2e,2024-11-21T08:51:06.673000 CVE-2024-1698,0,0,a3817713801dcdd2b6948f039ebd5bf82047ee39d455ae9db40460bcb81f0e4a,2024-11-21T08:51:06.797000 -CVE-2024-1700,0,0,c890221edc7d723da200984cd50788ad3f9477e6671e40a4826dd37ab78bdf87,2024-11-21T08:51:06.933000 -CVE-2024-1701,0,0,999a1855aff758dd3bea1c889c669b741d70388f4ca26ec930896a676a7eec80,2024-11-21T08:51:07.080000 +CVE-2024-1700,0,1,8f0d5e25a0ed37b6b76a334cde88576835fdff98665e5fcb2bc1cf5f764f3feb,2025-02-12T16:58:29.373000 +CVE-2024-1701,0,1,52c8c940f190bcaa163ee22225dbff8fdb651be3e5bfa1b6f375a6ccbccb0dd9,2025-02-12T16:57:05.487000 CVE-2024-1702,0,0,6bdc90b2a17f9cc720ccacf951a7c6fa4bbea546083aa1d1c8d973e97e935554,2025-02-12T01:01:24.223000 CVE-2024-1703,0,0,967f5b800879b74b8a5834ee2ca69d6ccd277ef7fdf67155513b4a3e4c5c9375,2025-01-03T19:11:33.877000 CVE-2024-1704,0,0,ade83be8825a88be560eefedd4a80ce29b73b997a3bc381116fac086a8487d74,2025-01-03T19:11:28.830000 @@ -248943,9 +248947,9 @@ CVE-2024-21886,0,0,1201cd3f4bc20f7f316f43dcca7f10d17cc8b7b0922b4eaacd28c4e8fb834 CVE-2024-21887,0,0,909c400ff9d3033f67611ba21426d1ac5bf861c401d35225cb9cdd824badd2fc,2025-02-04T19:15:31.230000 CVE-2024-21888,0,0,b45f885651aff86683860af6eb8a8226cada34955674ec263b53ac2cbb747474,2024-11-21T08:55:11.993000 CVE-2024-2189,0,0,7ea3e523e8b9e6befbc8a00f5933ce691dcd1de1f6fc8d37f688f1333e38d41b,2024-11-21T09:09:13.347000 -CVE-2024-21890,0,1,9ae110de2e6967c7a92f074f40cb8816fc9b5a0773b7f387b9e2d10a53376472,2025-02-12T14:59:58.097000 -CVE-2024-21891,0,0,4ec2dbacf0879ddb4c9abc78cb6a30f8307f89a07f7bcdd2671438b78ac74663,2024-11-21T08:55:12.330000 -CVE-2024-21892,0,0,35d39be706e99c5bb9ca96e3f055efe14861404edb8dfa6350c9f73c5ea01d2a,2024-11-21T08:55:12.463000 +CVE-2024-21890,0,0,9ae110de2e6967c7a92f074f40cb8816fc9b5a0773b7f387b9e2d10a53376472,2025-02-12T14:59:58.097000 +CVE-2024-21891,0,1,62ec1c603b63b08282bd5fb8136eec0bd40174e5a4f0327deb69e13e1763f1ff,2025-02-12T15:08:32.153000 +CVE-2024-21892,0,1,0cb6658e08e730ed7964a71f13f7f2146d8aa15793c4cfb2835baa2ff6f03c60,2025-02-12T15:17:34.380000 CVE-2024-21893,0,0,e526f17c4117b0594f892986704f00492d28f916b3e77a051a630f156948cf6b,2024-11-29T15:16:27.133000 CVE-2024-21894,0,0,0b9731024268f26061f06647376dec3d7f52d89500321a515bc8935c7738b3d8,2024-11-21T08:55:12.850000 CVE-2024-21896,0,0,c42b18c0164cd2c45352301f68f85218002e7e90074c3bedfb3af8d8f8061b1d,2024-11-21T08:55:13.107000 @@ -249179,7 +249183,7 @@ CVE-2024-22178,0,0,71254f623e00d5bb1e48d1af2784efb3046cf43ad2784e78ba9346e70b884 CVE-2024-22179,0,0,2b801faed759802b573f8a221bc335b3eb337f69cc84bd6f5d1a06164391d29b,2024-11-21T08:55:44.090000 CVE-2024-2218,0,0,424b1f62fd21e878c4d4af5731bddc2a60c6650d7ec1735a477b3efcab867815,2024-11-21T09:09:16.947000 CVE-2024-22180,0,0,eec6899847f68fcb904a1e50563ead2d05a754b9499da5083b6d7294326fa5fb,2025-01-27T17:58:03.073000 -CVE-2024-22181,0,0,865f27ea93b2f4cd418fa82e296f1730f12a178923e6676e37a31e9d007a0fe2,2024-11-21T08:55:44.390000 +CVE-2024-22181,0,1,42d6ef95e1add67f3139e90fb60d112a5bee36e3e7aafdfed106763fd11687e2,2025-02-12T16:15:53.237000 CVE-2024-22182,0,0,7ac8d878e2d4ca5a283cc9615664edc83ce6d44c467cc8255966406901629afc,2024-11-21T08:55:44.573000 CVE-2024-22184,0,0,b3abf3b3b4e6aac3413b6743bb34a9eb63531951dbfdb58ebc8d0dead3eb9c34,2025-02-04T18:34:23.990000 CVE-2024-22185,0,0,85f91f379b4d59a41a27787f13eaff968636790e8e661ef463dd204a3c8d0bcf,2024-11-15T14:00:09.720000 @@ -249233,7 +249237,7 @@ CVE-2024-22231,0,0,00d24777816f67af654168cfcd3ff75468e6779ec207c4463e3916155d2ce CVE-2024-22232,0,0,a58028fb899c58165e782bc20cdfb8e2eabeb083b6ccc045cb5ef6797325f51c,2024-11-21T08:55:51.217000 CVE-2024-22233,0,0,6b84f90a4974331ef0294bb64a8abd7145b43be907362a87a8d5c72bf99f79d0,2024-11-21T08:55:51.347000 CVE-2024-22234,0,0,81c502559f4ee286e35f7f530da1c13f7af490615612d02221903f6ed05e03de,2024-11-21T08:55:51.493000 -CVE-2024-22235,0,0,ef8fbf3b273775ff4b7cf6be19d76b52c98381f9c30aa02965486c632c3eef4c,2024-11-21T08:55:51.637000 +CVE-2024-22235,0,1,005a0b50c895e46cf18c49b9029038935bad06fd6e0d412045a501945d6825be,2025-02-12T16:59:46.897000 CVE-2024-22236,0,0,7a7a3e4ac4db4b451767224de6cb82094287c63ab888364cf9711bfcc5f9020f,2024-11-21T08:55:51.770000 CVE-2024-22237,0,0,8988002ac236d4e397c5988a00f219e4b57a88835084054c4efc993ea2b0cf14,2024-11-21T08:55:51.907000 CVE-2024-22238,0,0,e6819e36f5374d23fb71e862817cd3a024dd1ba4a6dafba26ae763447bcf1c0c,2024-11-21T08:55:52.037000 @@ -249456,7 +249460,7 @@ CVE-2024-22463,0,0,d7d862658e3c45f198827763f0f948786983de80b86774f7ea7e7d6abb7a0 CVE-2024-22464,0,0,89df0e10ef44510a8e5904e121c14fc7d7fe04dd8b75af148ba79e6d8aedebac,2024-11-21T08:56:20.280000 CVE-2024-2247,0,0,0ca7d7b7e23609e28e1499a00333ba2939a4606a46ffba5afb79df586f8f7777,2024-11-21T09:09:20.660000 CVE-2024-22472,0,0,cee1f8bd8d53e1f58b74d1b8778f6d5e5846827b53d5cb2194a2b8f2a34bd2ce,2024-11-21T08:56:20.427000 -CVE-2024-22473,0,0,b277fc9637f933d5d29967227db5676afeea1666486b4ab37b484aaf0c26530d,2024-11-21T08:56:20.573000 +CVE-2024-22473,0,1,4dee5095e8e11f9692d626fb0e99aba9ecf1bf87d14f8fa1c7018112ef2c5654,2025-02-12T16:52:42.397000 CVE-2024-22475,0,0,b9326cef104e527ebece5a44b8410430ec6ba360374b1b63130781d3fcf25c66,2024-11-21T08:56:20.717000 CVE-2024-22476,0,0,f03934f35360b7025b245717a358830a1748bf912d6afda43db399901cec9280,2024-11-21T08:56:20.933000 CVE-2024-22477,0,0,b8509029d5ec6a4381b6e6bd33da7f50735c23e01284aa814f384a92dcb70695,2024-11-21T08:56:21.077000 @@ -249980,7 +249984,7 @@ CVE-2024-23376,0,0,0cc779f80c19a11eb1a30cd9f5f91ff7c8407808f5ec64714cc981ec803d7 CVE-2024-23377,0,0,bce494f94080966abd252524c8e94fef027378ea35a6a1a9fb0dfdba152f3cd2,2024-11-07T19:59:06.997000 CVE-2024-23378,0,0,fca4266969c98a385338350bf287c1f8abbe4c04028e35e20fa31a2b61afbd7a,2024-10-16T20:00:29.503000 CVE-2024-23379,0,0,a6fcb1d2e5ab8a273d05660dd251072147a7d7f1a6aa011467a709909da01deb,2024-10-16T19:58:40.227000 -CVE-2024-2338,0,0,7affa4b1c78e9615649f3607324e276ded07602e0e70dd70c54539f188c7e1fb,2024-11-21T09:09:32.700000 +CVE-2024-2338,0,1,63ccab098d49f3f14286ede188ec00df2cf55c5c80d8cf952df967aef85e4a93,2025-02-12T16:44:27.073000 CVE-2024-23380,0,0,aba99a59df2c2c346822eef37c8a218574268c842b84113945ebc3473932778a,2024-11-21T08:57:40.700000 CVE-2024-23381,0,0,ac25b7a14d3a0aa4ad89b202d31b44a8295413335e466d08b1510c8ed7aa8468,2024-11-26T16:41:56.927000 CVE-2024-23382,0,0,61f2bab4ac828f7bd3ba9781b55dd2dc8270538ab53136bee7503d0a574f6aa5,2024-11-26T16:42:26.457000 @@ -249991,7 +249995,7 @@ CVE-2024-23386,0,0,a7685861d3b56f97f0034695e8270bc3c8543ef05deaff79f9997b472988a CVE-2024-23387,0,0,1b53231df06e7a2d9934d39ab746c9b238609b530843b990a50d92f2690c35d9,2024-11-21T08:57:42.283000 CVE-2024-23388,0,0,1337a0df1f3253f3e8955607179c908109edef648b6bcdbe60ad3ab856f5e39b,2024-11-21T08:57:42.427000 CVE-2024-23389,0,0,1d11e622c776e9a9a50ca0ae0018ba529c3fbce33040947ad969922ea6b2982c,2025-01-01T00:15:38.047000 -CVE-2024-2339,0,0,33602ccd8fd6e5bda5b99ca9b5d587372d0a208dfbb701184c2fa5266a00522d,2024-11-21T09:09:32.830000 +CVE-2024-2339,0,1,ac38041c62ad71b9ae2a288cf0e23986d3394897591f64cbc488199047ee8c60,2025-02-12T16:44:09.467000 CVE-2024-23390,0,0,db7b254e783f1a147fc80864fc99a15ca5acacf835209b6aaca8df2c453ce819,2025-01-01T00:15:38.103000 CVE-2024-23391,0,0,d233b84b01e1aed370cebf4f94e7d7c7bd9fc32c12aa7bd1bb5ee4154c23fae6,2025-01-01T00:15:38.163000 CVE-2024-23392,0,0,feba15e5d554b5934fc8ee6e31d652ff25fcc1f2cb877bf245257f721d2e11d7,2025-01-01T00:15:38.227000 @@ -250162,7 +250166,7 @@ CVE-2024-23559,0,0,c99cfd0fdf47b74263bfd3b28969d0b295141de4804e47c5696456fb67797 CVE-2024-23560,0,0,1ac21c967a6aa34f56a2141c43d6dc2d801111e3b28b514636b28c289a780afb,2024-11-21T08:57:56.477000 CVE-2024-23561,0,0,4c70648585cae8e25c85c736c78b97347e5c7300ec23d97d6f188bf631ec2b4b,2024-11-21T08:57:56.603000 CVE-2024-23562,0,0,3bb828292c209fcec85e3a252b2fea62176f8c8bb9b39bd91c753893070ca596,2024-11-21T08:57:56.743000 -CVE-2024-23563,1,1,76e975c2080f3bcdc51a228538ab7181294692203d42d9b22415e78088a6c664,2025-02-12T14:15:30.317000 +CVE-2024-23563,0,0,76e975c2080f3bcdc51a228538ab7181294692203d42d9b22415e78088a6c664,2025-02-12T14:15:30.317000 CVE-2024-2357,0,0,9db9e2d982cc7f87c4deab786615d4c2491074f7901aaf72f0e7eb4e46dabe0a,2024-11-21T09:09:35.103000 CVE-2024-23576,0,0,ae2f2574293dbbf7382406a21bd77da297dc368e0a3b7483251968e11d54c7ee,2024-11-21T08:57:56.943000 CVE-2024-23579,0,0,d24661721a28ef998bb0b5017df483b369b29abcab71f13d97c35966d3d2cd62,2024-11-21T08:57:57.097000 @@ -250517,10 +250521,10 @@ CVE-2024-23945,0,0,6288ec63e170b40e8b88ad06551a319a321a83698cafc7fd025d8491ff974 CVE-2024-23946,0,0,9c898cf09e521a2a31019dd3080db79ce9c32f7697e5321cb7301cafff4ddf89,2024-11-21T08:58:44.260000 CVE-2024-23947,0,0,f911293c6af8cf8e2a4c71b3a16ce5c03d9ac810bd789b6ce8a33c36c29ca1c5,2024-11-21T08:58:44.480000 CVE-2024-23948,0,0,d6d4011f0c2b673928e54c2b884e178d06b968843ed951ce2e90e73776691214,2024-11-21T08:58:44.607000 -CVE-2024-23949,0,0,da62630c8fa87849f3b8e313b2b05021cd7919bca6993eb5f7ba2a2cc72248d1,2024-11-21T08:58:44.733000 +CVE-2024-23949,0,1,d0362ae3925c21ea55d7175be64cd1f332c6f064e6790697c029261c8b73955e,2025-02-12T15:27:09.327000 CVE-2024-2395,0,0,af5ee44ed4e5a55dc7cee72e73dd87c7eca19f4fdfa76a380a7f63de620cfa5f,2025-01-22T17:38:35.133000 -CVE-2024-23950,0,0,fc22aca121744540088f0a682a9a12e51b13e88920d5f4c103703a8401d15b2a,2024-11-21T08:58:44.840000 -CVE-2024-23951,0,0,90949de6749d1342df813fafd173be208f7c748b51ad2522c41738d2f7a7174f,2024-11-21T08:58:44.960000 +CVE-2024-23950,0,1,a25694506be65627971d118ef0996de49f121864a4c393a4f64e7ed306dbe9f4,2025-02-12T15:27:11.963000 +CVE-2024-23951,0,1,2c1111104c3a80f1816366b6e03301e81b07c7121a3d81a108a46a5d9d035856,2025-02-12T15:27:18.610000 CVE-2024-23952,0,0,d956573f944b52b54178c073558282ca45131f0d187b6cc2538746038d148592,2024-11-21T08:58:45.077000 CVE-2024-23953,0,0,b0285d41e2da0253438aa75d630142c382c2bb0604a39903d4f79ed54be0a285,2025-01-28T18:15:37.223000 CVE-2024-23957,0,0,ccb57b4ba0507fbac13ac2445d2cac9760854f91ae7da4707e72f394ea98e263,2024-10-03T17:37:47.743000 @@ -251359,7 +251363,7 @@ CVE-2024-25239,0,0,62d1960a75816647dd0824c1a6dd7522a9b290438071c728f2122144b08a1 CVE-2024-2524,0,0,6f9563611770eaf74cbd654fb70e346ae094dcd9f1b5e7576a2f4a96999510fc,2024-11-21T09:09:56.390000 CVE-2024-25247,0,0,8f27432758a2853eba1d5c1a91c7da083827266e4e63e595dc12f3b358565fca,2024-11-21T09:00:31.417000 CVE-2024-25248,0,0,f376989aab963fd4c9f0643f5eb00e48c1e0cd4eea0df49b3289d75cd1c24fd0,2024-11-21T09:00:31.653000 -CVE-2024-25249,0,0,dad9f9cb969cb6e3893b32efee9cdddcb4dc79f9c140d418f6c5ba61ce402318,2024-11-21T09:00:31.800000 +CVE-2024-25249,0,1,7cbde78c75e4d8497d99a20ea8ce98a726a45fe216dbf1b4e6c8ae0251db6893,2025-02-12T16:44:43.817000 CVE-2024-2525,0,0,f8856386120b0b0e2a9a9905b06df8076256bd6ec85ecd75f598d7df4c9f1e7c,2024-11-21T09:09:56.523000 CVE-2024-25250,0,0,db72313d2b8a86eec26ab519ea1baaf7ac154d306dc7534c2e8c4d26bd439334,2024-11-21T09:00:31.943000 CVE-2024-25251,0,0,6dea5af83ad1e7e7deeb31cb468a1c94ab5c1e06beee69c782e91b5b37b29796,2024-11-21T09:00:32.163000 @@ -253772,9 +253776,9 @@ CVE-2024-28190,0,0,70b823e132fdaf915de1928040350b0ea87b81d33aa6e2ce37203b7b5b322 CVE-2024-28191,0,0,5b6c074ab018067c965562c5bbc6ca0ef417251157d63225a65bdafc747bece3,2025-01-17T15:39:22.060000 CVE-2024-28192,0,0,7508d9021ccc1565db3035af688147509fee676c90504fc13b4f73c460b6ef3c,2025-01-24T15:11:10.747000 CVE-2024-28193,0,0,8d227e8eb16fb4de0e704d7a312f2e5ac3bfb0063d0e3bd7134246d61929666c,2025-01-24T14:56:33.120000 -CVE-2024-28194,0,0,919f980bb3d86b49fd10405531eb8e0036001d5d3499843f594d6737b1cc5add,2024-11-21T09:06:00.183000 -CVE-2024-28195,0,0,1c8cd56ede5413ee2e3fc3f8a72d5ad055ccc2245b1d55d162ea0bb57080f1c2,2024-11-21T09:06:00.303000 -CVE-2024-28196,0,0,5935adc603506f91db2ad215ee3616bfe048394ec93eefd8b8d42fb8dd2992e8,2024-11-21T09:06:00.430000 +CVE-2024-28194,0,1,dc839140e9918f60622128b4ae95c79a28377a1e1e047fa3ba0a032ecfaa5910,2025-02-12T15:19:53.610000 +CVE-2024-28195,0,1,88cba2fb83e2245fa11cccdd922264095a701ee8b7109600d8beb431566d861a,2025-02-12T15:16:31.260000 +CVE-2024-28196,0,1,1aa739351558571e5c561707d080be08f96c798273d193f204af239cbed8c655,2025-02-12T15:18:34.053000 CVE-2024-28197,0,0,1ae2047ecd0c4043e0bdc00ceaccfcd5a2d21148692c0ff8a3261be8b479f2bf,2025-01-07T15:54:40.987000 CVE-2024-28198,0,0,761cba225c385d498bdd6fba40bd3dda8cd3d08c2183e5b794fada4afb002ea1,2024-11-21T09:06:00.677000 CVE-2024-28199,0,0,ce7b5d92a4f57c9e2aa64edecef6ee8520d5af49c8b77489080d765a812d8d41,2024-11-21T09:06:00.800000 @@ -254129,7 +254133,7 @@ CVE-2024-28864,0,0,6919dc757799fc59366e697569cb5bdd8699249bf5bc3570fad906c652ff8 CVE-2024-28865,0,0,0062a5145de87a14ca15ec6331d5ef90bfc88715baf3d6b5befa43f41fa814fa,2024-11-21T09:07:04.317000 CVE-2024-28866,0,0,b4d9a9c7cae11a8cc5512d01e0e004336928eba97a541638291b9c9a9385428b,2024-11-21T09:07:04.453000 CVE-2024-28867,0,0,13de37d1251837764571928cd6979ba699a7aa83d7eae7fbaaf533c23265ad8c,2024-11-21T09:07:04.590000 -CVE-2024-28868,0,0,6c9ea04241ecd2d663619e15c91822465ade59ac9d3964b9066fcf3f51923d3e,2024-11-21T09:07:04.723000 +CVE-2024-28868,0,1,eb611e363be714e3967489367b2768d2aad8d5b204059d84423a8d33f9241371,2025-02-12T15:23:09.683000 CVE-2024-28869,0,0,37b1b2db8728242f0e02311908952ceff63256ca368c823beb03f1803daff4a5,2024-11-21T09:07:04.857000 CVE-2024-2887,0,0,70a96806611abc951986b04e22c239259f8682e359651c93ff6f67c8b4acffc6,2024-12-20T13:48:51.147000 CVE-2024-28870,0,0,1948db6c1330344e0305cc9883b822c2b1c7846eda6f6ae64a39b3f568697ade,2024-11-21T09:07:05.013000 @@ -254293,7 +254297,7 @@ CVE-2024-29031,0,0,43885b264be637e71494b7988bfccd07c0c261c20bf20a201a9b30066be50 CVE-2024-29032,0,0,e4982184528b3910b9311a270985ad61418d068232bdcad658d089c012dde188,2024-11-21T09:07:24.850000 CVE-2024-29033,0,0,b30ff3b4288d6655f5f21132ae3c9d7becfaa96ec23d2d0ae74db6c2d1c1b5eb,2024-11-21T09:07:24.973000 CVE-2024-29034,0,0,f93a9cafcc84d32af021041aad35322e19a81121d9859b23a24caec8bdffe1e8,2024-11-21T09:07:25.100000 -CVE-2024-29035,0,0,da581f313a427c9bc01610288fb65e7d44e6081a29492217810bc3fbade391c7,2024-11-21T09:07:25.233000 +CVE-2024-29035,0,1,ef070b7e2246729f1c81fdb7adbddc3bb2de12297c6114bc6cf2e9e3860cc232,2025-02-12T15:26:10.717000 CVE-2024-29036,0,0,e9111c2bda4a8c52794b1d916cb4324b7edad3f1eb225d5de173609179c57fb0,2024-11-21T09:07:25.367000 CVE-2024-29037,0,0,07c5d00e82c63a2e1f8060633a0057734cf3176ca69685a1f25b09381e8c2a24,2024-11-21T09:07:25.500000 CVE-2024-29038,0,0,3c254eef01b264ba7c9a7863c0c7c05ed3bb36430fe13b91034a1d06e142cacf,2024-11-21T09:07:25.623000 @@ -257905,7 +257909,7 @@ CVE-2024-3388,0,0,e9b6f72b0b1c0b7f2c418e35fbf58cf2690eb64e09bf5e3388b48417000ae3 CVE-2024-33880,0,0,e592b0fcc1945574e62b07791cd81dcd61e6efd0a8817280337b8ece817c4469,2024-11-21T09:17:39.983000 CVE-2024-33881,0,0,c1b886fc16abf7aae010d3cd0b6df126ac4a7dacff52bac3f012a72388bd5eb6,2024-11-21T09:17:40.110000 CVE-2024-33883,0,0,a60b6dbe01d0df4525fad217549abc289e2dc3142ec07f81c8d9b45c0506b159,2024-11-21T09:17:40.303000 -CVE-2024-33891,0,0,8d1cf3446e61a9877622f5793db4e180c4aa06cd54d6426a41a58f8b9260406b,2024-11-21T09:17:40.487000 +CVE-2024-33891,0,1,dd477fbb1ee0bfbcfc6ef6b47357972caedec865080fe0f9a90e527403cff11a,2025-02-12T15:15:14.827000 CVE-2024-33892,0,0,f21b90c720809376ffb3c9eecbc31f204d7c233378324abc8dff77b0ef47f349,2024-09-03T19:18:42.870000 CVE-2024-33893,0,0,a9035f1be92e93d5c09f50566b3aa661370e6c7e813861ada45e03598f96018f,2024-11-21T09:17:40.830000 CVE-2024-33894,0,0,24ce8dbd25568714013b779c2f910e0c51cbe7395b534ce912626b0d41e22217,2024-11-21T09:17:41.037000 @@ -258074,7 +258078,7 @@ CVE-2024-34068,0,0,7f74bbca4e2db397199e15e665a073c5d30a617f5b6e634f61d035c77e231 CVE-2024-34069,0,0,272daf01091fd40b7e79c1d5d4afc7c83f6a52a4b429177799d0b69f29ec7ffa,2024-11-21T09:18:01.527000 CVE-2024-3407,0,0,1dd5d82b06a7cc20a14e63b07e1ddd6e99e77ef41257161f9f7dfedc8de831cf,2024-11-21T09:29:32.093000 CVE-2024-34070,0,0,5f1575a2d850d50c576f98c42a1ebac69cc9b6e5bffefc5b41bc301cd97009a0,2024-11-21T09:18:01.680000 -CVE-2024-34071,0,0,cda9f6df9572b578163b6aa702a8ffc9d7b864c0f8b9e917111917a05eedb0b1,2024-11-21T09:18:01.820000 +CVE-2024-34071,0,1,ffc35012c653d1b9edadd40a1fccd85a11c326f53822c11dd0077d4d3aab57be,2025-02-12T15:39:05.367000 CVE-2024-34072,0,0,0328017c25689b65deea8e6b5d9d864dcf5fbd8df8293d860b65d7cb7e44d96c,2024-11-21T09:18:01.967000 CVE-2024-34073,0,0,f7ad871910a24067ef07cc0245fd8074bbbce15b6e5922886339bf185df98b53,2024-11-21T09:18:02.103000 CVE-2024-34074,0,0,02adc0170b5030b9c74011e1341a900ec167561775046c5f84ea0d7e875fd048,2024-11-21T09:18:02.237000 @@ -258281,7 +258285,7 @@ CVE-2024-34367,0,0,7ff699636f6e7df739faa6cbcd9892725049411bdc1e39c1dc23c16ee03b2 CVE-2024-34368,0,0,bce2602f4869e8f4c1959d12f95f4e3944e55e2d8b8e4b27b47a03c1e42d5df1,2024-11-21T09:18:31.427000 CVE-2024-34369,0,0,6b8234cb255d707fb50e584fdbdaa726e242e7210bcc33ca056263ae6e18c1da,2024-11-21T09:18:31.557000 CVE-2024-3437,0,0,8177dd8175b079f136411c113a9d0bac6a0635d85550ff7dcc7564fd6e22ff9e,2025-02-10T16:15:30.727000 -CVE-2024-34370,0,0,4047551e28a0b3c8984c1f8dd180dc78c06c6194ff8ba96eb64ad39dfda39854,2024-11-21T09:18:31.687000 +CVE-2024-34370,0,1,3a2819603ce351747c3cc9df2f920cb8c37a163dfe688fbde1aba91f59b588bd,2025-02-12T15:42:09.867000 CVE-2024-34371,0,0,e846a2fe676040566f4e6efa50b35269655bad9983cf7c77a9c9788717f4eaee,2024-11-21T09:18:31.803000 CVE-2024-34372,0,0,6e08f9389cdc780953f7d11dfd76b886412e9c780b4d6714a57a67ed1541b47a,2024-11-21T09:18:31.923000 CVE-2024-34373,0,0,9a3853e05633db0457c23a26560ddf3c076d45e1bd24a34d6a00a0c54d2bec35,2025-01-29T16:41:21.897000 @@ -258486,7 +258490,7 @@ CVE-2024-34595,0,0,9e7778fdf455da2137cad71138f4d7b04b512071b57f6c8fcad630cdf1957 CVE-2024-34596,0,0,f3826dba7f5578245d8a6ee3d8f2e02fd250b5940fb106b55f170390470d5292,2024-11-21T09:19:02.710000 CVE-2024-34597,0,0,177e74cc84ab26472ddf89ba13c1485437043f4639b469fea00e41634d3ec98b,2024-11-21T09:19:02.843000 CVE-2024-34599,0,0,cf7052458c0d0767f934707d8abbd559c0875986c94ac6693429963460f92f50,2024-11-21T09:19:02.963000 -CVE-2024-3460,0,0,3cd4376d921ca23c37d76493dee331d65b07368d8d3fe1d522aaec8d4a5a3ff4,2024-11-21T09:29:38.773000 +CVE-2024-3460,0,1,29b5240f8e1f349c703c7b618a2caeea1fcbb3150ec58f69e279db6105f9eec9,2025-02-12T15:36:15.813000 CVE-2024-34600,0,0,acc93e75e2c654676889731158073e66b5724f27e6fde33a2de4352805d7c486,2024-11-21T09:19:03.100000 CVE-2024-34601,0,0,25a332c4a579011bb0c18e1d4a21b19636411ff6f28cbf9020b3962c90461a30,2025-01-03T19:15:49.823000 CVE-2024-34602,0,0,4d7ed54c46dcade2e8696d5e18f840ba7f0df79c7f91cdd2a16daad9d77e4421,2024-11-21T09:19:03.373000 @@ -258497,7 +258501,7 @@ CVE-2024-34606,0,0,7b1792b534d9b777c70020ea0bc4c7d26bc283027d45db7163587ccf987c2 CVE-2024-34607,0,0,06c03f66cf42192447645613f28036fcf0c2024a8799848e6f569b1b03a05a9e,2024-08-12T18:36:20.393000 CVE-2024-34608,0,0,1c494ef4e98f9c48dff87bc6fabc1ba6522fdf3bd782370e6a1c5e4c50382e00,2024-08-12T18:36:30.313000 CVE-2024-34609,0,0,304950e03b6b5f79c3c13be353fc442ee41c8caed227b08c3110893e1589840a,2024-08-12T18:36:40.413000 -CVE-2024-3461,0,0,d58104dcd514f1aef4661990ff546ba5e664036335484cbe7cac13e38ef6e65b,2024-11-21T09:29:38.900000 +CVE-2024-3461,0,1,ffa509b6626dc89a41dd54f1920be2fd6fe483abf5f37b4c0dc0df4c545ef22c,2025-02-12T15:37:59.677000 CVE-2024-34610,0,0,8224b6d22b90d43f7d65c5aef3c67d8735b48c70203926524646253eb47b66ab,2024-08-12T18:37:41.617000 CVE-2024-34611,0,0,1c6753dc55ef167624ad4f265ebd490e90ca6027871aa8c494537a4bda520a4d,2024-08-12T18:38:00.283000 CVE-2024-34612,0,0,cd0b63ccb62b91f27224f50157ed09bd228e119acbeb43814ccf35b6c17057bd,2024-08-12T18:38:07.797000 @@ -262330,7 +262334,7 @@ CVE-2024-39426,0,0,83982f7fdfeaa807165acfe18d0cad5ca5e47963386065143fcab9fe76521 CVE-2024-39427,0,0,7b7b8e0a3562ecdc26839a72808719e73a9c9f77c8bc63945b07f085b8af8943,2024-11-21T09:27:40.310000 CVE-2024-39428,0,0,7d1707af162b1d4d406f7bbbd19dc570b90779856a2606b9337dd453afa46029,2024-11-21T09:27:40.480000 CVE-2024-39429,0,0,e018e2d37f70674152617e811468ed611a1924ead2ff6b7800e384a166b49041,2024-11-21T09:27:40.620000 -CVE-2024-3943,0,0,7a93a1d424de06e451171fba0b5b14d35d1d5e7c2688aed38ca9e0b32f373a61,2024-11-21T09:30:45.133000 +CVE-2024-3943,0,1,e4cdb02cc62acb727aa35c031654b5d4b5a56c867352badc43e6886fb513cbfb,2025-02-12T16:26:27.347000 CVE-2024-39430,0,0,676e35275b326d39e01f6979baef933c2acdc8ac3021c1d5c5882757ff0a277f,2024-11-21T09:27:40.760000 CVE-2024-39431,0,0,3c249123a76ed41db06fc333d6487eebee132a6cf808510f304512d922aa7fe5,2024-09-30T18:09:30.780000 CVE-2024-39432,0,0,0d1b7bf8dd34d739673dfa5f623e01deafa7cf611509566b2d4d37b0b5a02b97,2024-09-30T18:12:04.437000 @@ -262343,11 +262347,11 @@ CVE-2024-39438,0,0,24206dc13e5c569ce4ed39f81926d8b7d31d87ead875693b60dd57a2673ab CVE-2024-39439,0,0,ce75ad981b5a0d9d1a3b44ff24f21db07abb0f10b7cc9c0104da458e8f884ead,2024-10-17T17:32:05.890000 CVE-2024-3944,0,0,b4ac3a6cc8bdc3d4562ec3251954cb7d98b5fdc3cd00cb185f6de2c2a7491615,2024-10-04T13:19:51.383000 CVE-2024-39440,0,0,4f2c0d9e1a449f4e7f0abbc3c14ac2d1b80f295000e70aed068814c8c26e6bdc,2024-10-17T17:33:48.143000 -CVE-2024-3945,0,0,a8568ddb128352df1d7d8e79cdab1b540e2174c1c586dd0889a6670a3b88cb92,2024-11-21T09:30:45.320000 +CVE-2024-3945,0,1,7093e87a0bcef232ea8887066fd83c1aa636503474edf23e55d40151afe0235f,2025-02-12T16:26:04.993000 CVE-2024-39457,0,0,200f1d3fc23798fbfd97f204ad1c3a109ac863e4640147e347dba97a39f0518e,2024-11-21T09:27:42.080000 CVE-2024-39458,0,0,600f68b554d8ca33ceea3ca3c437286132be7e855f795cc4e4b3eacc73ca7029,2024-11-21T09:27:42.223000 CVE-2024-39459,0,0,84163e8ef3d49be1fafbc48a09c7ad9ff761c361af71174eb5e30edb12f717d2,2024-11-21T09:27:42.417000 -CVE-2024-3946,0,0,d6d90bcaef0200a22c31898bb5c6a46abb5f9582f7cf61c67fcad1b2001b7f55,2024-11-21T09:30:45.437000 +CVE-2024-3946,0,1,49f43e30d22b0441f1e5a48b3bfb8d8a5e3ae8d7d93195abcf8eb9f6e8f62f64,2025-02-12T16:25:25.547000 CVE-2024-39460,0,0,9d61a536a27d65684c6084e992b80cf96ee2aa8701ccc8a9334b62260368ed4f,2024-11-29T16:15:10.243000 CVE-2024-39461,0,0,b41a22cc2e09ff68e921c279b09c51ff8f51194646e70786ea7a32f4b7947d93,2024-11-21T09:27:42.720000 CVE-2024-39462,0,0,15386dd370a6b0355a36c67130ba8a370ee55deb7c19c38c28df252a427dd11f,2024-11-21T09:27:42.857000 @@ -262358,7 +262362,7 @@ CVE-2024-39466,0,0,b041eb19cb7e44352da4439cf5631bbcc6b6f6d07932571e0c1df313025df CVE-2024-39467,0,0,f8b096103a7cd9fe514c14ad1458a5fdab112d0b5fdc16ac5fe6e5cb7370b2fe,2024-11-21T09:27:43.647000 CVE-2024-39468,0,0,4edfe26ed53b093f2dc91c57e5c504c28886c5044e711e6c41099de3068057d5,2024-11-21T09:27:43.777000 CVE-2024-39469,0,0,90dbfbf82d07283b34da66b7ea54266f98951a2d29cc67a3bb60db8ee26522e1,2024-11-21T09:27:43.917000 -CVE-2024-3947,0,0,a2c1f3482517659ff874307112a66491739a77382484450645c00824a70b946b,2024-11-21T09:30:45.547000 +CVE-2024-3947,0,1,03aa080e705f6b309fe6cebe8580fb91e66a8f879c3cfd81d416886988994ab5,2025-02-12T16:23:45.067000 CVE-2024-39470,0,0,8f39bbcefe24fbf68321b261e4ed65e0b7db56ef6c63fd1a3047b9b298e9fb06,2024-11-21T09:27:44.047000 CVE-2024-39471,0,0,d95568823aa8e4727b84a8b5644f02e786ca93cf25423e0833fe9b97687f0286,2024-11-21T09:27:44.163000 CVE-2024-39472,0,0,f8baf6ba41486258761861d10b0901d7b547b4ccfd023dd9252425ff6010d14c,2024-11-21T09:27:44.303000 @@ -264980,7 +264984,7 @@ CVE-2024-43164,0,0,af1cf52e9e5daf0524d227ca91881ef1661a1e31cfb7baa9b781d652d8651 CVE-2024-43165,0,0,d6b26bb563a0e6badcd424e8717f3eee2117ad61bb0aaa9e33b8f5d6bf543f4c,2024-08-13T12:58:25.437000 CVE-2024-43167,0,0,1f0299dd298e58ae7d0320a556b5cc8080d25729e8c4fc9c4051248a2f05ca8c,2024-11-21T09:35:06.587000 CVE-2024-43168,0,0,a00133049ed1a922ca0a7599f98603d24e2d8039ab92bf6ffa7a406368253241,2024-10-21T12:15:04.327000 -CVE-2024-4317,0,0,5b5e9e74799ba1a2d6d19fd0e10c6f6a1617c77f3e3ad0fc8833212ed75eb508,2024-11-21T09:42:36.813000 +CVE-2024-4317,0,1,db0abb41f20407d83ae6da5ad6bf273d95c1b6dc6d76af61523cb7222e98db9f,2025-02-12T16:17:31.043000 CVE-2024-43173,0,0,d8d2ac885c1902e546063772016f5d0005860b114ffe9d7489140ac6cd8bfc67,2024-10-25T15:40:19.977000 CVE-2024-43176,0,0,67ef639d68302e5458cf789165bf8b534cafee061131b6437c0c7535ddbce0f4,2025-01-09T15:15:15.737000 CVE-2024-43177,0,0,0d4884cc3bb5ef316ac2268cbd50954452c99cbd34944a23e957f2b36af6ec01,2024-10-25T16:05:15.777000 @@ -266000,7 +266004,7 @@ CVE-2024-44215,0,0,e32762ff0bf2f6f2e22b7422e9deddd79856979cb2bda3d837557df7bdb5d CVE-2024-44216,0,0,e207c9047398aa16280b349e1f263399dd58d00878c7a8d8ca180fe88f7ada73,2024-12-12T19:38:27.887000 CVE-2024-44217,0,0,a0eecfcb7bb8a1d6b2356fe5b76f307bcb6cb65108fa31b3d375cfc7672399a8,2024-12-12T19:55:20.407000 CVE-2024-44218,0,0,f11365ca91eee54b03c90ea2492115b72c14e7e1b502a66bb17b9ea40f96966f,2024-10-30T17:24:01.703000 -CVE-2024-4422,0,0,88e38c8f81c558e863db276496d3d3966ccaae5dc31d3db1528474edcaac1cce,2024-11-21T09:42:47.860000 +CVE-2024-4422,0,1,4a8df766f5ddaa896d051860123a74dd5313b726510bd02ff373fe7bedc390f4,2025-02-12T16:29:48.533000 CVE-2024-44220,0,0,bad2b508e552d1a09c11c8017d22721370fec111da93bdc30606a926bfe3892d,2024-12-18T18:37:48.003000 CVE-2024-44222,0,0,73a3c689e7090451963deac3a94c7bd82e8f2ad14cb50c55b40009dcf9370f17,2024-10-30T17:25:30.903000 CVE-2024-44223,0,0,e7c24ca22da306873e19ce1beaefb0f8a859aa352b193df7d6f03bb6b9e568ac,2025-01-06T13:38:02.493000 @@ -266037,7 +266041,7 @@ CVE-2024-44256,0,0,4f0f1a114f877f4585adb86a9d1785a0ed16207b0923723e8ec264acdefbc CVE-2024-44257,0,0,bc36fc25358e3fe0b559677b44ece93b30ed47701945377f20895583fd086699,2024-12-12T18:28:58.817000 CVE-2024-44258,0,0,b9a751f91557dd3ab0500580cec00561525ca507ea060ba008584e768ee04176,2024-11-06T14:35:02.583000 CVE-2024-44259,0,0,7840059ec23ad4e0890ff31c5401691372d865ee50b84fd574bde49a1d54e491,2024-12-11T18:29:11.187000 -CVE-2024-4426,0,0,5a50340811c8dac1bab1bb70f4f13d24fac71e6cdebba82e37baca92dd31c3ea,2024-11-21T09:42:48.490000 +CVE-2024-4426,0,1,b6d39a5d26426f9706e3191c67ebe4a7a8c7619da8ca33d2ce29f5ded44dad06,2025-02-12T16:29:15.587000 CVE-2024-44260,0,0,efa10ee749be06b6ff293117fb9189d3b9901ddb5dd166b86d7ea01257835480,2024-12-12T18:19:21.727000 CVE-2024-44261,0,0,faa469041a43d1fdc729623424014a61aa05639472f8e744062ab95ba97c94df,2024-12-11T18:28:45.787000 CVE-2024-44262,0,0,216f942ab6946c91db934f20abb4be07ce9b18ecbb90ae92edc94facbee54171,2024-10-30T21:35:08.940000 @@ -266046,7 +266050,7 @@ CVE-2024-44264,0,0,ee0924179708704586a947f8cb1bfc3250aa2f192047d549667f366c53b09 CVE-2024-44265,0,0,2a35e1f543866e069d19984c92081c66c8b71cadcb6f6181093964e7539adb55,2024-10-30T19:35:20.800000 CVE-2024-44267,0,0,a998007de4d2f37cefd77b01798057f7e8712e22e07027587ff9faa51feecfc5,2024-10-30T18:39:55.167000 CVE-2024-44269,0,0,cd94b5c2b28bd00f6bd3c5bd35107676552800aeee1f867a6d0535ed56a9aee1,2024-12-09T15:15:15.947000 -CVE-2024-4427,0,0,b4bf66b2e009198014a610dfd9745462884232b31fa92086d9d085cb136f3579,2024-11-21T09:42:48.593000 +CVE-2024-4427,0,1,9c2223af452db947a19fc0ab8b1b401893e6caa4222bada6a0e47c2734b08c2b,2025-02-12T16:28:31.400000 CVE-2024-44270,0,0,51d4b52a115ad2f279bed3a378d4fb4fa92b6583bd4c55801137fe6a87bcf63a,2024-10-30T18:44:35.083000 CVE-2024-44273,0,0,caae658c20ea929becd6a50f15cc5040f32d55f5bf0889d84daca4b410aa6c36,2024-12-09T15:15:16.147000 CVE-2024-44274,0,0,d4611874fae8cf46b4ebeede4c74afb829adabc974787d5151107510971373f7,2024-10-30T21:35:09.203000 @@ -272816,6 +272820,7 @@ CVE-2024-54157,0,0,651aaab1ba3fa67919b2a83ef120e30379ceac97443b3f5f57e4b98ff3e21 CVE-2024-54158,0,0,8c6dc67958b420fa6c8d095b96806595ddd0e8ce477f8baa35f7cadb7e0151dd,2025-01-30T21:50:32.770000 CVE-2024-54159,0,0,a6966b82b06dc6cc6ffe535670f7fe423d90e23d66a5791ea4c4b55b9827bb58,2024-12-03T15:15:12.097000 CVE-2024-5416,0,0,2cc8eb5abc95e0327999359a16ced825b9a25c50e0044d232fce1c6bda48c682,2024-09-26T14:37:59.290000 +CVE-2024-54160,1,1,f1c40d3cda0d23d0f4928e272d371e80332a2621ca29b9d07b061a13560813a7,2025-02-12T15:15:15.050000 CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc2553d,2024-10-07T15:44:01.830000 CVE-2024-54171,0,0,0b1e68485272d4832574ebb9e2b9b7d4e5d9f12a8c58fc003ccc374e2ce65830,2025-02-06T21:15:21.453000 CVE-2024-54176,0,0,1d22afff13116a5ec5700906a2d882f14295c99348d00475c7572a5a8fb2a6c7,2025-02-08T17:15:21.643000 @@ -273254,10 +273259,10 @@ CVE-2024-54887,0,0,7af3cad075b59623b7b3e30dd1983d85e5a9b2bf998f2ab9a001666a2a4fd CVE-2024-5489,0,0,6c00a6a2badf83516471ea1d81b619bbe482cb4a54de89ffa7bd06f7fa1ffabd,2024-11-21T09:47:46.807000 CVE-2024-5490,0,0,7e66a0f19af78ba5ab311e474f6c7a834b406cb5857b42d263e55e1190767452,2024-08-27T14:36:10.033000 CVE-2024-54907,0,0,80a392b1154d757e3dee13d617bee74a64b3baf8f41f4c6bebbb399698b18a69,2024-12-26T20:15:21.800000 -CVE-2024-54909,0,0,73dbe9c0eacf924ee5d6ba5f8aea112f03b6c84bae4083891b6147c1b1e4a2ff,2025-02-11T22:15:28.733000 +CVE-2024-54909,0,1,e09df11f9fd23515b803ba3007fd40230638945f3a2c3c6e417f7f2b8d8f42bc,2025-02-12T15:15:15.220000 CVE-2024-5491,0,0,e331b82e31ebdfe13500034914a1c37ca8ae8114dde41994ac12e59a5b4284ca,2024-11-21T09:47:47.017000 CVE-2024-54910,0,0,6581157280a10462a6b1d5622c98ff4607d8f7315bb6a89f500333c22a07f58a,2025-01-14T16:15:32.953000 -CVE-2024-54916,0,0,fff3ee0e89c570a0b653b311b6ad0eaae0c786e449fdb988eba614851470bc4d,2025-02-11T23:15:09.227000 +CVE-2024-54916,0,1,7a0dccad4793c9d5ee8482e55eec1c618ab1c20951125a4aedd6dcbd29752662,2025-02-12T16:15:42.160000 CVE-2024-54918,0,0,8d1c74ed435285d94b09f28fd23f5ea9a7eeb2cd4aab9028349afde0dfc746c6,2024-12-12T18:15:25.790000 CVE-2024-54919,0,0,d240fd7b13ed8b141b8975d3eb4f4e201c9093f582cb0ecbb49a96c5b085f2d9,2024-12-10T18:15:42.770000 CVE-2024-5492,0,0,bef41c141414e91a737f6b5c4fcaf83f2ee31e6e95a9e2405d6f4dc30a93092c,2024-11-21T09:47:47.140000 @@ -274327,7 +274332,7 @@ CVE-2024-56990,0,0,d73542476af2136f4500771d27d3e44f35a9b22fb9d2fc461dbdfee0bbfd6 CVE-2024-56997,0,0,b9e3b1a369f281014b3d6ae47db288812e253e2c05f0cfa169a74fad7957b7e9,2025-01-21T20:15:35.757000 CVE-2024-56998,0,0,f5f48efbc8b4fff5f7922bcdd7558331389f08761b2f0b3a0f88eaf8ce382ca8,2025-01-21T20:15:35.937000 CVE-2024-5700,0,0,03b60b2b2d02d40bfad068e0335a335857a618ee5b010c631028ca7b55a329d1,2024-11-21T09:48:11.903000 -CVE-2024-57000,0,0,bebb7ca545f033dce1711143b34b63e5e0bf44eaefebdf05145ea507a027fbc2,2025-02-11T23:15:09.337000 +CVE-2024-57000,0,1,22ae1adeeb8dde49b9cab48884a03b2d82548286eed8225c13790358889d77d6,2025-02-12T16:15:42.317000 CVE-2024-57004,0,0,f586a360af706a58378cf0329b6a642e0d827f8c0f318cf23dcc24fe8bb6abf1,2025-02-03T19:15:12.777000 CVE-2024-5701,0,0,9915dfee3e359182f9adc135791d10f705664babe0d2fafe943bf47d66747252,2024-11-21T09:48:12.093000 CVE-2024-57011,0,0,e423cf8108eeaccf1a4a6a564034672c57143be7df30237f44f891951f76e1ce,2025-01-16T15:15:13.873000 @@ -274781,8 +274786,8 @@ CVE-2024-57948,0,0,1a6e7a2592dc090b9c5651ce7d9dfb9cd17ca0fde703644781c208aeb34be CVE-2024-57949,0,0,ad521c28195b2cc8544ff311f495a1ba663d19f7873d7e81a8712409a3128dda,2025-02-11T16:06:53.447000 CVE-2024-5795,0,0,8c27870eb8f46b4876cdd6a9335698b3a6adeccd1af066b5f5391281ef70b349,2024-11-21T09:48:20.780000 CVE-2024-57950,0,0,97b43429de158865b5b0286f6bf81d91a6114b665bd3df28d16fd4e130eec8f0,2025-02-10T16:15:37.913000 -CVE-2024-57951,1,1,77bfd395632f5948551ffb9a90291ab130e3153bd4cd28926d23bf3968218a4e,2025-02-12T14:15:31.403000 -CVE-2024-57952,1,1,d43d5e8e3a8552e8508acfc3799e4ed212aafe1ad7494d2bc86ae9aaef799a6e,2025-02-12T14:15:31.540000 +CVE-2024-57951,0,0,77bfd395632f5948551ffb9a90291ab130e3153bd4cd28926d23bf3968218a4e,2025-02-12T14:15:31.403000 +CVE-2024-57952,0,0,d43d5e8e3a8552e8508acfc3799e4ed212aafe1ad7494d2bc86ae9aaef799a6e,2025-02-12T14:15:31.540000 CVE-2024-57954,0,0,91758d48648129248ea9805d5372fb353727b8abbefe2abe7e8495cf9dc66f5f,2025-02-06T13:15:39.467000 CVE-2024-57955,0,0,c9d2b1ffe54f7f5776391ee1ea15de6075933d1092f6712e436603a1d67aa02c,2025-02-06T13:15:39.590000 CVE-2024-57956,0,0,48560cb5ca493c2bb63e0d975b9dbbbb9d769306dd7be72806e60e0facf4e8fd,2025-02-06T13:15:39.723000 @@ -278338,6 +278343,7 @@ CVE-2024-9866,0,0,a0ba39e4ebba7a797233c2839de60b66f2e325e113630d15fc927dabf744cb CVE-2024-9867,0,0,af8c04cf7fe39d8c9c939bd4960d3e5a1bae720dbdabcedf4d767e596e9cc6a2,2024-11-08T16:00:04.640000 CVE-2024-9868,0,0,8b03b248bb9c12232453fd15a6ded978c56b8620d35965eebe04c58e726ecdaf,2024-11-04T13:44:51.370000 CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000 +CVE-2024-9870,1,1,6eab47920613cf24cddb6cce684d0b1b28db401f9fd9cc882f2ef4e1d8c7f6de,2025-02-12T16:15:42.563000 CVE-2024-9872,0,0,0e7d68583c29c66a5270292b98ec23a33c9fb82f2b56b0d5c54817e06e66bdd5,2024-12-06T09:15:09.040000 CVE-2024-9873,0,0,33bc81d0177b9feda09bc4924ad1b908e4d83e088ea8b1403a6d411bd77364fe,2024-10-16T16:38:14.557000 CVE-2024-9874,0,0,2c854e5be476fde52ee3df7991e955456b213438a6a861fb37fed209f8a3d727,2024-11-12T13:56:24.513000 @@ -278569,6 +278575,7 @@ CVE-2025-0318,0,0,43ba6204cbaa4c110e5bf9b669f9a8b449a31e92da6e4bc8237af066e2eac2 CVE-2025-0321,0,0,949a46e9b053903a4a5e7760dec47f1d94e986bd99c2cdf86cabc314ed2bfdb6,2025-01-30T17:39:45.447000 CVE-2025-0328,0,0,983a37850e7593e52c7049d9c87a360510a226adf3c659d5ad2fe111082fc07f,2025-01-09T17:15:17.330000 CVE-2025-0331,0,0,dbc642b98482c7a868d38d7a4b1240421a9e262e76044ff9bb695321876694a4,2025-01-09T17:15:17.933000 +CVE-2025-0332,1,1,b835c5b45376db1eaf12cf3c2ebf45121eb88483211e6713c18695181a471bf1,2025-02-12T16:15:42.703000 CVE-2025-0333,0,0,3183afb9350c8085fce656cea7939729bf7b0c3b383c8f7105e9da54dedb25bd,2025-01-09T17:15:18.077000 CVE-2025-0334,0,0,e3a8c3debfd678ee7c1344f925152dfd8cfa42591be5b844f5f2a9504bc9f616,2025-01-09T06:15:15.610000 CVE-2025-0335,0,0,ba6bd83ac72a18cacfb4c8aed3dc5b6304b883b41ec133eb940fb09de3e363fd,2025-01-09T06:15:15.850000 @@ -278599,6 +278606,7 @@ CVE-2025-0369,0,0,968f1c7b7fff7a404f2212aa81591bd64fc1ef313f079e18ed81ef90b8b129 CVE-2025-0371,0,0,de30e603b077e64693a9f53a95b364cbc495f2694acb2d5aef6b2eb3aaaea9a8,2025-01-31T20:16:11.363000 CVE-2025-0373,0,0,c896e2039f1868b25d47604a1b505a94cc3030671c646849df8ad1a697ac14ca,2025-02-07T17:15:30.760000 CVE-2025-0374,0,0,8869dd713bc48baec5d2bd3f0b3f9adaccbc12e420edf3f19dd609cc3be6ee1a,2025-02-07T17:15:30.903000 +CVE-2025-0376,1,1,451d07b494536b6facb8189af2373cdf4fd8368ab1d06f95e2f95eed47d1ce5d,2025-02-12T15:15:15.477000 CVE-2025-0377,0,0,1df5153b8a72b25478d0a1c4aa2347b3a7ff1e86a04300cb39dc18c1f91a367e,2025-01-21T16:15:14.290000 CVE-2025-0390,0,0,a9cacf0ddfe16d7ce6aba119743e725f69b4f5561bb60e372a0dcb6744d412ca,2025-01-11T08:15:26.527000 CVE-2025-0391,0,0,ab8f7905746a492810fe86765faefb1fff997fc4d75bb4be776d20c58a35599f,2025-01-11T09:15:05.937000 @@ -278685,13 +278693,14 @@ CVE-2025-0499,0,0,42871b7d04896bad08e4e2a0f52be498a4b936aaa56513408d624ca2987d2d CVE-2025-0500,0,0,ef67500424af835c1f75d32db89a4d3f8d70b570d80dc7e061c5614d7c9ed205,2025-01-29T19:15:18.870000 CVE-2025-0501,0,0,548edfbc8288b6ff7e57bf4d8a97bca009c549459d9d27e51c8af872c31d24f2,2025-01-29T19:15:18.993000 CVE-2025-0502,0,0,bf19161cdd08710fcd7f99c1f7c838e68552d69acf9f5504bdead56cab49bd6c,2025-01-15T18:15:24.650000 -CVE-2025-0506,0,0,b858444b2919cc63b6e750a00d2589e673084acaa2fd03cd370dda36b52ce603,2025-02-12T10:15:14.360000 +CVE-2025-0506,0,1,4a6852805f36f30ad94ceceb0f4a0d31ff4937d2fd2fd233631287ffb7576ed3,2025-02-12T15:15:15.613000 CVE-2025-0507,0,0,0741f2f025f4b48581d4d58f022e9dc19c48a922e6141a54aefd8981045d22c9,2025-01-31T05:15:10.280000 CVE-2025-0509,0,0,5c3664ffdd7f56763bb1b43873c2b214da02799f3bd4d544bc23e17ac3c97665,2025-02-04T20:15:49.763000 CVE-2025-0510,0,0,05652079849e71bfd50a60b32906a66a5fcd428ffe6c5caaa29432e1f6b204cf,2025-02-06T21:15:22.083000 CVE-2025-0511,0,0,bea8aba2d4058a594c2d6768a3ab9a2a20bcf3b8345b874df9ed98ad0444eb2e,2025-02-12T12:15:29.210000 CVE-2025-0513,0,0,d77995424ca84a8cb2f2fcb871053560789e57471ec763f3bc051ef53db6bd07,2025-02-11T15:15:19.257000 CVE-2025-0515,0,0,5ac36c3cf0188576defc5041e4d2f1cb1b09ae44d7e3c5256fa040d2f88a4731,2025-01-18T07:15:09.903000 +CVE-2025-0516,1,1,ea1922d06ac031903617831b38ffa32fc472c31e237d305ac2a29a182dfc3a66,2025-02-12T16:15:42.883000 CVE-2025-0517,0,0,59a53be50b99baee653b756881cc0ee4d0832bd3c59bfa5e70566936733554ba,2025-02-08T22:15:28.823000 CVE-2025-0518,0,0,6d3c5b8ffb150f75c389bd7e05b7aa905d22be4fb895631f5a9526d167be6180,2025-01-16T17:15:12.577000 CVE-2025-0522,0,0,7e3a5d181cd4b32ab493cc2c6b5d2e91736d8261a7e3c0e2dba5b00274469570,2025-02-06T15:15:17.127000 @@ -278714,6 +278723,7 @@ CVE-2025-0541,0,0,2bcf4b49dafe0ca8072dca95d533896ed37e1521635c2f052072b52c75beca CVE-2025-0542,0,0,20d694a09804286361feeafaf90a4c3710af9ee4f076a4817f46453b45a4bf83,2025-01-25T17:15:21.030000 CVE-2025-0543,0,0,97c8d3fe60003fabb6ebf6a84fa27757230cb958341ec2b8d0886e83538320e0,2025-01-25T17:15:21.720000 CVE-2025-0554,0,0,d63933ab2a1fc2c70aefeeec5806ddf95b1569c2ec4a93f64ef98e2e1c34bb43,2025-01-18T06:15:28.160000 +CVE-2025-0556,1,1,33665ab93cb53f2cfc4237aee22aab9954624502d0563735fde8bf6568ff3e83,2025-02-12T16:15:43.030000 CVE-2025-0557,0,0,e808bac35fe14e1bd365beea3de65d9f8e7338d7448163ead06636689058d369,2025-01-18T09:15:07.710000 CVE-2025-0558,0,0,27ffe131a6321b0cb805cae5fc680fb74b1dcbc47a4ad8efbfdf40a5f678d3c5,2025-01-18T13:15:20.417000 CVE-2025-0559,0,0,0a800171c944689ff17e82031a900e5ceea035631c8364601a835471cdd72821,2025-01-18T14:15:25.420000 @@ -278921,6 +278931,7 @@ CVE-2025-1022,0,0,3584ff46175d68101a45d5993906f4257360866bbe28a87215bbd752fc41d7 CVE-2025-1025,0,0,169d790f70af0dd93c224d268df788909eaff4f4264ab0847532881b40bea08d,2025-02-05T20:15:45.593000 CVE-2025-1026,0,0,4962716a888aff2530344f294a2ddb1ab75b4c1e13e8d22f2bf72465d4df20aa,2025-02-05T05:15:10.687000 CVE-2025-1028,0,0,e6b466122e3fc2d0ee27df4e2f7cd7a187e72415f42ddc27a98c68b86b7822c0,2025-02-05T04:15:06.543000 +CVE-2025-1042,1,1,727597b2df8c6e5925af064d1c047222ac7870d4fb0653bc96def494163afd0b,2025-02-12T15:15:16.230000 CVE-2025-1044,0,0,f2d901015fc0e6049437a84a32809b8c4712e1d9cd344db9b24ed666ed368479,2025-02-11T20:15:35.913000 CVE-2025-1052,0,0,2558dc5aa326f4b5ba9a0b42415250f88c10a360fd02b001eec15ae5cce74dea,2025-02-11T20:15:36.070000 CVE-2025-1061,0,0,6a23092bda6a59b35939be3869c0d77fbfb36191dc775a19d3c3e005aa053667,2025-02-07T02:15:29.587000 @@ -278938,9 +278949,9 @@ CVE-2025-1085,0,0,f584db130967758b77431e11a5f469d25699b86ea49d2e400bcb605050e5a1 CVE-2025-1086,0,0,939f922cf83473192b0b258783d5ca641c4443176d820dcd2d3b84e692405303,2025-02-07T02:15:30.523000 CVE-2025-1096,0,0,f369ee58dbaa6e142f3d975d8711cac15a0a303facd75e898c558f3e454cc535,2025-02-08T01:15:07.947000 CVE-2025-1099,0,0,bf17eec112b497da534e01d8cb5eb20bbffb3f16a9e8841ea572781479eb3e5f,2025-02-10T11:15:21.147000 -CVE-2025-1100,1,1,caabd467f14edf71ead8d61afba156fa4f48c60c81aecb9cb29d5d2ddb691e7f,2025-02-12T14:15:31.647000 -CVE-2025-1101,1,1,653e4d8789e0a603dce8525fccddc1e58d3d170b62e552fa0e2e737799b6826d,2025-02-12T14:15:31.800000 -CVE-2025-1102,1,1,408734b1a794fa84fcebab8fbc58cb4a13567ed174ecb909d1caac1022991826,2025-02-12T14:15:31.943000 +CVE-2025-1100,0,0,caabd467f14edf71ead8d61afba156fa4f48c60c81aecb9cb29d5d2ddb691e7f,2025-02-12T14:15:31.647000 +CVE-2025-1101,0,0,653e4d8789e0a603dce8525fccddc1e58d3d170b62e552fa0e2e737799b6826d,2025-02-12T14:15:31.800000 +CVE-2025-1102,0,0,408734b1a794fa84fcebab8fbc58cb4a13567ed174ecb909d1caac1022991826,2025-02-12T14:15:31.943000 CVE-2025-1103,0,0,0da522d14deeaf45148b501a367ab749f077dad47c4b30f829bee85624296edf,2025-02-07T16:15:39.973000 CVE-2025-1104,0,0,f27d338b8e2511acc1acbe6516171263568f132d7b220ca31da3272b87396332,2025-02-07T17:15:31.477000 CVE-2025-1105,0,0,aa7b6cd0c83a86d735235deb6c7a0772ed1014df82b1e052f59dde14d6f5ec93,2025-02-07T18:15:28.433000 @@ -278991,12 +279002,12 @@ CVE-2025-1179,0,0,0ad6d408a4c217fcd2f0909da4acda484e872fa130d8cbaf0a20fe64a3a013 CVE-2025-1180,0,0,d1d8d021051706334ac9a6030ae7ee53a7be8dad213687a1d844e003d2aa2979,2025-02-11T15:15:20.260000 CVE-2025-1181,0,0,5744a84c9cc40c25fd0c78ba42e9c10937962bb69eac9a569d4d076d61e43914,2025-02-11T15:15:20.393000 CVE-2025-1182,0,0,813fe4ea4720937754bba6fc4a1d1e3d64c610460d89e01f2f7be5cbad40fd72,2025-02-11T15:15:20.523000 -CVE-2025-1183,0,0,c50f23eb27c5b89a5407b3fc357488245ef96cf500619544044ab07479b825dd,2025-02-12T07:15:07.863000 -CVE-2025-1184,0,0,8131a2a4601c6312f2be80133d491273bcd19bb85edd90fe334f633ee19a75ca,2025-02-12T07:15:08.410000 -CVE-2025-1185,0,0,d7d60669b8d029a70e5905da8185e5960e0963b635c54b43748534bea8b261a0,2025-02-12T08:15:08.870000 -CVE-2025-1186,0,0,547fd5e0a4619f219ac2583ed0200393212b444eb24e675c33f239c4a07dc330,2025-02-12T08:15:09.153000 +CVE-2025-1183,0,1,774bc5a8ee17c16ab02429df24e868edd2457f975924e971035ffcaf542b17ef,2025-02-12T15:15:16.520000 +CVE-2025-1184,0,1,a80fcc54a11609a5a903676e90c3038371980beaec234244c6e4d5dcbd7f3db1,2025-02-12T15:15:16.723000 +CVE-2025-1185,0,1,c83e5452fff0328a1e8da8da2083316337f86f3a81adf0b7358081e7c7fcd81c,2025-02-12T15:15:16.917000 +CVE-2025-1186,0,1,9576b7d4ea8b3cccc8eb9e8b907ade221983acd6c5734f425f9ff4db24f2feb3,2025-02-12T15:15:17.140000 CVE-2025-1187,0,0,43f3ee88fa37af31ad67e166fbe6ad94a2bfae0a2b2c2cfaf9fc12673460f41b,2025-02-12T09:15:08.613000 -CVE-2025-1188,0,0,18bebbbb20a4fb87b4a75dd6596b3b417690e341ae1b534eb541221170a7c80e,2025-02-12T09:15:08.803000 +CVE-2025-1188,0,1,1efd87eb623a2ea1602b65efb7de507f9509c349aa55c87850be5d94618279ae,2025-02-12T15:15:17.407000 CVE-2025-1189,0,0,1e88f29d1eddbfa7a88b6fffffc75999f3d987abafd9713fdca1605bf31701ac,2025-02-12T10:15:14.540000 CVE-2025-1190,0,0,da811d3d30f112190fe172c4b017c4318948c541b09c054d804548ae31d5325a,2025-02-12T10:15:14.740000 CVE-2025-1191,0,0,5aa818843f7a22909fc3a5a1705ae5196aa4ef915cc6666902591e7b2650aa60,2025-02-12T11:15:08.480000 @@ -279004,15 +279015,21 @@ CVE-2025-1192,0,0,6662abddb119a1bb2c91cccf7b709a688f2700556834ad9992fdbf2fe1f52a CVE-2025-1193,0,0,fcc052109589eb1970f90d1d7ff13b99a2b86ca08fe73a0a45a738ed06ce3eca,2025-02-10T18:15:34.273000 CVE-2025-1195,0,0,1d5f3753255234f81d63fc32e8cbd40738b3a19f44c9909eb40a82bf5fa2574d,2025-02-12T12:15:29.397000 CVE-2025-1196,0,0,bdc527bc42a2927bc910f55434082c1c0a1ed3e2c45952ca78ca5e2ee1724965,2025-02-12T12:15:29.640000 -CVE-2025-1197,1,1,60ac46ff13b863d239a0bfaeecf79fa3fd0c4c6ca1b7002f4896f427c424ec1f,2025-02-12T13:15:08.983000 -CVE-2025-1199,1,1,40308126959111aa48c274698df5d37756e819953db27b036d6fb4be271f3515,2025-02-12T13:15:09.537000 -CVE-2025-1200,1,1,ec3c8cc9571e223ae9867f7c93ea0eec88d8b939a6541467854106d434eb6669,2025-02-12T14:15:32.090000 -CVE-2025-1201,1,1,24e3bd420cbcfaff5a7e819062f5cc675cd65d98fded880a84770beffbe4b0cf,2025-02-12T14:15:32.297000 +CVE-2025-1197,0,1,5354355ae236a276a3f65e5eda2738c028cb5c94e47feecf12db2011e1245866,2025-02-12T15:15:17.670000 +CVE-2025-1199,0,0,40308126959111aa48c274698df5d37756e819953db27b036d6fb4be271f3515,2025-02-12T13:15:09.537000 +CVE-2025-1200,0,0,ec3c8cc9571e223ae9867f7c93ea0eec88d8b939a6541467854106d434eb6669,2025-02-12T14:15:32.090000 +CVE-2025-1201,0,0,24e3bd420cbcfaff5a7e819062f5cc675cd65d98fded880a84770beffbe4b0cf,2025-02-12T14:15:32.297000 +CVE-2025-1202,1,1,68ea7b6e33aa360ea653c2269e7bd31276265b58ef1ad4588d5cc5c63f0fd0d4,2025-02-12T15:15:17.920000 +CVE-2025-1206,1,1,1b63ab94a407914f1000aacda050b0a8aace04a77122bccf98ade88f280850b4,2025-02-12T15:15:18.093000 +CVE-2025-1207,1,1,7bb162a11374602cabef0a58114bb5e7ffacc992738e1b786794f1ef79474809,2025-02-12T16:15:44.393000 +CVE-2025-1208,1,1,4e2425a56d9b8fcaf9e973fed5e1d7aa050e90c0b8188ddb2cd5342cc89a1147,2025-02-12T16:15:44.613000 CVE-2025-1211,0,0,6ad766f197b6f1fef6e3f3a893bb15bcbebd409cf163deb595b57c10dde2bea9,2025-02-11T16:15:50.660000 +CVE-2025-1212,1,1,98d80cb73dedae96f8bcc23c42b9fd82cdc0bbfed669e845fdc4caee22b5a462,2025-02-12T15:15:18.290000 CVE-2025-1230,0,0,f5f2c5099eb280f9d04dd16fe504952a8bf38601f6c57755a8e738275e60ce0c,2025-02-12T11:15:11.230000 CVE-2025-1231,0,0,649e1b02ffb9b2bdea0c0d5302a32991e98ee2dd95c7154e6cc11a5ff00876a1,2025-02-11T15:15:20.643000 CVE-2025-1240,0,0,9246fa8e04ff02b401e811c0a0ea877726af12834c8315ffa6c43657c8f2f12a,2025-02-11T22:15:29.800000 CVE-2025-1243,0,0,ce5d6de4aa6c9e357b98e042ebbfccf5742c455f48067e48b6f93d2620d3c5f5,2025-02-12T01:15:09.073000 +CVE-2025-1244,1,1,3a7066df433eb03dbb1a5156667b9922c9a48d520391bb584a7af3176d35b733,2025-02-12T15:15:18.430000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,58d0a26aacf6cc700c9707f22937d4a9fd06e9e8ac5a17ed011c7efb874a7f40,2025-02-05T18:15:29.573000 @@ -279069,19 +279086,19 @@ CVE-2025-20640,0,0,19242b4ab5555d3c296c9d663e46f0f6013cbb3b643a9a42576483affee44 CVE-2025-20641,0,0,8f64d7bdc38a4d4d6ffe4b925ecebf51da87177f825fd96d952c3b788cf66055,2025-02-04T15:22:10.670000 CVE-2025-20642,0,0,110f2bb3fd587df7b20a2739b2ed2dbc64fbe49db6605a51a1b388b3e56f194a,2025-02-04T15:20:21.300000 CVE-2025-20643,0,0,2e2366245f9f5bcad98b9838a1898890ae5530ce7393a7ea521ec6965e892894,2025-02-04T15:19:23.330000 -CVE-2025-20881,0,1,69e8ec3ffc0d609e9ff0a5c0f14dc382935286a9654ff8a957242175a6264c27,2025-02-12T13:42:58.443000 -CVE-2025-20882,0,1,f4193a007427cf2316ed2b8c45d5bf9c15dfb695bfcd22869153b3359f33afd6,2025-02-12T13:43:13.267000 -CVE-2025-20883,0,1,cb8cf9b686cdb6300b673deaabe4b9ce5e5f73e6e26d527f21f3d0dcbca2cc19,2025-02-12T13:43:37.743000 -CVE-2025-20884,0,1,0ef919d19e33130de91addcfd3689e86c4693c0d6297e2621f7de6044b22b402,2025-02-12T13:44:06.350000 -CVE-2025-20885,0,1,df9df381539edfb91729009921d73aada3154c637a0cb4c17c23914de8cafef1,2025-02-12T13:45:19.913000 -CVE-2025-20886,0,1,97c291410a0c614e0f48253d7784372b9b25278bc5571b4b7b6da62566c0fc4e,2025-02-12T13:45:48.443000 -CVE-2025-20887,0,1,f70656b3e4c0a04ef380dde01aebd62568d08db27801fe81e2e70fe8a7cfeaef,2025-02-12T13:46:17.187000 -CVE-2025-20888,0,1,e70eadf3983b2268decd2d92646d6a75e4a7fa5b444976242784261718aac8a1,2025-02-12T13:46:35.857000 -CVE-2025-20889,0,1,bfdacd8e85bf9d95ce60133c673e26387a32ac22a98b96cbd3e007539030393c,2025-02-12T13:46:49.193000 -CVE-2025-20890,0,1,771da717386dd7e2da6010ed87cc82d70ffd7ee71e46755ed3ff18993fe57445,2025-02-12T13:47:05.413000 -CVE-2025-20891,0,1,62cf5cd78e9505b20615dd46ae94b8096fe30c8b854d4c6f4a744fed5c2e36d2,2025-02-12T13:47:21.220000 -CVE-2025-20892,0,1,b771ffba7ef2fc5530fad3230c5bdfb0a16912c760c754be8391ec5687549536,2025-02-12T13:47:40.283000 -CVE-2025-20893,0,1,f85545b990c78d6fa6432d9a988d3f6eec2ec9478094baf8caa9d8289cf10fdb,2025-02-12T13:48:39.090000 +CVE-2025-20881,0,0,69e8ec3ffc0d609e9ff0a5c0f14dc382935286a9654ff8a957242175a6264c27,2025-02-12T13:42:58.443000 +CVE-2025-20882,0,0,f4193a007427cf2316ed2b8c45d5bf9c15dfb695bfcd22869153b3359f33afd6,2025-02-12T13:43:13.267000 +CVE-2025-20883,0,0,cb8cf9b686cdb6300b673deaabe4b9ce5e5f73e6e26d527f21f3d0dcbca2cc19,2025-02-12T13:43:37.743000 +CVE-2025-20884,0,0,0ef919d19e33130de91addcfd3689e86c4693c0d6297e2621f7de6044b22b402,2025-02-12T13:44:06.350000 +CVE-2025-20885,0,0,df9df381539edfb91729009921d73aada3154c637a0cb4c17c23914de8cafef1,2025-02-12T13:45:19.913000 +CVE-2025-20886,0,0,97c291410a0c614e0f48253d7784372b9b25278bc5571b4b7b6da62566c0fc4e,2025-02-12T13:45:48.443000 +CVE-2025-20887,0,0,f70656b3e4c0a04ef380dde01aebd62568d08db27801fe81e2e70fe8a7cfeaef,2025-02-12T13:46:17.187000 +CVE-2025-20888,0,0,e70eadf3983b2268decd2d92646d6a75e4a7fa5b444976242784261718aac8a1,2025-02-12T13:46:35.857000 +CVE-2025-20889,0,0,bfdacd8e85bf9d95ce60133c673e26387a32ac22a98b96cbd3e007539030393c,2025-02-12T13:46:49.193000 +CVE-2025-20890,0,0,771da717386dd7e2da6010ed87cc82d70ffd7ee71e46755ed3ff18993fe57445,2025-02-12T13:47:05.413000 +CVE-2025-20891,0,0,62cf5cd78e9505b20615dd46ae94b8096fe30c8b854d4c6f4a744fed5c2e36d2,2025-02-12T13:47:21.220000 +CVE-2025-20892,0,0,b771ffba7ef2fc5530fad3230c5bdfb0a16912c760c754be8391ec5687549536,2025-02-12T13:47:40.283000 +CVE-2025-20893,0,0,f85545b990c78d6fa6432d9a988d3f6eec2ec9478094baf8caa9d8289cf10fdb,2025-02-12T13:48:39.090000 CVE-2025-20894,0,0,2baed7d01f38ec8eaa2911bec3736421bcdfaa234e0e19deb6dda3741db77733,2025-02-04T08:15:30.673000 CVE-2025-20895,0,0,51221b078ad5f06176b86212a81931a401064887e07db2ef54966a289a1403c7,2025-02-04T08:15:30.827000 CVE-2025-20896,0,0,db8b5e76e05673e4957f3331f51a5ae0f253c3313d4dd61e1aa47a3c5e7e92d1,2025-02-04T08:15:30.973000 @@ -279091,10 +279108,10 @@ CVE-2025-20899,0,0,37e552d621ddc6dc1641fe22a67e7855bbb90df3935b8b7bcae06f629e861 CVE-2025-20900,0,0,cdbfe12fadb6b1daef1b5df096ec18e9fbbc9e22b5f7855c559a75859f21009e,2025-02-04T08:15:31.573000 CVE-2025-20901,0,0,1cd5be79ef23e55fe6145042cb5a2419ef341bfead0310c40602ee7c827f70ed,2025-02-04T08:15:31.707000 CVE-2025-20902,0,0,8013f469fd8000f4a72f5eaf9c7432ead63aa4009d5e5a41230ef22aa8a9bad7,2025-02-04T08:15:31.857000 -CVE-2025-20904,0,1,e64372ca9753518166d5d1484c4b77aaccc9ceef13997ee92c25077a814f1ec5,2025-02-12T13:48:47.607000 -CVE-2025-20905,0,1,a956dc69bd97b881e89bd16659a244ea0d2dfdbee0596702ba457566048c8c03,2025-02-12T13:49:26.310000 +CVE-2025-20904,0,0,e64372ca9753518166d5d1484c4b77aaccc9ceef13997ee92c25077a814f1ec5,2025-02-12T13:48:47.607000 +CVE-2025-20905,0,0,a956dc69bd97b881e89bd16659a244ea0d2dfdbee0596702ba457566048c8c03,2025-02-12T13:49:26.310000 CVE-2025-20906,0,0,227b94242ada97f5f1b38d2297103a593c8ae5078c64d6e33b6eecd693ed4b68,2025-02-04T08:15:32.263000 -CVE-2025-20907,0,1,379c340eb54b31b9cb5f71668b76a83cd25f313f0ca982b642024600b12637ce,2025-02-12T13:49:49.460000 +CVE-2025-20907,0,0,379c340eb54b31b9cb5f71668b76a83cd25f313f0ca982b642024600b12637ce,2025-02-12T13:49:49.460000 CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000 CVE-2025-21087,0,0,33fb1ec06a861dcf74a4d61156f86fd896fc8a89287560b58160ed063ae8e130,2025-02-05T18:15:30.430000 CVE-2025-21088,0,0,2fc6ecd1dae8270574ff01139ed8a42b63c05aa457c258a8d76906ce3a93ca54,2025-01-15T16:15:32.413000 @@ -279118,7 +279135,7 @@ CVE-2025-21131,0,0,bd9947447c6eaa1cc16f247aee5cb76a0ae540007c1234492add7170f98e9 CVE-2025-21132,0,0,638462d9be187051a18a689c12e2e1ce1ddef5c76aec080f6deef373f9d944d3,2025-01-17T20:37:29.347000 CVE-2025-21133,0,0,9851c0eba5952f518e7359005fb3e9b2f8426fec26e26df6a38702b911bcdd6a,2025-01-21T17:49:17.330000 CVE-2025-21134,0,0,c93daea6012e8c7d66590fc258c4a36aadabfb4ef78a3c9c6e5bab6127e3d755,2025-01-16T20:43:02.810000 -CVE-2025-21135,0,1,f6a822f92ac86ff9d1c3b9c221ac90629c38746a42c8a93825272cf7a4492037,2025-02-12T13:38:26.103000 +CVE-2025-21135,0,0,f6a822f92ac86ff9d1c3b9c221ac90629c38746a42c8a93825272cf7a4492037,2025-02-12T13:38:26.103000 CVE-2025-21136,0,0,1471b8df9400bf2a614051a2204be217d0d5f426f818af5f4e13aa30b875abad,2025-01-21T17:49:34.937000 CVE-2025-21137,0,0,45139b02243d4b1da14a9edb94333c11b50a8560016fecd32028ca2a6372fd84,2025-01-21T17:49:47.150000 CVE-2025-21138,0,0,9175fd36c28710bcae9acb351f078e58c4e36962afaf9695ab07299ddfe97cfb,2025-01-21T17:49:57.513000 @@ -279530,12 +279547,12 @@ CVE-2025-21690,0,0,409184d515a8ba278a78e3182a62947193916d8738de3b3f3b5bc8e7c7527 CVE-2025-21691,0,0,7b442008fae99134657976bf7535055e277309d3aaae2c6d48207dd41283a97d,2025-02-10T16:15:38.660000 CVE-2025-21692,0,0,1555d9a0f484c79fb0521445824e128614c8ef002d6f5d06ed98703295d0b013,2025-02-10T16:15:38.763000 CVE-2025-21693,0,0,7a6b4aca501bc98d818a39748ab53f772cb8c2c6c63fb05bf7b85e749e32488e,2025-02-10T18:15:35.367000 -CVE-2025-21694,1,1,f3208723e5ea28fa5fd7201508cf23ae505e836a8b84859f7104fefaeeac6af4,2025-02-12T14:15:32.463000 -CVE-2025-21695,1,1,ca643353f3476144f00734e5585a92f981e373f7c1f68af83a5b89241db65ab0,2025-02-12T14:15:32.577000 -CVE-2025-21696,1,1,b50db3425e3c5ae8f9bcd952321a8faca5176a354e7da76e7a95c5c44fb3f418,2025-02-12T14:15:32.677000 -CVE-2025-21697,1,1,21dbc5e8ca09f0db10d8b851c55a1218ced4547bd60419817adfbeb41bc40c98,2025-02-12T14:15:32.787000 -CVE-2025-21698,1,1,d7e293d79ce2d1c259f49fc2afa96a937082b9e40b1bdd42a351c66f25f809e0,2025-02-12T14:15:32.900000 -CVE-2025-21699,1,1,0738ffc847a7a2829b592d8dc197a21782e195ddce9370e0b4f4c6413dc7be27,2025-02-12T14:15:33.020000 +CVE-2025-21694,0,0,f3208723e5ea28fa5fd7201508cf23ae505e836a8b84859f7104fefaeeac6af4,2025-02-12T14:15:32.463000 +CVE-2025-21695,0,0,ca643353f3476144f00734e5585a92f981e373f7c1f68af83a5b89241db65ab0,2025-02-12T14:15:32.577000 +CVE-2025-21696,0,0,b50db3425e3c5ae8f9bcd952321a8faca5176a354e7da76e7a95c5c44fb3f418,2025-02-12T14:15:32.677000 +CVE-2025-21697,0,0,21dbc5e8ca09f0db10d8b851c55a1218ced4547bd60419817adfbeb41bc40c98,2025-02-12T14:15:32.787000 +CVE-2025-21698,0,0,d7e293d79ce2d1c259f49fc2afa96a937082b9e40b1bdd42a351c66f25f809e0,2025-02-12T14:15:32.900000 +CVE-2025-21699,0,0,0738ffc847a7a2829b592d8dc197a21782e195ddce9370e0b4f4c6413dc7be27,2025-02-12T14:15:33.020000 CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000 CVE-2025-22130,0,0,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000 CVE-2025-22131,0,0,69440877e24142b0c883a083dd220512bc0b0c9b1551c23031d4be6598836d66,2025-01-20T16:15:27.880000 @@ -279930,7 +279947,7 @@ CVE-2025-22913,0,0,3bc9600e263923113da087744ed3f4aa37ff9ee04dbfd0442bed480f8f497 CVE-2025-22916,0,0,3b1c3cad59207b1adc896532af2f2e01463f789a6a5c3c67e9a5bc2566ececf1,2025-01-16T15:15:16.113000 CVE-2025-22917,0,0,0d72f7ff6d66913d2820416ce95685d3bc853139131a9698fa080019dc84bb06,2025-01-29T16:15:43.907000 CVE-2025-22918,0,0,985a7d3a1f4e44f1bcd441f29cd4cd89565f32d382d6b97f3b8954242be3f08e,2025-02-04T15:15:22.713000 -CVE-2025-22936,0,1,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6c20,2025-02-12T14:15:33.187000 +CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6c20,2025-02-12T14:15:33.187000 CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000 CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000 CVE-2025-22957,0,0,916201be55856fe17638195010411f5f5b49ee491e16fc0f0d0d9fe711b69be4,2025-02-03T17:15:26.677000 @@ -280006,7 +280023,7 @@ CVE-2025-23088,0,0,845d9312418bf4c13a6587b45a3978c9579f09ecb2202802a6894efed1c83 CVE-2025-23089,0,0,3ae0cb484c93b409c89c5203f6cad39f49e4ea73c8d9d46c331f864ca1913e9e,2025-02-10T23:15:15.960000 CVE-2025-23090,0,0,db1a04b33215738ef9ff89e7dd3243ce6839535b0728d9bb0d1927af1170accb,2025-02-11T00:15:29.570000 CVE-2025-23091,0,0,985e1a5bbb967b5c47b75684c18e18b6f1b255a13df4e133de56c4c9f7af4ed8,2025-02-01T07:15:08.277000 -CVE-2025-23093,0,0,ebfbbf9806215e4ced792367e1526d0c7b35f18d444e155d70d79d8077e2c65b,2025-02-11T22:15:30.427000 +CVE-2025-23093,0,1,7320826aecf4e98ab5895586ea1e6e8575244a0f095c3e1b8e12bb0d362e3614,2025-02-12T15:15:18.597000 CVE-2025-23094,0,0,7cea7e6e51afc006925b4e48de2308fe64516f9177080ff30f9a60f654ae9082,2025-02-11T22:15:30.597000 CVE-2025-23108,0,0,0867ae52bf9537919e00df206497183b5abf45a3a43e56579f476cc3d26e8d6c,2025-01-13T18:15:22.680000 CVE-2025-23109,0,0,4d519c5c41161d21ebd8f814ea3659acc2224a598528dd7d3e4c7b87a5ad8cc0,2025-01-13T18:15:22.903000 @@ -280298,7 +280315,7 @@ CVE-2025-23794,0,0,8097f4da128cc9925b9ca616a7ea5eba076c4b40e08f589897a5a808ba282 CVE-2025-23795,0,0,f110438d2af14e24d173b3605ff2ed725867872c4e87dee92040f4ebb58e5378,2025-01-16T21:15:20.567000 CVE-2025-23796,0,0,0a3fabd756343760fb9fd7ea1faf1fd87c92ac1431e709162d1ddbc10e973b0c,2025-01-16T21:15:20.727000 CVE-2025-23797,0,0,082b5b5ea2fb63d11c655fbf0b483df0d8fb7cfd44eb169c32045a13b0f3b570,2025-01-16T21:15:20.877000 -CVE-2025-23798,0,0,414d8e782134768860832599ac0ec11b45803d59a040c05e64233009b978925f,2025-01-22T15:15:23.873000 +CVE-2025-23798,0,1,707c49293c33d181ff5a97e7158413a43279428c770e750f95afaf56a8f385d6,2025-02-12T16:15:45.630000 CVE-2025-23799,0,0,11bdf56dd0c8d60a8e7ce20b6fe107d6d81aa05ec15436d7d55867128885bddf,2025-02-03T15:15:22.843000 CVE-2025-23800,0,0,878d719ae1f903e32e2d6add2209886c141de252f651652314e69251a4a34fb9,2025-01-16T21:15:21.040000 CVE-2025-23801,0,0,f35c3b1c7ca35d2725621e19aa2aa2edc970115b0f68db658f0c8dc9dcb2d2ec,2025-01-16T21:15:21.190000 @@ -280982,6 +280999,8 @@ CVE-2025-25241,0,0,3f1a5e9f52cb19b464445ba11bc8902290ee3de6281565f07fab135133fb7 CVE-2025-25243,0,0,4a1fb2a2f647dbb24d92bc1eec2013806163e245973af288dc8e801924ea4b36,2025-02-11T06:15:24.330000 CVE-2025-25246,0,0,0ae0916aaea4283fe6ce79729127d0aa8edfdf07242f3416b5c2d5ec885c2c98,2025-02-05T05:15:11.663000 CVE-2025-25247,0,0,2690485555121cc3195beb93ff27e2a62b28c4f65e937f10f15ef11f9c4f824a,2025-02-10T15:15:13.333000 +CVE-2025-25349,1,1,1719e1721d7487688b7bcc870b24d655aa6de7ad5dd7048ecc08987a1985507b,2025-02-12T16:15:46.323000 +CVE-2025-25351,1,1,cdcd8e58bc2d04652968c3d47eedc1a7504f4c099db31cb878d22be60d38fffe,2025-02-12T16:15:46.453000 CVE-2025-25522,0,0,134d853c7acffe14f61ea9663eafcc5a3836051c19c8c173c6beae54efc4aa8e,2025-02-11T19:15:18.883000 CVE-2025-25523,0,0,be3d6367d2839ada2e950cba54f10f43e3987782bf2b0625985a3811b208de0b,2025-02-11T19:15:19 CVE-2025-25524,0,0,266e58e31a39a594c7ade747d38a7ddd90ae4d066937745ff84387f801bb03fe,2025-02-11T19:15:19.110000 @@ -280991,46 +281010,46 @@ CVE-2025-25527,0,0,314211c8189b7aa6a1a7e96a439066093948b3b95219e59fa2c06aefb556d CVE-2025-25528,0,0,5b917e62e0ef1905194ac4a608df812ee8814d382f2458a64eace04d90b10d0b,2025-02-11T20:15:39.090000 CVE-2025-25529,0,0,3b7615b283527305fc75ac9cfd1583c3a2f40f867f0fe9298be0be0d4f070094,2025-02-11T20:15:39.217000 CVE-2025-25530,0,0,b297970422a9009f3519f09d12d391c8a089497e9f856b7f5a138869935d03dd,2025-02-11T20:15:39.327000 -CVE-2025-26339,1,1,bf29cf27bf0313878ff158c2baab3319b314e90402d364b4bae80b0ff3690b84,2025-02-12T14:15:33.510000 -CVE-2025-26340,1,1,b066968dbbcdbf77631ff8578b94ee75e5d24efc878ed88726b86433606826d8,2025-02-12T14:15:33.650000 -CVE-2025-26341,1,1,66ba8ee45cc95ad8cd01c50f18902be4ac8bf5285c3bc5f97b6c1e0be981e1ce,2025-02-12T14:15:33.857000 -CVE-2025-26342,1,1,ec590c8f9a9ed71815ba8dc7d1d5274f9fb3cdbb158dcafc881d5c3e868b5bcc,2025-02-12T14:15:33.990000 -CVE-2025-26343,1,1,960dad3fa07bb87cc9332137716edb3330260b7ab45b51fcec9fea40519bf486,2025-02-12T14:15:34.130000 -CVE-2025-26344,1,1,0a6ae8deb5196b7efdb0063b5acd387c68636b653589b9722f335b24077318ee,2025-02-12T14:15:34.273000 -CVE-2025-26345,1,1,b712a247e3db83a5d2f58a4bc5eac28d75727a66e3dfdd4461957cbc93bf784b,2025-02-12T14:15:34.407000 -CVE-2025-26346,1,1,ff46d94f3110b344929b215ebaf0199f7406977b937594b1a9a41e51235b705e,2025-02-12T14:15:34.547000 -CVE-2025-26347,1,1,07d9e939484eaa1ff4cdabd23cc3e3b64f9cc51758eba62a62b4576177e93bd5,2025-02-12T14:15:34.687000 -CVE-2025-26348,1,1,2549e0690fe0b2289debff5715a31c0858579e4a52666873108e808e7a1391f3,2025-02-12T14:15:34.827000 -CVE-2025-26349,1,1,46a525249bae5677e34a3cc216ff60b562c5d1674c059f1c87b7c79adcfead31,2025-02-12T14:15:34.960000 -CVE-2025-26350,1,1,5ad07ddbfed394ae8b9f2194e4302f5f2cc532cea5b1ff67dec8c790c44d60c9,2025-02-12T14:15:35.107000 -CVE-2025-26351,1,1,a3798fe6605bc205865f8ad5e14fad913689aa161a5ddd2629354f847951765f,2025-02-12T14:15:35.270000 -CVE-2025-26352,1,1,661aaebbc8ab7034cb67a928c30416395b30d5b732209e4a2530793600191851,2025-02-12T14:15:35.430000 -CVE-2025-26353,1,1,47a9a9154aefb0537f7a97104d1455dfb6443de7d94899a2bd861405a87c9536,2025-02-12T14:15:35.587000 -CVE-2025-26354,1,1,b5c32253cc9cdd28ca6819bda06c053aee121e243d1691c0d87075e3815527b5,2025-02-12T14:15:35.727000 -CVE-2025-26355,1,1,2acfa9c3428cb3ae2856fe3df3c8974e1ae17361024d5f15c3bdb0724aa3eb48,2025-02-12T14:15:35.870000 -CVE-2025-26356,1,1,d902fe85de7d86661a403d9bd748081501584575651a123a0d8756372a2119d1,2025-02-12T14:15:36.017000 -CVE-2025-26357,1,1,d12fffc6453131e19af18d2736d53e2c86beb87191f3e7dc9faab56ad1d14265,2025-02-12T14:15:36.160000 -CVE-2025-26358,1,1,62a9d58f329d1e5057566eb411cceff4edaea062699a5f8e61414984cd685026,2025-02-12T14:15:36.297000 -CVE-2025-26359,1,1,2823740aad1d2e1e54f39765f81d6af19ee1e6f98c1617bf3a6d1781a5db05e4,2025-02-12T14:15:36.437000 -CVE-2025-26360,1,1,74998f805d63e80b06e08c26f633b45a629d964a2866bc7a17f9a5b3da0a3763,2025-02-12T14:15:36.577000 -CVE-2025-26361,1,1,0547df7d0c4851fbd71d5f88c2f92994a0067b35048d6293f6771ddc21d7ab4f,2025-02-12T14:15:36.717000 -CVE-2025-26362,1,1,2265dbb13ea5c83e9b8e6af3e20d744ef23b59c9cb546f2fd2f391883ccdafa6,2025-02-12T14:15:36.847000 -CVE-2025-26363,1,1,46a47d90feee1eae4bf2681edb667146d94fe2cd2803a7e0eea659f5e7114099,2025-02-12T14:15:36.983000 -CVE-2025-26364,1,1,3eb8d5644d611e9680424d4296d7f72545cd75c2e0e0817f5ba409b5c7cdaf77,2025-02-12T14:15:37.123000 -CVE-2025-26365,1,1,7c36b8430a9a394cdbec12b10152a2ec09c33d11bfec6f968b5075e4b08ac9e5,2025-02-12T14:15:37.267000 -CVE-2025-26366,1,1,c8d57424dad392106e5a726746557532b665bcef15029b1f4b19de2ae7d8539e,2025-02-12T14:15:37.397000 -CVE-2025-26367,1,1,c2cf7bf136d773db89a151473940815ed9c639b0fb261d59ba174f6b3c49114d,2025-02-12T14:15:37.533000 -CVE-2025-26368,1,1,10f1bf75646d66a58ddb0aa5ef2dd6f2e600620131dd044a507d0ede2464798e,2025-02-12T14:15:37.660000 -CVE-2025-26369,1,1,9e63e141ef2c975cf81ca4f3d665055cd562f2546ff73eec1bf416a8d676ce8d,2025-02-12T14:15:37.800000 -CVE-2025-26370,1,1,c091180c9fb75c1bd5dd287c227c8d3c1c8d705067033938fe7624ff18defd88,2025-02-12T14:15:37.940000 -CVE-2025-26371,1,1,916e2eb100652646d6c83c2af9b479662965815d0db6129dc7876884ae2839fd,2025-02-12T14:15:38.077000 -CVE-2025-26372,1,1,854af7162d2787c5886a1dba65290cdd88c69dd72e904f78194314ecda91a0ca,2025-02-12T14:15:38.227000 -CVE-2025-26373,1,1,303af1779a32677b73ece8c6cb9abbfab9f0407a4e36f50c2fd46f36427081ba,2025-02-12T14:15:38.360000 -CVE-2025-26374,1,1,6b4cde6bdd21addaff9f9939eac886d337dc390ef4436213649dd204813f156d,2025-02-12T14:15:38.500000 -CVE-2025-26375,1,1,95c0e5603a6b8f4235685b120b43d32682014e85ba62c1ad13acdb904ebd74ef,2025-02-12T14:15:38.633000 -CVE-2025-26376,1,1,b9f0909bd3bcb0a1869e3cf0682583c1471937e6148f03a4c6b368746ac3494f,2025-02-12T14:15:38.777000 -CVE-2025-26377,1,1,e3e151b6bd619f3832bf374f51b634c26d759814a1259441eaebff3ee9909e72,2025-02-12T14:15:38.933000 -CVE-2025-26378,1,1,eae26e196029c3f2d8c112ec45f1721a88ef2ca9a01115a61cbc899a329140dd,2025-02-12T14:15:39.163000 +CVE-2025-26339,0,0,bf29cf27bf0313878ff158c2baab3319b314e90402d364b4bae80b0ff3690b84,2025-02-12T14:15:33.510000 +CVE-2025-26340,0,0,b066968dbbcdbf77631ff8578b94ee75e5d24efc878ed88726b86433606826d8,2025-02-12T14:15:33.650000 +CVE-2025-26341,0,0,66ba8ee45cc95ad8cd01c50f18902be4ac8bf5285c3bc5f97b6c1e0be981e1ce,2025-02-12T14:15:33.857000 +CVE-2025-26342,0,0,ec590c8f9a9ed71815ba8dc7d1d5274f9fb3cdbb158dcafc881d5c3e868b5bcc,2025-02-12T14:15:33.990000 +CVE-2025-26343,0,0,960dad3fa07bb87cc9332137716edb3330260b7ab45b51fcec9fea40519bf486,2025-02-12T14:15:34.130000 +CVE-2025-26344,0,1,4ef803a2f81991b5d659cb2827cea363defd6bba023204f95b005089922a982e,2025-02-12T15:15:18.757000 +CVE-2025-26345,0,1,5c179481c8be0ec34986e1d99bcd057b8698cdc095e04bcfaf1d5c623e6c83ab,2025-02-12T15:15:18.930000 +CVE-2025-26346,0,0,ff46d94f3110b344929b215ebaf0199f7406977b937594b1a9a41e51235b705e,2025-02-12T14:15:34.547000 +CVE-2025-26347,0,0,07d9e939484eaa1ff4cdabd23cc3e3b64f9cc51758eba62a62b4576177e93bd5,2025-02-12T14:15:34.687000 +CVE-2025-26348,0,0,2549e0690fe0b2289debff5715a31c0858579e4a52666873108e808e7a1391f3,2025-02-12T14:15:34.827000 +CVE-2025-26349,0,0,46a525249bae5677e34a3cc216ff60b562c5d1674c059f1c87b7c79adcfead31,2025-02-12T14:15:34.960000 +CVE-2025-26350,0,0,5ad07ddbfed394ae8b9f2194e4302f5f2cc532cea5b1ff67dec8c790c44d60c9,2025-02-12T14:15:35.107000 +CVE-2025-26351,0,0,a3798fe6605bc205865f8ad5e14fad913689aa161a5ddd2629354f847951765f,2025-02-12T14:15:35.270000 +CVE-2025-26352,0,0,661aaebbc8ab7034cb67a928c30416395b30d5b732209e4a2530793600191851,2025-02-12T14:15:35.430000 +CVE-2025-26353,0,0,47a9a9154aefb0537f7a97104d1455dfb6443de7d94899a2bd861405a87c9536,2025-02-12T14:15:35.587000 +CVE-2025-26354,0,0,b5c32253cc9cdd28ca6819bda06c053aee121e243d1691c0d87075e3815527b5,2025-02-12T14:15:35.727000 +CVE-2025-26355,0,0,2acfa9c3428cb3ae2856fe3df3c8974e1ae17361024d5f15c3bdb0724aa3eb48,2025-02-12T14:15:35.870000 +CVE-2025-26356,0,0,d902fe85de7d86661a403d9bd748081501584575651a123a0d8756372a2119d1,2025-02-12T14:15:36.017000 +CVE-2025-26357,0,0,d12fffc6453131e19af18d2736d53e2c86beb87191f3e7dc9faab56ad1d14265,2025-02-12T14:15:36.160000 +CVE-2025-26358,0,0,62a9d58f329d1e5057566eb411cceff4edaea062699a5f8e61414984cd685026,2025-02-12T14:15:36.297000 +CVE-2025-26359,0,0,2823740aad1d2e1e54f39765f81d6af19ee1e6f98c1617bf3a6d1781a5db05e4,2025-02-12T14:15:36.437000 +CVE-2025-26360,0,0,74998f805d63e80b06e08c26f633b45a629d964a2866bc7a17f9a5b3da0a3763,2025-02-12T14:15:36.577000 +CVE-2025-26361,0,0,0547df7d0c4851fbd71d5f88c2f92994a0067b35048d6293f6771ddc21d7ab4f,2025-02-12T14:15:36.717000 +CVE-2025-26362,0,0,2265dbb13ea5c83e9b8e6af3e20d744ef23b59c9cb546f2fd2f391883ccdafa6,2025-02-12T14:15:36.847000 +CVE-2025-26363,0,0,46a47d90feee1eae4bf2681edb667146d94fe2cd2803a7e0eea659f5e7114099,2025-02-12T14:15:36.983000 +CVE-2025-26364,0,0,3eb8d5644d611e9680424d4296d7f72545cd75c2e0e0817f5ba409b5c7cdaf77,2025-02-12T14:15:37.123000 +CVE-2025-26365,0,0,7c36b8430a9a394cdbec12b10152a2ec09c33d11bfec6f968b5075e4b08ac9e5,2025-02-12T14:15:37.267000 +CVE-2025-26366,0,0,c8d57424dad392106e5a726746557532b665bcef15029b1f4b19de2ae7d8539e,2025-02-12T14:15:37.397000 +CVE-2025-26367,0,0,c2cf7bf136d773db89a151473940815ed9c639b0fb261d59ba174f6b3c49114d,2025-02-12T14:15:37.533000 +CVE-2025-26368,0,0,10f1bf75646d66a58ddb0aa5ef2dd6f2e600620131dd044a507d0ede2464798e,2025-02-12T14:15:37.660000 +CVE-2025-26369,0,0,9e63e141ef2c975cf81ca4f3d665055cd562f2546ff73eec1bf416a8d676ce8d,2025-02-12T14:15:37.800000 +CVE-2025-26370,0,0,c091180c9fb75c1bd5dd287c227c8d3c1c8d705067033938fe7624ff18defd88,2025-02-12T14:15:37.940000 +CVE-2025-26371,0,0,916e2eb100652646d6c83c2af9b479662965815d0db6129dc7876884ae2839fd,2025-02-12T14:15:38.077000 +CVE-2025-26372,0,0,854af7162d2787c5886a1dba65290cdd88c69dd72e904f78194314ecda91a0ca,2025-02-12T14:15:38.227000 +CVE-2025-26373,0,0,303af1779a32677b73ece8c6cb9abbfab9f0407a4e36f50c2fd46f36427081ba,2025-02-12T14:15:38.360000 +CVE-2025-26374,0,0,6b4cde6bdd21addaff9f9939eac886d337dc390ef4436213649dd204813f156d,2025-02-12T14:15:38.500000 +CVE-2025-26375,0,0,95c0e5603a6b8f4235685b120b43d32682014e85ba62c1ad13acdb904ebd74ef,2025-02-12T14:15:38.633000 +CVE-2025-26376,0,0,b9f0909bd3bcb0a1869e3cf0682583c1471937e6148f03a4c6b368746ac3494f,2025-02-12T14:15:38.777000 +CVE-2025-26377,0,0,e3e151b6bd619f3832bf374f51b634c26d759814a1259441eaebff3ee9909e72,2025-02-12T14:15:38.933000 +CVE-2025-26378,0,0,eae26e196029c3f2d8c112ec45f1721a88ef2ca9a01115a61cbc899a329140dd,2025-02-12T14:15:39.163000 CVE-2025-26408,0,0,33b8ab1d964eed8374cf2895d0fb5039e22b031ca552fb49290499a2fa382a45,2025-02-11T15:15:21.377000 CVE-2025-26409,0,0,ca13ca3a8e4796bfb9010cd7417af6b477b812c777fc3763439360034c7a9481,2025-02-11T15:15:21.537000 CVE-2025-26410,0,0,7436cf38115e526a16ee35c34809d408cd39f53af45b718ca00b110673ee34d1,2025-02-11T15:15:21.700000