From b12b73d26bb82a02217e7729c070a8acbe9de2e9 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 12 Feb 2025 03:04:24 +0000 Subject: [PATCH] Auto-Update: 2025-02-12T03:00:57.960645+00:00 --- CVE-2024/CVE-2024-01xx/CVE-2024-0142.json | 8 +- CVE-2024/CVE-2024-01xx/CVE-2024-0143.json | 60 +++++++++++++ CVE-2024/CVE-2024-01xx/CVE-2024-0144.json | 60 +++++++++++++ CVE-2024/CVE-2024-01xx/CVE-2024-0145.json | 60 +++++++++++++ CVE-2024/CVE-2024-120xx/CVE-2024-12085.json | 6 +- CVE-2024/CVE-2024-17xx/CVE-2024-1702.json | 73 ++++++++++++++-- CVE-2024/CVE-2024-17xx/CVE-2024-1706.json | 72 ++++++++++++++-- CVE-2024/CVE-2024-17xx/CVE-2024-1707.json | 95 ++++++++++++++++++--- CVE-2024/CVE-2024-258xx/CVE-2024-25898.json | 70 +++++++++++++-- CVE-2024/CVE-2024-291xx/CVE-2024-29171.json | 56 ++++++++++++ CVE-2024/CVE-2024-291xx/CVE-2024-29172.json | 56 ++++++++++++ CVE-2024/CVE-2024-297xx/CVE-2024-29793.json | 52 ++++++++++- CVE-2024/CVE-2024-313xx/CVE-2024-31349.json | 52 ++++++++++- CVE-2024/CVE-2024-345xx/CVE-2024-34566.json | 52 ++++++++++- CVE-2024/CVE-2024-34xx/CVE-2024-3459.json | 82 ++++++++++++++++-- CVE-2024/CVE-2024-408xx/CVE-2024-40890.json | 6 +- CVE-2024/CVE-2024-408xx/CVE-2024-40891.json | 6 +- CVE-2024/CVE-2024-538xx/CVE-2024-53880.json | 56 ++++++++++++ CVE-2025/CVE-2025-12xx/CVE-2025-1243.json | 82 ++++++++++++++++++ CVE-2025/CVE-2025-213xx/CVE-2025-21391.json | 8 +- CVE-2025/CVE-2025-214xx/CVE-2025-21418.json | 8 +- CVE-2025/CVE-2025-233xx/CVE-2025-23359.json | 56 ++++++++++++ README.md | 53 ++++++------ _state.csv | 72 +++++++++------- 24 files changed, 1084 insertions(+), 117 deletions(-) create mode 100644 CVE-2024/CVE-2024-01xx/CVE-2024-0143.json create mode 100644 CVE-2024/CVE-2024-01xx/CVE-2024-0144.json create mode 100644 CVE-2024/CVE-2024-01xx/CVE-2024-0145.json create mode 100644 CVE-2024/CVE-2024-291xx/CVE-2024-29171.json create mode 100644 CVE-2024/CVE-2024-291xx/CVE-2024-29172.json create mode 100644 CVE-2024/CVE-2024-538xx/CVE-2024-53880.json create mode 100644 CVE-2025/CVE-2025-12xx/CVE-2025-1243.json create mode 100644 CVE-2025/CVE-2025-233xx/CVE-2025-23359.json diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0142.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0142.json index 2a20ad0b1c1..9811bfd89f7 100644 --- a/CVE-2024/CVE-2024-01xx/CVE-2024-0142.json +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0142.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0142", "sourceIdentifier": "psirt@nvidia.com", "published": "2025-02-12T00:15:08.423", - "lastModified": "2025-02-12T00:15:08.423", + "lastModified": "2025-02-12T01:15:08.230", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "psirt@nvidia.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5596", "source": "psirt@nvidia.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2080", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0143.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0143.json new file mode 100644 index 00000000000..2d2ff49c304 --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0143.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-0143", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2025-02-12T01:15:08.347", + "lastModified": "2025-02-12T02:15:09.253", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause an out-of-bounds write issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to code execution and data tampering." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5596", + "source": "psirt@nvidia.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2095", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0144.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0144.json new file mode 100644 index 00000000000..91407da6b9c --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0144.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-0144", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2025-02-12T01:15:08.483", + "lastModified": "2025-02-12T02:15:10.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause a buffer overflow issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to data tampering." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5596", + "source": "psirt@nvidia.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2113", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0145.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0145.json new file mode 100644 index 00000000000..b3f822600fe --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0145.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-0145", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2025-02-12T01:15:08.630", + "lastModified": "2025-02-12T02:15:10.263", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause a heap-based buffer overflow issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to code execution and data tampering." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5596", + "source": "psirt@nvidia.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2108", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json index 2c80a46c28f..84972ed7671 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12085", "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-14T18:15:25.123", - "lastModified": "2025-02-11T12:15:34.047", + "lastModified": "2025-02-12T01:15:08.777", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -100,6 +100,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:1120", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:1123", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-12085", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1702.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1702.json index 4c660cb1381..2099f84ff98 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1702.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1702.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1702", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-21T17:15:08.583", - "lastModified": "2024-11-21T08:51:07.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T01:01:24.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:keerti1924:php_mysql_user_signup_login_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C400362C-F44F-4C21-ADA4-E1547FFAF327" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/omarexala/PHP-MYSQL-User-Login-System---SQL-Injection", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.254390", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.254390", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/omarexala/PHP-MYSQL-User-Login-System---SQL-Injection", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.254390", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.254390", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1706.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1706.json index cf78289c420..f5159c15266 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1706.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1706.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1706", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-21T18:15:51.057", - "lastModified": "2024-11-21T08:51:07.893", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T01:03:35.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,30 +96,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zkteco:zkbio_access_ivs:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.3.2", + "matchCriteriaId": "3F72FFB6-F055-42A3-8048-79CDAC6D9374" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.githubusercontent.com/whiteman007/8d3a09991de4ef336937ba91c07b7856/raw/adc00538d7a8c3c54bde4797a10d9b6af393711d/gistfile1.txt", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.254396", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.254396", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gist.githubusercontent.com/whiteman007/8d3a09991de4ef336937ba91c07b7856/raw/adc00538d7a8c3c54bde4797a10d9b6af393711d/gistfile1.txt", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.254396", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.254396", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1707.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1707.json index 36ebe8fe42d..87a5b4d9600 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1707.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1707.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1707", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-21T19:15:08.453", - "lastModified": "2024-11-21T08:51:08.030", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T01:21:17.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,38 +96,93 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:garo:wallbox_glb\\+_t2ev7_firmware:0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "46BAEB34-C2A0-443C-8F88-B276448A14BA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:garo:wallbox_glb\\+_t2ev7:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A66DE61-F5E2-4C07-B79B-F04E3AA49A36" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1spsElvU8rgCs4gUxc662SCBjTI9VAqth/view", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/strik3r0x1/Vulns/blob/main/GARO_GLBDCMB-T274WO_Stored_XSS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.254397", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.254397", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://drive.google.com/file/d/1spsElvU8rgCs4gUxc662SCBjTI9VAqth/view", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/strik3r0x1/Vulns/blob/main/GARO_GLBDCMB-T274WO_Stored_XSS.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.254397", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.254397", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25898.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25898.json index e4d48710627..b3b5323787f 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25898.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25898.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25898", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T18:15:51.820", - "lastModified": "2024-11-21T09:01:32.087", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T01:12:54.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "Se encontr\u00f3 una vulnerabilidad XSS en la funcionalidad ChurchCRM v.5.5.0, edite su evento, donde se puede insertar c\u00f3digo JS o HTML malicioso en el campo Event Sermon en EventEditor.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:churchcrm:churchcrm:5.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEB8DD0-3ADC-4C06-84DF-9296533BFBD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ChurchCRM/CRM/issues/6851", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/ChurchCRM/CRM/issues/6851", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29171.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29171.json new file mode 100644 index 00000000000..0e5c4d7428a --- /dev/null +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29171.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-29171", + "sourceIdentifier": "security_alert@emc.com", + "published": "2025-02-12T02:15:10.363", + "lastModified": "2025-02-12T02:15:10.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell BSAFE SSL-J contains an Improper certificate verification vulnerability. A remote attacker could potentially exploit this vulnerability, leading to information disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000226620/dsa-2024-221-security-update-for-dell-bsafe-ssl-j-multiple-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29172.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29172.json new file mode 100644 index 00000000000..b5624a75f63 --- /dev/null +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29172.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-29172", + "sourceIdentifier": "security_alert@emc.com", + "published": "2025-02-12T02:15:10.500", + "lastModified": "2025-02-12T02:15:10.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell BSAFE SSL-J contains a deadlock vulnerability. A remote attacker could potentially exploit this vulnerability, leading to a Denial of Service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-833" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000226620/dsa-2024-221-security-update-for-dell-bsafe-ssl-j-multiple-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29793.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29793.json index 63d6072337a..d1aec462d8e 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29793.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29793.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29793", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T13:15:50.637", - "lastModified": "2024-11-21T09:08:20.773", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T01:24:37.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mailmunch:mailchimp_forms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.3", + "matchCriteriaId": "3EA10CAE-BAD7-41C3-AA46-71D9AA71AB83" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/mailchimp-forms-by-mailmunch/wordpress-mailchimp-forms-by-mailmunch-plugin-3-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/mailchimp-forms-by-mailmunch/wordpress-mailchimp-forms-by-mailmunch-plugin-3-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31349.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31349.json index 6d57a753bf9..39eec590e9b 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31349.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31349.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31349", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-07T18:15:13.240", - "lastModified": "2024-11-21T09:13:20.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T01:27:43.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mailmunch:mailmunch:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.7", + "matchCriteriaId": "C93CA6A5-4DE5-4179-AF22-5132B04B8292" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/mailmunch/wordpress-mailmunch-grow-your-email-list-plugin-3-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/mailmunch/wordpress-mailmunch-grow-your-email-list-plugin-3-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34566.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34566.json index caa5e219842..ec42d729fb9 100644 --- a/CVE-2024/CVE-2024-345xx/CVE-2024-34566.json +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34566.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34566", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-08T11:15:24.930", - "lastModified": "2024-11-21T09:18:57.020", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T01:40:13.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vanderwijk:content_blocks:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.3.1", + "matchCriteriaId": "7FC7A8B6-066A-48C3-891D-20F747BE2359" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/custom-post-widget/wordpress-content-blocks-custom-post-widget-plugin-3-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/custom-post-widget/wordpress-content-blocks-custom-post-widget-plugin-3-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3459.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3459.json index 557471a8625..47aa816f0e2 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3459.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3459.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3459", "sourceIdentifier": "cvd@cert.pl", "published": "2024-05-14T15:41:12.060", - "lastModified": "2024-11-21T09:29:38.633", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-12T01:48:00.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,32 +69,78 @@ "value": "CWE-424" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kioware:kioware:*:*:*:*:*:windows:*:*", + "versionEndIncluding": "8.34", + "matchCriteriaId": "08120DB6-BEF8-4C1E-B969-3F661CB25C70" + } + ] + } + ] } ], "references": [ { "url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Broken Link" + ] }, { "url": "https://cert.pl/posts/2024/04/CVE-2024-3459", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.kioware.com/", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Product" + ] }, { "url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://cert.pl/posts/2024/04/CVE-2024-3459", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.kioware.com/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40890.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40890.json index ef3ab78d363..60bdf785385 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40890.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40890.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40890", "sourceIdentifier": "security@zyxel.com.tw", "published": "2025-02-04T10:15:08.717", - "lastModified": "2025-02-04T10:15:08.717", + "lastModified": "2025-02-12T02:00:01.980", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -46,6 +46,10 @@ } ] }, + "cisaExploitAdd": "2025-02-11", + "cisaActionDue": "2025-03-04", + "cisaRequiredAction": "The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.", + "cisaVulnerabilityName": "Zyxel DSL CPE OS Command Injection Vulnerability", "weaknesses": [ { "source": "security@zyxel.com.tw", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40891.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40891.json index a63358f176a..213d207c8aa 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40891.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40891.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40891", "sourceIdentifier": "security@zyxel.com.tw", "published": "2025-02-04T10:15:08.920", - "lastModified": "2025-02-04T10:15:08.920", + "lastModified": "2025-02-12T02:00:01.980", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -46,6 +46,10 @@ } ] }, + "cisaExploitAdd": "2025-02-11", + "cisaActionDue": "2025-03-04", + "cisaRequiredAction": "The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.", + "cisaVulnerabilityName": "Zyxel DSL CPE OS Command Injection Vulnerability", "weaknesses": [ { "source": "security@zyxel.com.tw", diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53880.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53880.json new file mode 100644 index 00000000000..72bdb833ccb --- /dev/null +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53880.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-53880", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2025-02-12T01:15:08.940", + "lastModified": "2025-02-12T01:15:08.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA Triton Inference Server contains a vulnerability in the model loading API, where a user could cause an integer overflow or wraparound error by loading a model with an extra-large file size that overflows an internal variable. A successful exploit of this vulnerability might lead to denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5612", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1243.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1243.json new file mode 100644 index 00000000000..0776c6185f4 --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1243.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-1243", + "sourceIdentifier": "security@temporal.io", + "published": "2025-02-12T01:15:09.073", + "lastModified": "2025-02-12T01:15:09.073", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Temporal api-go library prior to version 1.44.1 did not send `update response` information to Data Converter when the proxy package within the api-go module was used in a gRPC proxy prior to transmission. This resulted in\u00a0information contained within the `update response` field not having Data Converter transformations (e.g. encryption) applied. This is an issue only when using the UpdateWorkflowExecution APIs (released on 13th January 2025) with a proxy leveraging the api-go library before version 1.44.1.\n\nOther data fields were correctly sent to Data Converter. This issue does not impact the Data Converter server. Data was encrypted in transit. Temporal Cloud services are not impacted." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@temporal.io", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@temporal.io", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-311" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/temporalio/api-go/releases/tag/v1.44.1", + "source": "security@temporal.io" + }, + { + "url": "https://temporal.io/blog/announcing-a-new-operation-workflow-update", + "source": "security@temporal.io" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21391.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21391.json index ed943f7c88e..55d35c4f19e 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21391.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21391.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21391", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:37.723", - "lastModified": "2025-02-11T18:15:37.723", - "vulnStatus": "Received", + "lastModified": "2025-02-12T02:00:01.980", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -35,6 +35,10 @@ } ] }, + "cisaExploitAdd": "2025-02-11", + "cisaActionDue": "2025-03-04", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Microsoft Windows Storage Link Following Vulnerability", "weaknesses": [ { "source": "secure@microsoft.com", diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21418.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21418.json index 24c8f1c5f2b..96a8cdd35f2 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21418.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21418.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21418", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-11T18:15:40.023", - "lastModified": "2025-02-11T18:15:40.023", - "vulnStatus": "Received", + "lastModified": "2025-02-12T02:00:01.980", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -35,6 +35,10 @@ } ] }, + "cisaExploitAdd": "2025-02-11", + "cisaActionDue": "2025-03-04", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability", "weaknesses": [ { "source": "secure@microsoft.com", diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23359.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23359.json new file mode 100644 index 00000000000..edcddd587a5 --- /dev/null +++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23359.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23359", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2025-02-12T01:15:09.230", + "lastModified": "2025-02-12T01:15:09.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA Container Toolkit for Linux contains a Time-of-Check Time-of-Use (TOCTOU) vulnerability when used with default configuration, where a crafted container image could gain access to the host file system. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5616", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index c260db6c67d..1c37abf0fde 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-12T00:56:43.013705+00:00 +2025-02-12T03:00:57.960645+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-12T00:54:22.470000+00:00 +2025-02-12T02:15:10.500000+00:00 ``` ### Last Data Feed Release @@ -27,44 +27,47 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-02-11T01:00:04.373607+00:00 +2025-02-12T01:00:04.376896+00:00 ``` ### Total Number of included CVEs ```plain -280919 +280927 ``` ### CVEs added in the last Commit -Recently added CVEs: `16` +Recently added CVEs: `8` -- [CVE-2020-3432](CVE-2020/CVE-2020-34xx/CVE-2020-3432.json) (`2025-02-12T00:15:07.670`) -- [CVE-2022-37660](CVE-2022/CVE-2022-376xx/CVE-2022-37660.json) (`2025-02-11T23:15:08.140`) -- [CVE-2023-20508](CVE-2023/CVE-2023-205xx/CVE-2023-20508.json) (`2025-02-12T00:15:07.850`) -- [CVE-2023-31342](CVE-2023/CVE-2023-313xx/CVE-2023-31342.json) (`2025-02-11T23:15:08.277`) -- [CVE-2023-31343](CVE-2023/CVE-2023-313xx/CVE-2023-31343.json) (`2025-02-11T23:15:08.407`) -- [CVE-2023-31345](CVE-2023/CVE-2023-313xx/CVE-2023-31345.json) (`2025-02-12T00:15:08.003`) -- [CVE-2023-31352](CVE-2023/CVE-2023-313xx/CVE-2023-31352.json) (`2025-02-11T23:15:08.537`) -- [CVE-2024-0112](CVE-2024/CVE-2024-01xx/CVE-2024-0112.json) (`2025-02-12T00:15:08.263`) -- [CVE-2024-0142](CVE-2024/CVE-2024-01xx/CVE-2024-0142.json) (`2025-02-12T00:15:08.423`) -- [CVE-2024-21971](CVE-2024/CVE-2024-219xx/CVE-2024-21971.json) (`2025-02-12T00:15:08.750`) -- [CVE-2024-33469](CVE-2024/CVE-2024-334xx/CVE-2024-33469.json) (`2025-02-11T23:15:08.903`) -- [CVE-2024-44336](CVE-2024/CVE-2024-443xx/CVE-2024-44336.json) (`2025-02-11T23:15:09.020`) -- [CVE-2024-54772](CVE-2024/CVE-2024-547xx/CVE-2024-54772.json) (`2025-02-11T23:15:09.117`) -- [CVE-2024-54916](CVE-2024/CVE-2024-549xx/CVE-2024-54916.json) (`2025-02-11T23:15:09.227`) -- [CVE-2024-57000](CVE-2024/CVE-2024-570xx/CVE-2024-57000.json) (`2025-02-11T23:15:09.337`) -- [CVE-2025-25203](CVE-2025/CVE-2025-252xx/CVE-2025-25203.json) (`2025-02-11T23:15:09.450`) +- [CVE-2024-0143](CVE-2024/CVE-2024-01xx/CVE-2024-0143.json) (`2025-02-12T01:15:08.347`) +- [CVE-2024-0144](CVE-2024/CVE-2024-01xx/CVE-2024-0144.json) (`2025-02-12T01:15:08.483`) +- [CVE-2024-0145](CVE-2024/CVE-2024-01xx/CVE-2024-0145.json) (`2025-02-12T01:15:08.630`) +- [CVE-2024-29171](CVE-2024/CVE-2024-291xx/CVE-2024-29171.json) (`2025-02-12T02:15:10.363`) +- [CVE-2024-29172](CVE-2024/CVE-2024-291xx/CVE-2024-29172.json) (`2025-02-12T02:15:10.500`) +- [CVE-2024-53880](CVE-2024/CVE-2024-538xx/CVE-2024-53880.json) (`2025-02-12T01:15:08.940`) +- [CVE-2025-1243](CVE-2025/CVE-2025-12xx/CVE-2025-1243.json) (`2025-02-12T01:15:09.073`) +- [CVE-2025-23359](CVE-2025/CVE-2025-233xx/CVE-2025-23359.json) (`2025-02-12T01:15:09.230`) ### CVEs modified in the last Commit -Recently modified CVEs: `3` +Recently modified CVEs: `14` -- [CVE-2023-31356](CVE-2023/CVE-2023-313xx/CVE-2023-31356.json) (`2025-02-11T23:15:08.640`) -- [CVE-2024-12797](CVE-2024/CVE-2024-127xx/CVE-2024-12797.json) (`2025-02-11T23:15:08.807`) -- [CVE-2024-1705](CVE-2024/CVE-2024-17xx/CVE-2024-1705.json) (`2025-02-12T00:54:22.470`) +- [CVE-2024-0142](CVE-2024/CVE-2024-01xx/CVE-2024-0142.json) (`2025-02-12T01:15:08.230`) +- [CVE-2024-12085](CVE-2024/CVE-2024-120xx/CVE-2024-12085.json) (`2025-02-12T01:15:08.777`) +- [CVE-2024-1702](CVE-2024/CVE-2024-17xx/CVE-2024-1702.json) (`2025-02-12T01:01:24.223`) +- [CVE-2024-1706](CVE-2024/CVE-2024-17xx/CVE-2024-1706.json) (`2025-02-12T01:03:35.347`) +- [CVE-2024-1707](CVE-2024/CVE-2024-17xx/CVE-2024-1707.json) (`2025-02-12T01:21:17.617`) +- [CVE-2024-25898](CVE-2024/CVE-2024-258xx/CVE-2024-25898.json) (`2025-02-12T01:12:54.453`) +- [CVE-2024-29793](CVE-2024/CVE-2024-297xx/CVE-2024-29793.json) (`2025-02-12T01:24:37.180`) +- [CVE-2024-31349](CVE-2024/CVE-2024-313xx/CVE-2024-31349.json) (`2025-02-12T01:27:43.223`) +- [CVE-2024-34566](CVE-2024/CVE-2024-345xx/CVE-2024-34566.json) (`2025-02-12T01:40:13.093`) +- [CVE-2024-3459](CVE-2024/CVE-2024-34xx/CVE-2024-3459.json) (`2025-02-12T01:48:00.043`) +- [CVE-2024-40890](CVE-2024/CVE-2024-408xx/CVE-2024-40890.json) (`2025-02-12T02:00:01.980`) +- [CVE-2024-40891](CVE-2024/CVE-2024-408xx/CVE-2024-40891.json) (`2025-02-12T02:00:01.980`) +- [CVE-2025-21391](CVE-2025/CVE-2025-213xx/CVE-2025-21391.json) (`2025-02-12T02:00:01.980`) +- [CVE-2025-21418](CVE-2025/CVE-2025-214xx/CVE-2025-21418.json) (`2025-02-12T02:00:01.980`) ## Download and Usage diff --git a/_state.csv b/_state.csv index c90ea373d99..bafadd9df53 100644 --- a/_state.csv +++ b/_state.csv @@ -158131,7 +158131,7 @@ CVE-2020-3428,0,0,1d203dfb64afc88635ecdea956d4e399018ec66b0845e3a3c519582ad91af9 CVE-2020-3429,0,0,101e53f438fdaab4d8036c36641c0ed4e00559faf42044f1ad2ece55c0b4650a,2024-11-21T05:31:03.167000 CVE-2020-3430,0,0,98eeb5229dfeae10e40545efe1765338b1e8931dcbdcc810929adf0530704da8,2024-11-21T05:31:03.293000 CVE-2020-3431,0,0,cd6d3bac32cfd8857a644f1078f419fb235151f316f0943be1e4e9e1b0583c53,2024-11-18T17:11:17.393000 -CVE-2020-3432,1,1,9b69615c3842cce8448bfa4502eb2b040fae2656051ffa06bd712b3dcf30a12d,2025-02-12T00:15:07.670000 +CVE-2020-3432,0,0,9b69615c3842cce8448bfa4502eb2b040fae2656051ffa06bd712b3dcf30a12d,2025-02-12T00:15:07.670000 CVE-2020-3433,0,0,0e0fb5bb51a05c6c75a030d839f72e158a7c69e2a7cb7718d94fd50b680f41ff,2024-11-21T05:31:03.480000 CVE-2020-3434,0,0,c8995b33bcde31c655667c0230d7d58e1c0dd14cc20aaace02cd27edf751de36,2024-11-21T05:31:03.617000 CVE-2020-3435,0,0,42896a56717af6cb678dbb4889e2a239138d23b959eef5d7c82a355eef30417a,2024-11-21T05:31:03.753000 @@ -204650,7 +204650,7 @@ CVE-2022-3763,0,0,c2299b9c134ab1c6cdc29ea9bb0d35812068c7827af0b605982e68cbb64811 CVE-2022-3764,0,0,ec247594a5e83915ba6098faf7bda0926c3802dc302b6ea5fc586fe275d41890,2024-11-21T07:20:12.047000 CVE-2022-3765,0,0,55d4910aeb7e21447906423f7a9ff627183c7bc0e9d3c6b6eb67cc428a00617d,2024-11-21T07:20:12.173000 CVE-2022-3766,0,0,632191e742f432ebfc8c7e158ebc5aec2e0cf696db2bc4f54bff144bc238f89c,2024-11-21T07:20:12.303000 -CVE-2022-37660,1,1,706da5f82e3e20762b65ebef634761bd18a7d103e1bba95b01495248679e0311,2025-02-11T23:15:08.140000 +CVE-2022-37660,0,0,706da5f82e3e20762b65ebef634761bd18a7d103e1bba95b01495248679e0311,2025-02-11T23:15:08.140000 CVE-2022-37661,0,0,aabf45886c066567135fb17b01f6d8fdfa9a25c171f31720d62ad8227e48a8df,2024-11-21T07:15:04.177000 CVE-2022-3767,0,0,4e5d8fb3c9ad7d92e363d8284cf09f4ef86f4da536880a591d9b22149d210ced,2024-11-21T07:20:12.433000 CVE-2022-37679,0,0,30163e65f6c85937f7e28a683176b09d9eb146c2cfb64fbb7a583e8bbaaa62f6,2024-11-21T07:15:04.353000 @@ -215413,7 +215413,7 @@ CVE-2023-2048,0,0,a3fd93a0062ac104ab7685f0c38c5fdd726a12306b1269a975bd7db45101d5 CVE-2023-2049,0,0,a8c5ed7acd162068a2a9410c64cd0f59bf4dff352a99ca706b6abf6f7afe2aab,2024-11-21T07:57:50.160000 CVE-2023-2050,0,0,0f2d06f2759566b1898e0808f1100f70849c771723b910ff4d0d791d8bbccaed,2024-11-21T07:57:50.287000 CVE-2023-20507,0,0,5fed0288869bdcd6c0eeefc00d71017461fdff4b91e72fc9217d348444cdc77e,2025-02-11T21:15:10.620000 -CVE-2023-20508,1,1,e0e25a5ac3b708d7b324829c8fac6754eb617d0c39ee1f5150932999484b1b6a,2025-02-12T00:15:07.850000 +CVE-2023-20508,0,0,e0e25a5ac3b708d7b324829c8fac6754eb617d0c39ee1f5150932999484b1b6a,2025-02-12T00:15:07.850000 CVE-2023-20509,0,0,134094f09fd2dc07b9b6920005f6ed24e5bf76664c20df20b585bc7031e48136,2024-11-04T18:35:02.490000 CVE-2023-2051,0,0,e835721eb03a78486652d47f32bc2d564aae9456947669d05b669f8ccff34422,2024-11-21T07:57:50.417000 CVE-2023-20510,0,0,a6c482788f115b3798feb6c0849d19428006a08ae6d7047f8994f722afc3ac01,2024-12-12T20:28:55.010000 @@ -224430,17 +224430,17 @@ CVE-2023-31331,0,0,e046140d99705d1ececd3a0382c331bc7f6e3f9774e2e662b44c32bf8207d CVE-2023-31339,0,0,55016df2b1f62c6b4660412aa764fde8ebdeabe77b5e76cdf782b4574058e985,2024-11-27T15:55:02.843000 CVE-2023-3134,0,0,b41055d7bc0dc4c054369608e6a2b8131a42873b85a487dd8d397c15935034b8,2024-11-21T08:16:32.053000 CVE-2023-31341,0,0,4d30d8bcca3cc5a6fb3cb512a407b048c8089f2e2668f1d6af1cd5e924a75c8b,2024-12-13T16:22:04.967000 -CVE-2023-31342,1,1,a817ff9e2cec63e3d67cf98475fc467af022afb1295290ec211db96327d3bae0,2025-02-11T23:15:08.277000 -CVE-2023-31343,1,1,8d45208539fe42cc4465d051f2eb072fa687af3d01b5e5fbf556092a6c328054,2025-02-11T23:15:08.407000 -CVE-2023-31345,1,1,52bd9b4e735c6d4324a9a389c2634de5e45a9ce6291ab51b212c860b31254e01,2025-02-12T00:15:08.003000 +CVE-2023-31342,0,0,a817ff9e2cec63e3d67cf98475fc467af022afb1295290ec211db96327d3bae0,2025-02-11T23:15:08.277000 +CVE-2023-31343,0,0,8d45208539fe42cc4465d051f2eb072fa687af3d01b5e5fbf556092a6c328054,2025-02-11T23:15:08.407000 +CVE-2023-31345,0,0,52bd9b4e735c6d4324a9a389c2634de5e45a9ce6291ab51b212c860b31254e01,2025-02-12T00:15:08.003000 CVE-2023-31346,0,0,0f3aef9cb82d734f42dadff61934c6e7356f408812c277f7c7dc139cdf72f4ea,2024-11-21T08:01:46.650000 CVE-2023-31347,0,0,40bd095adcf20e32bd278c5ac69186bfbd901c6c106b24da3be411afb7fb0f7e,2024-11-21T08:01:46.837000 CVE-2023-31348,0,0,36de6f4439a3c352fc026755e75a90df41c385c2a4dc4700523138475af8101f,2024-12-12T01:21:40.110000 CVE-2023-31349,0,0,71bf4a5703aad3a9f91fdab88a68f528b7c5cf5a77563430c2326a8beb20b035,2024-12-12T01:21:40.263000 CVE-2023-3135,0,0,5525abaed0951618afc57f6ab0cf7d86c246aa704e41354313c6c2430b9e4078,2024-11-21T08:16:32.173000 -CVE-2023-31352,1,1,967c1f5cda2114de699a733dc03834d083cead864706f901ef53a9e79ab9560b,2025-02-12T00:15:08.140000 +CVE-2023-31352,0,0,967c1f5cda2114de699a733dc03834d083cead864706f901ef53a9e79ab9560b,2025-02-12T00:15:08.140000 CVE-2023-31355,0,0,69aec8bfd9cbbdf6fccaa5a3f23ea5d697dcae13123e85a3c8dc9b60288b0210,2024-11-26T19:10:21.797000 -CVE-2023-31356,0,1,07bf4f71e776193f1a6a37e4a0f9ba6134d79d38be24c782426c1fd54808f2af,2025-02-11T23:15:08.640000 +CVE-2023-31356,0,0,07bf4f71e776193f1a6a37e4a0f9ba6134d79d38be24c782426c1fd54808f2af,2025-02-11T23:15:08.640000 CVE-2023-3136,0,0,0082a969c34110c3bc77819ecd8198dbee6358cca1ed9acd2e0be2b757fea739,2024-11-21T08:16:32.297000 CVE-2023-31360,0,0,e7f92144bd68f5fb73c54ecfe395f6f555bcbb0068d8a55734c120f7f108127d,2025-02-11T20:15:32.950000 CVE-2023-31361,0,0,3f53f70de9580819e880ee58267a5a944926e79c159bf78735edbe5c8a56f4e4,2025-02-11T21:15:12.160000 @@ -242619,7 +242619,7 @@ CVE-2024-0108,0,0,6439b357fa8fa1da14854e67071d1b4030b146adfc75863fd5dbfa76b8b638 CVE-2024-0109,0,0,4e3c7f891f30f73ffea8812d68ca13e592b4af5ffbdce626b768e60669e5b0c4,2024-09-18T15:18:06.117000 CVE-2024-0110,0,0,f27210557f0c26fcfbedc193e4d0a41f340a75f32164d31e726fe652317f285c,2024-09-18T15:16:37.990000 CVE-2024-0111,0,0,bdef68470cbe972dbf78a48ee8c036044ad45c278e474af19b34bfbde7237a38,2024-09-18T15:22:14.727000 -CVE-2024-0112,1,1,be8cd03119d802758714824c57d15bd51b4e76c795126f3a56e576fda5f69386,2025-02-12T00:15:08.263000 +CVE-2024-0112,0,0,be8cd03119d802758714824c57d15bd51b4e76c795126f3a56e576fda5f69386,2025-02-12T00:15:08.263000 CVE-2024-0113,0,0,ddc72489479f075436bf2bede7a3c83b1b0eed041894108c913ed6a4245e286a,2024-12-26T19:21:52.380000 CVE-2024-0115,0,0,04fb8f6e5724a3bbcfb8807084f7db88a3df8dcc171391e4ae1eeafce22d77c1,2024-12-26T19:21:45.613000 CVE-2024-0116,0,0,7e098634cd96469f401e47ab7ff401cb9f2ab3f597905b45f057f27f5d24a16b,2024-10-04T13:51:25.567000 @@ -242647,7 +242647,10 @@ CVE-2024-0137,0,0,81bf66fb14b39da555a4d311dc1e072621ee9f6fdd9b89b32897086011f9e7 CVE-2024-0138,0,0,46b8bd281343bee2ec8e5c4452aa2b9e0b3ce4964c0c71b43db0559960702d7e,2024-11-23T00:15:04.367000 CVE-2024-0139,0,0,97175888b963c6f6c4d9af1853169dc46a253002be2bfcb37fc1cbdc17d01939,2024-12-06T20:15:23.763000 CVE-2024-0140,0,0,b1c3d4b9e03087faeab3c6b32b57a2d8e93481139427d7ea4f9e253833a83c15,2025-01-28T04:15:08.730000 -CVE-2024-0142,1,1,5a0886fa1cc35a8f3ebd456d261a655f0296ebae692baed5cb7342468b73179c,2025-02-12T00:15:08.423000 +CVE-2024-0142,0,1,261b501d3b1c6d9204171cc97a2b9eaa15dd08e26ef75f2cf5f87385800414ae,2025-02-12T01:15:08.230000 +CVE-2024-0143,1,1,2d6a775a99432800a0b296cde8d2dfd26489facfd8334a2df675b06faf561ec6,2025-02-12T02:15:09.253000 +CVE-2024-0144,1,1,bdb76e9bda487a77b5d7e400acce3daa73596d4ac300f78220fb30f99715119d,2025-02-12T02:15:10.163000 +CVE-2024-0145,1,1,3e1a5d12b12b13ee22f1d69fc3c32f9b40b092eb936e7c0e22e0dfa65e26aa4b,2025-02-12T02:15:10.263000 CVE-2024-0146,0,0,91247f908f4680f036c365cc7286ed9057cd8a10421a385a7ebe691b4e035d85,2025-01-28T04:15:09.447000 CVE-2024-0147,0,0,d266f38b1ebfcf418fb12ec7ba0c16644759f3d46ae142b8376ac2cc8dbc66b0,2025-01-28T04:15:09.590000 CVE-2024-0149,0,0,57c8b5d113e1d5b272dcbe1421dbea4404017873433aea02126d802ef03cb727,2025-01-28T04:15:09.733000 @@ -245317,7 +245320,7 @@ CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669 CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000 CVE-2024-12083,0,0,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753fb3,2025-01-14T01:15:09.267000 CVE-2024-12084,0,0,85dd725fc2f0b24c79e999378b1f0199fad5fe5d164b31609c57a84bcb434c0d,2025-01-15T15:15:10.537000 -CVE-2024-12085,0,0,a1a2583f6c82a273a7bdf431f022975e9740d33314ad6c5f1864990651c9e5a2,2025-02-11T12:15:34.047000 +CVE-2024-12085,0,1,4b4eeb835cd84654fb59f6e8ed766dfa536d170d944378d12098517e4998c73d,2025-02-12T01:15:08.777000 CVE-2024-12086,0,0,e5130c03152639985c3e2f822b45f241716bd573825b1ce309364a23fc10467b,2025-01-14T22:15:26.370000 CVE-2024-12087,0,0,083db16c2a7b9baa1b397fd2cd269bff2aa8f7c2646d1851d134f1f8a052e34a,2025-01-14T22:15:26.503000 CVE-2024-12088,0,0,43a2123ff1daddac120d556957600405449568b28a84ca944004ee72fa7fff31,2025-02-10T12:15:28.537000 @@ -245915,7 +245918,7 @@ CVE-2024-12791,0,0,ca87ba886f5289e1e8c19015d3d8fc3c978db86f9d300a7f44c7143ee4b7a CVE-2024-12792,0,0,2f49d07cb189e8abf573658d63830eb2a6eac4f064c5f29dff915dff35ec0407,2025-01-06T15:28:27.857000 CVE-2024-12793,0,0,2902a16bfecddc21a8d8d04e8f0997250ef373c3635003ef32f9127592c72540,2025-01-06T15:16:15.037000 CVE-2024-12794,0,0,1f45437b8b28f90cd480ff6b28049ee2f0d50b6e09b9de7825840b2430eeb83b,2025-01-06T14:40:23.127000 -CVE-2024-12797,0,1,37278789a176c7094e2d1358902e5b1073a52e129a2399d6b9e3c257451d319f,2025-02-11T23:15:08.807000 +CVE-2024-12797,0,0,37278789a176c7094e2d1358902e5b1073a52e129a2399d6b9e3c257451d319f,2025-02-11T23:15:08.807000 CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000 CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000 CVE-2024-12802,0,0,8f19e7a7cb329c26f5998e730d7f453cd46482968ebb674eef2b4e7f0f5bf48e,2025-01-09T15:15:14.683000 @@ -246894,12 +246897,12 @@ CVE-2024-1697,0,0,c470a81452f09db0e40146053a7ca6ac44c10328d8eb381864ced3a9cc5f2c CVE-2024-1698,0,0,a3817713801dcdd2b6948f039ebd5bf82047ee39d455ae9db40460bcb81f0e4a,2024-11-21T08:51:06.797000 CVE-2024-1700,0,0,c890221edc7d723da200984cd50788ad3f9477e6671e40a4826dd37ab78bdf87,2024-11-21T08:51:06.933000 CVE-2024-1701,0,0,999a1855aff758dd3bea1c889c669b741d70388f4ca26ec930896a676a7eec80,2024-11-21T08:51:07.080000 -CVE-2024-1702,0,0,b6175d9dc80a18f6f7cfdc8d7ccd672b051b17d818dc95fbcd9de4275081d0be,2024-11-21T08:51:07.220000 +CVE-2024-1702,0,1,6bdc90b2a17f9cc720ccacf951a7c6fa4bbea546083aa1d1c8d973e97e935554,2025-02-12T01:01:24.223000 CVE-2024-1703,0,0,967f5b800879b74b8a5834ee2ca69d6ccd277ef7fdf67155513b4a3e4c5c9375,2025-01-03T19:11:33.877000 CVE-2024-1704,0,0,ade83be8825a88be560eefedd4a80ce29b73b997a3bc381116fac086a8487d74,2025-01-03T19:11:28.830000 -CVE-2024-1705,0,1,af7b09e99e734f63ef2ea7268ab25172e3aeb4f4332770b78a46d2b1534caf79,2025-02-12T00:54:22.470000 -CVE-2024-1706,0,0,bb2fa26be71c93f252750ad503aa5f22cf00468ca8b87351c6c26fbbe19a743a,2024-11-21T08:51:07.893000 -CVE-2024-1707,0,0,a9020d35f22c4489f7cfd2297cfe28080eadd0f70b288122f51ccc5023ec8af1,2024-11-21T08:51:08.030000 +CVE-2024-1705,0,0,af7b09e99e734f63ef2ea7268ab25172e3aeb4f4332770b78a46d2b1534caf79,2025-02-12T00:54:22.470000 +CVE-2024-1706,0,1,71fc36de238f0366dd55cbea7bcd8880ece128b41623b8bba05a9729ba48f898,2025-02-12T01:03:35.347000 +CVE-2024-1707,0,1,386296f7b2d2f93198c912dd937a6be54a5c06c07c6e4c13ded38903cb47478e,2025-02-12T01:21:17.617000 CVE-2024-1708,0,0,9046bf6df7b5407027e6526b317a707fb0e597c8a478298cf2e268d00d5efe65,2024-11-21T08:51:08.173000 CVE-2024-1709,0,0,f75e75be5b68325f5e70652bc5e84a1c7f6bf9317747292f6c8f81b5bf5aa7a7,2025-01-27T21:48:25.323000 CVE-2024-1710,0,0,1e40e71747a8b12de39d769c827824fe24840a5de6160030b181cc2a6ca82e52,2024-11-21T08:51:08.487000 @@ -248945,7 +248948,7 @@ CVE-2024-21958,0,0,e5206ffa0444f8572c1e9e167d9a12d914a6e0246055c05b0d98e9036149b CVE-2024-2196,0,0,b69b6a180eaa2677dec83ce612fd6894dd1a1d839791fdc8c079145ded6dd346,2024-11-21T09:09:14.183000 CVE-2024-21966,0,0,95a7f244be612e572f7740e2431610bd1fd7003e288efea01d1c8140b03e252a,2025-02-11T20:15:34.210000 CVE-2024-2197,0,0,a2f883967a50a9a8d4e6369039be76593be79f2ff1288beb4c800f9afb124cb4,2024-11-21T09:09:14.310000 -CVE-2024-21971,1,1,da2a88b8f8a101424f4fcd39f6a734c5199f566dd4b14a8b4119c3882702a6f1,2025-02-12T00:15:08.750000 +CVE-2024-21971,0,0,da2a88b8f8a101424f4fcd39f6a734c5199f566dd4b14a8b4119c3882702a6f1,2025-02-12T00:15:08.750000 CVE-2024-21972,0,0,39505a9051e09d87e478fcc5f7515870aabb113eb6e35a2873ad7cf108e230e1,2024-11-21T08:55:18.060000 CVE-2024-21974,0,0,23f4ca1528e717237fe841fef4e4a6ef8c37c85aafce9b5c42cec363da075a34,2024-11-15T19:20:09.980000 CVE-2024-21975,0,0,85139c939620bb495fd621b698ae8c235d9f4ec5c4743aa119dda8b2c0db20fc,2024-11-15T19:15:18.770000 @@ -251721,7 +251724,7 @@ CVE-2024-25894,0,0,cb4e57455d9b80e2e8f11d1a23185865c70db5ef798e325cb010e2b0b6d33 CVE-2024-25895,0,0,ea845c5a4bfac820a7d6804261ac8359407017ef5c604fa51deecedebeb1f020,2024-11-21T09:01:31.480000 CVE-2024-25896,0,0,27e7ea1636a151061689223212aece2065c7f69b7c98d93f82bbadf54d10c93c,2024-11-21T21:15:19.023000 CVE-2024-25897,0,0,234d7bc3ad5db294358ea8462de8ed3775160c86133962c3d1daeea643b0d5f6,2024-11-21T09:01:31.853000 -CVE-2024-25898,0,0,6347051ac44c0ca971bdaf6528e1d0976bd821a3938179893f95e9c94967e810,2024-11-21T09:01:32.087000 +CVE-2024-25898,0,1,86006dde909e57a7bb647fd23ecf23a25c1344653211bfc4f446ecc8f96a3aa0,2025-02-12T01:12:54.453000 CVE-2024-2590,0,0,60a3bdaafc99a02849a3826c8a92974160c52fb0a8b38349972ea2276121fa28,2024-11-21T09:10:04.693000 CVE-2024-25902,0,0,50baecac8959a69ff064266e41b61821003e4b15caea11793c8b90ccdbd36bb5,2024-11-21T09:01:32.237000 CVE-2024-25903,0,0,510043d77f476a7b8dd893b0aa41ef8c44bea446cf82cb2f0af241f86238cb7c,2024-11-21T09:01:32.363000 @@ -254384,6 +254387,8 @@ CVE-2024-29168,0,0,76da846afbf9a55737b5d5153c7075fb50544a452bceda1dfcbdd4dbae96e CVE-2024-29169,0,0,d2a39941096d1cea2fb67256e6d405f7dadbfc7f6cf149bb994f4d72fa9e7ae2,2025-02-04T17:21:08.633000 CVE-2024-2917,0,0,b5f4311ed824c628747b6d6d6b66642d4215c934be667bd71791c2a5029b2dec,2024-11-21T09:10:50.053000 CVE-2024-29170,0,0,370cd60a5ddffa88cf8f7934c452c63f52b7ba07af57e96fdb32da3666fff09f,2025-01-08T16:25:58.207000 +CVE-2024-29171,1,1,3c82c3ed083bb886f21ca548be00ba108a1c61e9fb5593f79f450724196c7bab,2025-02-12T02:15:10.363000 +CVE-2024-29172,1,1,32298838eaebc5d1ea2496c4582652366c07713ae35bfafa61ac679d92cf6fb8,2025-02-12T02:15:10.500000 CVE-2024-29173,0,0,8f66bdd18b6f7192b1d98e3f67c2fa7b88807a5fecb3bffa3f651ea2750e1735,2025-02-03T15:08:59.513000 CVE-2024-29174,0,0,65010050e670e870e2ab6c488596f4f6fc1385fbeba243078e77aa3e825c9f1d,2024-11-21T09:07:43.507000 CVE-2024-29175,0,0,1a7114481e9b20c8eff6bf81f7575050706de007b87f7c2ddbf4ca9624c9a616,2024-11-21T09:07:43.653000 @@ -254678,7 +254683,7 @@ CVE-2024-2979,0,0,169364e1b852ff19eb4d89578c5260ea1664b46f15655b4e30fc73711f61d6 CVE-2024-29790,0,0,4ffc45027b2f086e430b392874a445504ac1e7739db800cb2ffc6c260cdab45e,2024-11-21T09:08:20.387000 CVE-2024-29791,0,0,85a4d58c4a829257279f8d65f2f235a00f3ee6099db60d44f44693f14d788eea,2024-11-21T09:08:20.517000 CVE-2024-29792,0,0,34e590205d2f418692ebf9014a875d8e00e620d9fce1b035a6741819f3890f75,2025-02-05T15:40:41.777000 -CVE-2024-29793,0,0,b83bf35d70ed5fefa81aa917a86052a2cab25d1fd31eb4ba1db86890386b59d2,2024-11-21T09:08:20.773000 +CVE-2024-29793,0,1,c5d9c74c41987492ebade1b57d87fdaf3bfd4d1a3de11698ad8abc8119120590,2025-02-12T01:24:37.180000 CVE-2024-29794,0,0,70800983f55d41173548f798a538d577c2723effa998974108d8c11c876be532,2024-11-21T09:08:20.910000 CVE-2024-29795,0,0,7cde9d85141c898a41540349f913ce42b8abc1f9285faa500037755a789a809f,2024-11-21T09:08:21.040000 CVE-2024-29796,0,0,14e02f618887b491d5254cacc44f3e2a453bf69cb6f08ac2aea28174bd15e322,2024-11-21T09:08:21.173000 @@ -256005,7 +256010,7 @@ CVE-2024-31345,0,0,14c52f9c3da5bdb90298c2b06fd58a68d1c79361ab0ea506debd4e9a43a47 CVE-2024-31346,0,0,b972a4a46a8f82aecb8e6a911642668b9c99df971421a9cdb94fecde63fc42f7,2024-11-21T09:13:20.400000 CVE-2024-31347,0,0,fbe2b413b7eff6717602ddd334ae28e4d6a1bc4991f31ed08ca6e39c79a3eba8,2024-11-21T09:13:20.513000 CVE-2024-31348,0,0,2e98ac178df5c221fd6690a2f1a2bc14e79e9523c14699479d5406069a39380a,2024-11-21T09:13:20.623000 -CVE-2024-31349,0,0,717aebb22adc3da84f95e90451aabf762069a5b289b6eaeb300c3179e06e25de,2024-11-21T09:13:20.733000 +CVE-2024-31349,0,1,16e17cf1acfc4a804075d3c2eac540c448394a1ef345218dffd55a47e0b455f5,2025-02-12T01:27:43.223000 CVE-2024-3135,0,0,a8ab488dcb130f07beccc80a8f4ebc2149cdf0280a6b66ffe02a28c850b4d100,2024-11-21T09:28:58.417000 CVE-2024-31350,0,0,d28e6c1f64725b53d92b4f35582c3333676898df2f97b9e93654a4411eeafad8,2024-11-21T09:13:20.840000 CVE-2024-31351,0,0,92c50237d42e95d85681af7f04333b2484437293a310d18109874b28fa58170e,2024-11-21T09:13:20.970000 @@ -257535,7 +257540,7 @@ CVE-2024-33453,0,0,1fbe82c644fb8bbe113912cb00a4a5d1a1c94bafa8eab10745ce875253c5c CVE-2024-33454,0,0,828c3154586cb9467c595c29d55b5edffb58459441e838ece7c4b76998774cd3,2024-11-21T09:16:59.873000 CVE-2024-3346,0,0,59b56dd3f76b482f3f46a4f5168e1d1df055d74f08cce67e579a69f871f78046,2024-11-21T09:29:25.567000 CVE-2024-33465,0,0,028b0b409a1d692a647c2520d19ecf0970cde52f7911daddec0b497be9b02421,2024-11-21T09:17:00.083000 -CVE-2024-33469,1,1,495c710f8d26a286929310ebe6bba90cf8d173cc5d9918b7540497a710f68650,2025-02-11T23:15:08.903000 +CVE-2024-33469,0,0,495c710f8d26a286929310ebe6bba90cf8d173cc5d9918b7540497a710f68650,2025-02-11T23:15:08.903000 CVE-2024-3347,0,0,84580b9ac972f7e1b9b68290f45a4841524b704cb60fa893b96efa9e425529ef,2024-11-21T09:29:25.703000 CVE-2024-33470,0,0,08742a77635184295f1eb4cd590862e27d57823d4ad2e85bd8bf65959a85d00d,2024-11-21T09:17:00.293000 CVE-2024-33471,0,0,70fd7f1f07be12a7e1cc088009fc2e2ec3d705634ba21a89ed0b1fc39d5857b1,2024-11-21T09:17:00.520000 @@ -258403,7 +258408,7 @@ CVE-2024-34562,0,0,22e9af7c3c7972513883b09b828274e40ff3fe33753cfb2dd3842a5691b68 CVE-2024-34563,0,0,040e10566a3859791595a0c0a3fd8df23d5dfb5e509404b6b78f66aa609377b8,2024-11-21T09:18:56.630000 CVE-2024-34564,0,0,cda6ebc66c36b8b0b609a35365d30e1dec81e59451dcb9e93db6bc2f43d200c0,2024-11-21T09:18:56.760000 CVE-2024-34565,0,0,cad1f1315da853e64ba67f67cf4501a859399268359dcdf02f7b21194a3856e0,2024-11-21T09:18:56.890000 -CVE-2024-34566,0,0,2671e0b5139844bb2688036f565bfd7344554ba83df594d02643341f22296441,2024-11-21T09:18:57.020000 +CVE-2024-34566,0,1,551c9639368b69fc3a51ac711b9940c7917ef958d0e7556eb6b33c06b1a5e2a5,2025-02-12T01:40:13.093000 CVE-2024-34567,0,0,2ab276be8a7d5ba54eff2226d21311c587c26eddbddaace14bc714e7d0243fe0,2024-11-21T09:18:57.143000 CVE-2024-34568,0,0,e2a99021dbe034875bba53eef3b45ca37b51ca7526699e547fd5d14e77646bbc,2024-11-21T09:18:57.270000 CVE-2024-34569,0,0,cd8352582a68c7f60aec609b227b4580a06f5f85d280b7f4cd9eabb100d8aa73,2024-11-21T09:18:57.397000 @@ -258427,7 +258432,7 @@ CVE-2024-34586,0,0,dd61ac39e080637c3d06cb160b51db7d6028a8ae3c7acedaea446e122ae60 CVE-2024-34587,0,0,a1ea0c2bc61320f1c19b728274877a0035d53c1740b926a40db9be507484bd32,2024-11-21T09:18:59.630000 CVE-2024-34588,0,0,7fd384a050a91a1492743c2c9bc72e1345a594b8c12774ff795ba64a2b6923f7,2024-11-21T09:18:59.783000 CVE-2024-34589,0,0,6fef5e07338107638aef6817dbd0c411c0299c6afcc66be7b7eb8ff397efd304,2024-11-21T09:18:59.933000 -CVE-2024-3459,0,0,eb6950b6e6b398f4f248bb57e02e28661732e5479fa83345a1eead742c901f56,2024-11-21T09:29:38.633000 +CVE-2024-3459,0,1,edda0f4899447a7e6b858b8951f50319e74b549a64650bcda8c3f37500b4d328,2025-02-12T01:48:00.043000 CVE-2024-34590,0,0,d172563a087c8cc3fc0f18ab9f59b7a38684c26fe9d7eb21c9f28503c3607b69,2024-11-21T09:19:00.083000 CVE-2024-34591,0,0,38f4e77aa79e1fe352794c9dd648e5c24d0b6c108df771e74aa53e4a7f38804e,2024-11-21T09:19:01.973000 CVE-2024-34592,0,0,2348be36c9bc2af83e1b7f1822c29ed34295e7b533f76caeff201627048bb319,2024-11-21T09:19:02.133000 @@ -263229,8 +263234,8 @@ CVE-2024-40884,0,0,ed9954ff74e93284dab776e5f85f657d7b2f3e463ef905e91d917d70faae6 CVE-2024-40885,0,0,c819fb6dd4b0136231d7f32857f3d24a5008c3818051b19ae2000f42a9494ee6,2024-11-15T14:00:09.720000 CVE-2024-40886,0,0,d6046df7f06d5f5712a2972118d791b3c29f6fc6001fad542f39cc79b75e1580,2024-08-23T16:09:31.887000 CVE-2024-4089,0,0,7a035608d08862b8a3927991cbc7bcfd8e0cb13815d39b3b58eaf685ec21d6c5,2024-10-17T19:41:36.467000 -CVE-2024-40890,0,0,5268031b6b0c69c868b634e8d2dcc745299983ca826dbcb0aeb2308ae94d43c6,2025-02-04T10:15:08.717000 -CVE-2024-40891,0,0,efbfdb62d645eed67f121c1bccca906620c7719c0e0f11f26167858d6df188a2,2025-02-04T10:15:08.920000 +CVE-2024-40890,0,1,a2545f7bb3a1bbfdaf9948a013d36581b2d3b0971e991c0417acda97a4bb7112,2025-02-12T02:00:01.980000 +CVE-2024-40891,0,1,da753debbb056ccce6e92cb3a629df90a9c092073c1b0fbda1dae1b05e2f10de,2025-02-12T02:00:01.980000 CVE-2024-40892,0,0,0bef0c096de1fd9b74596dba063b1cf9ffb172ff0abd417611d342278b46245f,2024-08-21T18:15:09.710000 CVE-2024-40893,0,0,291c1cc414cfaa66f88e6f282a2cb52f9787a1f732797e904eca670adbd8e574,2024-08-21T18:15:09.803000 CVE-2024-40895,0,0,9bfbe451c0a62cc469c348ecf829cab564e06b39ab7ab75fbb9a00c7abd49483,2024-11-21T09:31:48.250000 @@ -266040,7 +266045,7 @@ CVE-2024-44331,0,0,42b00072d48078e0b9a060027e505c6c6396591a3a5817312b42a22a13dd2 CVE-2024-44333,0,0,c5d624202dbc9a9b1670ac84eba11673bfacf2e3bd54495df9c00726b1f1c22f,2024-09-09T21:35:11.347000 CVE-2024-44334,0,0,2a3b81ccad3fcc31e1a06c0adb7939fa911851042ebf4e5dd5061206cc9f639c,2024-09-09T20:35:12.473000 CVE-2024-44335,0,0,4962d89eefd697dbe30866ff3edf68624ec476c2d20b191be41bf6d9942ab0b8,2024-09-09T20:35:17.330000 -CVE-2024-44336,1,1,b336e2ea7f1da09debaa046d4f249f821a074a273864f2d0a5e68a498672bb62,2025-02-11T23:15:09.020000 +CVE-2024-44336,0,0,b336e2ea7f1da09debaa046d4f249f821a074a273864f2d0a5e68a498672bb62,2025-02-11T23:15:09.020000 CVE-2024-44337,0,0,030514f9e40e38f59570e28e764a82624613b34238346a3330ba41ff1d541657,2024-11-14T16:35:14.613000 CVE-2024-4434,0,0,7c3e3d7c9744d63a28cc3bc3d3c440c5b3c9ccfe3f078d9d12a3b43c238ce6e4,2025-01-15T20:05:02.353000 CVE-2024-44340,0,0,83e58ea9785ebdf6a4101ac95bdee1fca6e905c550b6bbbcea8839f08b665ae8,2024-08-30T14:56:38.207000 @@ -272562,6 +272567,7 @@ CVE-2024-53867,0,0,72e506c917a884d4217cf064e51169da2e7b7e498f38ccd1a1ee0446ccb5b CVE-2024-53869,0,0,c1261311436db2434e8425ca6c3b255cdf8ad346c162ecff4729cd3488762e70,2025-01-28T04:15:10.023000 CVE-2024-5387,0,0,d7455745fd4e2043656d894120ace9fd562ab2b459405f5c80fb87774616ea6e,2024-06-03T19:15:09.500000 CVE-2024-5388,0,0,88068f2d18329bc2e1ad4660154ccfa55826fed94a4e1660b5757c6715c273a8,2024-06-03T19:15:09.557000 +CVE-2024-53880,1,1,34183cceeecf9f65c439b51cd1afbc636f6139fbfbd07e606a43b81980ad32fb,2025-02-12T01:15:08.940000 CVE-2024-53881,0,0,9961109f8d29619e875e57c963e9962bf41cbd2a63df9c973c97fd1f736a0a6c,2025-01-28T04:15:10.170000 CVE-2024-5389,0,0,7b62c041501e93209780667aacd1d527276730dd1c9ab622b7a27b2efa3d1409,2024-11-21T09:47:33.420000 CVE-2024-53899,0,0,6a1e5c5e75d5e15fff4f2ff3855d9c19b45498a7a802333e24ea4271ef180bd9,2025-02-10T18:12:06.107000 @@ -273167,7 +273173,7 @@ CVE-2024-54762,0,0,cb8e4aa44b5cf3cee838feac63d68a9bf187e0e1794dfb8457350541c6231 CVE-2024-54763,0,0,35fe6aeaf8ff2a2d9d1415d3e6f03dd3382c26dbe16edd942f9dacbafebc435a,2025-01-07T22:15:30.950000 CVE-2024-54764,0,0,7108368b95c8c33cd12f1a88712752ff55f9a1ed7ed83d67f4ddea2a12f4ec62,2025-01-07T22:15:31.113000 CVE-2024-54767,0,0,84c265d2aae9152ded289b8afe6572e4e60031d668299b365ef2804b7e7ac1df,2025-01-07T16:15:36.157000 -CVE-2024-54772,1,1,596a344d20e5016fe86f597976bbdf92a2ea5a5e50bbc7dbd6f918da880df294,2025-02-11T23:15:09.117000 +CVE-2024-54772,0,0,596a344d20e5016fe86f597976bbdf92a2ea5a5e50bbc7dbd6f918da880df294,2025-02-11T23:15:09.117000 CVE-2024-54774,0,0,4ed84230e45b966235391401edd82584405ef683a3e2fc4ff18ea7ccdbfb6480,2024-12-28T18:15:10.397000 CVE-2024-54775,0,0,3fdaf8fe1f78335459cdc17721da7bdc51023f16b45ae3c005b68536d3244569,2024-12-28T17:15:07.733000 CVE-2024-5478,0,0,db0e3beae9848430f36a4effd5045d24657a32915031caa2ccdcaa2667957312,2024-11-21T09:47:45.637000 @@ -273207,7 +273213,7 @@ CVE-2024-54907,0,0,80a392b1154d757e3dee13d617bee74a64b3baf8f41f4c6bebbb399698b18 CVE-2024-54909,0,0,73dbe9c0eacf924ee5d6ba5f8aea112f03b6c84bae4083891b6147c1b1e4a2ff,2025-02-11T22:15:28.733000 CVE-2024-5491,0,0,e331b82e31ebdfe13500034914a1c37ca8ae8114dde41994ac12e59a5b4284ca,2024-11-21T09:47:47.017000 CVE-2024-54910,0,0,6581157280a10462a6b1d5622c98ff4607d8f7315bb6a89f500333c22a07f58a,2025-01-14T16:15:32.953000 -CVE-2024-54916,1,1,fff3ee0e89c570a0b653b311b6ad0eaae0c786e449fdb988eba614851470bc4d,2025-02-11T23:15:09.227000 +CVE-2024-54916,0,0,fff3ee0e89c570a0b653b311b6ad0eaae0c786e449fdb988eba614851470bc4d,2025-02-11T23:15:09.227000 CVE-2024-54918,0,0,8d1c74ed435285d94b09f28fd23f5ea9a7eeb2cd4aab9028349afde0dfc746c6,2024-12-12T18:15:25.790000 CVE-2024-54919,0,0,d240fd7b13ed8b141b8975d3eb4f4e201c9093f582cb0ecbb49a96c5b085f2d9,2024-12-10T18:15:42.770000 CVE-2024-5492,0,0,bef41c141414e91a737f6b5c4fcaf83f2ee31e6e95a9e2405d6f4dc30a93092c,2024-11-21T09:47:47.140000 @@ -274277,7 +274283,7 @@ CVE-2024-56990,0,0,d73542476af2136f4500771d27d3e44f35a9b22fb9d2fc461dbdfee0bbfd6 CVE-2024-56997,0,0,b9e3b1a369f281014b3d6ae47db288812e253e2c05f0cfa169a74fad7957b7e9,2025-01-21T20:15:35.757000 CVE-2024-56998,0,0,f5f48efbc8b4fff5f7922bcdd7558331389f08761b2f0b3a0f88eaf8ce382ca8,2025-01-21T20:15:35.937000 CVE-2024-5700,0,0,03b60b2b2d02d40bfad068e0335a335857a618ee5b010c631028ca7b55a329d1,2024-11-21T09:48:11.903000 -CVE-2024-57000,1,1,bebb7ca545f033dce1711143b34b63e5e0bf44eaefebdf05145ea507a027fbc2,2025-02-11T23:15:09.337000 +CVE-2024-57000,0,0,bebb7ca545f033dce1711143b34b63e5e0bf44eaefebdf05145ea507a027fbc2,2025-02-11T23:15:09.337000 CVE-2024-57004,0,0,f586a360af706a58378cf0329b6a642e0d827f8c0f318cf23dcc24fe8bb6abf1,2025-02-03T19:15:12.777000 CVE-2024-5701,0,0,9915dfee3e359182f9adc135791d10f705664babe0d2fafe943bf47d66747252,2024-11-21T09:48:12.093000 CVE-2024-57011,0,0,e423cf8108eeaccf1a4a6a564034672c57143be7df30237f44f891951f76e1ce,2025-01-16T15:15:13.873000 @@ -278937,6 +278943,7 @@ CVE-2025-1193,0,0,fcc052109589eb1970f90d1d7ff13b99a2b86ca08fe73a0a45a738ed06ce3e CVE-2025-1211,0,0,6ad766f197b6f1fef6e3f3a893bb15bcbebd409cf163deb595b57c10dde2bea9,2025-02-11T16:15:50.660000 CVE-2025-1231,0,0,649e1b02ffb9b2bdea0c0d5302a32991e98ee2dd95c7154e6cc11a5ff00876a1,2025-02-11T15:15:20.643000 CVE-2025-1240,0,0,9246fa8e04ff02b401e811c0a0ea877726af12834c8315ffa6c43657c8f2f12a,2025-02-11T22:15:29.800000 +CVE-2025-1243,1,1,ce5d6de4aa6c9e357b98e042ebbfccf5742c455f48067e48b6f93d2620d3c5f5,2025-02-12T01:15:09.073000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,58d0a26aacf6cc700c9707f22937d4a9fd06e9e8ac5a17ed011c7efb874a7f40,2025-02-05T18:15:29.573000 @@ -279255,7 +279262,7 @@ CVE-2025-21386,0,0,587925b9f51c6f3c61d2c5fdab169ea945b83965a4922958f2a0d4035a486 CVE-2025-21387,0,0,45b75cfa0e3c3024e9e9758b140c1e6a57941eb5f03adacfbe13ff717267ca19,2025-02-11T18:15:37.337000 CVE-2025-21389,0,0,e0837d0e37718f09b2f4f6a27094db9197593cd197ddd111d928061563fd763e,2025-01-17T15:44:04.177000 CVE-2025-21390,0,0,14697f02c8baf4b55b17c007d56cdc55e364c61db4a64d4a3dca6609d3016329,2025-02-11T18:15:37.523000 -CVE-2025-21391,0,0,6e4fd4950bb5758240b222f52711872c75e6883808a4a98384b300fa35641d63,2025-02-11T18:15:37.723000 +CVE-2025-21391,0,1,0010a0d8103c312adae0e6ab52ff5b2f6efb1301caae82c7257918d8825b7799,2025-02-12T02:00:01.980000 CVE-2025-21392,0,0,faf0d0e3f0fb591c7fa30ae6371bf66c37572648e7b14e075224882a96d4548d,2025-02-11T18:15:37.907000 CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000 CVE-2025-21394,0,0,17cc60461eb9eb8df29e62503902c081c32c2e62dd8a0d75bc2ce09b707ad17e,2025-02-11T18:15:38.100000 @@ -279278,7 +279285,7 @@ CVE-2025-21413,0,0,92246b94b6ff8ad6af923e8c9e956388783c15bc49ee5b2dd584abbbec413 CVE-2025-21414,0,0,3e2427e2ed7c2a71e7ca3cdd20bff3b54a00c32904d4ae8308a39097ff4a1289,2025-02-11T18:15:39.787000 CVE-2025-21415,0,0,a73e69cb370d0dac47b98a4826a11694e5572b74f5784ab533acee4e37f95f59,2025-02-07T14:11:24.557000 CVE-2025-21417,0,0,2747c56c84381d3763059eec5080d6fa07a433b2e87fb1f1180b0a05545552d9,2025-01-16T20:34:03.303000 -CVE-2025-21418,0,0,80fc1ee196509b1d5b15447fb529df5ce42a9131defec74112587798a6a8394d,2025-02-11T18:15:40.023000 +CVE-2025-21418,0,1,3ae3c511b74f45afb2582057b40d6d6e504500f2e441f4a2e37971243dae5c45,2025-02-12T02:00:01.980000 CVE-2025-21419,0,0,8d4a4ce1854ce64d5e9a1632a620dc74ee76e1214f2cab758271d527d93a2f57,2025-02-11T18:15:40.227000 CVE-2025-21420,0,0,4b5efeb1f002453a12ea1479627a151320581653d00a87f90e1240101e9780c2,2025-02-11T18:15:40.427000 CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000 @@ -279974,6 +279981,7 @@ CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe CVE-2025-23236,0,0,9ed63f7bfbe943272f760ab493d54bc59838c975bd594d259d2bee944c4c3a3d,2025-02-06T08:15:30.170000 CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000 CVE-2025-23239,0,0,7a585763d6c168ccfac8bf02954dc56c5ae9d7a095f70655a5a1ee00b3dbe979,2025-02-05T18:15:31.373000 +CVE-2025-23359,1,1,ca000ea1c09e6d84d7ca20124740a5199de0048ccb1fcc97aaaa4891bafa68b3,2025-02-12T01:15:09.230000 CVE-2025-23362,0,0,f1b04109bb5a53f0fa12693fb841988a838f82d29d11cab82e724120097242c3,2025-01-29T02:15:27.910000 CVE-2025-23363,0,0,0a9aef70d0345148f50c8be1d50129f0d5255e87312c25a23579bd06a0945ffc,2025-02-11T11:15:16.250000 CVE-2025-23366,0,0,3312897ce94f2285a7d2a9ec8c23b065acb503e3b2f9a747e3e7ca809adbfbea,2025-01-14T18:16:06.290000 @@ -280894,7 +280902,7 @@ CVE-2025-25190,0,0,e0da5cc0fc69e9aeec609eb916069649e239fce8ec02b2e1997642ab3a06b CVE-2025-25193,0,0,6313f18b0cc99557f7bb698f851fc47bc1114c9ea466bbb50c1e509a16b993db,2025-02-11T16:15:52.523000 CVE-2025-25194,0,0,3cfb92d0adf1aa48727a5bef815057c2df69f4fc0b8dbd2b306994cdf6b88680,2025-02-10T23:15:16.067000 CVE-2025-25202,0,0,44a9f4b6846ddccd75106a09a7d9e63e6d44f1833e59d9edfd1f84930b624155,2025-02-11T19:15:18.690000 -CVE-2025-25203,1,1,fafc3c78a1f4e39a87b4d68e2295b38c2910ef2359dd9409bb1510258a4c87e7,2025-02-11T23:15:09.450000 +CVE-2025-25203,0,0,fafc3c78a1f4e39a87b4d68e2295b38c2910ef2359dd9409bb1510258a4c87e7,2025-02-11T23:15:09.450000 CVE-2025-25241,0,0,3f1a5e9f52cb19b464445ba11bc8902290ee3de6281565f07fab135133fb799f,2025-02-11T06:15:24.120000 CVE-2025-25243,0,0,4a1fb2a2f647dbb24d92bc1eec2013806163e245973af288dc8e801924ea4b36,2025-02-11T06:15:24.330000 CVE-2025-25246,0,0,0ae0916aaea4283fe6ce79729127d0aa8edfdf07242f3416b5c2d5ec885c2c98,2025-02-05T05:15:11.663000