diff --git a/CVE-2020/CVE-2020-262xx/CVE-2020-26258.json b/CVE-2020/CVE-2020-262xx/CVE-2020-26258.json index 2bdec53edb8..5a09fa409f1 100644 --- a/CVE-2020/CVE-2020-262xx/CVE-2020-26258.json +++ b/CVE-2020/CVE-2020-262xx/CVE-2020-26258.json @@ -2,7 +2,7 @@ "id": "CVE-2020-26258", "sourceIdentifier": "security-advisories@github.com", "published": "2020-12-16T01:15:12.333", - "lastModified": "2024-11-21T05:19:40.820", + "lastModified": "2025-01-15T21:15:09.713", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -22,11 +22,11 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", - "baseScore": 7.7, - "baseSeverity": "HIGH", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", - "attackComplexity": "LOW", + "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", @@ -34,7 +34,7 @@ "integrityImpact": "NONE", "availabilityImpact": "NONE" }, - "exploitabilityScore": 3.1, + "exploitabilityScore": 1.8, "impactScore": 4.0 }, { @@ -179,7 +179,7 @@ ] }, { - "url": "https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34%40%3Ccommits.struts.apache.org%3E", + "url": "https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34@%3Ccommits.struts.apache.org%3E", "source": "security-advisories@github.com" }, { @@ -191,23 +191,20 @@ ] }, { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP", "source": "security-advisories@github.com" }, { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7", "source": "security-advisories@github.com" }, { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB", "source": "security-advisories@github.com" }, { - "url": "https://security.netapp.com/advisory/ntap-20210409-0005/", - "source": "security-advisories@github.com", - "tags": [ - "Third Party Advisory" - ] + "url": "https://security.netapp.com/advisory/ntap-20210409-0005", + "source": "security-advisories@github.com" }, { "url": "https://www.debian.org/security/2021/dsa-4828", diff --git a/CVE-2021/CVE-2021-468xx/CVE-2021-46887.json b/CVE-2021/CVE-2021-468xx/CVE-2021-46887.json index 84c4046e026..2e68a2eb8fb 100644 --- a/CVE-2021/CVE-2021-468xx/CVE-2021-46887.json +++ b/CVE-2021/CVE-2021-468xx/CVE-2021-46887.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46887", "sourceIdentifier": "psirt@huawei.com", "published": "2023-05-26T17:15:13.227", - "lastModified": "2024-11-21T06:34:51.440", + "lastModified": "2025-01-15T22:15:25.260", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0117.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0117.json index 1a31a16f484..1fdc5ecee16 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0117.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0117.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0117", "sourceIdentifier": "psirt@huawei.com", "published": "2023-05-26T17:15:13.743", - "lastModified": "2024-11-21T07:36:35.130", + "lastModified": "2025-01-15T22:15:25.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1664.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1664.json index 040d7d7e06b..2ee1b735f41 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1664.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1664.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1664", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-26T18:15:09.740", - "lastModified": "2024-11-21T07:39:38.787", + "lastModified": "2025-01-15T22:15:25.593", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ] }, diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1981.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1981.json index 2a89bc8c15c..df68071fe22 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1981.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1981.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1981", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-26T18:15:11.277", - "lastModified": "2024-11-21T07:40:16.500", + "lastModified": "2025-01-15T22:15:25.813", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2879.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2879.json index 13db56b2bde..14fbde02e8d 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2879.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2879.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2879", "sourceIdentifier": "cve@gitlab.com", "published": "2023-05-26T21:15:19.000", - "lastModified": "2024-11-21T07:59:28.960", + "lastModified": "2025-01-15T22:15:26.060", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-835" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31226.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31226.json index a2dece2fbeb..a95f3c660f0 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31226.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31226.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31226", "sourceIdentifier": "psirt@huawei.com", "published": "2023-05-26T17:15:17.913", - "lastModified": "2024-11-21T08:01:39.760", + "lastModified": "2025-01-15T22:15:26.220", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31227.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31227.json index 5b5ffb08a11..803beba8dc7 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31227.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31227.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31227", "sourceIdentifier": "psirt@huawei.com", "published": "2023-05-26T17:15:18.000", - "lastModified": "2024-11-21T08:01:39.863", + "lastModified": "2025-01-15T21:15:11.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33255.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33255.json index 1b7b1c68c79..e041388c1e8 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33255.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33255.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33255", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-26T20:15:49.577", - "lastModified": "2024-11-21T08:05:16.590", + "lastModified": "2025-01-15T21:15:11.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1124.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1124.json index 674214dbdcb..3a88d6aa2a5 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1124.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1124.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1124", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-09T07:15:08.000", - "lastModified": "2024-11-21T08:49:51.203", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T21:21:12.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metagauss:eventprime:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.4.4", + "matchCriteriaId": "A668DE1F-72F6-41C6-A3FE-0EF956389DD6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3043888%40eventprime-event-calendar-management&new=3043888%40eventprime-event-calendar-management&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/346049ca-1bc5-4e02-9f38-d1f64338709d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3043888%40eventprime-event-calendar-management&new=3043888%40eventprime-event-calendar-management&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/346049ca-1bc5-4e02-9f38-d1f64338709d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1125.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1125.json index 751bb22d6a2..48c47e9d646 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1125.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1125.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1125", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-09T07:15:08.313", - "lastModified": "2024-11-21T08:49:51.320", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T21:23:06.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metagauss:eventprime:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.4.4", + "matchCriteriaId": "A668DE1F-72F6-41C6-A3FE-0EF956389DD6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3043888%40eventprime-event-calendar-management&new=3043888%40eventprime-event-calendar-management&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b5278afb-9db3-4b1d-bb2f-e6595f0ac6dc?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3043888%40eventprime-event-calendar-management&new=3043888%40eventprime-event-calendar-management&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b5278afb-9db3-4b1d-bb2f-e6595f0ac6dc?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1320.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1320.json index 3d6345fce91..87e22651149 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1320.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1320.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1320", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-09T07:15:08.730", - "lastModified": "2024-11-21T08:50:19.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T21:23:22.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metagauss:eventprime:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.4.4", + "matchCriteriaId": "A668DE1F-72F6-41C6-A3FE-0EF956389DD6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3043888%40eventprime-event-calendar-management&new=3043888%40eventprime-event-calendar-management&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7e82e1c5-0ed4-4dee-9990-976591693eb5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3043888%40eventprime-event-calendar-management&new=3043888%40eventprime-event-calendar-management&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7e82e1c5-0ed4-4dee-9990-976591693eb5?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21308.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21308.json index d331ac375bc..33cb6e512a6 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21308.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21308.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21308", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:11.337", - "lastModified": "2024-11-21T08:54:04.457", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T22:44:09.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,100 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "52804B2D-2D71-41DC-92BC-4B3C086CFE59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "C736C053-C058-4D51-A248-6933448045BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "805A8624-FFA0-48D6-9B19-D6B75F8FCA50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "39B9F117-2AE1-4D98-8B3C-53EF4F67CAEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "782A9D81-65C8-442D-AF6E-6FBF0714B30E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "F881242C-241B-4279-AB0F-2D3EF241E67D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.1000.6", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "B89DF738-CC52-4C5D-9D51-19A32565742D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.4003.1", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "BAFC0689-DA13-40B0-9088-F661A0567877" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21308", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21308", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21317.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21317.json index fe9867fd442..f74dc2e5d93 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21317.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21317.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21317", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:11.573", - "lastModified": "2024-11-21T08:54:05.833", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T22:43:44.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,100 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "52804B2D-2D71-41DC-92BC-4B3C086CFE59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "C736C053-C058-4D51-A248-6933448045BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "805A8624-FFA0-48D6-9B19-D6B75F8FCA50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "39B9F117-2AE1-4D98-8B3C-53EF4F67CAEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "782A9D81-65C8-442D-AF6E-6FBF0714B30E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "F881242C-241B-4279-AB0F-2D3EF241E67D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.1000.6", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "B89DF738-CC52-4C5D-9D51-19A32565742D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.4003.1", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "BAFC0689-DA13-40B0-9088-F661A0567877" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21317", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21317", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21331.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21331.json index ded8dd19c83..9848d7eca5e 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21331.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21331.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21331", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:11.800", - "lastModified": "2024-11-21T08:54:07.490", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T22:43:24.930", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,100 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "52804B2D-2D71-41DC-92BC-4B3C086CFE59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "C736C053-C058-4D51-A248-6933448045BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "805A8624-FFA0-48D6-9B19-D6B75F8FCA50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "39B9F117-2AE1-4D98-8B3C-53EF4F67CAEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "782A9D81-65C8-442D-AF6E-6FBF0714B30E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "F881242C-241B-4279-AB0F-2D3EF241E67D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.1000.6", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "B89DF738-CC52-4C5D-9D51-19A32565742D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.4003.1", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "BAFC0689-DA13-40B0-9088-F661A0567877" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21331", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21331", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21332.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21332.json index cfecb25a65b..ffb4d3532b5 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21332.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21332.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21332", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:12.033", - "lastModified": "2024-11-21T08:54:07.610", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T22:43:03.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,100 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "52804B2D-2D71-41DC-92BC-4B3C086CFE59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "C736C053-C058-4D51-A248-6933448045BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "805A8624-FFA0-48D6-9B19-D6B75F8FCA50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "39B9F117-2AE1-4D98-8B3C-53EF4F67CAEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "782A9D81-65C8-442D-AF6E-6FBF0714B30E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "F881242C-241B-4279-AB0F-2D3EF241E67D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.1000.6", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "B89DF738-CC52-4C5D-9D51-19A32565742D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.4003.1", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "BAFC0689-DA13-40B0-9088-F661A0567877" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21332", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21332", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21333.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21333.json index 56329b5754a..7fc5a16a0b6 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21333.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21333.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21333", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:12.260", - "lastModified": "2024-11-21T08:54:07.733", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T22:42:43.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,100 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "52804B2D-2D71-41DC-92BC-4B3C086CFE59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "C736C053-C058-4D51-A248-6933448045BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "805A8624-FFA0-48D6-9B19-D6B75F8FCA50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "39B9F117-2AE1-4D98-8B3C-53EF4F67CAEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "782A9D81-65C8-442D-AF6E-6FBF0714B30E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "F881242C-241B-4279-AB0F-2D3EF241E67D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.1000.6", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "B89DF738-CC52-4C5D-9D51-19A32565742D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.4003.1", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "BAFC0689-DA13-40B0-9088-F661A0567877" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21333", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21333", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21335.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21335.json index c200b1e7604..65b706a1fec 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21335.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21335.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21335", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:12.487", - "lastModified": "2024-11-21T08:54:07.997", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T22:42:26.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,100 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "52804B2D-2D71-41DC-92BC-4B3C086CFE59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "C736C053-C058-4D51-A248-6933448045BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "805A8624-FFA0-48D6-9B19-D6B75F8FCA50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "39B9F117-2AE1-4D98-8B3C-53EF4F67CAEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "782A9D81-65C8-442D-AF6E-6FBF0714B30E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "F881242C-241B-4279-AB0F-2D3EF241E67D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.1000.6", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "B89DF738-CC52-4C5D-9D51-19A32565742D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.4003.1", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "BAFC0689-DA13-40B0-9088-F661A0567877" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21335", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21335", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21373.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21373.json index 70020dbdcbf..b6656a283d4 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21373.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21373.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21373", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:12.857", - "lastModified": "2024-11-21T08:54:13.623", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T22:37:35.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,100 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "52804B2D-2D71-41DC-92BC-4B3C086CFE59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "C736C053-C058-4D51-A248-6933448045BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "805A8624-FFA0-48D6-9B19-D6B75F8FCA50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "39B9F117-2AE1-4D98-8B3C-53EF4F67CAEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "782A9D81-65C8-442D-AF6E-6FBF0714B30E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "F881242C-241B-4279-AB0F-2D3EF241E67D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.1000.6", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "B89DF738-CC52-4C5D-9D51-19A32565742D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.4003.1", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "BAFC0689-DA13-40B0-9088-F661A0567877" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21373", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21373", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21398.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21398.json index 7fb59beabc8..561b04eccc9 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21398.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21398.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21398", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:13.103", - "lastModified": "2024-11-21T08:54:16.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T22:36:43.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,100 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "52804B2D-2D71-41DC-92BC-4B3C086CFE59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "C736C053-C058-4D51-A248-6933448045BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "805A8624-FFA0-48D6-9B19-D6B75F8FCA50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "39B9F117-2AE1-4D98-8B3C-53EF4F67CAEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "782A9D81-65C8-442D-AF6E-6FBF0714B30E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "F881242C-241B-4279-AB0F-2D3EF241E67D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.1000.6", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "B89DF738-CC52-4C5D-9D51-19A32565742D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.4003.1", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "BAFC0689-DA13-40B0-9088-F661A0567877" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21398", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21398", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21414.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21414.json index eac8ffece4e..86ecb7fbe90 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21414.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21414.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21414", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:13.327", - "lastModified": "2024-11-21T08:54:18.853", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T22:36:14.993", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,100 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "52804B2D-2D71-41DC-92BC-4B3C086CFE59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "C736C053-C058-4D51-A248-6933448045BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "805A8624-FFA0-48D6-9B19-D6B75F8FCA50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "39B9F117-2AE1-4D98-8B3C-53EF4F67CAEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "782A9D81-65C8-442D-AF6E-6FBF0714B30E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "F881242C-241B-4279-AB0F-2D3EF241E67D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.1000.6", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "B89DF738-CC52-4C5D-9D51-19A32565742D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.4003.1", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "BAFC0689-DA13-40B0-9088-F661A0567877" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21414", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21414", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21415.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21415.json index 7d2470d1c99..e430e5c7a03 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21415.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21415.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21415", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:13.550", - "lastModified": "2024-11-21T08:54:18.973", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T22:34:43.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,100 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "52804B2D-2D71-41DC-92BC-4B3C086CFE59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "C736C053-C058-4D51-A248-6933448045BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "805A8624-FFA0-48D6-9B19-D6B75F8FCA50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "39B9F117-2AE1-4D98-8B3C-53EF4F67CAEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "782A9D81-65C8-442D-AF6E-6FBF0714B30E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "F881242C-241B-4279-AB0F-2D3EF241E67D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.1000.6", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "B89DF738-CC52-4C5D-9D51-19A32565742D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.4003.1", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "BAFC0689-DA13-40B0-9088-F661A0567877" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21415", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21415", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21425.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21425.json index 4439f9f383a..a5295ae6078 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21425.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21425.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21425", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:13.770", - "lastModified": "2024-11-21T08:54:20.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T22:34:16.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,100 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "52804B2D-2D71-41DC-92BC-4B3C086CFE59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "C736C053-C058-4D51-A248-6933448045BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "805A8624-FFA0-48D6-9B19-D6B75F8FCA50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "39B9F117-2AE1-4D98-8B3C-53EF4F67CAEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "782A9D81-65C8-442D-AF6E-6FBF0714B30E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "F881242C-241B-4279-AB0F-2D3EF241E67D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.1000.6", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "B89DF738-CC52-4C5D-9D51-19A32565742D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.4003.1", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "BAFC0689-DA13-40B0-9088-F661A0567877" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21425", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21425", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21428.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21428.json index 7fe592c941a..15da019a1de 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21428.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21428.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21428", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:13.973", - "lastModified": "2024-11-21T08:54:20.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T22:33:02.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,100 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "52804B2D-2D71-41DC-92BC-4B3C086CFE59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "C736C053-C058-4D51-A248-6933448045BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "805A8624-FFA0-48D6-9B19-D6B75F8FCA50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "39B9F117-2AE1-4D98-8B3C-53EF4F67CAEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "782A9D81-65C8-442D-AF6E-6FBF0714B30E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "F881242C-241B-4279-AB0F-2D3EF241E67D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.1000.6", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "B89DF738-CC52-4C5D-9D51-19A32565742D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.4003.1", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "BAFC0689-DA13-40B0-9088-F661A0567877" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21428", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21428", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28928.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28928.json index 571b910c19d..5aa4bbbc56b 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28928.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28928.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28928", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-09T17:15:15.447", - "lastModified": "2024-11-21T09:07:12.667", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T22:32:19.930", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,100 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6441.1", + "matchCriteriaId": "52804B2D-2D71-41DC-92BC-4B3C086CFE59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7037.1", + "matchCriteriaId": "C736C053-C058-4D51-A248-6933448045BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2056.2", + "matchCriteriaId": "805A8624-FFA0-48D6-9B19-D6B75F8FCA50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3471.2", + "matchCriteriaId": "39B9F117-2AE1-4D98-8B3C-53EF4F67CAEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2116.2", + "matchCriteriaId": "782A9D81-65C8-442D-AF6E-6FBF0714B30E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4382.1", + "matchCriteriaId": "F881242C-241B-4279-AB0F-2D3EF241E67D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.1000.6", + "versionEndExcluding": "16.0.1121.4", + "matchCriteriaId": "B89DF738-CC52-4C5D-9D51-19A32565742D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.4003.1", + "versionEndExcluding": "16.0.4131.2", + "matchCriteriaId": "BAFC0689-DA13-40B0-9088-F661A0567877" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28928", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28928", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36751.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36751.json new file mode 100644 index 00000000000..9042426ff03 --- /dev/null +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36751.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-36751", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-15T22:15:26.400", + "lastModified": "2025-01-15T22:15:26.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in parse-uri v1.0.9 allows attackers to cause a Regular expression Denial of Service (ReDoS) via a crafted URL." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/6en6ar/78168687da94e8aa2e0357f2456b0233", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Kikobeats/parse-uri/issues/14", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37966.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37966.json index 1f39c6e0016..2c4ab18b449 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37966.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37966.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37966", "sourceIdentifier": "secure@microsoft.com", "published": "2024-09-10T17:15:19.197", - "lastModified": "2024-09-10T17:43:14.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T22:31:41.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,79 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2060.1", + "matchCriteriaId": "092AF402-BDA3-46C2-ADB8-BEA92DF81BA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3475.1", + "matchCriteriaId": "6E6AD612-AB64-4454-970E-D868420C6CC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2120.1", + "matchCriteriaId": "64D0E7A9-846A-421E-A3E0-E2C0CDACD13C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4390.2", + "matchCriteriaId": "AF8BBB82-ED5C-4943-A787-EA07536BCFBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.1000.6", + "versionEndExcluding": "16.0.1125.1", + "matchCriteriaId": "30D1D16A-0B3E-49B4-9DB4-77FC462BA503" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.4003.1", + "versionEndExcluding": "16.0.4140.3", + "matchCriteriaId": "148D362E-101A-4121-9790-B537D02CB114" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37966", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4397.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4397.json index 431ad6eabe0..e6fba68ad58 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4397.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4397.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4397", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:43:31.793", - "lastModified": "2024-11-21T09:42:45.863", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-15T21:23:41.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.2.6.6", + "matchCriteriaId": "CA0A1657-143B-466C-B5BE-B54F5AC945ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/learnpress/tags/4.2.6.5/inc/rest-api/v1/frontend/class-lp-rest-material-controller.php#L98", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3083657/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ec20d5c4-4c41-4ec9-8d0a-ec8f03634f7d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/learnpress/tags/4.2.6.5/inc/rest-api/v1/frontend/class-lp-rest-material-controller.php#L98", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3083657/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ec20d5c4-4c41-4ec9-8d0a-ec8f03634f7d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48121.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48121.json new file mode 100644 index 00000000000..204b923471b --- /dev/null +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48121.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48121", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-15T21:15:13.063", + "lastModified": "2025-01-15T21:15:13.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The HI-SCAN 6040i Hitrax HX-03-19-I was discovered to transmit user credentials in cleartext over the GIOP protocol. This allows attackers to possibly gain access to sensitive information via a man-in-the-middle attack." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://kth.diva-portal.org/smash/get/diva2:1876534/FULLTEXT01.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48122.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48122.json new file mode 100644 index 00000000000..2f9e28581b6 --- /dev/null +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48122.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48122", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-15T21:15:13.200", + "lastModified": "2025-01-15T21:15:13.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insecure default configurations in HI-SCAN 6040i Hitrax HX-03-19-I allow authenticated attackers with low-level privileges to escalate to root-level privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://kth.diva-portal.org/smash/get/diva2:1876534/FULLTEXT01.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48123.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48123.json new file mode 100644 index 00000000000..2ddd2b15865 --- /dev/null +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48123.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48123", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-15T21:15:13.340", + "lastModified": "2025-01-15T21:15:13.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the USB Autorun function of HI-SCAN 6040i Hitrax HX-03-19-I allows attackers to execute arbitrary code via uploading a crafted script from a USB device." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://kth.diva-portal.org/smash/get/diva2:1876534/FULLTEXT01.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48125.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48125.json new file mode 100644 index 00000000000..805de3ec62e --- /dev/null +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48125.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48125", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-15T21:15:13.477", + "lastModified": "2025-01-15T21:15:13.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the AsDB service of HI-SCAN 6040i Hitrax HX-03-19-I allows attackers to enumerate user credentials via crafted GIOP protocol requests." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://kth.diva-portal.org/smash/get/diva2:1876534/FULLTEXT01.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48126.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48126.json new file mode 100644 index 00000000000..47530c50075 --- /dev/null +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48126.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48126", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-15T21:15:13.613", + "lastModified": "2025-01-15T21:15:13.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "HI-SCAN 6040i Hitrax HX-03-19-I was discovered to contain hardcoded credentials for access to vendor support and service access." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://kth.diva-portal.org/smash/get/diva2:1876534/FULLTEXT01.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54887.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54887.json index 61a112769fb..8332b86e8a1 100644 --- a/CVE-2024/CVE-2024-548xx/CVE-2024-54887.json +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54887.json @@ -2,7 +2,7 @@ "id": "CVE-2024-54887", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-09T20:15:39.277", - "lastModified": "2025-01-09T20:15:39.277", + "lastModified": "2025-01-15T21:15:13.820", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los dispositivos TP-Link TL-WR940N V3 y V4 con firmware 3.16.9 y versiones anteriores presentan un desbordamiento de b\u00fafer a trav\u00e9s de los par\u00e1metros dnsserver1 y dnsserver2 en /userRpm/Wan6to4TunnelCfgRpm.htm. Esta vulnerabilidad permite que un atacante autenticado ejecute c\u00f3digo arbitrario en el dispositivo remoto en el contexto del usuario ra\u00edz." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "http://tp-link.com", diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57211.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57211.json index 12bfec351a7..e02ff4d3713 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57211.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57211.json @@ -2,20 +2,63 @@ "id": "CVE-2024-57211", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T17:15:17.850", - "lastModified": "2025-01-10T17:15:17.850", - "vulnStatus": "Received", + "lastModified": "2025-01-15T21:15:14.057", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulnerability via the modifyOne parameter in the enable_wsh function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que TOTOLINK A6000R V1.0.1-B20201211.2000 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro modifyOne en la funci\u00f3n enable_wsh." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/yanggao017/vuln/blob/main/TOTOLINK/A6000R/CI_11_enable_wsh/README.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yanggao017/vuln/blob/main/TOTOLINK/A6000R/CI_11_enable_wsh/README.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57226.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57226.json index c9715a037c1..5ace9d76150 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57226.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57226.json @@ -2,20 +2,63 @@ "id": "CVE-2024-57226", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-10T18:15:25.600", - "lastModified": "2025-01-10T18:15:25.600", - "vulnStatus": "Received", + "lastModified": "2025-01-15T21:15:14.303", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the iface parameter in the vif_enable function." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Linksys E7350 1.1.00.032 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s del par\u00e1metro iface en la funci\u00f3n vif_enable." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/yanggao017/vuln/blob/main/Linksys/E7350/CI_2_vif_enable/README.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yanggao017/vuln/blob/main/Linksys/E7350/CI_2_vif_enable/README.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0482.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0482.json index 2ba8767cbfc..2d514bcb5b3 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0482.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0482.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0482", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-15T20:15:28.863", - "lastModified": "2025-01-15T20:15:28.863", + "lastModified": "2025-01-15T21:15:14.653", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,14 @@ { "url": "https://vuldb.com/?submit.475237", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Fanli2012/native-php-cms/issues/4", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://github.com/Fanli2012/native-php-cms/issues/4#issue-2769866348", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0486.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0486.json new file mode 100644 index 00000000000..88cf2697ee5 --- /dev/null +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0486.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0486", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-15T21:15:14.960", + "lastModified": "2025-01-15T21:15:14.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /fladmin/login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Fanli2012/native-php-cms/issues/8", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Fanli2012/native-php-cms/issues/8#issue-2769942639", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.291931", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.291931", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.475249", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0487.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0487.json new file mode 100644 index 00000000000..dfb9adfa4bc --- /dev/null +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0487.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0487", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-15T21:15:15.160", + "lastModified": "2025-01-15T21:15:15.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /fladmin/cat_edit.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Fanli2012/native-php-cms/issues/9", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Fanli2012/native-php-cms/issues/9#issue-2769962332", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.291932", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.291932", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.475254", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0488.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0488.json new file mode 100644 index 00000000000..195823b6afe --- /dev/null +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0488.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0488", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-15T21:15:15.380", + "lastModified": "2025-01-15T21:15:15.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in Fanli2012 native-php-cms 1.0. This affects an unknown part of the file product_list.php. The manipulation of the argument cat leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Fanli2012/native-php-cms/issues/10", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Fanli2012/native-php-cms/issues/10#issue-2769983658", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.291933", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.291933", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.475255", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0489.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0489.json new file mode 100644 index 00000000000..6a3825c7216 --- /dev/null +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0489.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0489", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-15T22:15:26.660", + "lastModified": "2025-01-15T22:15:26.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in Fanli2012 native-php-cms 1.0. This vulnerability affects unknown code of the file /fladmin/friendlink_dodel.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Fanli2012/native-php-cms/issues/11", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Fanli2012/native-php-cms/issues/11#issue-2769999157", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.291934", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.291934", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.475256", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0490.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0490.json new file mode 100644 index 00000000000..f9fbf7d16e0 --- /dev/null +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0490.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0490", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-15T22:15:26.820", + "lastModified": "2025-01-15T22:15:26.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in Fanli2012 native-php-cms 1.0. This issue affects some unknown processing of the file /fladmin/article_dodel.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Fanli2012/native-php-cms/issues/12", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Fanli2012/native-php-cms/issues/12#issue-2770013163", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.291935", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.291935", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.475258", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0491.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0491.json new file mode 100644 index 00000000000..e122d9ef906 --- /dev/null +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0491.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0491", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-15T22:15:26.990", + "lastModified": "2025-01-15T22:15:26.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in Fanli2012 native-php-cms 1.0. Affected is an unknown function of the file /fladmin/cat_dodel.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Fanli2012/native-php-cms/issues/13", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Fanli2012/native-php-cms/issues/13#issue-2770022466", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.291936", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.291936", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.475260", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0492.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0492.json new file mode 100644 index 00000000000..a486d363387 --- /dev/null +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0492.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0492", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-15T22:15:27.157", + "lastModified": "2025-01-15T22:15:27.157", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in D-Link DIR-823X 240126/240802 and classified as critical. Affected by this vulnerability is the function FUN_00412244. The manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", + "baseScore": 7.8, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://tasty-foxtrot-3a8.notion.site/D-link-DIR-823X-FUN_00412244-NULL-Pointer-Dereference-1730448e619580fcb7f9d871c6e7190a", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.291937", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.291937", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.475301", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 9da0daf65fb..b7ffd7ff537 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-15T21:00:22.785535+00:00 +2025-01-15T23:00:23.955117+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-15T20:58:52.953000+00:00 +2025-01-15T22:44:09.030000+00:00 ``` ### Last Data Feed Release @@ -33,60 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -277590 +277603 ``` ### CVEs added in the last Commit -Recently added CVEs: `16` +Recently added CVEs: `13` -- [CVE-2024-27856](CVE-2024/CVE-2024-278xx/CVE-2024-27856.json) (`2025-01-15T20:15:27.483`) -- [CVE-2024-40771](CVE-2024/CVE-2024-407xx/CVE-2024-40771.json) (`2025-01-15T20:15:27.597`) -- [CVE-2024-40839](CVE-2024/CVE-2024-408xx/CVE-2024-40839.json) (`2025-01-15T20:15:27.700`) -- [CVE-2024-40854](CVE-2024/CVE-2024-408xx/CVE-2024-40854.json) (`2025-01-15T20:15:27.797`) -- [CVE-2024-44136](CVE-2024/CVE-2024-441xx/CVE-2024-44136.json) (`2025-01-15T20:15:27.923`) -- [CVE-2024-54470](CVE-2024/CVE-2024-544xx/CVE-2024-54470.json) (`2025-01-15T20:15:28.520`) -- [CVE-2024-54535](CVE-2024/CVE-2024-545xx/CVE-2024-54535.json) (`2025-01-15T20:15:28.610`) -- [CVE-2024-54540](CVE-2024/CVE-2024-545xx/CVE-2024-54540.json) (`2025-01-15T20:15:28.703`) -- [CVE-2025-0481](CVE-2025/CVE-2025-04xx/CVE-2025-0481.json) (`2025-01-15T19:15:26.807`) -- [CVE-2025-0482](CVE-2025/CVE-2025-04xx/CVE-2025-0482.json) (`2025-01-15T20:15:28.863`) -- [CVE-2025-0483](CVE-2025/CVE-2025-04xx/CVE-2025-0483.json) (`2025-01-15T20:15:29.040`) -- [CVE-2025-0484](CVE-2025/CVE-2025-04xx/CVE-2025-0484.json) (`2025-01-15T20:15:29.227`) -- [CVE-2025-0485](CVE-2025/CVE-2025-04xx/CVE-2025-0485.json) (`2025-01-15T20:15:29.400`) -- [CVE-2025-0500](CVE-2025/CVE-2025-05xx/CVE-2025-0500.json) (`2025-01-15T19:15:27.003`) -- [CVE-2025-0501](CVE-2025/CVE-2025-05xx/CVE-2025-0501.json) (`2025-01-15T19:15:27.190`) -- [CVE-2025-22146](CVE-2025/CVE-2025-221xx/CVE-2025-22146.json) (`2025-01-15T20:15:30.557`) +- [CVE-2024-36751](CVE-2024/CVE-2024-367xx/CVE-2024-36751.json) (`2025-01-15T22:15:26.400`) +- [CVE-2024-48121](CVE-2024/CVE-2024-481xx/CVE-2024-48121.json) (`2025-01-15T21:15:13.063`) +- [CVE-2024-48122](CVE-2024/CVE-2024-481xx/CVE-2024-48122.json) (`2025-01-15T21:15:13.200`) +- [CVE-2024-48123](CVE-2024/CVE-2024-481xx/CVE-2024-48123.json) (`2025-01-15T21:15:13.340`) +- [CVE-2024-48125](CVE-2024/CVE-2024-481xx/CVE-2024-48125.json) (`2025-01-15T21:15:13.477`) +- [CVE-2024-48126](CVE-2024/CVE-2024-481xx/CVE-2024-48126.json) (`2025-01-15T21:15:13.613`) +- [CVE-2025-0486](CVE-2025/CVE-2025-04xx/CVE-2025-0486.json) (`2025-01-15T21:15:14.960`) +- [CVE-2025-0487](CVE-2025/CVE-2025-04xx/CVE-2025-0487.json) (`2025-01-15T21:15:15.160`) +- [CVE-2025-0488](CVE-2025/CVE-2025-04xx/CVE-2025-0488.json) (`2025-01-15T21:15:15.380`) +- [CVE-2025-0489](CVE-2025/CVE-2025-04xx/CVE-2025-0489.json) (`2025-01-15T22:15:26.660`) +- [CVE-2025-0490](CVE-2025/CVE-2025-04xx/CVE-2025-0490.json) (`2025-01-15T22:15:26.820`) +- [CVE-2025-0491](CVE-2025/CVE-2025-04xx/CVE-2025-0491.json) (`2025-01-15T22:15:26.990`) +- [CVE-2025-0492](CVE-2025/CVE-2025-04xx/CVE-2025-0492.json) (`2025-01-15T22:15:27.157`) ### CVEs modified in the last Commit -Recently modified CVEs: `27` +Recently modified CVEs: `31` -- [CVE-2022-46812](CVE-2022/CVE-2022-468xx/CVE-2022-46812.json) (`2025-01-15T19:40:42.270`) -- [CVE-2023-33394](CVE-2023/CVE-2023-333xx/CVE-2023-33394.json) (`2025-01-15T20:15:27.270`) -- [CVE-2024-1123](CVE-2024/CVE-2024-11xx/CVE-2024-1123.json) (`2025-01-15T20:58:52.953`) -- [CVE-2024-1686](CVE-2024/CVE-2024-16xx/CVE-2024-1686.json) (`2025-01-15T19:51:44.277`) -- [CVE-2024-1687](CVE-2024/CVE-2024-16xx/CVE-2024-1687.json) (`2025-01-15T19:53:11.960`) -- [CVE-2024-28939](CVE-2024/CVE-2024-289xx/CVE-2024-28939.json) (`2025-01-15T19:06:06.007`) -- [CVE-2024-28940](CVE-2024/CVE-2024-289xx/CVE-2024-28940.json) (`2025-01-15T19:06:25.340`) -- [CVE-2024-28942](CVE-2024/CVE-2024-289xx/CVE-2024-28942.json) (`2025-01-15T19:06:35.190`) -- [CVE-2024-28944](CVE-2024/CVE-2024-289xx/CVE-2024-28944.json) (`2025-01-15T19:06:42.510`) -- [CVE-2024-28945](CVE-2024/CVE-2024-289xx/CVE-2024-28945.json) (`2025-01-15T19:06:51.920`) -- [CVE-2024-29044](CVE-2024/CVE-2024-290xx/CVE-2024-29044.json) (`2025-01-15T19:07:05.677`) -- [CVE-2024-29045](CVE-2024/CVE-2024-290xx/CVE-2024-29045.json) (`2025-01-15T19:07:39.023`) -- [CVE-2024-29046](CVE-2024/CVE-2024-290xx/CVE-2024-29046.json) (`2025-01-15T19:07:32.210`) -- [CVE-2024-29047](CVE-2024/CVE-2024-290xx/CVE-2024-29047.json) (`2025-01-15T19:07:28.587`) -- [CVE-2024-29048](CVE-2024/CVE-2024-290xx/CVE-2024-29048.json) (`2025-01-15T19:07:25.327`) -- [CVE-2024-29982](CVE-2024/CVE-2024-299xx/CVE-2024-29982.json) (`2025-01-15T19:07:20.527`) -- [CVE-2024-29983](CVE-2024/CVE-2024-299xx/CVE-2024-29983.json) (`2025-01-15T19:07:16.507`) -- [CVE-2024-4434](CVE-2024/CVE-2024-44xx/CVE-2024-4434.json) (`2025-01-15T20:05:02.353`) -- [CVE-2024-50857](CVE-2024/CVE-2024-508xx/CVE-2024-50857.json) (`2025-01-15T20:15:28.023`) -- [CVE-2024-50859](CVE-2024/CVE-2024-508xx/CVE-2024-50859.json) (`2025-01-15T20:15:28.193`) -- [CVE-2024-54045](CVE-2024/CVE-2024-540xx/CVE-2024-54045.json) (`2025-01-15T20:15:28.360`) -- [CVE-2024-55591](CVE-2024/CVE-2024-555xx/CVE-2024-55591.json) (`2025-01-15T20:48:30.333`) -- [CVE-2025-21333](CVE-2025/CVE-2025-213xx/CVE-2025-21333.json) (`2025-01-15T20:57:37.467`) -- [CVE-2025-21334](CVE-2025/CVE-2025-213xx/CVE-2025-21334.json) (`2025-01-15T20:10:39.600`) -- [CVE-2025-21335](CVE-2025/CVE-2025-213xx/CVE-2025-21335.json) (`2025-01-15T20:24:16.867`) +- [CVE-2023-31226](CVE-2023/CVE-2023-312xx/CVE-2023-31226.json) (`2025-01-15T22:15:26.220`) +- [CVE-2023-31227](CVE-2023/CVE-2023-312xx/CVE-2023-31227.json) (`2025-01-15T21:15:11.430`) +- [CVE-2023-33255](CVE-2023/CVE-2023-332xx/CVE-2023-33255.json) (`2025-01-15T21:15:11.620`) +- [CVE-2024-1124](CVE-2024/CVE-2024-11xx/CVE-2024-1124.json) (`2025-01-15T21:21:12.120`) +- [CVE-2024-1125](CVE-2024/CVE-2024-11xx/CVE-2024-1125.json) (`2025-01-15T21:23:06.507`) +- [CVE-2024-1320](CVE-2024/CVE-2024-13xx/CVE-2024-1320.json) (`2025-01-15T21:23:22.623`) +- [CVE-2024-21308](CVE-2024/CVE-2024-213xx/CVE-2024-21308.json) (`2025-01-15T22:44:09.030`) +- [CVE-2024-21317](CVE-2024/CVE-2024-213xx/CVE-2024-21317.json) (`2025-01-15T22:43:44.023`) +- [CVE-2024-21331](CVE-2024/CVE-2024-213xx/CVE-2024-21331.json) (`2025-01-15T22:43:24.930`) +- [CVE-2024-21332](CVE-2024/CVE-2024-213xx/CVE-2024-21332.json) (`2025-01-15T22:43:03.843`) +- [CVE-2024-21333](CVE-2024/CVE-2024-213xx/CVE-2024-21333.json) (`2025-01-15T22:42:43.347`) +- [CVE-2024-21335](CVE-2024/CVE-2024-213xx/CVE-2024-21335.json) (`2025-01-15T22:42:26.617`) +- [CVE-2024-21373](CVE-2024/CVE-2024-213xx/CVE-2024-21373.json) (`2025-01-15T22:37:35.290`) +- [CVE-2024-21398](CVE-2024/CVE-2024-213xx/CVE-2024-21398.json) (`2025-01-15T22:36:43.943`) +- [CVE-2024-21414](CVE-2024/CVE-2024-214xx/CVE-2024-21414.json) (`2025-01-15T22:36:14.993`) +- [CVE-2024-21415](CVE-2024/CVE-2024-214xx/CVE-2024-21415.json) (`2025-01-15T22:34:43.580`) +- [CVE-2024-21425](CVE-2024/CVE-2024-214xx/CVE-2024-21425.json) (`2025-01-15T22:34:16.520`) +- [CVE-2024-21428](CVE-2024/CVE-2024-214xx/CVE-2024-21428.json) (`2025-01-15T22:33:02.860`) +- [CVE-2024-28928](CVE-2024/CVE-2024-289xx/CVE-2024-28928.json) (`2025-01-15T22:32:19.930`) +- [CVE-2024-37966](CVE-2024/CVE-2024-379xx/CVE-2024-37966.json) (`2025-01-15T22:31:41.957`) +- [CVE-2024-4397](CVE-2024/CVE-2024-43xx/CVE-2024-4397.json) (`2025-01-15T21:23:41.467`) +- [CVE-2024-54887](CVE-2024/CVE-2024-548xx/CVE-2024-54887.json) (`2025-01-15T21:15:13.820`) +- [CVE-2024-57211](CVE-2024/CVE-2024-572xx/CVE-2024-57211.json) (`2025-01-15T21:15:14.057`) +- [CVE-2024-57226](CVE-2024/CVE-2024-572xx/CVE-2024-57226.json) (`2025-01-15T21:15:14.303`) +- [CVE-2025-0482](CVE-2025/CVE-2025-04xx/CVE-2025-0482.json) (`2025-01-15T21:15:14.653`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 56a6003fd0c..a63dc6a2792 100644 --- a/_state.csv +++ b/_state.csv @@ -87553,7 +87553,7 @@ CVE-2016-4298,0,0,4300d617f1328079cfa4d4f536468c7fac176711e0b09aa2e79fdd9a4e6763 CVE-2016-4300,0,0,82e01c130441b2b18f8726b2208d77c7a064b3046a01f7372c2ebb3466d5b7c8,2024-11-21T02:51:49.600000 CVE-2016-4301,0,0,e92b906dbad85d9dd8cef6862b60c2b5ea9f535a15401a6d48dd5017f88d5713,2024-11-21T02:51:49.743000 CVE-2016-4302,0,0,564e2d675b8d1ead7affc9df01835c0e539e563e6f3c0c5ea5ee9c9d2b52c787,2024-11-21T02:51:49.880000 -CVE-2016-4303,0,1,cad44bcf8b6c8a9cfd48297e54c12eff8f410347fd6ced9a2a950437e1f2a339,2025-01-15T19:12:53.237000 +CVE-2016-4303,0,0,cad44bcf8b6c8a9cfd48297e54c12eff8f410347fd6ced9a2a950437e1f2a339,2025-01-15T19:12:53.237000 CVE-2016-4304,0,0,8009d3e7378cba8f0c2b7f5701db6e869c31de17c07bf005c2b52303fd5e4f4f,2024-11-21T02:51:50.133000 CVE-2016-4305,0,0,f554619e9867a74f85c697ff83efa4cff69d8ad066848b4c3c8ce407b7821041,2024-11-21T02:51:50.247000 CVE-2016-4306,0,0,914ec351f3e031b873d6a3ed20274716c75a06e21ce998d83bdba7ecd02817db,2024-11-21T02:51:50.350000 @@ -155503,7 +155503,7 @@ CVE-2020-26254,0,0,a3db4c0b9a792593475c1b67eb2a994981435b10deb14abd73974a78d6ffe CVE-2020-26255,0,0,9d7735987e2e7151ee7320ef4208241d051a753a9123e4983604b9c33a5b54da,2024-11-21T05:19:40.367000 CVE-2020-26256,0,0,9cb9277cdee3f35b9d12518457d771f937ef9bc01f3bb75d61da4f82b99a8ed2,2024-11-21T05:19:40.500000 CVE-2020-26257,0,0,19c62be5aa57d17c10e70cbef0c1a6361cc6d64c31c8b422f1cfe184181be716,2024-11-21T05:19:40.667000 -CVE-2020-26258,0,0,ccf2b0f9ffe129cb215b6e941affb8aa157787d22a9cc2e2f7f43f6812dbbd31,2024-11-21T05:19:40.820000 +CVE-2020-26258,0,1,511c78466f412ced94ca41846516dd6c8cce22815ecbe0997d9aacd3347ba66f,2025-01-15T21:15:09.713000 CVE-2020-26259,0,0,397121439ce660dd91b52e3d015b11b98d44adc79420c146c68bd8d043754ca3,2024-11-21T05:19:40.973000 CVE-2020-2626,0,0,f5c6a5cff6c79eafddd69419b232020f9be8685a3b4cb829ed7a5fd66e3a64ac,2024-11-21T05:25:46.193000 CVE-2020-26260,0,0,7f7e4d6986183311506cc46852028e6194aebec96a37af3191f161335e7a7850,2024-11-21T05:19:41.170000 @@ -187080,7 +187080,7 @@ CVE-2021-46883,0,0,803534e2ffd0d23633fdc83959b96a75e3d606ec5f1642209ea8bb49372f1 CVE-2021-46884,0,0,d3bb33b81d7f7db1ac5f6537dac41295cc01ad49b0d420c49e31750013cf6794,2024-11-21T06:34:51.123000 CVE-2021-46885,0,0,ca14c568b6957964e2aeb21e2df3c4374ecea0a51efe690e6c30d43433aacfc9,2024-11-21T06:34:51.230000 CVE-2021-46886,0,0,ad22c9780b3597a44ed9c478aead1a4b4c5109a9f1e5e369cbe77fa8c1629423,2024-11-21T06:34:51.337000 -CVE-2021-46887,0,0,f615d9d4f81a7ae3fb5db20b8ab5d2938cd9d4a725fadbcc21e0d37ae76e2380,2024-11-21T06:34:51.440000 +CVE-2021-46887,0,1,4d2aeaa5fdfffc72430e8673e513062c79400a9d30bf93d3a46b1ad013945275,2025-01-15T22:15:25.260000 CVE-2021-46888,0,0,e916f9fdc43e2550a1951cb944d65325cf86dac8b181c95d8165c6f948b1a16a,2024-11-21T06:34:51.543000 CVE-2021-46889,0,0,ba37aaad1a60dd4ba930fc90098de431225bce3bf5bc16d406fd0629e21a4a90,2024-11-21T06:34:51.703000 CVE-2021-46890,0,0,67f0f62a1031a3a92107c23e205975fcec99c76f74f21d06aa2e9c6d2c6deefc,2024-11-21T06:34:51.870000 @@ -211419,9 +211419,9 @@ CVE-2022-46807,0,0,39a3f934768ee54f03dc2d14f1f7f201b03f4f00b6c5b9b48bbd28e0abbe6 CVE-2022-46808,0,0,09692571faba2600144135fdf7ef01348db48611a7a6f89fa55ac220207efaae,2024-11-21T07:31:05.117000 CVE-2022-46809,0,0,f68cca3d9b57745f52b2ec86c681ff323df367d2184ae136c8194dff947d8a85,2024-11-21T07:31:05.313000 CVE-2022-4681,0,0,95fcb5c67c7a474f4a133f9a658163af79be09783a90e553a395ec8db4260f73,2024-11-21T07:35:43.473000 -CVE-2022-46810,0,1,cf31b406f02ce17934c212e7130d6db5db229ba40cd4853a6091c18a3c7c5000,2025-01-15T19:40:42.270000 +CVE-2022-46810,0,0,cf31b406f02ce17934c212e7130d6db5db229ba40cd4853a6091c18a3c7c5000,2025-01-15T19:40:42.270000 CVE-2022-46811,0,0,1ae6c64379ff71d5b0c19f4258ef108f2266b2fde80b29493d9fa587977e07e8,2024-12-13T15:15:09.270000 -CVE-2022-46812,0,1,9661287a55211e611b52403ecd9e895da74076c5120bde9e2c7a60aee4c3f266,2025-01-15T19:40:42.270000 +CVE-2022-46812,0,0,9661287a55211e611b52403ecd9e895da74076c5120bde9e2c7a60aee4c3f266,2025-01-15T19:40:42.270000 CVE-2022-46813,0,0,999d404c98c65460f24969a80a51558de6876e65218657881e2567abffd939c9,2024-11-21T07:31:05.730000 CVE-2022-46814,0,0,876ea7dc572abd921ba1554d59a039c0aff6f5732dba9073fd05a599247fefce,2024-11-21T07:31:05.883000 CVE-2022-46815,0,0,a525aac13b38af56784b85908f1746cf610b483f62e2b70bf8114a89f9142198,2024-11-21T07:31:06.033000 @@ -213230,7 +213230,7 @@ CVE-2023-0113,0,0,663c39f3e1188aa305e851e0ee248af39ffa8cb95845affe0b194465d035e8 CVE-2023-0114,0,0,2f07bc196f841368fdea1612492d2ae4a0f0a6291173cfd028090993b9b47dbc,2024-11-21T07:36:34.847000 CVE-2023-0115,0,0,7be8b903a3fd39955fe065bd6effade79b91ffcebace4feddfdebfecb2ffeca7,2023-11-07T03:59:40.983000 CVE-2023-0116,0,0,64ec64bbcf1b0d858338f29aee2d5b0aea4d29ec3cd0d8867422e363870c46b1,2025-01-15T17:15:10.890000 -CVE-2023-0117,0,0,d925e15b03815e85cd9575db6cb76a9d33e78b2295bb879cf3ba095982cfab11,2024-11-21T07:36:35.130000 +CVE-2023-0117,0,1,f0ff0378c1acf881f93ce8cc5f6c4e8850973e08b43a86d20c14744d9683e790,2025-01-15T22:15:25.433000 CVE-2023-0118,0,0,aa0b661d40d0ecffa7edc28fcea63c3d1e6716f461081ff2b068a1c61f148b16,2024-11-21T07:36:35.247000 CVE-2023-0119,0,0,db8b4bb6e60810391071fecb8352baf3f21408c3c45bfe947c091d19a61eb005,2024-11-21T07:36:35.410000 CVE-2023-0120,0,0,13869732abdfabb700ffbaf147e2c3e4fa590d46bc9b1f6ba275c936f0defe72,2024-11-21T07:36:35.567000 @@ -214704,7 +214704,7 @@ CVE-2023-1659,0,0,250cf06d3106193ba878ae985dd709d7fe5d2e42c1a1427e8f122c00b1b21c CVE-2023-1660,0,0,51e5220e485bc31b336e8eb583bdbdc932c5c2df6bf6fc5ce8e665ce3dfddba8,2024-11-21T07:39:38.397000 CVE-2023-1661,0,0,c449f2a3ac22ac4fec5792f01ad50cfc7557231b9431c87d798c24a3393fa984,2024-11-21T07:39:38.527000 CVE-2023-1663,0,0,ce30f874231840a98f83f1911dfbf34f1fc3c2e0a778cac0bfaf55a97f108e28,2024-11-21T07:39:38.663000 -CVE-2023-1664,0,0,907ecb7f0e1b7abc73914b37ec31e54817921c509c6ebb405581bf3ec153ac44,2024-11-21T07:39:38.787000 +CVE-2023-1664,0,1,c5e7999779de6c9ea395b5fefc9e7e89f3e44bfd554b089bf2b2f3cf80379a7f,2025-01-15T22:15:25.593000 CVE-2023-1665,0,0,1d3df359bc1f5d4b8798b6f7df301eaa09959155a1e05e483d0acbdc7664f076,2024-11-21T07:39:38.910000 CVE-2023-1666,0,0,0a6bd042bfce50ece02839147998ce826930595674c07380fe99c25993f1ec40,2024-11-21T07:39:39.030000 CVE-2023-1667,0,0,007039c95c2a66e283c8829a0e671b3f5d75acb867d7db6331aefe56e15ddde2,2024-11-21T07:39:39.170000 @@ -215011,7 +215011,7 @@ CVE-2023-1977,0,0,638e5bfe6600910c65c3df906f73dfdbe267c80c41adf75006aa5d47b4ab8f CVE-2023-1978,0,0,afddd92bdbc211f9e6199e1b2b54993fb36e8ef8bf5269c7887ca73ddc2d7510,2024-11-21T07:40:16.160000 CVE-2023-1979,0,0,be2d39ce7da61000fadc3613cd52512f9af7fe5b83e0ace271406e8dd3d2aa47,2024-11-21T07:40:16.270000 CVE-2023-1980,0,0,c4dae4580b068847f44348d59df24c8db4615745dc2bc8821fc95e0b3969299e,2024-11-21T07:40:16.397000 -CVE-2023-1981,0,0,d23caea659a1035d5c9ea2d1ce2f7ed7d61253c5d18e08a70e34e3f0968de09c,2024-11-21T07:40:16.500000 +CVE-2023-1981,0,1,6f68726520ac91184807215a180bbac61dd7146473f9cf6bb4588e7dabf7467b,2025-01-15T22:15:25.813000 CVE-2023-1982,0,0,52e540a8fbdc9679a5580dafb93ed8f97e0f40883150516b80da23ada8ec82bd,2024-11-21T07:40:16.613000 CVE-2023-1983,0,0,6cc029760b59d25b12a1434415e06a3fcfb274ef34c193d938358e71d6f7252d,2024-11-21T07:40:16.727000 CVE-2023-1984,0,0,822dbe5f348e652527ad257648006c57996d651e1939ec9c2f3ce470a0b59fbd,2024-11-21T07:40:16.860000 @@ -222426,7 +222426,7 @@ CVE-2023-28786,0,0,012c9424006607effaa638c30217f6d07b3f6baa4f7406d719fa25483cc31 CVE-2023-28787,0,0,6106c74f8c52427d427496ccd81b6d3977c6e4f98fb6f9b53ee1727ed305f0f0,2024-11-21T07:56:00.780000 CVE-2023-28788,0,0,a5cee9ff3224a56b3f90bd57bf05031cfb3eff440cc84bdd927bb622875f1d08,2024-11-21T07:56:00.887000 CVE-2023-28789,0,0,0d24d4500dd620e22d086e351cdcda7bed4b75aa84c2da7941a97002d85bc51b,2024-11-21T07:56:01 -CVE-2023-2879,0,0,e25e39b895132baa8056e9c5f05c80c73e33dcfee2b21579617229deb1082473,2024-11-21T07:59:28.960000 +CVE-2023-2879,0,1,5af63f837f7c46749f9f393023b6d68cfefc0bb870e7c96f4f8ad58d9bec8af6,2025-01-15T22:15:26.060000 CVE-2023-28790,0,0,ebe360063b2132491288196dfebb296b06590669937a61c641e16c16942e98e8,2024-11-21T07:56:01.107000 CVE-2023-28791,0,0,52be846dd0c7f448df686016e038514808f0fb3bad0f0e95e8a3011075262f46,2024-11-21T07:56:01.223000 CVE-2023-28792,0,0,8550b9a59e71959a4e6b50a3ac3184ae9f5f46c4ecc0f1e27370378cc7e55371,2024-11-21T07:56:01.343000 @@ -224283,8 +224283,8 @@ CVE-2023-31222,0,0,7961a39815ac2759759ce411687c93596119ee1f2b490d852d79d101cabe0 CVE-2023-31223,0,0,d6b4463920b025a3c4c2ff78c6ce72039d883d4d0ee015b7e0c57ff5227d6c3a,2024-11-21T08:01:39.360000 CVE-2023-31224,0,0,f0811b5c5188602ccf913e1f9c204f9fa1146aa79807b8093094e08b07797914,2024-11-21T08:01:39.500000 CVE-2023-31225,0,0,13b14a54aed7fde6113c3a846e8cec308697c177fa07cd753f641be0c489804f,2024-11-21T08:01:39.640000 -CVE-2023-31226,0,0,5ffa38a32983921ca5b6c436a8328d5024435bd2e71766ffe17027f8d6f2cdef,2024-11-21T08:01:39.760000 -CVE-2023-31227,0,0,04bfee08f428ef6b1e1f3b2942d4f3d3da11c65173c299c2ae26ce121ba0eb1b,2024-11-21T08:01:39.863000 +CVE-2023-31226,0,1,b624206e6bd26b66e04ba787947c0cfc9054c6de981dd4726eebb088955551d6,2025-01-15T22:15:26.220000 +CVE-2023-31227,0,1,a79c72351c00c0dfc94ea740102d77e7e111a4196fb6ceb215505e0c32ed7290,2025-01-15T21:15:11.430000 CVE-2023-31228,0,0,5549fdeb2526d07e9e45b500b38f669c0404737afd5dc9f59c6b72c76f820c34,2024-11-21T08:01:39.970000 CVE-2023-31229,0,0,178a5f0a857be4743af9141d22876b5cc362e61fcc8354e1b25627cc26169f62,2024-11-21T08:01:40.090000 CVE-2023-3123,0,0,15a7155d280d6b4ef78601eeebe76fb7568c18cd83789b0b3f9e8541979219b6,2023-11-07T04:17:57.050000 @@ -225932,7 +225932,7 @@ CVE-2023-33251,0,0,e92a4a69fa1b662b2a4691b1ea5954886eb42c8616e222a90d0a8c04df56f CVE-2023-33252,0,0,aa7dd6edc72f9ea8d094e3340f325db26ede3ba72ea600731ad6fafcc1abb07e,2024-11-21T08:05:16.100000 CVE-2023-33253,0,0,4a593ab7b70d2464d3eb85991e7f64274fa7eb8500a3d2ed4be96f94a2764a25,2024-11-21T08:05:16.260000 CVE-2023-33254,0,0,6a63e7bf10313313c2d0296eacf9cc48c72dcb64facccfea5da32e91cee31cbd,2024-11-21T08:05:16.430000 -CVE-2023-33255,0,0,389d6653bbbea330dc07abd318c24eece64aed074f0cf3adb7d37ad6c4cdbf09,2024-11-21T08:05:16.590000 +CVE-2023-33255,0,1,7e4596cdad5b64b99f016651e12a6d1709828aff168c9c419786c73abb34cd09,2025-01-15T21:15:11.620000 CVE-2023-33257,0,0,40f4748e448d3cf2963da9b64864a1171c611d35f4e94fe20624c5b622cd26a5,2024-11-21T08:05:16.770000 CVE-2023-3326,0,0,b95d37602520e2bc0d6938f65ea32c0fa39c0137389f8278d8c7d442c61e26bb,2024-11-21T08:17:01.307000 CVE-2023-33263,0,0,dc4b2ffcf74cf6f443d68c9d7b3aab6517e8342e36d9996769f4cfda1827e2e8,2024-11-21T08:05:16.943000 @@ -226039,7 +226039,7 @@ CVE-2023-33383,0,0,a28a7167b95315782f605325b16be32691bcd42b3f8b778f9c9163d5147b8 CVE-2023-33386,0,0,35cdcf2891b479b9a9502f0198064f6fa096a2cfc529fd18fe8d468b4e8943d4,2025-01-08T20:15:24.450000 CVE-2023-33387,0,0,3e3361f6605be6009330b3068fed6534dc9ea26a4bdf2b70a6ee9bb32c805270,2024-11-21T08:05:31.887000 CVE-2023-3339,0,0,1eb850a0ee33f4a634ae5ab5a33d04ae4e964149464e4343eb2740f3d794b7db,2024-11-21T08:17:03.083000 -CVE-2023-33394,0,1,b0db6d878731707c17e5ff32d5106ff557cac8acc340ea626ef8cee1d9264c99,2025-01-15T20:15:27.270000 +CVE-2023-33394,0,0,b0db6d878731707c17e5ff32d5106ff557cac8acc340ea626ef8cee1d9264c99,2025-01-15T20:15:27.270000 CVE-2023-3340,0,0,886acf1ac581bf96ef0b8a2140f4f4fa6948f6c59a9fe8f93226b73530b4b900,2024-11-21T08:17:03.230000 CVE-2023-33404,0,0,2326dc4f79af9853ced62a740677d8f7c16fcd50e611de93c34ee10d4f26ac67,2024-11-21T08:05:32.223000 CVE-2023-33405,0,0,4ffc9ed6899a82157392aaa5892cf9cb52b24d07dacf07cc60fb49ff4b70c63c,2024-12-06T18:15:21.373000 @@ -244259,7 +244259,7 @@ CVE-2024-11225,0,0,49e01dccad3ee4a4adc9a23405324c84c815ee3ae2fa63f77a3607812451f CVE-2024-11227,0,0,4429f46befcca636641488313efda0ce9e85d610d1a8222594e7b609e2557ec7,2024-11-23T10:15:04.083000 CVE-2024-11228,0,0,ea3ea506f494760971365e8cc08e4c50cc9e1b3e56f38ea31b32e4e82646f717,2024-11-23T12:15:18.577000 CVE-2024-11229,0,0,f216e4e055884628872bc9827bd59bcb71e0c27eff667134ca7f40729f0e7955,2024-11-23T12:15:18.983000 -CVE-2024-1123,0,1,dbd74d2bdf1c9938d3eb1273c808414f4dcdd896820b094dc62943fa6871cf56,2025-01-15T20:58:52.953000 +CVE-2024-1123,0,0,dbd74d2bdf1c9938d3eb1273c808414f4dcdd896820b094dc62943fa6871cf56,2025-01-15T20:58:52.953000 CVE-2024-11230,0,0,a616c425830dab899eabf177b24f5555ccf0670a3cefb55f20054d7baa25cf22,2024-12-23T05:15:05.800000 CVE-2024-11231,0,0,1babaa8434f0dabb897e61577b0db39dc3dbee760a24a16a5980940fb44c99a3,2024-11-23T12:15:19.387000 CVE-2024-11233,0,0,f693569babb39b28690250bf399e234d5652aa087fc09c6fa53135c369c0e730,2024-11-26T18:26:37.783000 @@ -244268,7 +244268,7 @@ CVE-2024-11236,0,0,550d85bfafd1434d8d927c6d8dee8c7c226d05255dec5cf2f93f8237a1b74 CVE-2024-11237,0,0,1dfab8d857aa65c1da3cce61dfbf4297f61d66aac666c992d2b23a44599cc4b9,2024-11-19T19:04:14.987000 CVE-2024-11238,0,0,8ff90f478e5080e5784d0b48ba4f92cb68bcedebf032cd07ccd187e39fa89d52,2024-11-19T19:01:13.060000 CVE-2024-11239,0,0,4735abfe3fc47439a8f46c4628574fb109a45cfc8a7386b806072387724841e6,2024-11-19T19:00:43.230000 -CVE-2024-1124,0,0,93efde3c7a05038a0c6f9962639a748adcef7338f3620fa3d033ec605d3fbf17,2024-11-21T08:49:51.203000 +CVE-2024-1124,0,1,d8d0187c6b94f4b50cf34486247b771b0563ee0deff5ed33007b35519d16f87e,2025-01-15T21:21:12.120000 CVE-2024-11240,0,0,6be2a91d528c3a4c7175bfb99e91b9f0e24a720ce79ef3e39c80f0d4b3343539,2024-11-20T15:09:05.640000 CVE-2024-11241,0,0,e6ec4021849264870c0f2e9dd96d3ad3cc92866011c3601b9dc89bba8584b101,2024-11-20T15:41:34.393000 CVE-2024-11242,0,0,8db1192e3fa3c4ab1fc7cc9a83a6088c96b5a038163c1366289c4697bbe4ad49,2024-11-18T17:11:56.587000 @@ -244278,7 +244278,7 @@ CVE-2024-11245,0,0,3868d85bee15596e18d90d743d189cb00c43805781b6a27dce308f812593e CVE-2024-11246,0,0,b59dcfa6da5d52729d620a8c054b6e313170600211d522d4440f6fdb2ab7ab9b,2024-11-20T14:35:51.070000 CVE-2024-11247,0,0,b596229e9a83fd7b97522e41140de97dbd27f0f6c2cfd461d0e494401274f19c,2024-11-19T21:55:35.283000 CVE-2024-11248,0,0,e949ca81c35849785cb57c05fa4cfa4c83e0d863fa1f747727d022cf62711013,2024-11-19T21:51:57.467000 -CVE-2024-1125,0,0,35f3eb4fdef5aeda8bc5c5a6f7eae5a72c329a418fbacbe3a79981620a5e60f4,2024-11-21T08:49:51.320000 +CVE-2024-1125,0,1,4d0b5fc967895869908236f67000c1641c8e7f2139240de53289a37094eb178d,2025-01-15T21:23:06.507000 CVE-2024-11250,0,0,30ad3d0d58cc914838a0c9f0ed52ca375c320917547ffc5deccabf737c546160,2024-12-10T17:22:10.547000 CVE-2024-11251,0,0,a5e300dd05d8f2142172ae8a0de73066b49d6ea2d842d19c278f24903bcb19d9,2024-11-18T17:11:56.587000 CVE-2024-11252,0,0,e3a49be80375d7d6eb07a5b8ea5fe1ead6b27bf2476ff0719e421b392fb0b61d,2024-11-30T06:15:17.580000 @@ -245823,7 +245823,7 @@ CVE-2024-13196,0,0,5dd7421e2de00a0fa2b4567f99035d33f92e8ffa54d83b03cc9fee45488e2 CVE-2024-13197,0,0,d428182213fac4cc8b40fd7e33b4d20effb06542e944df56397e4ff16985515a,2025-01-09T00:15:25.973000 CVE-2024-13198,0,0,7e9bc253359d2ad851b64677d9cdcc0bbdb5a58a67156c16438da86863bb5cdf,2025-01-09T01:15:07.970000 CVE-2024-13199,0,0,e7aeb9d5683ec76f2b52e306a899af630c26a8d44dd2afcef123fab78e01b09b,2025-01-09T01:15:08.170000 -CVE-2024-1320,0,0,38fea25fedd71b495f8390b27fa63616d1b38682e55e5d1d6ad88b3a7d6c2436,2024-11-21T08:50:19.647000 +CVE-2024-1320,0,1,aaaef1a9478a9ac2768f9b592c02529e1f1a3518e3f017f4f309a188cefbc9da,2025-01-15T21:23:22.623000 CVE-2024-13200,0,0,deea54311c8ffd3251ff905e09fd0b29a82de9065f77209914269bd56eadd82b,2025-01-09T03:15:23.820000 CVE-2024-13201,0,0,f3be9d5ff1c407cd25b4d9118bb72306e8d3f63ff7193d9f98e54adda8fe5339,2025-01-09T03:15:24.020000 CVE-2024-13202,0,0,d52b238cdd2b81346aa8cea3f6247e194c74bac78f2cc293d53ec4fda2a0709b,2025-01-09T17:15:12.110000 @@ -246258,8 +246258,8 @@ CVE-2024-1682,0,0,0e11607cf529dec133ea113ba87fcf066536c068f0b68436a61501901b8952 CVE-2024-1683,0,0,40ff1170327873e06408d050c303bd1e9091b35ce3f19779d85a3b2dc46d6863,2024-12-17T17:10:15.347000 CVE-2024-1684,0,0,a2762a66a814f5204a354c8bbfa584827a57b6131530a0e170ebd413c4b2f27d,2024-11-21T08:51:04.913000 CVE-2024-1685,0,0,2f7ae0ae3975272b30529edef3fef8df839121e00b7dbc3889f6e8ba99676b8a,2024-11-21T08:51:05.037000 -CVE-2024-1686,0,1,866a1c96d4aa74389c113d68789c3e80de4a865bdcf2d542b10935f5e4dd3e8e,2025-01-15T19:51:44.277000 -CVE-2024-1687,0,1,f94a175ab610da669115dea438e96471ace865defa8948ff13486d462acaee7a,2025-01-15T19:53:11.960000 +CVE-2024-1686,0,0,866a1c96d4aa74389c113d68789c3e80de4a865bdcf2d542b10935f5e4dd3e8e,2025-01-15T19:51:44.277000 +CVE-2024-1687,0,0,f94a175ab610da669115dea438e96471ace865defa8948ff13486d462acaee7a,2025-01-15T19:53:11.960000 CVE-2024-1688,0,0,d444d817db036efaac5f0bcc589b1371cb8edcdc3232d167d45921b644e59486,2024-11-21T08:51:05.417000 CVE-2024-1689,0,0,7b4924415f013ed776a662a888a67f638609a0d7f17fe4fa93b6bee7be9adbcb,2024-11-21T08:51:05.540000 CVE-2024-1690,0,0,7e2e3e4c0dc45c7e10c6184fa4180e4340b05f725f49212c634f18d52aeb86be,2024-11-21T08:51:05.677000 @@ -247705,7 +247705,7 @@ CVE-2024-21304,0,0,607ca2506e8d6e07e5506f7ccdc160849bc37d9535ae11f25cc6787833699 CVE-2024-21305,0,0,1c0a22df63f7a023df3dd8e98c5b53578ded66a13c05227ab9bc9ac270ddff1e,2024-11-21T08:54:04.037000 CVE-2024-21306,0,0,2a370a0aee5d92bbbe454d1fdf5ed058cd5c6c363a0e02cdc4a816823a09f0ea,2024-11-21T08:54:04.170000 CVE-2024-21307,0,0,6dc2710569e776546cc4f624cada8ba22376217566b47669f18adc9d69851b4e,2024-11-21T08:54:04.307000 -CVE-2024-21308,0,0,417c54a6e17303716bc218d15e4b4276cac26a79cd55a736b1828faf5e1da01c,2024-11-21T08:54:04.457000 +CVE-2024-21308,0,1,f6a379d41c4cd5133050a31bdc4ca5e24f06dd737032839685d9ee434bfbe4a1,2025-01-15T22:44:09.030000 CVE-2024-21309,0,0,b3bb2afb81b8de5377de8c6125fbd52c99c699ccbea021f8b9db6bc7ca4cde8c,2024-11-21T08:54:04.583000 CVE-2024-2131,0,0,a5c199c67a29a51a3f196eff09fe5f3259839ee406319c0cd2f55c4089afd920,2024-11-21T09:09:05.730000 CVE-2024-21310,0,0,07e8f724d65a59640e46d5cde5e1148b80be9e027bb9661a3d8d6a1b12f33d89,2024-11-21T08:54:04.720000 @@ -247715,7 +247715,7 @@ CVE-2024-21313,0,0,d011ae4aff53b99394f69ff7eaf39d367af31ed6865af317ed53aef480fa0 CVE-2024-21314,0,0,c01ca57498aed35c9dc331d5de44c2c31169d2f22151eab27756fa28d4cbf1d9,2024-11-21T08:54:05.350000 CVE-2024-21315,0,0,632e226320c765b22c96ee6da18e0c5749242f81146a597cb246634d685ed66b,2024-11-21T08:54:05.510000 CVE-2024-21316,0,0,3a0b2cd4117e2701a72794c6fe2d8fc78eb5d6a6aee47085737c4cfbf8338497,2024-11-21T08:54:05.693000 -CVE-2024-21317,0,0,697a3422f6ebf1396b16e274c988c155440041cd5e1553f2d5cbdf11f7e166c8,2024-11-21T08:54:05.833000 +CVE-2024-21317,0,1,e46df503923c69b32e12468250ac7d8482d9d632264dfa08636fb2d7207195e6,2025-01-15T22:43:44.023000 CVE-2024-21318,0,0,ca767d7aa803d3841f62c6c1923d52a1ac5a9730e72db4cb3f0afba14c47ccc2,2024-11-21T08:54:05.963000 CVE-2024-21319,0,0,0594fdd8042dc2dc4f649e60a59dfcff74723526db3edc0bd3e2c82ca19c9334,2024-11-21T08:54:06.097000 CVE-2024-2132,0,0,9e615187974debc656e16ca4b720f98a69cc5883fddfc478b00888b774ed5293,2025-01-15T18:43:44.303000 @@ -247730,11 +247730,11 @@ CVE-2024-21328,0,0,4725266cf9fa4f8f933fcbe5e3762adcaf89327ba04176d8846d6f8cae95b CVE-2024-21329,0,0,fd1b970c05b7ad7d6f140f728a636693c3e75004b6efec797ca1339929404b2a,2024-11-21T08:54:07.230000 CVE-2024-2133,0,0,deee6a988f84f078fab44ee176845a849d08bac2ca04e15a44bb3be0c740bce8,2024-11-21T09:09:05.960000 CVE-2024-21330,0,0,ee2512964df2f427bca4cbf3a3349cb10cf202fbca176cdd5adca71c963f4e02,2024-12-27T17:07:41.530000 -CVE-2024-21331,0,0,3ac6f620da8a1a55e12bbe6e32b80d5938ed90f55215d36f2497a9b2078277c7,2024-11-21T08:54:07.490000 -CVE-2024-21332,0,0,3ea68a814fdc0df7f7b1e5f02a10b1f5625545cab98e7cb9e338cf1eb80f4767,2024-11-21T08:54:07.610000 -CVE-2024-21333,0,0,9b20d500a57055bb25c08789a1e7346e48d36c3ccd7ac4a27e2a5d6fcd244804,2024-11-21T08:54:07.733000 +CVE-2024-21331,0,1,1e22f60447370e9e7b8c25b7f030ec5cb9fb4982957b3123fa49563cdbc89034,2025-01-15T22:43:24.930000 +CVE-2024-21332,0,1,5f9940555ae52de3fb4c58a74af48c4cce1f007909b6bc0347705e13b575ca53,2025-01-15T22:43:03.843000 +CVE-2024-21333,0,1,fca87e75a73907ac25d8a52ae672b55693e036068bda7bf778fc15147ed5e371,2025-01-15T22:42:43.347000 CVE-2024-21334,0,0,ffcd2589ece44d3aa482792f3b25b435ac329b8110b846b65c2c20dd22148932,2024-11-29T20:52:35.697000 -CVE-2024-21335,0,0,92d5f20fcfa20e7033524cab867905b9f07dcb5a555662e422a100dba5163a25,2024-11-21T08:54:07.997000 +CVE-2024-21335,0,1,e715edd1d516e9b938f915a8f242f7644cd49833bf26a9afcc34702e2ee00c40,2025-01-15T22:42:26.617000 CVE-2024-21336,0,0,f065666e443fdecdabd36ea1b143f43c28391c6a8196d5a56dfe1d5991980728,2024-11-21T08:54:08.120000 CVE-2024-21337,0,0,52873b8661b47b4e8d8c7451fd3e1fb72e87537a402891bb2daa31f46807400c,2024-11-21T08:54:08.243000 CVE-2024-21338,0,0,541e73946090ef29d4fa1a7bbce6dde2ac104f71ed24880c04429f64f7ee24f6,2024-11-29T15:27:05.917000 @@ -247776,7 +247776,7 @@ CVE-2024-2137,0,0,251fb0612b25441e52eb38eaefb727bbfd8da974406ed133e727cdc915150c CVE-2024-21370,0,0,3d7c4dd05a16bd938e38514b5badbaf55dc1b0c4db7f452b9e33bfdf0c6d09e6,2024-11-21T08:54:13.170000 CVE-2024-21371,0,0,5b15c89f5820daa171eade2e3f31abdccd363068fac83c9a46a8941f67ae2b99,2024-11-21T08:54:13.323000 CVE-2024-21372,0,0,ba4d9bf85cfc38863e13b8c3371551762e5f9cead88275b92a0db40eb1a28212,2024-11-21T08:54:13.470000 -CVE-2024-21373,0,0,0aa8881b74dbf983cf1981c6597d3de4dc8f39e38553f6ca68598c19fd4baba6,2024-11-21T08:54:13.623000 +CVE-2024-21373,0,1,435548b7c63dcebcad7a162ef915c74456e6e179ff20ac9f9abe9ea6478d8437,2025-01-15T22:37:35.290000 CVE-2024-21374,0,0,37e5f3cbf075003dde5710e9de8f5859549e2bbf8ee981c9d4e1fa89f225577e,2024-11-21T08:54:13.743000 CVE-2024-21375,0,0,ac00767c4731bb688325743be07caa10ebbc952d5911816645a8b7e28c495412,2024-11-21T08:54:13.873000 CVE-2024-21376,0,0,74365a6fe1ea03cb8bcca4b647804df584cc285554299561038c8bdb0cda11e1,2024-11-21T08:54:14.027000 @@ -247803,7 +247803,7 @@ CVE-2024-21394,0,0,4eb9ccb2b6c339aeaf2bf7b599d563812248c000b8bbe83c44e26075dae74 CVE-2024-21395,0,0,f73ec177413ed822d3a3b95116e04de4620bb28debd03777928b9cd72a78f4f7,2024-11-21T08:54:16.410000 CVE-2024-21396,0,0,727d9383842f94260c8a93654a0b746b928a433f4efb51060705e1103b866301,2024-11-21T08:54:16.527000 CVE-2024-21397,0,0,40e279eaf9f3416f16ba8fc80d0f531b4bfb03d96c9778e1fa620adced6a8b53,2024-11-21T08:54:16.640000 -CVE-2024-21398,0,0,0456b4fb4c2735aecca79f972eec8e7b32996f7143773af70f9fb141d58ceb44,2024-11-21T08:54:16.760000 +CVE-2024-21398,0,1,de3fc80fdb08744b424f164fbb17e2bbb34c7453aa78a5d134d918d88ecb9bf9,2025-01-15T22:36:43.943000 CVE-2024-21399,0,0,2dffa4cd262da40a519e66ca454cd27c52f2f7a64b9e59220d76cb819a2492a3,2024-11-21T08:54:16.870000 CVE-2024-2140,0,0,e04d8580c30dec7817045bce899d8636377de80a0de3c339751faf63ec687f4f,2024-11-21T09:09:06.883000 CVE-2024-21400,0,0,a872873b0bfdbefda2cec5094d48212a53bd41a16367483affa57e5731e64d1b,2024-11-29T20:52:31.103000 @@ -247821,8 +247821,8 @@ CVE-2024-21410,0,0,95d0b95a5f0063806998bacddd7789744542e29655fa4a9d4c4406647d161 CVE-2024-21411,0,0,014096b872a3129a023c532a8b0c270957fa0df4578b38d594339a889b601731,2024-12-27T17:07:01.770000 CVE-2024-21412,0,0,fe6d0090a3119f8d25267196b6a07a7c56807e1de815457f2dcf42a8c64f6c87,2024-11-29T15:25:25.097000 CVE-2024-21413,0,0,d835c10b8d96a916c89f5e3ecedc3ec638f083c020433a615e84937da0dcf125,2024-11-21T08:54:18.730000 -CVE-2024-21414,0,0,047bdfa4f1706a1c49b1aa320349fb7b5e22e3901463e1a78a80234d539dfb2e,2024-11-21T08:54:18.853000 -CVE-2024-21415,0,0,0dd239ce11010263b2251985737137fcdee870dd85da049b265c564484ba73de,2024-11-21T08:54:18.973000 +CVE-2024-21414,0,1,ea1fb9d74fee1e7852fb2532e32a52d6117683ecf03a7fb41c2d7d29b62033fb,2025-01-15T22:36:14.993000 +CVE-2024-21415,0,1,36765e9d74792bc2d6b496d7876c7b3d1edd41ffd91b365fa76ee75a85d4ad4e,2025-01-15T22:34:43.580000 CVE-2024-21416,0,0,93f002464d825de469964fa8d43a5472864f4628746c95028532cc0c5cfb11df,2024-09-20T18:55:14.573000 CVE-2024-21417,0,0,b241f9d83014e4a156b41d2c2f0ed30e2be20a18f3cb27885bff56d4c78a5183,2025-01-09T13:59:37.857000 CVE-2024-21418,0,0,f32851cbbca0a03afdc0a119babc5fa51c261b1380e1a035fd467fecb985d1cb,2024-12-27T18:05:13.933000 @@ -247832,10 +247832,10 @@ CVE-2024-21420,0,0,a004a088ff4068dab42258a5056ff38772eed2377a2d08b691f3a79d4ff39 CVE-2024-21421,0,0,ed338fff59f35749ce3716067c14685623c753eb75dba216ba03a5b62655ebda,2024-12-27T18:25:29.033000 CVE-2024-21423,0,0,bbea988a7d7bfb2f2ac99b02f22f42892d890b4d73ce38691772d73165b4186d,2024-11-29T20:42:08.630000 CVE-2024-21424,0,0,69268fa4d05c7c72753f06ddfafde0ba7d45361da9176b7add3cda4916845692,2025-01-08T16:41:51.853000 -CVE-2024-21425,0,0,9b22fd2f2bbafa6b412c65d40da0f708a935ea72443779d442de89f7be54cbd3,2024-11-21T08:54:20.160000 +CVE-2024-21425,0,1,2c65069004238a9ae0f697b025703be784ba667f6b4074d2c63ec2a8dd06e3a3,2025-01-15T22:34:16.520000 CVE-2024-21426,0,0,50edf6306cb1ce5b303e08364d4006ec275603628e75970c0fb1acf0db53bfd5,2024-11-29T20:50:09.910000 CVE-2024-21427,0,0,a17e3791f8438ee030d81372ddcf2e380b43f955c75cddb04d75263db9989f15,2024-11-29T20:49:42.757000 -CVE-2024-21428,0,0,ca1e4865036ff57a6fdec55bc0203da5ed208936e50e4419f961369c47f6d45f,2024-11-21T08:54:20.517000 +CVE-2024-21428,0,1,34beec50e3cbf79fef40742e3e1fc1c696f99190f8ce8c604dcca2e0eb4f2cca,2025-01-15T22:33:02.860000 CVE-2024-21429,0,0,6ceebfbd2f821b5be335f2f5c5cc08e1d66066dc65ad7b0f02fd03874ac1f2be,2024-11-29T20:43:50.370000 CVE-2024-2143,0,0,3f8800ab3ee439af10c3f3686e880417f53a8822e9ac1646c1e898d83a40b724,2024-11-21T09:09:07.330000 CVE-2024-21430,0,0,0c82706eb5221197af87e1f265a82dd4b412c443a76d8a68cabb9de79ab86d7a,2024-11-29T20:44:32.717000 @@ -252703,7 +252703,7 @@ CVE-2024-27851,0,0,c3b97ee6b26dfbc0c56d39614137e38659ab1609757d63181c34ff60a311c CVE-2024-27852,0,0,21baed505dd28c7a0b77d3ba061072e5a4859b987a8b1d420f9b79d60ef54041,2024-12-09T19:40:07.710000 CVE-2024-27853,0,0,72a1ed6ec4d0895fb804921668bc2bff946add21527d9bb528b8f3dbbcdca964,2024-11-21T09:05:17.167000 CVE-2024-27855,0,0,7b61a08acfa4129bbd09ca95b2fbbadadedd2683e38c872f9104fbd486556985,2024-11-21T09:05:17.320000 -CVE-2024-27856,1,1,69510cb9bd366799f2d0040fe911a2357bcf61e5f940dbaa36e6ab73fc306e86,2025-01-15T20:15:27.483000 +CVE-2024-27856,0,0,69510cb9bd366799f2d0040fe911a2357bcf61e5f940dbaa36e6ab73fc306e86,2025-01-15T20:15:27.483000 CVE-2024-27857,0,0,50c74cada9fa0a92498be7b0ed6d9257c0a8cdcb5b5d97a471df147f46938208,2024-11-21T09:05:17.540000 CVE-2024-27858,0,0,aa4ac34917fc25a3b363315db7cb3fffd219145d245e40c2d78d17a7bcb483bf,2024-09-23T19:56:28.840000 CVE-2024-2786,0,0,22e7aa45cb0e7749183823d317f8f7b810ca18197f71a7cb7903a7f8a0a36e07,2025-01-07T18:17:10.187000 @@ -253444,7 +253444,7 @@ CVE-2024-28924,0,0,affd3065f73ae07f99d1f99d6584d4fd530fbd5816ab104d9b09354d69358 CVE-2024-28925,0,0,fda4f9796ab3d565d0cf91a5c06f18f8d483173173405898b9f9b1ed41dd1df1,2025-01-14T20:54:14.313000 CVE-2024-28926,0,0,c5f375be6d2d488bea53ec1e93300777cdfbddeb5ddc37526b3c2ac3b4aa9562,2025-01-15T18:44:21.050000 CVE-2024-28927,0,0,695e9c189aff014fc53371c2cc03e1340199354cfc08d7dc2774750486df412c,2025-01-15T18:45:39.533000 -CVE-2024-28928,0,0,1c5a7a6f0efcbf889b49dfcf66728716f8d8370f347a179f7e7faeb77331f70d,2024-11-21T09:07:12.667000 +CVE-2024-28928,0,1,c27b696b54b60804049f3d90e44cea72634bdc70647e90d01df999543c8b82a6,2025-01-15T22:32:19.930000 CVE-2024-28929,0,0,046264c571aafda225d7365c3059ab68bd25c30dca254045cc4347ca9da9e90f,2025-01-14T20:47:41.253000 CVE-2024-2893,0,0,d6fda5ad886871814bd5ffa9d425d870715f3c56c45827b8c39c61f55007f365,2024-11-21T09:10:46.457000 CVE-2024-28930,0,0,61f753279169a9d3d53d3ab92a960da8c3002d265e18e3e04a743a7e521200cb,2025-01-14T20:48:06.263000 @@ -253456,14 +253456,14 @@ CVE-2024-28935,0,0,7a9b694a1788f94dab7630c76299ee0e92bc57bb87bac1aa0c13973639cba CVE-2024-28936,0,0,4264c80a5f3a08d5f205f651ba6b20f9bdacfc5ecc900ceccddb8f2af2de3c44,2025-01-14T20:50:19.147000 CVE-2024-28937,0,0,f7c193f0a4b300cb22ce8d1015fa240677db7dffadf67f0783951778c1c26673,2025-01-14T20:50:38.043000 CVE-2024-28938,0,0,4c3ed97a2df40cd15aafe170d8f206c668154d1c86cc5aea8e7d1547ef3219c2,2025-01-14T20:51:01.370000 -CVE-2024-28939,0,1,38ebf183fe37377b8fd2ccb268afcf629c3fc3a5e43928b9e008d675f0d5fedd,2025-01-15T19:06:06.007000 +CVE-2024-28939,0,0,38ebf183fe37377b8fd2ccb268afcf629c3fc3a5e43928b9e008d675f0d5fedd,2025-01-15T19:06:06.007000 CVE-2024-2894,0,0,4e4e197d6e5e2cfa7dce6da3a124c67e0d58dfe258916ccee0dc79455f6b8393,2024-11-21T09:10:46.603000 -CVE-2024-28940,0,1,b4e91055e512829ef86de877890d0613f8bb207a143a8a2a9701b281837d479a,2025-01-15T19:06:25.340000 +CVE-2024-28940,0,0,b4e91055e512829ef86de877890d0613f8bb207a143a8a2a9701b281837d479a,2025-01-15T19:06:25.340000 CVE-2024-28941,0,0,c146dba5cc5132ed8f71f242b70ea18220d6242e2e3181c7792809978cb5aa59,2025-01-14T20:51:28.040000 -CVE-2024-28942,0,1,45e12863cfd2906d7e9b154de89b6a52a9867356e5cbdae1fbce2828713bad02,2025-01-15T19:06:35.190000 +CVE-2024-28942,0,0,45e12863cfd2906d7e9b154de89b6a52a9867356e5cbdae1fbce2828713bad02,2025-01-15T19:06:35.190000 CVE-2024-28943,0,0,e80a4854eeb7627b9c1ed13dba09eca1d796746a77c7f22cfe39ed58b71671f9,2024-11-21T09:07:14.757000 -CVE-2024-28944,0,1,be45cc8ea93b7e0969e7b71555f1a6d5af47a05327c0aa4f4ea121fc2d7b8dcf,2025-01-15T19:06:42.510000 -CVE-2024-28945,0,1,fd0f929d94e9a072a54ac6220b0a882ea43cf1101ced55267196733ea906c727,2025-01-15T19:06:51.920000 +CVE-2024-28944,0,0,be45cc8ea93b7e0969e7b71555f1a6d5af47a05327c0aa4f4ea121fc2d7b8dcf,2025-01-15T19:06:42.510000 +CVE-2024-28945,0,0,fd0f929d94e9a072a54ac6220b0a882ea43cf1101ced55267196733ea906c727,2025-01-15T19:06:51.920000 CVE-2024-28947,0,0,f423c6da395b9fab8d455cff865afb02d4eaef269f598c96201d2b407abccf3e,2024-09-12T18:52:38.433000 CVE-2024-28948,0,0,1666ae581c80c38aac0ccf842fe7ca7d976d37f538b8ec7b216cab7a6078bfb5,2024-10-04T18:58:14.400000 CVE-2024-28949,0,0,1f3684a855e01293d9c0333b231907267ad216e334a79f7ff99fcfcf991a1b22,2024-12-12T21:38:08.237000 @@ -253556,11 +253556,11 @@ CVE-2024-29040,0,0,6f600fd776c6a2753acef940ae7e86d9938f64b7492793359aca46255cc2c CVE-2024-29041,0,0,6ac0f71fb6f950c6f7b59cb10e9a1d9aeaaf1dbdf40430ddb4997841553145c1,2024-11-21T09:07:26.023000 CVE-2024-29042,0,0,730c6dea49127983163b153e644945f8bae8aa398a44073ad49834eb438c9828,2024-11-21T09:07:26.187000 CVE-2024-29043,0,0,75345fd1236015f4a39acc2e3adc311342077da343eecc5f0b12f0791dee5f6f,2024-11-21T09:07:26.317000 -CVE-2024-29044,0,1,3690b041a3c5958ebc59f0790f86871fc965cb811eb42eb807a4bba754e2b2e3,2025-01-15T19:07:05.677000 -CVE-2024-29045,0,1,ff22f9c41d3e70ac25fb0e1bb7236e191425737ba948ce35025fae4c11f3715e,2025-01-15T19:07:39.023000 -CVE-2024-29046,0,1,7a60f0ac29ac5196b90ed4a88e6d478ff3ffe45f34c3faae54c66ed7a088fac0,2025-01-15T19:07:32.210000 -CVE-2024-29047,0,1,8a2e8b2baac4b1a7ff52438994f73baf63d20a80af11c9ac475819fed362a5cf,2025-01-15T19:07:28.587000 -CVE-2024-29048,0,1,ba22a52d5980e59ca3cced96e67087d9c8aaf647cef6c0f589cd918fa4a6bd2e,2025-01-15T19:07:25.327000 +CVE-2024-29044,0,0,3690b041a3c5958ebc59f0790f86871fc965cb811eb42eb807a4bba754e2b2e3,2025-01-15T19:07:05.677000 +CVE-2024-29045,0,0,ff22f9c41d3e70ac25fb0e1bb7236e191425737ba948ce35025fae4c11f3715e,2025-01-15T19:07:39.023000 +CVE-2024-29046,0,0,7a60f0ac29ac5196b90ed4a88e6d478ff3ffe45f34c3faae54c66ed7a088fac0,2025-01-15T19:07:32.210000 +CVE-2024-29047,0,0,8a2e8b2baac4b1a7ff52438994f73baf63d20a80af11c9ac475819fed362a5cf,2025-01-15T19:07:28.587000 +CVE-2024-29048,0,0,ba22a52d5980e59ca3cced96e67087d9c8aaf647cef6c0f589cd918fa4a6bd2e,2025-01-15T19:07:25.327000 CVE-2024-29049,0,0,b4de33718e2a66f5e65d4713457675b539c089be4fac657ccc0a19e7d6ed6465,2025-01-06T18:37:14.790000 CVE-2024-2905,0,0,475c26f278f0caf02a3d877ee86a9d24c3c71da9cf1b51cbc9b4dbccdbf9aab6,2024-11-21T09:10:48.187000 CVE-2024-29050,0,0,44f58c2f1cf521bf680200ab8a0b4bb5be8ceae4f46643b1fbd737900e35d15c,2024-11-21T09:07:27.143000 @@ -254171,8 +254171,8 @@ CVE-2024-29979,0,0,eef8f0e0c6e3c19f2b73e8323e8d55c578f57049bf57b4c0973d36e1da15a CVE-2024-2998,0,0,4dea38390aec1eb05ba53ab716c17a921873391ec79bf9978195fbb79ed9eddd,2024-11-21T09:11:01.313000 CVE-2024-29980,0,0,ddf5e79e683f65eb79e5290f66a5d55d0946f8257145ed6e6fa62aaec8e2ce4a,2025-01-14T16:15:28.600000 CVE-2024-29981,0,0,0d96708c10f774658d035c3c0f7071119e5248a30ce12e4c6ac613898514042d,2025-01-06T18:38:04.080000 -CVE-2024-29982,0,1,32bee63f46b19e8d6975cc6983b6808d51edf6687a8f1c8ed2a0a94e65adcb52,2025-01-15T19:07:20.527000 -CVE-2024-29983,0,1,344b9d2199881b2661a68e9af52fece38d7f15e18fcc01ca69668f2b65328c8a,2025-01-15T19:07:16.507000 +CVE-2024-29982,0,0,32bee63f46b19e8d6975cc6983b6808d51edf6687a8f1c8ed2a0a94e65adcb52,2025-01-15T19:07:20.527000 +CVE-2024-29983,0,0,344b9d2199881b2661a68e9af52fece38d7f15e18fcc01ca69668f2b65328c8a,2025-01-15T19:07:16.507000 CVE-2024-29984,0,0,1e929976d60d8d8c80a8b4b034fd4acc9655224e09e9042f98560c9a35205d22,2025-01-15T18:43:37.357000 CVE-2024-29985,0,0,95b40f746fa954c9414076d1fb815efea23aa50e94505fc471b09342077083a5,2025-01-15T18:43:11.970000 CVE-2024-29986,0,0,6b79630c4fe76b8f26a75938c4d4e1e90c4fdf4ae6de5522c549b488e3e47194,2024-11-21T09:08:44.993000 @@ -259355,6 +259355,7 @@ CVE-2024-36742,0,0,3a8ac06d2b7460d92170f393580d757a9169bcf0cb47f2df5b6b9175dc24e CVE-2024-36743,0,0,997f7cc47dfdd9276a067f7a34f5b7be0237277a0a3157d65da6a25a7753b82b,2024-11-21T09:22:35.510000 CVE-2024-36745,0,0,7dbdb6b068ebfce6206826a7b3683b8e3075311b55f148598b550b2d1cdd84ea,2024-11-21T09:22:35.730000 CVE-2024-3675,0,0,320c0c6a821e66128af3b5683a2218c46856ee00dab3b257adbda9526c52d243,2025-01-08T21:11:01.357000 +CVE-2024-36751,1,1,2271916d5f89041732d6b75105cd263352748eef475d012a206b19ae37afa068,2025-01-15T22:15:26.400000 CVE-2024-36755,0,0,959c7e1c5392de2c0c9f9c3a5e5235cba19560b12ef4e2310e57761b2d2324b3,2024-11-21T09:22:35.883000 CVE-2024-3676,0,0,c25c73186d2926601a4bf9263de9e5912c4170cf55771346041257a143aab173,2024-11-21T09:30:09.570000 CVE-2024-36760,0,0,2eed0d1b029328b3aaf61411ac108b885b75813a77deb3defd7d8df3d154ccef,2024-11-21T09:22:36.097000 @@ -260319,7 +260320,7 @@ CVE-2024-37960,0,0,88ecfceb39b7e0063b870ddb68c9129955f8d29f0184bea950ac004cc590c CVE-2024-37961,0,0,cf66c48c044de3bddb607a0cf3c90167369e2890a5e938294c10f20a360a5cca,2024-11-21T09:24:35.847000 CVE-2024-37962,0,0,db2675353f860399b9d6d1a0495bf62bb81eedede36ed49cbf58759c240cc39a,2024-12-19T12:15:06.737000 CVE-2024-37965,0,0,6babe1d0e2999b39cc0895ef2ca352332d264b85c5043751559162ff1c32b3d2,2024-09-10T17:43:14.410000 -CVE-2024-37966,0,0,b958755a3490da731ed6e6cb6c62d6f7bcdc15cb21c727ca987e15acffcf6c1d,2024-09-10T17:43:14.410000 +CVE-2024-37966,0,1,902a6d8ad8d1506ce3f6dc31414e49d9cee54d275d5e12dd48e5597741d913e9,2025-01-15T22:31:41.957000 CVE-2024-37968,0,0,54c65ab38f96c984d47f26d7973e70fed12b5bc92a49f3dcf7903784570e6447,2024-08-16T20:54:18.347000 CVE-2024-37969,0,0,3dcb4134c3158b14ca3242c535734c22f29e358125eadc3ea20366ebc7be9900,2024-11-21T09:24:36.200000 CVE-2024-3797,0,0,6feb8a9d021f23da482191570109c9d8b5e367059955d2ef051a467c83ae269a,2024-11-21T09:30:25.280000 @@ -262327,7 +262328,7 @@ CVE-2024-40766,0,0,245a65896d5e59cbc106ef8982774d28e0903e2f3e66c1e0224a1b4643d1a CVE-2024-40767,0,0,d8daa36a05263c3ffe16e1b113badcb7ade4182a8a1be061cbdf839ea5fdacae,2024-11-21T09:31:35.113000 CVE-2024-4077,0,0,8de588b7fa8bc539a1390a30d26ffec16c49968012710ff1d0939c2fbeb8f325,2024-11-21T09:42:08.940000 CVE-2024-40770,0,0,868a7712172f9193db04503bf4681e6456ac2c380ba489a77f29f0b183bde5f0,2024-09-24T14:55:38.737000 -CVE-2024-40771,1,1,30ba71cb5241cfa30cc5f26a06f020157e4cda6a8888d34bbb5c58d61f6dcba6,2025-01-15T20:15:27.597000 +CVE-2024-40771,0,0,30ba71cb5241cfa30cc5f26a06f020157e4cda6a8888d34bbb5c58d61f6dcba6,2025-01-15T20:15:27.597000 CVE-2024-40774,0,0,acf9484778c188d9655881f6296c67ea4d7b41e7dc81159e8bc4a6eb0bc45b07,2024-11-21T09:31:35.363000 CVE-2024-40775,0,0,5a1c8ebb97a8c67c049206c150e713e1edac12079e5342341c02eb94b0a883fc,2024-11-21T09:31:35.600000 CVE-2024-40776,0,0,691f82117c272b7fd0cd01aff97f784b0cb450c83a62bf9d7355e7e0bac6f051,2024-11-21T09:31:35.730000 @@ -262396,7 +262397,7 @@ CVE-2024-40835,0,0,3f6ef0b1fef5cf4b00a629185a96b630665ef3a9544463783f9d2cf4975e7 CVE-2024-40836,0,0,a141cd1ddaeaf46ffa54c1bf810175958c1ce047751b66d0d0ec544280cee946,2024-12-11T19:40:36.427000 CVE-2024-40837,0,0,d9e1d727c5489e5fbe91c9a35481e1b475460063dae3d0ae089fbdf692fb517e,2024-09-23T18:50:16.050000 CVE-2024-40838,0,0,580b3d51fd4431cbc24e96aafd19ebfdf3fdc30d947e42e3e5409dfdf94d1c3e,2024-09-25T16:46:24.123000 -CVE-2024-40839,1,1,b36e8fc9f8f718ec8481a078d01dd34b33a827e4972472f4754a5122d08877d3,2025-01-15T20:15:27.700000 +CVE-2024-40839,0,0,b36e8fc9f8f718ec8481a078d01dd34b33a827e4972472f4754a5122d08877d3,2025-01-15T20:15:27.700000 CVE-2024-4084,0,0,a28b137c9c522b2744d2cc719744fd799a787e733e6ed4c14866cfffc6da3e36,2024-11-21T09:42:09.817000 CVE-2024-40840,0,0,14bdf19150fd7acf49468e39cdf6efc98838dab91ac000670442c80f0c1e00a7,2024-09-25T19:42:49.173000 CVE-2024-40841,0,0,4a95dd6a234443731d705e87950516814e31e11699249b315c7fa66892964954,2024-12-12T15:44:20.363000 @@ -262412,7 +262413,7 @@ CVE-2024-40850,0,0,e801dfe1b5836330a5238e832cf4a665932ae66da89298e09c70965412d21 CVE-2024-40851,0,0,b958c164114af6b23a2bf7ef2bd1c6335c3be241ec455192784b6b386c9ef358,2024-10-30T15:35:14.883000 CVE-2024-40852,0,0,872fb94116f001037c1281aa476b36043a3a7ea2928e48e7702d75cc209d3fce,2024-12-12T15:28:11.783000 CVE-2024-40853,0,0,dfc9fa03d8fda58ef712d436e720ae0f21a7fffb74fe4326b57538d3690d7a89,2024-10-30T17:08:42.157000 -CVE-2024-40854,1,1,b5fc3009d973dd181eb618ca54a118d70a9fa8469b527fc2fb5f07296674d912,2025-01-15T20:15:27.797000 +CVE-2024-40854,0,0,b5fc3009d973dd181eb618ca54a118d70a9fa8469b527fc2fb5f07296674d912,2025-01-15T20:15:27.797000 CVE-2024-40855,0,0,7c6a015a8df0c3902c0c5c429b62fdf8917463144cc33940de5fdcb1a0b9dbc7,2024-10-30T19:35:15.737000 CVE-2024-40856,0,0,3b5bf51664ee45ba68d50745d32de308dce65dbf1c8981b487e32ad3441090dc,2024-09-25T13:43:40.657000 CVE-2024-40857,0,0,102892d8544ef4f8b8056a1e88dba88dbbcaf3abbcaa73be23c6e2ed59b0fb0a,2024-09-25T13:41:41.843000 @@ -264879,7 +264880,7 @@ CVE-2024-43966,0,0,b1c3a2c914b7fe3d93385a29bdef310151a44a0dfd7002e70261789dc777c CVE-2024-43967,0,0,66cf70e54d96e5c9aeb8db434f3fb011e631096716456a134558f4b472b4d158,2024-09-18T17:00:57.497000 CVE-2024-43968,0,0,e68d2b1867fd5f5aa5b26c5e7c6ccd7ec578fd8c649ccf866817e41be944243d,2024-11-08T20:43:04.257000 CVE-2024-43969,0,0,e8eccaca93e84d826c12a7bcb831012c8f9a0c683a018b1ad485d805b91a7483,2024-09-20T12:30:51.220000 -CVE-2024-4397,0,0,5646e465afbadff74c039caa4c6970bcb84b5d40dbf11296e0765f5e0c8afb85,2024-11-21T09:42:45.863000 +CVE-2024-4397,0,1,e6d602fc67b0c53ad5163003149e22b7f7313348a9f06c7c332e08c3a696b945,2025-01-15T21:23:41.467000 CVE-2024-43970,0,0,2b47a67bd95544f24bdc1a4cc32dd92da388690995a292f770d40c585891a766,2024-09-25T14:18:53.297000 CVE-2024-43971,0,0,1e49fcf5224ad0c23ad76de8f088ba096b929897c7ed5e5894fcd05c79e6d09d,2024-09-25T14:18:13.137000 CVE-2024-43972,0,0,4f406ff04cb3c0b59ca13837f305ef0175722ef92955f73d7615bcf08b6757d0,2024-09-25T14:16:18.150000 @@ -265036,7 +265037,7 @@ CVE-2024-44132,0,0,8afd03fa4900bdc815951be587052cdc1902d648f6c0f1c1ad745b8e3479d CVE-2024-44133,0,0,9196ca541ad45474d5d5e36a2a1369fb1dbddc304bb390dd887770a28cf137d9,2024-09-24T18:24:44.733000 CVE-2024-44134,0,0,a1a7565b3d1d747868a47cfe0b90ac2757ca3fe3528c74bc3c5562541c409893,2024-09-24T18:26:26.963000 CVE-2024-44135,0,0,1a66ffb3fced69f7dd0088f00608289a6df8f259d48e72e731b80a9fde46b0b9,2024-09-25T13:28:09.067000 -CVE-2024-44136,1,1,16a63f34167268b1dffcacf255b3c118151d27a439821fc597cf12db499ecd47,2025-01-15T20:15:27.923000 +CVE-2024-44136,0,0,16a63f34167268b1dffcacf255b3c118151d27a439821fc597cf12db499ecd47,2025-01-15T20:15:27.923000 CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000 CVE-2024-44139,0,0,227592f6930f5804ef7361e5c64b194003d6a9fbe8100b1944463ea300dd6852,2024-09-24T18:30:34.863000 CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000 @@ -265200,7 +265201,7 @@ CVE-2024-44333,0,0,c5d624202dbc9a9b1670ac84eba11673bfacf2e3bd54495df9c00726b1f1c CVE-2024-44334,0,0,2a3b81ccad3fcc31e1a06c0adb7939fa911851042ebf4e5dd5061206cc9f639c,2024-09-09T20:35:12.473000 CVE-2024-44335,0,0,4962d89eefd697dbe30866ff3edf68624ec476c2d20b191be41bf6d9942ab0b8,2024-09-09T20:35:17.330000 CVE-2024-44337,0,0,030514f9e40e38f59570e28e764a82624613b34238346a3330ba41ff1d541657,2024-11-14T16:35:14.613000 -CVE-2024-4434,0,1,924c8e05348dcc5a178234770674e9fd8f96c251c986881d5a18ca7bf83e4da3,2025-01-15T20:05:02.353000 +CVE-2024-4434,0,0,924c8e05348dcc5a178234770674e9fd8f96c251c986881d5a18ca7bf83e4da3,2025-01-15T20:05:02.353000 CVE-2024-44340,0,0,83e58ea9785ebdf6a4101ac95bdee1fca6e905c550b6bbbcea8839f08b665ae8,2024-08-30T14:56:38.207000 CVE-2024-44341,0,0,7651f1877c3d6b1232bf2f13cf52731db1b14545c472830418f8093ef24618dc,2024-08-30T14:57:07.260000 CVE-2024-44342,0,0,9946b8e73e8a0eed62aea52b08d3d3c4e1ec770a53fc7da4a55ac13f51727d07,2024-08-30T14:57:40.020000 @@ -267699,6 +267700,11 @@ CVE-2024-48112,0,0,66b06dae67eaefbc5b4fba345a4c29b161777f09831586e1142c2f5b06f80 CVE-2024-48119,0,0,baa21abf94b191e4316bf16893ebdf390866a932a6251e9efb907f2e6f573b4f,2024-10-30T14:32:43.217000 CVE-2024-4812,0,0,8ef04e2594d9b88fdf0c6c095b09aa229bb7a9aa44c0aa25b1242cac8134f5e7,2024-11-21T09:43:40.183000 CVE-2024-48120,0,0,b0e650c739b138b707281499471fca0d2a4e71d5ab6d1ef4874ee3da12eccefd,2024-10-29T20:57:53.360000 +CVE-2024-48121,1,1,3214bee7da8e3f509f7412f3e279397011d850b12d106151290f87bcfd743976,2025-01-15T21:15:13.063000 +CVE-2024-48122,1,1,ef4dbe73ddcbe3747d75bc0f305c7993ceeca917a7b17b9ddb38c3b776858056,2025-01-15T21:15:13.200000 +CVE-2024-48123,1,1,1ce64456a782985d4c9c698673e093b6139525cfb44a23952e0fe7744f609606,2025-01-15T21:15:13.340000 +CVE-2024-48125,1,1,c3755bd226434427c2b180f569b2230179d5af35e7843e7c981f9561e09afddd,2025-01-15T21:15:13.477000 +CVE-2024-48126,1,1,a82082fdb76a284967c26fe2fcc716154230021a5b401682f7689f4e75b72428,2025-01-15T21:15:13.613000 CVE-2024-4813,0,0,53589647721842c051dd9f712ddb32f92956eced2bba5aa7c708a955b3cd0fb3,2024-11-21T09:43:40.333000 CVE-2024-48138,0,0,1cf669aa62b7ce9fd297b61c1300f02586ab21a6411386c8391a654aac137760,2024-11-01T12:57:35.843000 CVE-2024-48139,0,0,1d758cb962b76524a06521373672f481daf5d3617952ffba3fa119154194d14e,2024-10-25T19:35:12.730000 @@ -269591,9 +269597,9 @@ CVE-2024-5085,0,0,2c4b4085a8e4bdb77987847a0b046b43685474bf82f1bc30dd3b70feca1941 CVE-2024-50852,0,0,a554aacf991646da5b2721516004d1f4d3015c73785e9e42d26b1a8b27fd0d85,2024-11-21T17:15:21.473000 CVE-2024-50853,0,0,a2c16db2d9a48c6744a7c1a41fb13ec1d9457efe837db0d74474da40cef9ea9d,2024-11-21T17:15:21.783000 CVE-2024-50854,0,0,ef773b735c2a347d27ee6e8fc360f731f61bfb69f79492695040fe16f5b3d113,2024-11-14T14:43:25.770000 -CVE-2024-50857,0,1,0911de7b594086a09c0ba9e92d1369f1fd2f6d03681c75ac7ebe8d3f9d3fc6c8,2025-01-15T20:15:28.023000 +CVE-2024-50857,0,0,0911de7b594086a09c0ba9e92d1369f1fd2f6d03681c75ac7ebe8d3f9d3fc6c8,2025-01-15T20:15:28.023000 CVE-2024-50858,0,0,a45701b9b7375b6bf75c6c4453bcfdb9b731f413529cc2440928205311c968e2,2025-01-15T17:15:16.100000 -CVE-2024-50859,0,1,52108c1f888dbe270b543a86024d52785db90837da3a5168ac1ec034a576eaed,2025-01-15T20:15:28.193000 +CVE-2024-50859,0,0,52108c1f888dbe270b543a86024d52785db90837da3a5168ac1ec034a576eaed,2025-01-15T20:15:28.193000 CVE-2024-5086,0,0,6f4adcedc32131edaa2421b93d6f66300703be46e5cbd2689d364be6c71d3e7a,2024-11-21T09:46:56.290000 CVE-2024-50861,0,0,b2a762d829416507d5f1897d7dd81f35b1933c282e8cdf7868d849bc14b5ce1b,2025-01-15T17:15:16.257000 CVE-2024-5087,0,0,31abeedd94931ed5c0834d8eca1075c48705227fc52b3830e1422827a9f66ace,2024-11-21T09:46:56.403000 @@ -271598,7 +271604,7 @@ CVE-2024-54041,0,0,d9bcc030129bf6dec82b04a143991ef06874386036703482c0d5681793cd3 CVE-2024-54042,0,0,9d43f35835f316da2fa5f61db70a83aa2739a1fe6e06c346b10895cf4aac4595,2025-01-15T17:55:33.857000 CVE-2024-54043,0,0,ede99d38ecac874e28017712798906fe5b446ab4e801a82b15bdb294dd89e8b2,2025-01-15T17:55:28.267000 CVE-2024-54044,0,0,836ece2ae02f0aedda9d5dc4227134956bd2db31d966e8556ac460235670f49a,2025-01-15T17:54:49.977000 -CVE-2024-54045,0,1,b2ebb653c6c2ae09641bb3140f9eb7d50dff2ba8341c2451b161fd30ef9e8c13,2025-01-15T20:15:28.360000 +CVE-2024-54045,0,0,b2ebb653c6c2ae09641bb3140f9eb7d50dff2ba8341c2451b161fd30ef9e8c13,2025-01-15T20:15:28.360000 CVE-2024-54046,0,0,1d8aad1a4f52e5f4edad067bd49c9651d7e63201067355bfb75f73e32888cbd0,2025-01-15T17:54:25.687000 CVE-2024-54047,0,0,8d2915c75960e69f5f925f8972c0722700b5aa7687645417029b62e5f8efd754,2025-01-15T17:54:07.947000 CVE-2024-54048,0,0,543296160fe4adfe5f36af9cbe29900a01d4655bc978ae785dbc59f3aed5f660,2025-01-15T17:54:00.550000 @@ -271960,7 +271966,7 @@ CVE-2024-54460,0,0,4ac93df62b811ec1eda8d55b6ad4df0cd01ba031f49040b335381137847e4 CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000 CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000 CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000 -CVE-2024-54470,1,1,8269904babee0d90f7fbfbaffb4c1acc275b9e67c7821b0498628597c436d078,2025-01-15T20:15:28.520000 +CVE-2024-54470,0,0,8269904babee0d90f7fbfbaffb4c1acc275b9e67c7821b0498628597c436d078,2025-01-15T20:15:28.520000 CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000 CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000 CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000 @@ -272002,9 +272008,9 @@ CVE-2024-54529,0,0,be90cc5d5d809d1a3746b39c45f75d946f866e9a1f3852b3648566e8b40f1 CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000 CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000 CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000 -CVE-2024-54535,1,1,d2d25f0707ec6464e182c375aa360c23a7e7fe3de2397e55c833d496da5c2b5f,2025-01-15T20:15:28.610000 +CVE-2024-54535,0,0,d2d25f0707ec6464e182c375aa360c23a7e7fe3de2397e55c833d496da5c2b5f,2025-01-15T20:15:28.610000 CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000 -CVE-2024-54540,1,1,02ab4a7fb5294cf3a3d27e82d5a580359064e7caf122af5b709e03d96a4b1294,2025-01-15T20:15:28.703000 +CVE-2024-54540,0,0,02ab4a7fb5294cf3a3d27e82d5a580359064e7caf122af5b709e03d96a4b1294,2025-01-15T20:15:28.703000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000 CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000 @@ -272075,7 +272081,7 @@ CVE-2024-5487,0,0,9fbfbc79e6dff8c3b550139a3c2eecf9b7c4bdde8704bc6cfe1f3d5f4415c8 CVE-2024-54879,0,0,b29885c9d1f972b1a85e410837486f9a5cbdaaa5454176171e37cc430fed9212,2025-01-07T21:15:12.170000 CVE-2024-5488,0,0,703a569b98e6f1a8130cee58df129e22e6ef47912a99f32d5a452e25c6109519,2024-11-21T09:47:46.633000 CVE-2024-54880,0,0,e5b3a5485624ea2d9e12e0827ea5724e74a008cbdfa4830f07e177ce5a2b6b3e,2025-01-07T21:15:12.367000 -CVE-2024-54887,0,0,9cd9a472618710124f54d358b5a0616c2b34979c89c661ff4cf5c991a7e09957,2025-01-09T20:15:39.277000 +CVE-2024-54887,0,1,7af3cad075b59623b7b3e30dd1983d85e5a9b2bf998f2ab9a001666a2a4fd71c,2025-01-15T21:15:13.820000 CVE-2024-5489,0,0,6c00a6a2badf83516471ea1d81b619bbe482cb4a54de89ffa7bd06f7fa1ffabd,2024-11-21T09:47:46.807000 CVE-2024-5490,0,0,7e66a0f19af78ba5ab311e474f6c7a834b406cb5857b42d263e55e1190767452,2024-08-27T14:36:10.033000 CVE-2024-54907,0,0,80a392b1154d757e3dee13d617bee74a64b3baf8f41f4c6bebbb399698b18a69,2024-12-26T20:15:21.800000 @@ -272264,7 +272270,7 @@ CVE-2024-55582,0,0,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3 CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c81a3,2024-12-12T02:08:22.247000 CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000 CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f0186,2024-11-21T09:47:55.840000 -CVE-2024-55591,0,1,a4119c3a900eabf0113ebb321de53b83e488411766eec9c46fb6102609e7a164,2025-01-15T20:48:30.333000 +CVE-2024-55591,0,0,a4119c3a900eabf0113ebb321de53b83e488411766eec9c46fb6102609e7a164,2025-01-15T20:48:30.333000 CVE-2024-55593,0,0,7966b8c0c61f0e982eed66bcaeabb127b9928db85b43c7e5a46fdeafce2a85f4,2025-01-14T14:15:34.610000 CVE-2024-5560,0,0,201a92ce337d2fd4d85cefc5a8b186dd1f339de19f8ea6d91a69fddcd5fd3ef6,2024-11-21T09:47:55.983000 CVE-2024-55601,0,0,3b6016987278f61ded580e0e03402a0550929e4ad53cc1af6a73ada12213c6f3,2024-12-09T22:15:23.100000 @@ -273088,7 +273094,7 @@ CVE-2024-5718,0,0,5319c47b63a6835fedbdcd43dc1fd8b869ba81977081921f790378b370cee7 CVE-2024-5719,0,0,3d2db656c5d1f0a79b62bae36bd1cd10161f3160ac0d855266c2bbd4d021243f,2024-11-22T20:15:10.450000 CVE-2024-5720,0,0,eb323a155cad85d456bd7c0f7894b5f9589ce98c04e2db5736a7c40744f539a9,2024-11-22T20:15:10.563000 CVE-2024-5721,0,0,f143dbbb695fa9f83fd9d3c9d9d3aaa920ced069d4617f7e2c69a39cb694b5ad,2024-11-22T20:15:10.677000 -CVE-2024-57211,0,0,0bb5c735faf028ac51e639a0424cafb53cab80afb7803cb0f416ddb8f441c0b5,2025-01-10T17:15:17.850000 +CVE-2024-57211,0,1,57b520ff240cd1b95722e462b132296a6ab5311980b04d2750462f237d1cf6b2,2025-01-15T21:15:14.057000 CVE-2024-57212,0,0,ec6e149d277d1971a4be9cc9ccc4b09a27f9df022cacab3ca719730b9bd3a1bc,2025-01-14T16:15:33.120000 CVE-2024-57213,0,0,da38e8db9d9624bfb17e9b74dcbb1d9c9b4d9164a614e7e55222409b4b1ba115,2025-01-13T16:15:18.460000 CVE-2024-57214,0,0,88774198ca1615fe7c85c8d15ba3ecb9d024222f80b5ad4ede4275a8640ddc74,2025-01-14T17:15:19.380000 @@ -273097,7 +273103,7 @@ CVE-2024-57222,0,0,bddbdc8f278a6d79bbafdfadd56296b1ae6babffc483678c3d81d31de6931 CVE-2024-57223,0,0,7aa014bd144e210943598673adc96f88513f7f5847e8e5029067c6d35453604b,2025-01-13T21:15:13.637000 CVE-2024-57224,0,0,d743b28053138e146f17b7d9d8eba5f98ad07a1fbfe64e9ab1d1f1b2b7162bec,2025-01-13T21:15:13.773000 CVE-2024-57225,0,0,e72498860bbaa18f2a0eb6b55d3b3d2e7524cdea4fc6c5c9b67999bdcbb71019,2025-01-13T21:15:13.910000 -CVE-2024-57226,0,0,76ce969d7911ee470d21ffb7153db41a1e9c7064f9f2579a56ac0082a3e31efc,2025-01-10T18:15:25.600000 +CVE-2024-57226,0,1,13241ab5fcad4d8797ceadffb98a698582b96500669617b3e0cb2d147cf0ed7b,2025-01-15T21:15:14.303000 CVE-2024-57227,0,0,6f045b0d2bb89ec8c3ab46f5cd18581b593229453d62753a55e00ba7f053121a,2025-01-10T18:15:25.783000 CVE-2024-57228,0,0,35546c277e8fc4642b71ace2382a16c32e4974ec269930e28ce39482d44a2bc6,2025-01-10T18:15:25.970000 CVE-2024-5723,0,0,e9a9bfbb365da81a3cbb0381b41b1530e9a21124d15e20f7ac8fec3dc25c5b02,2024-11-26T02:16:48.200000 @@ -277037,13 +277043,20 @@ CVE-2025-0464,0,0,80c2bc95d50c713972edec6dc7d153c62488d8880041d16d73f1c9db54dac9 CVE-2025-0465,0,0,6bbd81e7422bebba96c70ce0da9cdbb0423e61273c917a50ebc77b69676af96e,2025-01-14T18:15:29.883000 CVE-2025-0474,0,0,469f826f4845a259aa881ad42b8eacd95b41d69c527a4acd303e5e0c3ed0c4b7,2025-01-14T19:15:32.930000 CVE-2025-0480,0,0,e092b69b17ce664f29d203f06bde29cda1f01654d85548b205c10efb41a0322f,2025-01-15T18:15:24.457000 -CVE-2025-0481,1,1,6055fd3353d8c887f362d28d480da0be5338049d687506a3b52d8b7c0af28506,2025-01-15T19:15:26.807000 -CVE-2025-0482,1,1,33a8196ac8ac36ddbe2a7398445bed3b02991874b777e65dd0dad5a06fbd7f89,2025-01-15T20:15:28.863000 -CVE-2025-0483,1,1,893ed5987618ca7c97f5426c8951dfbe2ccc0e9df236c11015b7e50d0b363b68,2025-01-15T20:15:29.040000 -CVE-2025-0484,1,1,b013cc873755fa671111ee9676cdbc5d83472f586ce91385aff0b6bd336451f4,2025-01-15T20:15:29.227000 -CVE-2025-0485,1,1,f73ea3212d3f8bb57645a5a3186a67a483153769046e197e77cb0f8fbcca7e26,2025-01-15T20:15:29.400000 -CVE-2025-0500,1,1,7c3466d64b8c8ab9f735aa3c3f46ce64626b7310542fe424f3c28d5da1451b7e,2025-01-15T19:15:27.003000 -CVE-2025-0501,1,1,fbfcc714bfa842cdf14ebe8af7abc835756e267ba83725e6c74f3794f29c6547,2025-01-15T19:15:27.190000 +CVE-2025-0481,0,0,6055fd3353d8c887f362d28d480da0be5338049d687506a3b52d8b7c0af28506,2025-01-15T19:15:26.807000 +CVE-2025-0482,0,1,8b20e5aa158c38b38fb2c143fab4838c1b1e0b2fe8aa5513704bf8dee8f916b0,2025-01-15T21:15:14.653000 +CVE-2025-0483,0,0,893ed5987618ca7c97f5426c8951dfbe2ccc0e9df236c11015b7e50d0b363b68,2025-01-15T20:15:29.040000 +CVE-2025-0484,0,0,b013cc873755fa671111ee9676cdbc5d83472f586ce91385aff0b6bd336451f4,2025-01-15T20:15:29.227000 +CVE-2025-0485,0,0,f73ea3212d3f8bb57645a5a3186a67a483153769046e197e77cb0f8fbcca7e26,2025-01-15T20:15:29.400000 +CVE-2025-0486,1,1,46acd9214cd963a88ec9311c0e6dfcfe4a6ea1db37785856bda1f0ccaad6f2ca,2025-01-15T21:15:14.960000 +CVE-2025-0487,1,1,f254ff4eba12361ad33cafe695d950724dc64dda0c40f08cdaac336df89bb15b,2025-01-15T21:15:15.160000 +CVE-2025-0488,1,1,4f2575fa6aa0cf7363321d631c18e4f9ac623004f31f2ef8f8fa5a8c5d269f6a,2025-01-15T21:15:15.380000 +CVE-2025-0489,1,1,ad4e2da0114a89e77b7dea82312a8af94ea05d675feeb045e76378e98e362df3,2025-01-15T22:15:26.660000 +CVE-2025-0490,1,1,4875fbbfdfa23fa3ba99b879faaf8bd9ec6141b7db8e4bc5b2d2384256d9aba0,2025-01-15T22:15:26.820000 +CVE-2025-0491,1,1,e2c578f6867a872596ea91113158697f19532a63f0930ed0dee8793b679ca3c5,2025-01-15T22:15:26.990000 +CVE-2025-0492,1,1,8a17b017a98a002e0eca45e84c80fdbdf21fc23599e7b8c3264d472e99151077,2025-01-15T22:15:27.157000 +CVE-2025-0500,0,0,7c3466d64b8c8ab9f735aa3c3f46ce64626b7310542fe424f3c28d5da1451b7e,2025-01-15T19:15:27.003000 +CVE-2025-0501,0,0,fbfcc714bfa842cdf14ebe8af7abc835756e267ba83725e6c74f3794f29c6547,2025-01-15T19:15:27.190000 CVE-2025-0502,0,0,3f983c4e65bc0e78af8f9f866ec1bd6cbe586e74611a52dc0d65bfadf6586674,2025-01-15T18:15:24.650000 CVE-2025-20016,0,0,3fa4bc97a0a3d288bd5925fa89275b3fac40424bcf9581fb156684828af784ae,2025-01-14T10:15:07.500000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 @@ -277195,9 +277208,9 @@ CVE-2025-21329,0,0,e053eb234509e6346e777591f7eee67377618570069360bf34234fc39e023 CVE-2025-21330,0,0,80a4977dbce37c5d8567d0fe001790553daf1f6abc63cf234b438f7c67548e09,2025-01-14T18:15:57.940000 CVE-2025-21331,0,0,7a818162f8ba8eea8880d8fea97ae9fc902e5806f423695656c6540478d1c5e2,2025-01-14T18:15:58.120000 CVE-2025-21332,0,0,0076c5c8af7fbb5019d64b870d9a3205940a3532bd8cc68bd7aa25391ece3f70,2025-01-14T18:15:58.307000 -CVE-2025-21333,0,1,53b6f65b92792d651bc7343d317ec8018ad636151aaaa8a80fe15ca3226ca8e6,2025-01-15T20:57:37.467000 -CVE-2025-21334,0,1,fb3df3a0d1648467aa7e0321fb13275462a742bb7a179f1f294e1b9cdb3727fb,2025-01-15T20:10:39.600000 -CVE-2025-21335,0,1,9c773b3c3d2aec7a248b923a70e5a9419e37d3c58c810c23379a419aae9b4597,2025-01-15T20:24:16.867000 +CVE-2025-21333,0,0,53b6f65b92792d651bc7343d317ec8018ad636151aaaa8a80fe15ca3226ca8e6,2025-01-15T20:57:37.467000 +CVE-2025-21334,0,0,fb3df3a0d1648467aa7e0321fb13275462a742bb7a179f1f294e1b9cdb3727fb,2025-01-15T20:10:39.600000 +CVE-2025-21335,0,0,9c773b3c3d2aec7a248b923a70e5a9419e37d3c58c810c23379a419aae9b4597,2025-01-15T20:24:16.867000 CVE-2025-21336,0,0,0d7c814919cbeed2c3035babb3a91cbe14e7b415bb6bee2c1177f48fe0226072,2025-01-14T18:15:59.143000 CVE-2025-21338,0,0,829f1e0ae95ccccc175808a7477ceff41739f9dd91a35b6190dbced0f8367cc0,2025-01-14T18:15:59.300000 CVE-2025-21339,0,0,ba30d4d8ac9f6c58d3589ae53d1f775a6b9e449bd771cb2b76f26b86f2d7f769,2025-01-14T18:15:59.480000 @@ -277276,7 +277289,7 @@ CVE-2025-22142,0,0,9c88f0b148975f706930696ccbcc2dc52817d450ed0a7485308e47712b5ff CVE-2025-22143,0,0,535b34000993ab6e069ce70a88afd72eb8046a8f188d22ed6e3f4d9ac657466d,2025-01-08T20:15:30.003000 CVE-2025-22144,0,0,33e5ba813b6394d3c01915cfc0bd45d5cd56cbf4b2f6585093ffbfd1d00f9db3,2025-01-13T21:15:14.737000 CVE-2025-22145,0,0,88df2b27b4a7796924aa6277caf85bae572e95291858d2eee15b7f4eb271d86c,2025-01-08T21:15:13.480000 -CVE-2025-22146,1,1,1c93ec5b6025ff5a57e7775f48997be4b9eca8156fa69a81bbc621fcc7eea253,2025-01-15T20:15:30.557000 +CVE-2025-22146,0,0,1c93ec5b6025ff5a57e7775f48997be4b9eca8156fa69a81bbc621fcc7eea253,2025-01-15T20:15:30.557000 CVE-2025-22149,0,0,a38f1d25924ff640550a2206f96377b56b7eb734e7bb1771523eee3ff2dd77f7,2025-01-09T18:15:30.233000 CVE-2025-22151,0,0,21f9e4fddd90599ac45f0514a6d95c5510077d3d9b45eefd94598514744d82c1,2025-01-09T19:15:20.410000 CVE-2025-22152,0,0,f6e16a6363f55c864692fd37f669ef41501d91a264daf32f0f68d6d46b264ef9,2025-01-10T16:15:29.910000