From b8e02dcf26355d493093acfb6e9bd2ca320b10ce Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 24 Jan 2025 17:03:56 +0000 Subject: [PATCH] Auto-Update: 2025-01-24T17:00:32.072783+00:00 --- CVE-2020/CVE-2020-133xx/CVE-2020-13377.json | 32 ++- CVE-2020/CVE-2020-133xx/CVE-2020-13378.json | 32 ++- CVE-2021/CVE-2021-427xx/CVE-2021-42718.json | 45 +++- CVE-2021/CVE-2021-470xx/CVE-2021-47035.json | 11 +- CVE-2021/CVE-2021-473xx/CVE-2021-47315.json | 10 +- CVE-2021/CVE-2021-474xx/CVE-2021-47490.json | 32 +-- CVE-2022/CVE-2022-470xx/CVE-2022-47090.json | 41 ++- CVE-2022/CVE-2022-478xx/CVE-2022-47879.json | 32 ++- CVE-2022/CVE-2022-488xx/CVE-2022-48853.json | 9 +- CVE-2023/CVE-2023-207xx/CVE-2023-20719.json | 32 ++- CVE-2023/CVE-2023-207xx/CVE-2023-20720.json | 32 ++- CVE-2023/CVE-2023-207xx/CVE-2023-20721.json | 32 ++- CVE-2023/CVE-2023-207xx/CVE-2023-20726.json | 32 ++- CVE-2023/CVE-2023-20xx/CVE-2023-2088.json | 22 +- CVE-2023/CVE-2023-26xx/CVE-2023-2662.json | 32 ++- CVE-2023/CVE-2023-26xx/CVE-2023-2663.json | 32 ++- CVE-2023/CVE-2023-26xx/CVE-2023-2682.json | 34 ++- CVE-2023/CVE-2023-298xx/CVE-2023-29808.json | 32 ++- CVE-2023/CVE-2023-298xx/CVE-2023-29809.json | 32 ++- CVE-2023/CVE-2023-298xx/CVE-2023-29818.json | 32 ++- CVE-2023/CVE-2023-298xx/CVE-2023-29819.json | 32 ++- CVE-2023/CVE-2023-298xx/CVE-2023-29820.json | 32 ++- CVE-2023/CVE-2023-299xx/CVE-2023-29983.json | 32 ++- CVE-2023/CVE-2023-301xx/CVE-2023-30130.json | 32 ++- CVE-2023/CVE-2023-302xx/CVE-2023-30246.json | 32 ++- CVE-2023/CVE-2023-311xx/CVE-2023-31146.json | 32 ++- CVE-2023/CVE-2023-316xx/CVE-2023-31620.json | 32 ++- CVE-2023/CVE-2023-316xx/CVE-2023-31621.json | 32 ++- CVE-2023/CVE-2023-319xx/CVE-2023-31920.json | 32 ++- CVE-2023/CVE-2023-319xx/CVE-2023-31921.json | 32 ++- CVE-2023/CVE-2023-319xx/CVE-2023-31922.json | 32 ++- CVE-2023/CVE-2023-319xx/CVE-2023-31983.json | 32 ++- CVE-2023/CVE-2023-319xx/CVE-2023-31985.json | 32 ++- CVE-2023/CVE-2023-320xx/CVE-2023-32058.json | 32 ++- CVE-2023/CVE-2023-399xx/CVE-2023-39990.json | 52 +++- CVE-2024/CVE-2024-103xx/CVE-2024-10312.json | 44 +++- CVE-2024/CVE-2024-136xx/CVE-2024-13698.json | 60 +++++ CVE-2024/CVE-2024-16xx/CVE-2024-1633.json | 113 +++++++- CVE-2024/CVE-2024-236xx/CVE-2024-23607.json | 70 ++++- CVE-2024/CVE-2024-249xx/CVE-2024-24966.json | 68 ++++- CVE-2024/CVE-2024-249xx/CVE-2024-24989.json | 76 +++++- CVE-2024/CVE-2024-249xx/CVE-2024-24990.json | 88 ++++++- CVE-2024/CVE-2024-250xx/CVE-2024-25034.json | 56 ++++ CVE-2024/CVE-2024-25xx/CVE-2024-2503.json | 84 +++++- CVE-2024/CVE-2024-25xx/CVE-2024-2550.json | 229 ++++++++++++++++- CVE-2024/CVE-2024-25xx/CVE-2024-2551.json | 94 ++++++- CVE-2024/CVE-2024-25xx/CVE-2024-2552.json | 271 +++++++++++++++++++- CVE-2024/CVE-2024-268xx/CVE-2024-26885.json | 9 +- CVE-2024/CVE-2024-268xx/CVE-2024-26886.json | 10 +- CVE-2024/CVE-2024-268xx/CVE-2024-26889.json | 10 +- CVE-2024/CVE-2024-269xx/CVE-2024-26920.json | 34 +-- CVE-2024/CVE-2024-270xx/CVE-2024-27022.json | 24 +- CVE-2024/CVE-2024-281xx/CVE-2024-28192.json | 64 ++++- CVE-2024/CVE-2024-289xx/CVE-2024-28951.json | 61 ++++- CVE-2024/CVE-2024-290xx/CVE-2024-29006.json | 65 ++++- CVE-2024/CVE-2024-298xx/CVE-2024-29834.json | 105 +++++++- CVE-2024/CVE-2024-310xx/CVE-2024-31079.json | 138 +++++++++- CVE-2024/CVE-2024-31xx/CVE-2024-3131.json | 81 +++++- CVE-2024/CVE-2024-31xx/CVE-2024-3139.json | 91 ++++++- CVE-2024/CVE-2024-31xx/CVE-2024-3140.json | 81 +++++- CVE-2024/CVE-2024-327xx/CVE-2024-32760.json | 138 +++++++++- CVE-2024/CVE-2024-32xx/CVE-2024-3251.json | 81 +++++- CVE-2024/CVE-2024-33xx/CVE-2024-3383.json | 77 +++++- CVE-2024/CVE-2024-33xx/CVE-2024-3384.json | 89 ++++++- CVE-2024/CVE-2024-33xx/CVE-2024-3385.json | 143 ++++++++++- CVE-2024/CVE-2024-33xx/CVE-2024-3386.json | 128 ++++++++- CVE-2024/CVE-2024-33xx/CVE-2024-3388.json | 152 ++++++++++- CVE-2024/CVE-2024-341xx/CVE-2024-34161.json | 138 +++++++++- CVE-2024/CVE-2024-352xx/CVE-2024-35200.json | 138 +++++++++- CVE-2024/CVE-2024-359xx/CVE-2024-35995.json | 10 +- CVE-2024/CVE-2024-406xx/CVE-2024-40693.json | 56 ++++ CVE-2024/CVE-2024-407xx/CVE-2024-40706.json | 56 ++++ CVE-2024/CVE-2024-417xx/CVE-2024-41757.json | 56 ++++ CVE-2024/CVE-2024-420xx/CVE-2024-42067.json | 16 +- CVE-2024/CVE-2024-420xx/CVE-2024-42068.json | 16 +- CVE-2024/CVE-2024-449xx/CVE-2024-44949.json | 10 +- CVE-2024/CVE-2024-450xx/CVE-2024-45077.json | 56 ++++ CVE-2024/CVE-2024-46xx/CVE-2024-4618.json | 94 ++++++- CVE-2024/CVE-2024-476xx/CVE-2024-47683.json | 23 +- CVE-2024/CVE-2024-499xx/CVE-2024-49926.json | 10 +- CVE-2024/CVE-2024-500xx/CVE-2024-50010.json | 13 +- CVE-2024/CVE-2024-502xx/CVE-2024-50282.json | 32 +-- CVE-2024/CVE-2024-571xx/CVE-2024-57184.json | 41 ++- CVE-2024/CVE-2024-59xx/CVE-2024-5913.json | 96 ++++++- CVE-2024/CVE-2024-59xx/CVE-2024-5917.json | 67 ++++- CVE-2024/CVE-2024-59xx/CVE-2024-5919.json | 74 +++++- CVE-2024/CVE-2024-59xx/CVE-2024-5920.json | 81 +++++- CVE-2024/CVE-2024-76xx/CVE-2024-7634.json | 65 ++++- CVE-2024/CVE-2024-94xx/CVE-2024-9490.json | 56 ++++ CVE-2024/CVE-2024-94xx/CVE-2024-9491.json | 56 ++++ CVE-2024/CVE-2024-94xx/CVE-2024-9492.json | 56 ++++ CVE-2024/CVE-2024-94xx/CVE-2024-9493.json | 56 ++++ CVE-2024/CVE-2024-94xx/CVE-2024-9494.json | 56 ++++ CVE-2024/CVE-2024-94xx/CVE-2024-9495.json | 56 ++++ CVE-2024/CVE-2024-94xx/CVE-2024-9496.json | 86 +++++++ CVE-2024/CVE-2024-94xx/CVE-2024-9497.json | 86 +++++++ CVE-2024/CVE-2024-94xx/CVE-2024-9498.json | 86 +++++++ CVE-2024/CVE-2024-94xx/CVE-2024-9499.json | 86 +++++++ CVE-2025/CVE-2025-06xx/CVE-2025-0697.json | 141 ++++++++++ CVE-2025/CVE-2025-06xx/CVE-2025-0698.json | 145 +++++++++++ CVE-2025/CVE-2025-06xx/CVE-2025-0699.json | 145 +++++++++++ CVE-2025/CVE-2025-216xx/CVE-2025-21654.json | 10 +- CVE-2025/CVE-2025-226xx/CVE-2025-22605.json | 94 +++++++ CVE-2025/CVE-2025-226xx/CVE-2025-22606.json | 78 ++++++ CVE-2025/CVE-2025-226xx/CVE-2025-22607.json | 82 ++++++ CVE-2025/CVE-2025-239xx/CVE-2025-23991.json | 56 ++++ README.md | 70 +++-- _state.csv | 209 ++++++++------- 108 files changed, 6167 insertions(+), 613 deletions(-) create mode 100644 CVE-2024/CVE-2024-136xx/CVE-2024-13698.json create mode 100644 CVE-2024/CVE-2024-250xx/CVE-2024-25034.json create mode 100644 CVE-2024/CVE-2024-406xx/CVE-2024-40693.json create mode 100644 CVE-2024/CVE-2024-407xx/CVE-2024-40706.json create mode 100644 CVE-2024/CVE-2024-417xx/CVE-2024-41757.json create mode 100644 CVE-2024/CVE-2024-450xx/CVE-2024-45077.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9490.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9491.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9492.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9493.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9494.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9495.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9496.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9497.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9498.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9499.json create mode 100644 CVE-2025/CVE-2025-06xx/CVE-2025-0697.json create mode 100644 CVE-2025/CVE-2025-06xx/CVE-2025-0698.json create mode 100644 CVE-2025/CVE-2025-06xx/CVE-2025-0699.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22605.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22606.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22607.json create mode 100644 CVE-2025/CVE-2025-239xx/CVE-2025-23991.json diff --git a/CVE-2020/CVE-2020-133xx/CVE-2020-13377.json b/CVE-2020/CVE-2020-133xx/CVE-2020-13377.json index 9b3d7859bcd..b1bd2b9d8ad 100644 --- a/CVE-2020/CVE-2020-133xx/CVE-2020-13377.json +++ b/CVE-2020/CVE-2020-133xx/CVE-2020-13377.json @@ -2,7 +2,7 @@ "id": "CVE-2020-13377", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T11:15:12.560", - "lastModified": "2024-11-21T05:01:07.813", + "lastModified": "2025-01-24T16:15:27.070", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-133xx/CVE-2020-13378.json b/CVE-2020/CVE-2020-133xx/CVE-2020-13378.json index 67fa07006e4..bdf51344463 100644 --- a/CVE-2020/CVE-2020-133xx/CVE-2020-13378.json +++ b/CVE-2020/CVE-2020-133xx/CVE-2020-13378.json @@ -2,7 +2,7 @@ "id": "CVE-2020-13378", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T01:15:09.023", - "lastModified": "2024-11-21T05:01:07.997", + "lastModified": "2025-01-24T16:15:27.830", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-427xx/CVE-2021-42718.json b/CVE-2021/CVE-2021-427xx/CVE-2021-42718.json index 04f98ab03ed..3f40c1e3331 100644 --- a/CVE-2021/CVE-2021-427xx/CVE-2021-42718.json +++ b/CVE-2021/CVE-2021-427xx/CVE-2021-42718.json @@ -2,16 +2,55 @@ "id": "CVE-2021-42718", "sourceIdentifier": "security@replicated.com", "published": "2025-01-23T23:15:07.717", - "lastModified": "2025-01-23T23:15:07.717", - "vulnStatus": "Received", + "lastModified": "2025-01-24T15:15:08.273", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information Disclosure in API in Replicated Replicated Classic versions prior to 2.53.1 on all platforms allows authenticated users with Admin Console access to retrieve sensitive data, including application secrets, via accessing container definitions with environment variables through the Admin Console API on port 8800.\n\nThis CVE was originally reserved in 2021 and later publicly disclosed by Replicated on their website on 21 October 2021. However, it mistakenly remained in the Reserved But Public (RBP) status with the CVE Numbering Authority (CNA). Please note that this product reached its end of life on 31 December 2024. Publishing this CVE with the CNA was required to comply with CNA rules, despite the fact that the issue was disclosed and fixed four years ago, and the affected product is no longer supported as of 2024.\n\nSummary of VulnerabilityThis advisory discloses a low severity security vulnerability in the versions of Replicated Classic listed above (\u201cAffected Replicated Classic Versions\u201d)\n\nDescriptionReplicated Classic versions prior to 2.53.1 have an authenticated API from the Replicated Admin Console that may expose sensitive data including application secrets, depending on how the application manifests are written. A user with valid credentials and access to the Admin Console port (8800) on the Replicated Classic server can retrieve container definitions including environment variables which may contain passwords and other secrets depending on how the application is configured.\n\nThis data is shared over authenticated sessions to the Admin Console only, and was never displayed or used in the application processing. To remediate this issue, we removed the sensitive data from the API, sending only the data to the Admin Console that was needed.\n\nTimelineThis issue was discovered during a security review on 16 September 2021.\nPatched versions were released on 23 September 2021.\nThis advisory was published on 21 October 2021.\n\n\nThe CVE Numbering Authority (CNA) notified Replicated on 23 January 2025 that the CVE was still in Reserved But Public (RBP) status. Upon discovering the oversight in updating the status to published with the CNA, Replicated submitted the updated report on the same day, 23 January 2025." + }, + { + "lang": "es", + "value": "Divulgaci\u00f3n de informaci\u00f3n en la API en Replicated Las versiones cl\u00e1sicas de Replicated anteriores a la 2.53.1 en todas las plataformas permiten a los usuarios autenticados con acceso a la Consola de administraci\u00f3n recuperar datos confidenciales, incluidos los secretos de la aplicaci\u00f3n, mediante el acceso a las definiciones de contenedor con variables de entorno a trav\u00e9s de la API de la Consola de administraci\u00f3n en el puerto 8800. Esta CVE se reserv\u00f3 originalmente en 2021 y luego Replicated la divulg\u00f3 p\u00fablicamente en su sitio web el 21 de octubre de 2021. Sin embargo, permaneci\u00f3 por error en el estado Reservado pero p\u00fablico (RBP) con la Autoridad de numeraci\u00f3n de CVE (CNA). Tenga en cuenta que este producto lleg\u00f3 al final de su vida \u00fatil el 31 de diciembre de 2024. La publicaci\u00f3n de este CVE con la CNA fue necesaria para cumplir con las reglas de la CNA, a pesar del hecho de que el problema se divulg\u00f3 y solucion\u00f3 hace cuatro a\u00f1os, y el producto afectado ya no recibe soporte a partir de 2024. Resumen de la vulnerabilidadEste aviso revela una vulnerabilidad de seguridad de baja gravedad en las versiones de Replicated Classic enumeradas anteriormente (\"Versiones de Replicated Classic afectadas\") Descripci\u00f3nLas versiones de Replicated Classic anteriores a 2.53.1 tienen una API autenticada de la Consola de administraci\u00f3n de Replicated que puede exponer datos confidenciales, incluidos secretos de la aplicaci\u00f3n, seg\u00fan c\u00f3mo se escriban los manifiestos de la aplicaci\u00f3n. Un usuario con credenciales v\u00e1lidas y acceso al puerto de la Consola de administraci\u00f3n (8800) en el servidor de Replicated Classic puede recuperar definiciones de contenedor, incluidas variables de entorno que pueden contener contrase\u00f1as y otros secretos seg\u00fan c\u00f3mo est\u00e9 configurada la aplicaci\u00f3n. Estos datos se comparten a trav\u00e9s de sesiones autenticadas solo con la Consola de administraci\u00f3n, y nunca se mostraron ni se usaron en el procesamiento de la aplicaci\u00f3n. Para solucionar este problema, eliminamos los datos confidenciales de la API y enviamos solo los datos necesarios a la consola de administraci\u00f3n. Cronolog\u00edaEste problema se descubri\u00f3 durante una revisi\u00f3n de seguridad el 16 de septiembre de 2021. Las versiones parcheadas se publicaron el 23 de septiembre de 2021. Este aviso se public\u00f3 el 21 de octubre de 2021. La autoridad de numeraci\u00f3n de CVE (CNA) notific\u00f3 a Replicated el 23 de enero de 2025 que la CVE todav\u00eda estaba en estado de reservada pero p\u00fablica (RBP). Al descubrir el descuido al actualizar el estado a publicado con la CNA, Replicated envi\u00f3 el informe actualizado el mismo d\u00eda, 23 de enero de 2025." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.replicated.com/cve-2021-42718", diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47035.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47035.json index 72a034da276..e6345ed70d6 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47035.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47035.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47035", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-28T09:15:39.757", - "lastModified": "2025-01-09T15:15:16.310", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-24T16:15:28.167", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -106,13 +106,6 @@ "Patch" ] }, - { - "url": "https://git.kernel.org/stable/c/c848416cc05afc1589edba04fe00b85c2f797ee3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, { "url": "https://git.kernel.org/stable/c/eea53c5816889ee8b64544fa2e9311a81184ff9c", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47315.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47315.json index e062de9ffbd..ff1ee8cd9c0 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47315.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47315.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47315", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:18.860", - "lastModified": "2024-11-21T06:35:51.877", + "lastModified": "2025-01-24T16:15:28.320", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -41,14 +41,6 @@ "url": "https://git.kernel.org/stable/c/94bc2fe46102d1e060fc749c0c19511e76c9995f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, - { - "url": "https://git.kernel.org/stable/c/b7a2bcb4a3731d68f938207f75ed3e1d41774510", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/bd051b3e184fa56eeb6276ee913ba4d48069024b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, { "url": "https://git.kernel.org/stable/c/d0d04b95e8ed0223844a1d58497c686fe2e4a955", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2021/CVE-2021-474xx/CVE-2021-47490.json b/CVE-2021/CVE-2021-474xx/CVE-2021-47490.json index a96c629da1d..ca66ca75fb0 100644 --- a/CVE-2021/CVE-2021-474xx/CVE-2021-47490.json +++ b/CVE-2021/CVE-2021-474xx/CVE-2021-47490.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47490", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-22T09:15:10.837", - "lastModified": "2025-01-06T19:57:02.840", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-24T16:15:28.487", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -133,34 +133,6 @@ "Patch" ] }, - { - "url": "https://git.kernel.org/stable/c/960b1fdfc39aba8f41e9e27b2de0c925c74182d9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/bbc920fb320f1c241cc34ac85edaa0058922246a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/bd99782f3ca491879e8524c89b1c0f40071903bd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/c21b4002214c1c7e7b627b9b53375612f7aab6db", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, { "url": "https://git.kernel.org/stable/c/0db55f9a1bafbe3dac750ea669de9134922389b5", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2022/CVE-2022-470xx/CVE-2022-47090.json b/CVE-2022/CVE-2022-470xx/CVE-2022-47090.json index e2497d7d500..30e291fdaef 100644 --- a/CVE-2022/CVE-2022-470xx/CVE-2022-47090.json +++ b/CVE-2022/CVE-2022-470xx/CVE-2022-47090.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47090", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-24T14:15:29.983", - "lastModified": "2025-01-24T14:15:29.983", - "vulnStatus": "Received", + "lastModified": "2025-01-24T15:15:09.350", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "GPAC MP4box 2.1-DEV-rev574-g9d5bb184b contains a buffer overflow in gf_vvc_read_pps_bs_internal function of media_tools/av_parsers.c, check needed for num_exp_tile_columns" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/gpac/gpac/commit/48760768611f6766bf9e7378bb7cc66cebd6e49d", diff --git a/CVE-2022/CVE-2022-478xx/CVE-2022-47879.json b/CVE-2022/CVE-2022-478xx/CVE-2022-47879.json index 671df92fc96..996f6b125a0 100644 --- a/CVE-2022/CVE-2022-478xx/CVE-2022-47879.json +++ b/CVE-2022/CVE-2022-478xx/CVE-2022-47879.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47879", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T14:15:09.567", - "lastModified": "2024-11-21T07:32:27.340", + "lastModified": "2025-01-24T16:15:28.653", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48853.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48853.json index 57cb932cfa1..9bb65b3a545 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48853.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48853.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48853", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-16T13:15:12.380", - "lastModified": "2024-11-21T07:34:12.970", + "lastModified": "2025-01-24T16:15:28.903", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -154,13 +154,6 @@ "Patch" ] }, - { - "url": "https://git.kernel.org/stable/c/d4d975e7921079f877f828099bb8260af335508f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, { "url": "https://git.kernel.org/stable/c/ddbd89deb7d32b1fbb879f48d68fda1a8ac58e8e", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20719.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20719.json index ed9a495dfad..baae55655d5 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20719.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20719.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20719", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.273", - "lastModified": "2024-11-21T07:41:24.780", + "lastModified": "2025-01-24T16:15:29.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20720.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20720.json index 4ba62faf7c4..8a03bce4fad 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20720.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20720.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20720", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.313", - "lastModified": "2024-11-21T07:41:24.890", + "lastModified": "2025-01-24T15:15:09.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20721.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20721.json index a7a52d41563..cdd5cab4c69 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20721.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20721.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20721", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.350", - "lastModified": "2024-11-21T07:41:24.990", + "lastModified": "2025-01-24T15:15:09.697", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20726.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20726.json index 098c92055b8..2751a2f52ac 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20726.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20726.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20726", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.433", - "lastModified": "2024-11-21T07:41:25.530", + "lastModified": "2025-01-24T15:15:09.850", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2088.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2088.json index a43f86488f3..0327246c658 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2088.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2088.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2088", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-12T21:15:09.430", - "lastModified": "2024-11-21T07:57:54.757", + "lastModified": "2025-01-24T16:15:31.020", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2662.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2662.json index bd4e663011a..557db09076c 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2662.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2662.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2662", "sourceIdentifier": "xpdf@xpdfreader.com", "published": "2023-05-11T21:15:09.873", - "lastModified": "2024-11-21T07:59:01.810", + "lastModified": "2025-01-24T16:15:31.363", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,6 +52,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -75,6 +95,16 @@ "value": "CWE-369" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-369" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2663.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2663.json index ca8fed532f3..6ebf66e3cc2 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2663.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2663.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2663", "sourceIdentifier": "xpdf@xpdfreader.com", "published": "2023-05-11T21:15:10.043", - "lastModified": "2024-11-21T07:59:01.930", + "lastModified": "2025-01-24T16:15:31.577", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,6 +52,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -75,6 +95,16 @@ "value": "CWE-674" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-674" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2682.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2682.json index 1b9153ae28f..7238d2b7f5e 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2682.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2682.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2682", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-12T13:15:09.477", - "lastModified": "2024-11-21T07:59:04.553", + "lastModified": "2025-01-24T16:15:31.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -35,6 +35,26 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "cvssData": { "version": "3.1", @@ -90,6 +110,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29808.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29808.json index 72283849185..d83b5c08b50 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29808.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29808.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29808", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T01:15:09.707", - "lastModified": "2024-11-21T07:57:32.400", + "lastModified": "2025-01-24T16:15:29.357", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29809.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29809.json index 947bb6d7409..2f69a03a7a2 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29809.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29809.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29809", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T01:15:09.743", - "lastModified": "2024-11-21T07:57:32.547", + "lastModified": "2025-01-24T16:15:29.680", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29818.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29818.json index 3608d882072..b4480bc5259 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29818.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29818.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29818", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T11:15:12.887", - "lastModified": "2024-11-21T07:57:32.827", + "lastModified": "2025-01-24T16:15:29.943", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29819.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29819.json index 64a38cd316b..3933085e945 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29819.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29819.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29819", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T11:15:12.923", - "lastModified": "2024-11-21T07:57:32.987", + "lastModified": "2025-01-24T16:15:30.210", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29820.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29820.json index 03ddeb342df..24ad3577ffd 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29820.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29820.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29820", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T11:15:12.960", - "lastModified": "2024-11-21T07:57:33.133", + "lastModified": "2025-01-24T16:15:30.470", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -52,6 +72,16 @@ "value": "CWE-668" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29983.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29983.json index a453a1a4ace..50eb9d26baf 100644 --- a/CVE-2023/CVE-2023-299xx/CVE-2023-29983.json +++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29983.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29983", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T11:15:12.997", - "lastModified": "2024-11-21T07:57:43.140", + "lastModified": "2025-01-24T16:15:30.773", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30130.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30130.json index a28db811c32..f89973a6440 100644 --- a/CVE-2023/CVE-2023-301xx/CVE-2023-30130.json +++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30130.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30130", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T11:15:13.097", - "lastModified": "2024-11-21T07:59:49.403", + "lastModified": "2025-01-24T16:15:32.220", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-302xx/CVE-2023-30246.json b/CVE-2023/CVE-2023-302xx/CVE-2023-30246.json index b29d9fd3b7a..d60b0ea81dc 100644 --- a/CVE-2023/CVE-2023-302xx/CVE-2023-30246.json +++ b/CVE-2023/CVE-2023-302xx/CVE-2023-30246.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30246", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T11:15:13.133", - "lastModified": "2024-11-21T07:59:56.270", + "lastModified": "2025-01-24T16:15:32.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31146.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31146.json index 778cab6eac2..4a80e537c6f 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31146.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31146.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31146", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-11T21:15:10.240", - "lastModified": "2024-11-21T08:01:29.300", + "lastModified": "2025-01-24T16:15:32.803", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,6 +52,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -65,6 +85,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31620.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31620.json index bdd76b924c6..f783bf73f56 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31620.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31620.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31620", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.237", - "lastModified": "2024-11-21T08:02:06.120", + "lastModified": "2025-01-24T15:15:10.067", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31621.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31621.json index d12cdc05954..5d301a1e80e 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31621.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31621.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31621", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.300", - "lastModified": "2024-11-21T08:02:06.273", + "lastModified": "2025-01-24T15:15:10.273", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31920.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31920.json index 7f453d2cb5e..510a8ac518c 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31920.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31920.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31920", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T14:15:09.963", - "lastModified": "2024-11-21T08:02:23.767", + "lastModified": "2025-01-24T16:15:33.003", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-617" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31921.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31921.json index e053bcf5151..c9222ba1952 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31921.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31921.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31921", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T14:15:10.007", - "lastModified": "2024-11-21T08:02:23.900", + "lastModified": "2025-01-24T16:15:33.267", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-617" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31922.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31922.json index a48b12785e8..b9becf6d683 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31922.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31922.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31922", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T14:15:10.043", - "lastModified": "2024-11-21T08:02:24.040", + "lastModified": "2025-01-24T16:15:33.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31983.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31983.json index a91c38722f3..e7c3634e02b 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31983.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31983.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31983", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T16:15:09.820", - "lastModified": "2024-11-21T08:02:28.327", + "lastModified": "2025-01-24T16:15:33.787", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31985.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31985.json index bc409127c43..b58a6bec363 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31985.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31985.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31985", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T12:15:09.800", - "lastModified": "2024-11-21T08:02:28.473", + "lastModified": "2025-01-24T16:15:34.033", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32058.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32058.json index 40e460ecdba..824eaf90ba4 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32058.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32058.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32058", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-11T21:15:10.397", - "lastModified": "2024-11-21T08:02:37.770", + "lastModified": "2025-01-24T16:15:34.267", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,6 +52,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -65,6 +85,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39990.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39990.json index c2bf04ccece..26ce56b205e 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39990.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39990.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39990", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-19T13:15:54.157", - "lastModified": "2024-11-21T08:16:11.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:08:44.243", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:strangerstudios:paid_memberships_pro:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.4", + "matchCriteriaId": "8D13C3B1-7E06-46A9-87E3-8C477FB7895A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/pmpro-courses/wordpress-paid-memberships-pro-courses-for-membership-add-on-plugin-1-2-3-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/pmpro-courses/wordpress-paid-memberships-pro-courses-for-membership-add-on-plugin-1-2-3-broken-access-control-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10312.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10312.json index 73ba090d72b..e894e773ac6 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10312.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10312.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10312", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-29T08:15:12.330", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:38:39.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,23 +42,57 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:exclusiveaddons:exclusive_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.7.5", + "matchCriteriaId": "0CF78C76-F4D7-4FE7-B637-D058F4620C3E" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3175285/exclusive-addons-for-elementor", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dc931943-13f3-4ab1-b70f-c234253ca269?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13698.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13698.json new file mode 100644 index 00000000000..64b62e5fcaa --- /dev/null +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13698.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-13698", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-01-24T16:15:34.597", + "lastModified": "2025-01-24T16:15:34.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Jobify - Job Board WordPress Theme for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the 'download_image_via_ai' and 'generate_image_via_ai' functions in all versions up to, and including, 4.2.7. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application to upload files in an image format, and to generate AI images using the site's OpenAI key." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://themeforest.net/item/jobify-wordpress-job-board-theme/5247604", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/393811e4-71dd-4359-80fa-5a3d146439bb?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1633.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1633.json index e32b7e35688..3454115d2e7 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1633.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1633.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1633", "sourceIdentifier": "cve@asrg.io", "published": "2024-02-19T17:15:08.347", - "lastModified": "2024-11-21T08:50:58.023", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T15:21:06.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.5, + "impactScore": 1.4 } ] }, @@ -49,16 +69,101 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:renesas:arm-trusted-firmware:rcar_gen3_2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "A34F3FE3-C1EE-4C6B-8323-D82590784CA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:renesas:r-car_d3e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B20C33B-DBE7-41B5-8934-A457D0406247" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:renesas:r-car_e3e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BB57A69-E624-4CE6-B3BE-3095DD52DF21" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:renesas:r-car_h3e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16309BD2-C8EE-49BE-9C0E-6785AD5B5AE8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:renesas:r-car_h3ne:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AA982FE-883B-488E-8C33-956FFEE78124" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:renesas:r-car_m3e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E5C59110-27F5-4D0D-83D1-293A154CEC54" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:renesas:r-car_m3ne:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B33C8369-B9E4-47E2-AA28-64E320B88E3E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:renesas:r-car_v3h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4E89977-FF22-49AD-A250-A5259BCF2899" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:renesas:r-car_v3h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D4041BE-312D-4BEE-85A6-09B8BD71627D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:renesas:r-car_v3m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5EBC200B-D7C2-4075-92EC-A508A11F1379" + } + ] + } + ] } ], "references": [ { "url": "https://asrg.io/security-advisories/CVE-2024-1633/", - "source": "cve@asrg.io" + "source": "cve@asrg.io", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://asrg.io/security-advisories/CVE-2024-1633/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23607.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23607.json index 4dded7cf880..561f6f36e80 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23607.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23607.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23607", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-02-14T17:15:13.857", - "lastModified": "2024-11-21T08:57:59.680", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:03:56.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,58 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:f5:f5os-a:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.3.0", + "versionEndExcluding": "1.4.0", + "matchCriteriaId": "B177AF06-AD07-4659-8A64-F2E36BC79B22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:f5:f5os-c:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.3.0", + "versionEndExcluding": "1.6.0", + "matchCriteriaId": "E0D3FD97-C360-447E-8974-CE1A85D1D720" + } + ] + } + ] } ], "references": [ { "url": "https://my.f5.com/manage/s/article/K000132800", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://my.f5.com/manage/s/article/K000132800", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24966.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24966.json index fe7f560b803..21269ddd32e 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24966.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24966.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24966", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-02-14T17:15:15.213", - "lastModified": "2024-11-21T09:00:03.660", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:03:35.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,56 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:f5:f5os-a:1.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "84917001-4C06-4F16-9765-DB9989232446" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:f5:f5os-c:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.3.0", + "versionEndExcluding": "1.6.0", + "matchCriteriaId": "E0D3FD97-C360-447E-8974-CE1A85D1D720" + } + ] + } + ] } ], "references": [ { "url": "https://my.f5.com/manage/s/article/K000133111", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://my.f5.com/manage/s/article/K000133111", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24989.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24989.json index 3636c06174b..2f8afda2838 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24989.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24989.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24989", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-02-14T17:15:15.513", - "lastModified": "2024-11-21T09:00:05.640", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:02:33.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,24 +69,68 @@ "value": "CWE-476" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_open_source:1.25.3:*:*:*:*:*:*:*", + "matchCriteriaId": "1C76731D-187B-4EB2-90C0-54B0507F6C96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r31:-:*:*:*:*:*:*", + "matchCriteriaId": "8248517E-D805-4928-8252-2168472341EF" + } + ] + } + ] } ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/30/4", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://my.f5.com/manage/s/article/K000138444", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/30/4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://my.f5.com/manage/s/article/K000138444", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24990.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24990.json index d32f24bf87d..31445f39001 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24990.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24990.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24990", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-02-14T17:15:15.713", - "lastModified": "2024-11-21T09:00:05.750", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:01:36.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,24 +69,80 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.25.0", + "versionEndExcluding": "1.25.4", + "matchCriteriaId": "7F1D106D-58A7-4CF4-95CD-5B36A8D54F2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*", + "matchCriteriaId": "96BF2B19-52C7-4051-BA58-CAE6F912B72F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r30:p1:*:*:*:*:*:*", + "matchCriteriaId": "4EBEC829-7EED-487E-974D-BBA704DFBF0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r31:-:*:*:*:*:*:*", + "matchCriteriaId": "8248517E-D805-4928-8252-2168472341EF" + } + ] + } + ] } ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/30/4", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://my.f5.com/manage/s/article/K000138445", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/30/4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://my.f5.com/manage/s/article/K000138445", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25034.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25034.json new file mode 100644 index 00000000000..b6043074e5e --- /dev/null +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25034.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-25034", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-24T16:15:34.747", + "lastModified": "2025-01-24T16:15:34.747", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Planning Analytics 2.0 and 2.1 could be vulnerable to malicious file upload by not validating the type of file in the File Manager T1 process. Attackers can make use of this weakness and upload malicious executable files into the system that can be sent to victims for performing further attacks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7168387", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2503.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2503.json index be3f5a37061..16a67c6d13d 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2503.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2503.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2503", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:17.810", - "lastModified": "2024-11-21T09:09:53.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:37:14.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:exclusiveaddons:exclusive_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.6.9.3", + "matchCriteriaId": "03EFE00F-283B-4081-8E6D-65BDFE7BC17E" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/exclusive-addons-for-elementor/tags/2.6.9.1/includes/template-parts/tmpl-post-grid.php#L103", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3065677%40exclusive-addons-for-elementor%2Ftrunk&old=3051927%40exclusive-addons-for-elementor%2Ftrunk&sfp_email=&sfph_mail=#file51", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2bd53172-ddfa-481a-818d-626b9db6fe41?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/exclusive-addons-for-elementor/tags/2.6.9.1/includes/template-parts/tmpl-post-grid.php#L103", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3065677%40exclusive-addons-for-elementor%2Ftrunk&old=3051927%40exclusive-addons-for-elementor%2Ftrunk&sfp_email=&sfph_mail=#file51", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2bd53172-ddfa-481a-818d-626b9db6fe41?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2550.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2550.json index 32b9fed5691..18c9bc90b5a 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2550.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2550.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2550", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:04.137", - "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:02:49.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "AMBER" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -71,12 +93,213 @@ "value": "CWE-476" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.2.0", + "versionEndExcluding": "10.2.7", + "matchCriteriaId": "243077CD-5021-4DF3-8AC7-5B14F7FD9710" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndExcluding": "11.0.6", + "matchCriteriaId": "47CBEECE-EA41-4A58-8AE9-D695C76D4019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.1.0", + "versionEndExcluding": "11.1.4", + "matchCriteriaId": "459485B4-47FF-4A5F-9249-AE0445A0096A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*", + "matchCriteriaId": "B3AAD4BA-22DD-43D3-91F1-8A6F5FBBF029" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*", + "matchCriteriaId": "AA4994CB-6591-4B44-A5D7-3CDF540B97DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*", + "matchCriteriaId": "A6AB7874-FE24-42AC-8E3A-822A70722126" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h18:*:*:*:*:*:*", + "matchCriteriaId": "34B083B9-CC1B-43CD-9A16-C018F7FA2DDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h19:*:*:*:*:*:*", + "matchCriteriaId": "0D88CC33-7E32-4E82-8A94-70759E910510" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*", + "matchCriteriaId": "776E06EC-2FDA-4664-AB43-9F6BE9B897CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*", + "matchCriteriaId": "CBE09375-A863-42FF-813F-C20679D7C45C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*", + "matchCriteriaId": "1311961A-0EF6-488E-B0C2-EDBD508587C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*", + "matchCriteriaId": "5D64390F-F870-4DBF-B0FE-BCDFE58C8685" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*", + "matchCriteriaId": "F70FC9DF-10C9-4AE5-B64B-3153E2E4E9E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*", + "matchCriteriaId": "C3D6D552-6F33-496A-A505-5F59DF3B487B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*", + "matchCriteriaId": "D1ECD1DC-5A05-4E4F-97F5-136CE777FAB3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*", + "matchCriteriaId": "CBA2B4FA-16C2-41B9-856D-EDC0CAF7A164" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*", + "matchCriteriaId": "E5E6A893-2994-40A3-AF35-8AF068B0DE42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*", + "matchCriteriaId": "D814F3A3-5E9D-426D-A654-1346D9ECE9B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*", + "matchCriteriaId": "8C7E9211-7041-4720-B4B9-3EA95D425263" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*", + "matchCriteriaId": "CEB258EE-2C6E-4A63-B04C-89C5F76B0878" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*", + "matchCriteriaId": "0F481B0E-2353-4AB0-8A98-B0EFBC409868" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h16:*:*:*:*:*:*", + "matchCriteriaId": "3F7FC771-527F-4619-B785-6AE1F4722074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*", + "matchCriteriaId": "4E9EB9C6-78BA-4C66-A4BD-856BF27388CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*", + "matchCriteriaId": "03C5ABF2-8C53-4376-8A64-6CB34E18E77C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*", + "matchCriteriaId": "872BC747-512A-4872-AC86-E7F1DC589F47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*", + "matchCriteriaId": "67F527D0-F85B-4B83-AEA5-BA636FC89210" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*", + "matchCriteriaId": "6CF8F985-7E51-49E6-857A-FAAF027F5611" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*", + "matchCriteriaId": "B437DCEA-ABA3-41CA-B320-97EC430F1122" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*", + "matchCriteriaId": "593AFE7A-CB37-4156-A2B8-646A317F3176" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h9:*:*:*:*:*:*", + "matchCriteriaId": "A9F032C2-3202-479B-8C70-277F6871A4A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:*", + "matchCriteriaId": "DF83EAA1-49E1-4AD0-A049-F1B3065950BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1:*:*:*:*:*:*", + "matchCriteriaId": "BE3F7369-9F35-409A-9F47-45A959592DFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4:*:*:*:*:*:*", + "matchCriteriaId": "E9DB4DA9-2262-4E9E-B3A1-49D261D01295" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h7:*:*:*:*:*:*", + "matchCriteriaId": "4852E738-990C-4DD2-8252-D4625D843A99" + } + ] + } + ] } ], "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2024-2550", - "source": "psirt@paloaltonetworks.com" + "source": "psirt@paloaltonetworks.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2551.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2551.json index c3b43555b8f..0c7e2427229 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2551.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2551.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2551", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:04.547", - "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:03:41.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "AMBER" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -71,12 +93,78 @@ "value": "CWE-476" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.1.0", + "versionEndExcluding": "10.1.14", + "matchCriteriaId": "19D52DC1-4441-4C88-B209-9B86FCC2162F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.2.0", + "versionEndExcluding": "10.2.4", + "matchCriteriaId": "D61F01F8-1598-4078-9D98-BFF5B62F3BA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndExcluding": "11.0.5", + "matchCriteriaId": "06B9F11D-D5EF-487A-8E43-9AE14307CCE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*", + "matchCriteriaId": "135588B5-6771-46A3-98B0-39B4873FD6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*", + "matchCriteriaId": "20673F1E-733D-41C4-A644-C482431C26EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*", + "matchCriteriaId": "156DA55E-4152-47BF-A067-136EEC9ADE22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*", + "matchCriteriaId": "C2D2F5C4-7ACC-4514-ADBD-3948158B93CC" + } + ] + } + ] } ], "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2024-2551", - "source": "psirt@paloaltonetworks.com" + "source": "psirt@paloaltonetworks.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2552.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2552.json index 6a0eed70d0e..bb2a4b247cd 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2552.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2552.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2552", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:04.957", - "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:04:14.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "AMBER" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 + } ] }, "weaknesses": [ @@ -71,12 +93,255 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.2.0", + "versionEndExcluding": "10.2.7", + "matchCriteriaId": "243077CD-5021-4DF3-8AC7-5B14F7FD9710" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndExcluding": "11.0.6", + "matchCriteriaId": "47CBEECE-EA41-4A58-8AE9-D695C76D4019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.1.0", + "versionEndExcluding": "11.1.4", + "matchCriteriaId": "459485B4-47FF-4A5F-9249-AE0445A0096A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.2.0", + "versionEndExcluding": "11.2.4", + "matchCriteriaId": "7E4D3A51-0A40-4B19-AAFC-A2484B1CF5D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*", + "matchCriteriaId": "A8C42D98-CF8F-456B-9D57-80BBDC2C8E74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*", + "matchCriteriaId": "B3AAD4BA-22DD-43D3-91F1-8A6F5FBBF029" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*", + "matchCriteriaId": "AA4994CB-6591-4B44-A5D7-3CDF540B97DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*", + "matchCriteriaId": "A6AB7874-FE24-42AC-8E3A-822A70722126" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h18:*:*:*:*:*:*", + "matchCriteriaId": "34B083B9-CC1B-43CD-9A16-C018F7FA2DDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h19:*:*:*:*:*:*", + "matchCriteriaId": "0D88CC33-7E32-4E82-8A94-70759E910510" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*", + "matchCriteriaId": "776E06EC-2FDA-4664-AB43-9F6BE9B897CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*", + "matchCriteriaId": "CBE09375-A863-42FF-813F-C20679D7C45C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*", + "matchCriteriaId": "1311961A-0EF6-488E-B0C2-EDBD508587C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*", + "matchCriteriaId": "5D64390F-F870-4DBF-B0FE-BCDFE58C8685" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*", + "matchCriteriaId": "F70FC9DF-10C9-4AE5-B64B-3153E2E4E9E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*", + "matchCriteriaId": "C3D6D552-6F33-496A-A505-5F59DF3B487B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*", + "matchCriteriaId": "D1ECD1DC-5A05-4E4F-97F5-136CE777FAB3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*", + "matchCriteriaId": "CBA2B4FA-16C2-41B9-856D-EDC0CAF7A164" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*", + "matchCriteriaId": "E5E6A893-2994-40A3-AF35-8AF068B0DE42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*", + "matchCriteriaId": "D814F3A3-5E9D-426D-A654-1346D9ECE9B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*", + "matchCriteriaId": "8C7E9211-7041-4720-B4B9-3EA95D425263" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*", + "matchCriteriaId": "CEB258EE-2C6E-4A63-B04C-89C5F76B0878" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*", + "matchCriteriaId": "0F481B0E-2353-4AB0-8A98-B0EFBC409868" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h16:*:*:*:*:*:*", + "matchCriteriaId": "3F7FC771-527F-4619-B785-6AE1F4722074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*", + "matchCriteriaId": "4E9EB9C6-78BA-4C66-A4BD-856BF27388CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*", + "matchCriteriaId": "03C5ABF2-8C53-4376-8A64-6CB34E18E77C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*", + "matchCriteriaId": "872BC747-512A-4872-AC86-E7F1DC589F47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*", + "matchCriteriaId": "67F527D0-F85B-4B83-AEA5-BA636FC89210" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*", + "matchCriteriaId": "6CF8F985-7E51-49E6-857A-FAAF027F5611" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*", + "matchCriteriaId": "B437DCEA-ABA3-41CA-B320-97EC430F1122" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*", + "matchCriteriaId": "593AFE7A-CB37-4156-A2B8-646A317F3176" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h9:*:*:*:*:*:*", + "matchCriteriaId": "A9F032C2-3202-479B-8C70-277F6871A4A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:-:*:*:*:*:*:*", + "matchCriteriaId": "2B3D7DBA-C90C-451D-94C3-8B7066826308" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h1:*:*:*:*:*:*", + "matchCriteriaId": "010F170D-438E-4A57-98B9-E7522FD95FC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h2:*:*:*:*:*:*", + "matchCriteriaId": "AD8795BE-5CC2-443D-99AD-BD6985CADBA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h3:*:*:*:*:*:*", + "matchCriteriaId": "F3D096D4-E60E-4D4C-9122-C36B775B4A6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h4:*:*:*:*:*:*", + "matchCriteriaId": "FEE28628-E969-44FC-B577-066DB98BBDA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h6:*:*:*:*:*:*", + "matchCriteriaId": "C69B22C4-6E7D-4F39-B86C-D408670CDC42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:*", + "matchCriteriaId": "DF83EAA1-49E1-4AD0-A049-F1B3065950BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1:*:*:*:*:*:*", + "matchCriteriaId": "BE3F7369-9F35-409A-9F47-45A959592DFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4:*:*:*:*:*:*", + "matchCriteriaId": "E9DB4DA9-2262-4E9E-B3A1-49D261D01295" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h7:*:*:*:*:*:*", + "matchCriteriaId": "4852E738-990C-4DD2-8252-D4625D843A99" + } + ] + } + ] } ], "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2024-2552", - "source": "psirt@paloaltonetworks.com" + "source": "psirt@paloaltonetworks.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26885.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26885.json index 5e161d5367f..e5795180b63 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26885.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26885.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26885", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.210", - "lastModified": "2024-11-21T09:03:17.910", + "lastModified": "2025-01-24T16:15:35.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -117,13 +117,6 @@ "Patch" ] }, - { - "url": "https://git.kernel.org/stable/c/225da02acdc97af01b6bc6ce1a3e5362bf01d3fb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, { "url": "https://git.kernel.org/stable/c/250051acc21f9d4c5c595e4fcb55986ea08c4691", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26886.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26886.json index 92f43fe2b6b..1bf442bd6c8 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26886.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26886.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26886", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.253", - "lastModified": "2024-12-04T18:15:13.987", + "lastModified": "2025-01-24T16:15:35.193", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,10 +52,6 @@ } ], "references": [ - { - "url": "https://git.kernel.org/stable/c/0625d7c240b307b78640dcd823cb738cb900a8ba", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, { "url": "https://git.kernel.org/stable/c/2c9e2df022ef8b9d7fac58a04a2ef4ed25288955", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" @@ -68,10 +64,6 @@ "url": "https://git.kernel.org/stable/c/817e8138ce86001b2fa5c63d6ede756e205a01f7", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, - { - "url": "https://git.kernel.org/stable/c/cb8adca52f306563d958a863bb0cbae9c184d1ae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, { "url": "https://git.kernel.org/stable/c/f7b94bdc1ec107c92262716b073b3e816d4784fb", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26889.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26889.json index b3bc8456490..c0e912737e1 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26889.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26889.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26889", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.380", - "lastModified": "2024-11-21T09:03:18.463", + "lastModified": "2025-01-24T16:15:35.380", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -60,18 +60,10 @@ "url": "https://git.kernel.org/stable/c/2edce8e9a99dd5e4404259d52e754fdc97fb42c2", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, - { - "url": "https://git.kernel.org/stable/c/4c69abb4d41ece30d9f4cfdf51cf3ee838f48723", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, { "url": "https://git.kernel.org/stable/c/54a03e4ac1a41edf8a5087bd59f8241b0de96d3d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, - { - "url": "https://git.kernel.org/stable/c/68644bf5ec6baaff40fc39b3529c874bfda709bd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, { "url": "https://git.kernel.org/stable/c/6d5a9d4a7bcbb7534ce45a18a52e7bd23e69d8ac", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26920.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26920.json index 65f4f2039cb..3825e9453fb 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26920.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26920.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26920", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T16:15:08.407", - "lastModified": "2024-11-21T09:03:23.117", + "lastModified": "2025-01-24T16:15:35.563", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -21,22 +21,6 @@ "url": "https://git.kernel.org/stable/c/0958b33ef5a04ed91f61cef4760ac412080c4e08", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, - { - "url": "https://git.kernel.org/stable/c/2450a69d2ee75d1f0112d509ac82ef98f5ad6b5f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/26ebeffff238488466fa578be3b35b8a46e69906", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/2a3073d58382157ab396734ed4e421ba9e969db1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/34925d01baf3ee62ab21c21efd9e2c44c24c004a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, { "url": "https://git.kernel.org/stable/c/36be97e9eb535fe3008a5cb040b1e56f29f2e398", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" @@ -45,26 +29,10 @@ "url": "https://git.kernel.org/stable/c/4b001ef14baab16b553a002cb9979e31b8fc0c6b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, - { - "url": "https://git.kernel.org/stable/c/56cfbe60710772916a5ba092c99542332b48e870", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, { "url": "https://git.kernel.org/stable/c/6022c065c9ec465d84cebff8f480db083e4ee06b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, - { - "url": "https://git.kernel.org/stable/c/8ffd5590f4d6ef5460acbeac7fbdff7025f9b419", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/b5085b5ac1d96ea2a8a6240f869655176ce44197", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/bcf4a115a5068f3331fafb8c176c1af0da3d8b19", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, { "url": "https://git.kernel.org/stable/c/0958b33ef5a04ed91f61cef4760ac412080c4e08", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27022.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27022.json index 1bc6dd2862e..b313c66bf13 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27022.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27022.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27022", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:21.110", - "lastModified": "2024-11-21T09:03:41.010", + "lastModified": "2025-01-24T16:15:35.707", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -105,17 +105,6 @@ } ], "references": [ - { - "url": "https://git.kernel.org/stable/c/04b0c41912349aff11a1bbaef6a722bd7fbb90ac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/0c42f7e039aba3de6d7dbf92da708e2b2ecba557", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, { "url": "https://git.kernel.org/stable/c/35e351780fa9d8240dd6f7e4f245f9ea37e96c19", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", @@ -130,17 +119,6 @@ "Patch" ] }, - { - "url": "https://git.kernel.org/stable/c/cec11fa2eb512ebe3a459c185f4aca1d44059bbf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/dd782da470761077f4d1120e191f1a35787cda6e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, { "url": "https://git.kernel.org/stable/c/04b0c41912349aff11a1bbaef6a722bd7fbb90ac", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28192.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28192.json index 50e664dd202..85d6ff63fdd 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28192.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28192.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28192", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-13T21:16:00.823", - "lastModified": "2024-11-21T09:05:59.927", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T15:11:10.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -53,16 +73,52 @@ "value": "CWE-943" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yooooomi:your_spotify:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.0", + "matchCriteriaId": "4B8BF8EC-918E-446C-B00C-345B7A707F07" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-c8wf-wcjc-2pvm", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/Yooooomi/your_spotify/security/advisories/GHSA-c8wf-wcjc-2pvm", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28951.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28951.json index a16a1b13b6f..35727cae601 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28951.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28951.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28951", "sourceIdentifier": "scy@openharmony.io", "published": "2024-04-02T07:15:45.030", - "lastModified": "2024-11-21T09:07:15.640", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:25:21.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,49 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:4.0:-:*:*:-:*:*:*", + "matchCriteriaId": "0E24BA59-D8E5-438B-A046-3CF5CA940833" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29006.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29006.json index a7e6b6b6f51..d7c2b4be4ea 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29006.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29006.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29006", "sourceIdentifier": "security@apache.org", "published": "2024-04-04T08:15:06.810", - "lastModified": "2024-11-21T09:07:21.387", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:19:05.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "De forma predeterminada, el servidor de administraci\u00f3n de CloudStack respeta el encabezado HTTP x-forwarded-for y lo registra como la IP de origen de una solicitud de API. Esto podr\u00eda provocar una omisi\u00f3n de autenticaci\u00f3n y otros problemas operativos si un atacante decide falsificar su direcci\u00f3n IP de esta manera. Se recomienda a los usuarios actualizar a la versi\u00f3n 4.18.1.1 o 4.19.0.1 de CloudStack, que soluciona este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -28,14 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.11.0.0", + "versionEndExcluding": "4.18.1.1", + "matchCriteriaId": "B50170D1-71D1-4F1E-A1A8-0611D6AD9765" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:cloudstack:4.19.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "51E212EC-AC62-4533-B3B2-A660807F0C1F" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29834.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29834.json index ed5a8602a2b..5f02fac8e5e 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29834.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29834.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29834", "sourceIdentifier": "security@apache.org", "published": "2024-04-02T20:15:09.607", - "lastModified": "2024-11-21T09:08:26.233", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:21:24.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 } ] }, @@ -51,30 +71,99 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.7.1", + "versionEndIncluding": "2.10.6", + "matchCriteriaId": "6F72E981-1033-4288-B32A-D8BA23842F0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.11.0", + "versionEndIncluding": "2.11.4", + "matchCriteriaId": "BA0ADBDB-CBD3-465A-8A24-CA20BE0F2965" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.0.4", + "matchCriteriaId": "39CB0C2C-FFA0-47AD-AE95-33EDCD69D747" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1.0", + "versionEndIncluding": "3.1.3", + "matchCriteriaId": "3B345AA3-0ACC-4953-B214-F505CDB077F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2.0", + "versionEndExcluding": "3.2.2", + "matchCriteriaId": "92141F66-6615-4D09-9CD1-FB2341B7194E" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/02/2", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/v0ltl94k9lg28qfr1f54hpkvvsjc5bj5", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://pulsar.apache.org/security/CVE-2024-29834/", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/02/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/v0ltl94k9lg28qfr1f54hpkvvsjc5bj5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://pulsar.apache.org/security/CVE-2024-29834/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31079.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31079.json index 92b173b3725..e6ae15f7044 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31079.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31079.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31079", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-05-29T16:15:09.800", - "lastModified": "2024-11-21T09:12:48.597", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:01:04.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 } ] }, @@ -49,40 +69,138 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.25.0", + "versionEndExcluding": "1.26.1", + "matchCriteriaId": "CA79B55D-E494-4961-81C6-80363BE46FE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*", + "matchCriteriaId": "96BF2B19-52C7-4051-BA58-CAE6F912B72F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r30:p1:*:*:*:*:*:*", + "matchCriteriaId": "4EBEC829-7EED-487E-974D-BBA704DFBF0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r30:p2:*:*:*:*:*:*", + "matchCriteriaId": "D0648596-D1F5-4A7A-B7F8-104E3AF26317" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r31:-:*:*:*:*:*:*", + "matchCriteriaId": "8248517E-D805-4928-8252-2168472341EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r31:p1:*:*:*:*:*:*", + "matchCriteriaId": "9D5BB4C0-B862-4CDD-AA54-1BC1BDF27005" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] } ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/30/4", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://my.f5.com/manage/s/article/K000139611", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/30/4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://my.f5.com/manage/s/article/K000139611", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3131.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3131.json index 917f8298f1d..7360dd84db8 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3131.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3131.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3131", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-01T17:16:19.970", - "lastModified": "2024-11-21T09:28:58.147", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:27:37.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -76,38 +96,79 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ycxdzj/CVE_Hunter/blob/main/SQL-7.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.258874", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.258874", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.308184", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/ycxdzj/CVE_Hunter/blob/main/SQL-7.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.258874", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.258874", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.308184", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3139.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3139.json index 24fa283aa0f..bf6a9960a90 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3139.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3139.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3139", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-01T23:15:08.733", - "lastModified": "2024-11-21T09:28:58.927", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:29:06.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ], "cvssMetricV2": [ @@ -74,40 +94,91 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Sospiro014/zday1/blob/main/Laboratory_Management_System.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.258914", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.258914", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.308207", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/Sospiro014/zday1/blob/main/Laboratory_Management_System.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.258914", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.258914", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.308207", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3140.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3140.json index ceb6b9b043b..70cea524528 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3140.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3140.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3140", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-01T23:15:09.393", - "lastModified": "2024-11-21T09:28:59.070", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:30:02.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,38 +96,79 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Sospiro014/zday1/blob/main/xss_1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.258915", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.258915", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.308214", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/Sospiro014/zday1/blob/main/xss_1.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.258915", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.258915", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.308214", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32760.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32760.json index 43c8be5de5f..a42b22e75ae 100644 --- a/CVE-2024/CVE-2024-327xx/CVE-2024-32760.json +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32760.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32760", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-05-29T16:15:10.043", - "lastModified": "2024-11-21T09:15:40.530", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:21:55.993", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ] }, @@ -49,40 +69,138 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.25.0", + "versionEndExcluding": "1.26.1", + "matchCriteriaId": "CA79B55D-E494-4961-81C6-80363BE46FE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*", + "matchCriteriaId": "96BF2B19-52C7-4051-BA58-CAE6F912B72F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r30:p1:*:*:*:*:*:*", + "matchCriteriaId": "4EBEC829-7EED-487E-974D-BBA704DFBF0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r30:p2:*:*:*:*:*:*", + "matchCriteriaId": "D0648596-D1F5-4A7A-B7F8-104E3AF26317" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r31:-:*:*:*:*:*:*", + "matchCriteriaId": "8248517E-D805-4928-8252-2168472341EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r31:p1:*:*:*:*:*:*", + "matchCriteriaId": "9D5BB4C0-B862-4CDD-AA54-1BC1BDF27005" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] } ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/30/4", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://my.f5.com/manage/s/article/K000139609", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/30/4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://my.f5.com/manage/s/article/K000139609", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3251.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3251.json index 8d160c86be8..8f3b77ed8ff 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3251.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3251.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3251", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-03T10:15:09.257", - "lastModified": "2024-11-21T09:29:14.820", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:31:37.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,79 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/0xAlmighty/Vulnerability-Research/blob/main/SourceCodester/CLMS/SourceCodester-CLMS-SQLi.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259100", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.259100", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.309091", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/0xAlmighty/Vulnerability-Research/blob/main/SourceCodester/CLMS/SourceCodester-CLMS-SQLi.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259100", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.259100", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.309091", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3383.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3383.json index e6d24beb0d4..8a6de4cba1c 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3383.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3383.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3383", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-04-10T17:15:57.000", - "lastModified": "2024-11-21T09:29:30.393", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T15:29:26.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -49,16 +69,65 @@ "value": "CWE-282" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.1.0", + "versionEndExcluding": "10.1.11", + "matchCriteriaId": "77695C8C-9732-4605-A160-A5159BD8B49C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.2.0", + "versionEndExcluding": "10.2.5", + "matchCriteriaId": "831B815F-436B-40D2-AFBA-9BE7275C2BEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndExcluding": "11.0.3", + "matchCriteriaId": "A6B9B8A6-A4A7-4C14-9D22-50FEF531F15D" + } + ] + } + ] } ], "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2024-3383", - "source": "psirt@paloaltonetworks.com" + "source": "psirt@paloaltonetworks.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.paloaltonetworks.com/CVE-2024-3383", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3384.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3384.json index 12d6a198a22..19668877759 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3384.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3384.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3384", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-04-10T17:15:57.217", - "lastModified": "2024-11-21T09:29:30.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T15:54:56.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,77 @@ "value": "CWE-1286" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.1.0", + "versionEndExcluding": "8.1.24", + "matchCriteriaId": "F7D77695-CFDE-4BAE-8C8B-E389CC5C7A3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.0.17", + "matchCriteriaId": "89A55C5F-8E01-42C4-BE93-D683900C07BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.1.0", + "versionEndExcluding": "9.1.15", + "matchCriteriaId": "88CE0E44-13FF-4FD0-94D2-0C0823A7A70E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.12", + "matchCriteriaId": "71F1F86A-8158-4BE8-B509-5F50421DA829" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:9.1.15:-:*:*:*:*:*:*", + "matchCriteriaId": "7D461A2C-0DD3-4E11-B3BB-ECDFAE85064A" + } + ] + } + ] } ], "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2024-3384", - "source": "psirt@paloaltonetworks.com" + "source": "psirt@paloaltonetworks.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.paloaltonetworks.com/CVE-2024-3384", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3385.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3385.json index 4a2f897fb12..1529b06263d 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3385.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3385.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3385", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-04-10T17:15:57.410", - "lastModified": "2024-11-21T09:29:30.643", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T15:55:48.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -53,16 +73,131 @@ "value": "CWE-476" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndIncluding": "9.0.16", + "matchCriteriaId": "E954D7B2-125D-4246-BEC8-4A5E0DFEC580" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.1.0", + "versionEndExcluding": "9.1.17", + "matchCriteriaId": "9F9FFBA6-7008-422B-9CF1-E37CA62081EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.1.0", + "versionEndExcluding": "10.1.12", + "matchCriteriaId": "AC18B586-8FE2-4362-9F60-490FCB52569F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.2.0", + "versionEndExcluding": "10.2.8", + "matchCriteriaId": "C430BDF9-C688-47F9-BE38-D75460AE5B17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndExcluding": "11.0.3", + "matchCriteriaId": "A6B9B8A6-A4A7-4C14-9D22-50FEF531F15D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:-:*:*:*:*:*:*", + "matchCriteriaId": "CDAE9753-EF8D-4B15-A73C-0EF56FE6C78C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:h1:*:*:*:*:*:*", + "matchCriteriaId": "2A142EE1-E516-4582-9A7E-6E4C74FB3991" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:paloaltonetworks:pa-5410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C702B085-D739-4E06-805F-D01144279071" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:paloaltonetworks:pa-5420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29237799-7DF5-478C-AE36-EC8E8416EAB7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:paloaltonetworks:pa-5430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEB69E29-2974-4963-96D6-E0C08D7777F4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:paloaltonetworks:pa-5440:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F7914EA-FEA6-4911-9A47-4F516BEE6663" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:paloaltonetworks:pa-5445:-:*:*:*:*:*:*:*", + "matchCriteriaId": "37BC54A5-071C-4F62-87EB-2314CA019B08" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:paloaltonetworks:pa-7050:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1536A4E4-D769-45C8-B85C-4A1A4F4AAEC0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:paloaltonetworks:pa-7080:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01AEF722-2554-4B30-8821-84B20F3BA8CC" + } + ] + } + ] } ], "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2024-3385", - "source": "psirt@paloaltonetworks.com" + "source": "psirt@paloaltonetworks.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.paloaltonetworks.com/CVE-2024-3385", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3386.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3386.json index fa9004726a8..05a8a4e9f04 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3386.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3386.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3386", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-04-10T17:15:57.593", - "lastModified": "2024-11-21T09:29:30.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T15:58:52.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,16 +69,116 @@ "value": "CWE-436" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-436" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.0.16", + "matchCriteriaId": "0E3757E3-17C0-4D42-A31A-78F40A774F41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.1.0", + "versionEndExcluding": "9.1.17", + "matchCriteriaId": "9F9FFBA6-7008-422B-9CF1-E37CA62081EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndExcluding": "10.0.13", + "matchCriteriaId": "49DA2985-ADAA-4B26-B015-8B49D783B6D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.1.0", + "versionEndIncluding": "10.1.8", + "matchCriteriaId": "8B759077-C985-4005-8907-32E0C6CDFC10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.2.0", + "versionEndExcluding": "10.2.4", + "matchCriteriaId": "D61F01F8-1598-4078-9D98-BFF5B62F3BA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndExcluding": "11.0.1", + "matchCriteriaId": "77DF6A1B-2E69-4216-8740-3B1FF95E15A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:-:*:*:*:*:*:*", + "matchCriteriaId": "CDAE9753-EF8D-4B15-A73C-0EF56FE6C78C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:h1:*:*:*:*:*:*", + "matchCriteriaId": "2A142EE1-E516-4582-9A7E-6E4C74FB3991" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*", + "matchCriteriaId": "74E22763-558D-4B53-9452-BBD0C07366D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:h1:*:*:*:*:*:*", + "matchCriteriaId": "F5B9B574-5F3D-46B5-B9D8-2015997A63D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*", + "matchCriteriaId": "135588B5-6771-46A3-98B0-39B4873FD6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:-:*:*:*:*:*:*", + "matchCriteriaId": "10A69DAE-5AD5-4E1C-9DF0-C7B7BB023B66" + } + ] + } + ] } ], "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2024-3386", - "source": "psirt@paloaltonetworks.com" + "source": "psirt@paloaltonetworks.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.paloaltonetworks.com/CVE-2024-3386", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3388.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3388.json index 3f1c2565243..ffa0550735b 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3388.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3388.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3388", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-04-10T17:15:57.970", - "lastModified": "2024-11-21T09:29:31.047", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:16:18.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", + "baseScore": 5.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 1.4 } ] }, @@ -53,16 +73,140 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + }, + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.1.0", + "versionEndExcluding": "8.1.26", + "matchCriteriaId": "E37C0550-B96B-4A7F-A330-F2D7F4756D8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndExcluding": "9.0.17", + "matchCriteriaId": "89A55C5F-8E01-42C4-BE93-D683900C07BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.1.0", + "versionEndExcluding": "9.1.17", + "matchCriteriaId": "9F9FFBA6-7008-422B-9CF1-E37CA62081EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.1.0", + "versionEndExcluding": "10.1.11", + "matchCriteriaId": "77695C8C-9732-4605-A160-A5159BD8B49C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.2.0", + "versionEndExcluding": "10.2.7", + "matchCriteriaId": "243077CD-5021-4DF3-8AC7-5B14F7FD9710" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndExcluding": "11.0.3", + "matchCriteriaId": "A6B9B8A6-A4A7-4C14-9D22-50FEF531F15D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:-:*:*:*:*:*:*", + "matchCriteriaId": "CDAE9753-EF8D-4B15-A73C-0EF56FE6C78C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:h1:*:*:*:*:*:*", + "matchCriteriaId": "2A142EE1-E516-4582-9A7E-6E4C74FB3991" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:-:*:*:*:*:*:*", + "matchCriteriaId": "F6242E26-AF44-4A19-ADD3-CBB798A862D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:h1:*:*:*:*:*:*", + "matchCriteriaId": "72EF4202-7A13-4528-B928-CC34B76725B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:h3:*:*:*:*:*:*", + "matchCriteriaId": "8E58BF5C-037D-45B1-8867-D510EC0F80B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*", + "matchCriteriaId": "A8C42D98-CF8F-456B-9D57-80BBDC2C8E74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*", + "matchCriteriaId": "B3AAD4BA-22DD-43D3-91F1-8A6F5FBBF029" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:paloaltonetworks:prisma_access:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFB6FBC7-DEEB-4571-BCF9-92345A4B614A" + } + ] + } + ] } ], "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2024-3388", - "source": "psirt@paloaltonetworks.com" + "source": "psirt@paloaltonetworks.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.paloaltonetworks.com/CVE-2024-3388", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34161.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34161.json index 39ed8ae2b55..740ad098e42 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34161.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34161.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34161", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-05-29T16:15:10.270", - "lastModified": "2024-11-21T09:18:13.217", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:20:57.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,40 +69,138 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.25.0", + "versionEndExcluding": "1.26.1", + "matchCriteriaId": "CA79B55D-E494-4961-81C6-80363BE46FE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*", + "matchCriteriaId": "96BF2B19-52C7-4051-BA58-CAE6F912B72F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r30:p1:*:*:*:*:*:*", + "matchCriteriaId": "4EBEC829-7EED-487E-974D-BBA704DFBF0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r30:p2:*:*:*:*:*:*", + "matchCriteriaId": "D0648596-D1F5-4A7A-B7F8-104E3AF26317" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r31:-:*:*:*:*:*:*", + "matchCriteriaId": "8248517E-D805-4928-8252-2168472341EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r31:p1:*:*:*:*:*:*", + "matchCriteriaId": "9D5BB4C0-B862-4CDD-AA54-1BC1BDF27005" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] } ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/30/4", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://my.f5.com/manage/s/article/K000139627", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/30/4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://my.f5.com/manage/s/article/K000139627", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35200.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35200.json index c6309a32d8d..1575fed6565 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35200.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35200.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35200", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-05-29T16:15:10.497", - "lastModified": "2024-11-21T09:19:55.233", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:15:15.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,40 +69,138 @@ "value": "CWE-476" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.25.0", + "versionEndExcluding": "1.26.1", + "matchCriteriaId": "CA79B55D-E494-4961-81C6-80363BE46FE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*", + "matchCriteriaId": "96BF2B19-52C7-4051-BA58-CAE6F912B72F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r30:p1:*:*:*:*:*:*", + "matchCriteriaId": "4EBEC829-7EED-487E-974D-BBA704DFBF0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r30:p2:*:*:*:*:*:*", + "matchCriteriaId": "D0648596-D1F5-4A7A-B7F8-104E3AF26317" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r31:-:*:*:*:*:*:*", + "matchCriteriaId": "8248517E-D805-4928-8252-2168472341EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_plus:r31:p1:*:*:*:*:*:*", + "matchCriteriaId": "9D5BB4C0-B862-4CDD-AA54-1BC1BDF27005" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] } ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/30/4", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://my.f5.com/manage/s/article/K000139612", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/30/4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLAOKJWDALQZBIV3WKGPJ6T5Z56D3PRD/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7RPLWC35WHEUFCGKNFG62ESNID25TEZ/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://my.f5.com/manage/s/article/K000139612", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35995.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35995.json index 22798d6ec91..fc485197bd7 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35995.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35995.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35995", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:13.597", - "lastModified": "2024-12-27T13:15:20.103", + "lastModified": "2025-01-24T16:15:35.870", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -29,18 +29,10 @@ "url": "https://git.kernel.org/stable/c/2f4a4d63a193be6fd530d180bb13c3592052904c", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, - { - "url": "https://git.kernel.org/stable/c/4949affd5288b867cdf115f5b08d6166b2027f87", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, { "url": "https://git.kernel.org/stable/c/6cb6b12b78dcd8867a3fdbb1b6d0ed1df2b208d1", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, - { - "url": "https://git.kernel.org/stable/c/b54c4632946ae42f2b39ed38abd909bbf78cbcc2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, { "url": "https://git.kernel.org/stable/c/01fc53be672acae37e611c80cc0b4f3939584de3", "source": "af854a3a-2127-422b-91ae-364da2661108" diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40693.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40693.json new file mode 100644 index 00000000000..0503afd19fc --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40693.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-40693", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-24T16:15:36.003", + "lastModified": "2025-01-24T16:15:36.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Planning Analytics 2.0 and 2.1 could be vulnerable to malicious file upload by not validating the content of the file uploaded to the web interface. Attackers can make use of this weakness and upload malicious executable files into the system, and it can be sent to victim for performing further attacks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7168387", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40706.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40706.json new file mode 100644 index 00000000000..161b51a07de --- /dev/null +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40706.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-40706", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-24T16:15:36.150", + "lastModified": "2025-01-24T16:15:36.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM InfoSphere Information Server 11.7 could allow a remote user to obtain sensitive version information that could aid in further attacks against the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7169826", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41757.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41757.json new file mode 100644 index 00000000000..6f153e7d847 --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41757.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41757", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-24T16:15:36.297", + "lastModified": "2025-01-24T16:15:36.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Concert Software 1.0.0 and 1.0.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-311" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7173596", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42067.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42067.json index 56e53bed40f..8c7e89c3626 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42067.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42067.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42067", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T16:15:06.323", - "lastModified": "2024-11-21T09:33:31.323", + "lastModified": "2025-01-24T16:15:36.447", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -84,20 +84,6 @@ "Patch" ] }, - { - "url": "https://git.kernel.org/stable/c/08f6c05feb1db21653e98ca84ea04ca032d014c7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/9fef36cad60d4226f9d06953cd56d1d2f9119730", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, { "url": "https://git.kernel.org/stable/c/e60adf513275c3a38e5cb67f7fd12387e43a3ff5", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42068.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42068.json index 0ed7db10383..0913d352215 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42068.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42068.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42068", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T16:15:06.387", - "lastModified": "2024-11-21T09:33:31.457", + "lastModified": "2025-01-24T16:15:36.613", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -112,13 +112,6 @@ "Patch" ] }, - { - "url": "https://git.kernel.org/stable/c/e3540e5a7054d6daaf9a1415a48aacb092112a89", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, { "url": "https://git.kernel.org/stable/c/e4f602e3ff749ba770bf8ff10196e18358de6720", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", @@ -126,13 +119,6 @@ "Patch" ] }, - { - "url": "https://git.kernel.org/stable/c/fdd411af8178edc6b7bf260f8fa4fba1bedd0a6d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, { "url": "https://git.kernel.org/stable/c/05412471beba313ecded95aa17b25fe84bb2551a", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44949.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44949.json index 7012e1dd15e..4d1ec5b8b93 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44949.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44949.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44949", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T19:15:30.040", - "lastModified": "2024-12-19T19:15:07.270", + "lastModified": "2025-01-24T16:15:36.763", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -86,10 +86,6 @@ "url": "https://git.kernel.org/stable/c/00baca74fb5879e5f9034b6156671301f500f8ee", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, - { - "url": "https://git.kernel.org/stable/c/3dfd8991ad33b10c2fb027a4cfcf57579fa786c1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, { "url": "https://git.kernel.org/stable/c/533de2f470baac40d3bf622fe631f15231a03c9f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", @@ -110,10 +106,6 @@ "tags": [ "Patch" ] - }, - { - "url": "https://git.kernel.org/stable/c/dadac97f066a67334268132c1e2d0fd599fbcbec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45077.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45077.json new file mode 100644 index 00000000000..752ca1e8c78 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45077.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45077", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-24T16:15:36.903", + "lastModified": "2025-01-24T16:15:36.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Maximo Asset Management 7.6.1.3 MXAPIASSET API is vulnerable to unrestricted file upload which allows authenticated low privileged user to upload restricted file types with a simple method of adding a dot to the end of the file name if Maximo is installed on Windows operating system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7174819", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4618.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4618.json index c99e231914e..8cfb98bfa80 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4618.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4618.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4618", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-15T02:15:10.333", - "lastModified": "2024-11-21T09:43:13.690", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:37:51.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,41 +36,115 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:exclusiveaddons:exclusive_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.6.9.7", + "matchCriteriaId": "0C0BB825-359B-4D2B-A8E3-D65B4A342CE3" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/exclusive-addons-for-elementor/tags/2.6.9.6/elements/team-member/team-member.php#L1696", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3083582/#file4", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/exclusive-addons-for-elementor/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e82478c-e476-4cdf-ab72-f578331058e2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/exclusive-addons-for-elementor/tags/2.6.9.6/elements/team-member/team-member.php#L1696", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3083582/#file4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/exclusive-addons-for-elementor/#developers", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e82478c-e476-4cdf-ab72-f578331058e2?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47683.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47683.json index 9700a4c4489..1dc842fe598 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47683.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47683.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47683", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T12:15:05.210", - "lastModified": "2024-12-27T13:15:20.820", + "lastModified": "2025-01-24T16:15:37.083", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -112,13 +112,6 @@ } ], "references": [ - { - "url": "https://git.kernel.org/stable/c/6f9c39e8169384d2a5ca9bf323a0c1b81b3d0f3a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, { "url": "https://git.kernel.org/stable/c/7c887efda1201110211fed8921a92a713e0b6bcd", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", @@ -132,20 +125,6 @@ "tags": [ "Patch" ] - }, - { - "url": "https://git.kernel.org/stable/c/a53841b074cc196c3caaa37e1f15d6bc90943b97", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/d45c64d933586d409d3f1e0ecaca4da494b1d9c6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49926.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49926.json index 2c6a9b3acc6..78a8d1431d7 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49926.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49926.json @@ -2,7 +2,7 @@ "id": "CVE-2024-49926", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:14.623", - "lastModified": "2025-01-02T14:15:07.770", + "lastModified": "2025-01-24T16:15:37.237", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -84,10 +84,6 @@ "Patch" ] }, - { - "url": "https://git.kernel.org/stable/c/224fd631c41b81697aa622d38615bfbf446b91cf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, { "url": "https://git.kernel.org/stable/c/3104bddc666ff64b90491868bbc4c7ebdd90aedf", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", @@ -95,10 +91,6 @@ "Patch" ] }, - { - "url": "https://git.kernel.org/stable/c/acddb87620142f38fda834cd1ec661512ca59241", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, { "url": "https://git.kernel.org/stable/c/b3b2431ed27f4ebc28e26cdf005c1de42dc60bdf", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50010.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50010.json index f35f821e72a..634b6810b02 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50010.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50010.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50010", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T19:15:04.523", - "lastModified": "2024-12-05T14:15:21.263", + "lastModified": "2025-01-24T16:15:37.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -98,20 +98,9 @@ "Patch" ] }, - { - "url": "https://git.kernel.org/stable/c/b8b0e9650eeb6637b4e1cf3d6aaf0e96f87862e7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, { "url": "https://git.kernel.org/stable/c/c9b77438077d5a20c79ead95bcdaf9bd4797baaf", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/d62ba2a5536df83473a2ac15ab302258e3845251", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-502xx/CVE-2024-50282.json b/CVE-2024/CVE-2024-502xx/CVE-2024-50282.json index 018efd76923..d7309c90160 100644 --- a/CVE-2024/CVE-2024-502xx/CVE-2024-50282.json +++ b/CVE-2024/CVE-2024-502xx/CVE-2024-50282.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50282", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-19T02:16:30.540", - "lastModified": "2024-11-21T21:14:20.060", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-24T16:15:37.570", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -142,20 +142,6 @@ } ], "references": [ - { - "url": "https://git.kernel.org/stable/c/17f5f18085acb5e9d8d13d84a4e12bb3aff2bd64", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/25d7e84343e1235b667cf5226c3934fdf36f0df6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, { "url": "https://git.kernel.org/stable/c/2faaee36e6e30f9efc7fa6bcb0bdcbe05c23f51f", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", @@ -177,26 +163,12 @@ "Patch" ] }, - { - "url": "https://git.kernel.org/stable/c/7ccd781794d247589104a791caab491e21218fba", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, { "url": "https://git.kernel.org/stable/c/8906728f2fbd6504cb488f4afdd66af28f330a7a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ] - }, - { - "url": "https://git.kernel.org/stable/c/aaf6160a4b7f9ee3cd91aa5b3251f5dbe2170f42", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57184.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57184.json index 231f464340d..4ed31c97c4c 100644 --- a/CVE-2024/CVE-2024-571xx/CVE-2024-57184.json +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57184.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57184", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-24T14:15:31.793", - "lastModified": "2025-01-24T14:15:31.793", - "vulnStatus": "Received", + "lastModified": "2025-01-24T15:15:10.523", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "An issue was discovered in GPAC v0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer overflow in gf_m2ts_process_pmt in media_tools/mpegts.c:2163 that can cause a denial of service (DOS) via a crafted MP4 file." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/gpac/gpac/commit/8c5e847185d74462d674ee7d28fb46c29dae6dd2", diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5913.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5913.json index 990eeae563e..fd97dc9b2c0 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5913.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5913.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5913", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-10T19:15:11.837", - "lastModified": "2024-11-21T09:48:34.290", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:00:42.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,84 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.1.0", + "versionEndExcluding": "10.1.14", + "matchCriteriaId": "19D52DC1-4441-4C88-B209-9B86FCC2162F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.2.0", + "versionEndExcluding": "10.2.10", + "matchCriteriaId": "ECC53672-829D-4995-A75A-CE8D3C38A3A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndExcluding": "11.0.5", + "matchCriteriaId": "06B9F11D-D5EF-487A-8E43-9AE14307CCE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.1.0", + "versionEndExcluding": "11.1.4", + "matchCriteriaId": "459485B4-47FF-4A5F-9249-AE0445A0096A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.2.0", + "versionEndExcluding": "11.2.1", + "matchCriteriaId": "68053EEE-7CCC-4345-9700-F5FA6F606EDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*", + "matchCriteriaId": "B41A7115-A370-49E1-B162-24803E6DD2CB" + } + ] + } + ] } ], "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2024-5913", - "source": "psirt@paloaltonetworks.com" + "source": "psirt@paloaltonetworks.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://security.paloaltonetworks.com/CVE-2024-5913", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5917.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5917.json index afdf6db67e9..edb1268ee29 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5917.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5917.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5917", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:08.607", - "lastModified": "2025-01-15T23:15:09.910", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:04:54.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "AMBER" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -71,12 +93,51 @@ "value": "CWE-918" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.1.0", + "versionEndExcluding": "10.1.7", + "matchCriteriaId": "98999D32-B8D9-4D47-94D9-6383D31D0518" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.2.0", + "versionEndExcluding": "10.2.2", + "matchCriteriaId": "22513B1B-6022-4732-8CD4-6E74E40D664A" + } + ] + } + ] } ], "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2024-5917", - "source": "psirt@paloaltonetworks.com" + "source": "psirt@paloaltonetworks.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5919.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5919.json index 3136ff2adcd..ee2048a7640 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5919.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5919.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5919", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:09.027", - "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:06:00.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "AMBER" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -71,12 +93,58 @@ "value": "CWE-611" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.1.0", + "versionEndExcluding": "10.1.10", + "matchCriteriaId": "8F25D99D-0E7C-469B-977E-FCBD0AB2373E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.2.0", + "versionEndExcluding": "10.2.5", + "matchCriteriaId": "831B815F-436B-40D2-AFBA-9BE7275C2BEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndExcluding": "11.0.2", + "matchCriteriaId": "8A69845B-51CA-4612-BCBA-96EF92F01D2F" + } + ] + } + ] } ], "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2024-5919", - "source": "psirt@paloaltonetworks.com" + "source": "psirt@paloaltonetworks.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5920.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5920.json index fb43c33eaf1..75068940b9f 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5920.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5920.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5920", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-11-14T10:15:09.223", - "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:06:43.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "AMBER" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -71,12 +93,65 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.1.0", + "versionEndExcluding": "10.1.14", + "matchCriteriaId": "19D52DC1-4441-4C88-B209-9B86FCC2162F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.2.0", + "versionEndExcluding": "10.2.11", + "matchCriteriaId": "3B10307C-3EED-4014-AA02-122C6A112D66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0", + "versionEndExcluding": "11.0.6", + "matchCriteriaId": "47CBEECE-EA41-4A58-8AE9-D695C76D4019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.1.0", + "versionEndExcluding": "11.1.4", + "matchCriteriaId": "459485B4-47FF-4A5F-9249-AE0445A0096A" + } + ] + } + ] } ], "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2024-5920", - "source": "psirt@paloaltonetworks.com" + "source": "psirt@paloaltonetworks.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7634.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7634.json index 71fe8418225..832e8308938 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7634.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7634.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7634", "sourceIdentifier": "f5sirt@f5.com", "published": "2024-08-22T18:15:10.553", - "lastModified": "2024-08-23T16:18:28.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T16:14:16.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -93,12 +113,51 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_agent:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.17.0", + "versionEndExcluding": "2.37.0", + "matchCriteriaId": "B54DC1BB-2696-41DE-BC93-22EF05D2214C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:nginx_instance_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3.1", + "versionEndExcluding": "2.17.2", + "matchCriteriaId": "C029BDAC-95E1-4CCC-835D-954064A4F26E" + } + ] + } + ] } ], "references": [ { "url": "https://my.f5.com/manage/s/article/K000140630", - "source": "f5sirt@f5.com" + "source": "f5sirt@f5.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9490.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9490.json new file mode 100644 index 00000000000..c7f639d9802 --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9490.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9490", + "sourceIdentifier": "product-security@silabs.com", + "published": "2025-01-24T15:15:10.683", + "lastModified": "2025-01-24T15:15:10.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DLL hijacking vulnerabilities, caused by an uncontrolled search path in Silicon Labs (8-bit) IDE installer can lead to privilege escalation and arbitrary code execution when running the impacted installer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://community.silabs.com/068Vm00000JUQwd", + "source": "product-security@silabs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9491.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9491.json new file mode 100644 index 00000000000..d93c90e4815 --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9491.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9491", + "sourceIdentifier": "product-security@silabs.com", + "published": "2025-01-24T15:15:10.817", + "lastModified": "2025-01-24T15:15:10.817", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DLL hijacking vulnerabilities, caused by an uncontrolled search path in Configuration Wizard 2 installer can lead to privilege escalation and arbitrary code execution when running the impacted installer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://community.silabs.com/068Vm00000JUQwd", + "source": "product-security@silabs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9492.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9492.json new file mode 100644 index 00000000000..3d50c39270d --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9492.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9492", + "sourceIdentifier": "product-security@silabs.com", + "published": "2025-01-24T15:15:10.940", + "lastModified": "2025-01-24T15:15:10.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DLL hijacking vulnerabilities, caused by an uncontrolled search path in Flash Programming Utility installer can lead to privilege escalation and arbitrary code execution when running the impacted installer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://community.silabs.com/068Vm00000JUQwd", + "source": "product-security@silabs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9493.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9493.json new file mode 100644 index 00000000000..6e0e0a7310d --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9493.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9493", + "sourceIdentifier": "product-security@silabs.com", + "published": "2025-01-24T15:15:11.070", + "lastModified": "2025-01-24T15:15:11.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DLL hijacking vulnerabilities, caused by an uncontrolled search path in the\u00a0\n\nToolStick\n\n installer can lead to privilege escalation and arbitrary code execution when running the impacted installer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://community.silabs.com/068Vm00000JUQwd", + "source": "product-security@silabs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9494.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9494.json new file mode 100644 index 00000000000..cc9c3e38983 --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9494.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9494", + "sourceIdentifier": "product-security@silabs.com", + "published": "2025-01-24T15:15:11.197", + "lastModified": "2025-01-24T15:15:11.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DLL hijacking vulnerabilities, caused by an uncontrolled search path in the\u00a0\n\n\n\nCP210 VCP Win 2k\n\n\n\n installer can lead to privilege escalation and arbitrary code execution when running the impacted installer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://community.silabs.com/068Vm00000JUQwd", + "source": "product-security@silabs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9495.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9495.json new file mode 100644 index 00000000000..fe5a8d7159c --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9495.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9495", + "sourceIdentifier": "product-security@silabs.com", + "published": "2025-01-24T15:15:11.323", + "lastModified": "2025-01-24T15:15:11.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DLL hijacking vulnerabilities, caused by an uncontrolled search path in the\u00a0CP210x VCP Windows \n\n\n\n installer can lead to privilege escalation and arbitrary code execution when running the impacted installer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://community.silabs.com/068Vm00000JUQwd", + "source": "product-security@silabs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9496.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9496.json new file mode 100644 index 00000000000..900d856e453 --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9496.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-9496", + "sourceIdentifier": "product-security@silabs.com", + "published": "2025-01-24T15:15:11.450", + "lastModified": "2025-01-24T15:15:11.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DLL hijacking vulnerabilities, caused by an uncontrolled search path in the\u00a0USBXpress Dev Kit\n\n \n\n\n\n installer can lead to privilege escalation and arbitrary code execution when running the impacted installer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://community.silabs.com/068Vm00000JUQwd", + "source": "product-security@silabs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9497.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9497.json new file mode 100644 index 00000000000..ca2c6e69da3 --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9497.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-9497", + "sourceIdentifier": "product-security@silabs.com", + "published": "2025-01-24T15:15:11.620", + "lastModified": "2025-01-24T15:15:11.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DLL hijacking vulnerabilities, caused by an uncontrolled search path in the\u00a0USBXpress 4 SDK\n\n \n\n\n\n installer can lead to privilege escalation and arbitrary code execution when running the impacted installer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://community.silabs.com/068Vm00000JUQwd", + "source": "product-security@silabs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9498.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9498.json new file mode 100644 index 00000000000..8ce0f3848f4 --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9498.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-9498", + "sourceIdentifier": "product-security@silabs.com", + "published": "2025-01-24T15:15:11.793", + "lastModified": "2025-01-24T15:15:11.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DLL hijacking vulnerabilities, caused by an uncontrolled search path in the\u00a0USBXpress SDK\n\n \n\n\n\n installer can lead to privilege escalation and arbitrary code execution when running the impacted installer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://community.silabs.com/068Vm00000JUQwd", + "source": "product-security@silabs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9499.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9499.json new file mode 100644 index 00000000000..245d1138c46 --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9499.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-9499", + "sourceIdentifier": "product-security@silabs.com", + "published": "2025-01-24T15:15:11.967", + "lastModified": "2025-01-24T15:15:11.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DLL hijacking vulnerabilities, caused by an uncontrolled search path in the\u00a0USBXpress Win 98SE Dev Kit\u00a0installer can lead to privilege escalation and arbitrary code execution when running the impacted installer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@silabs.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://community.silabs.com/068Vm00000JUQwd", + "source": "product-security@silabs.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0697.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0697.json new file mode 100644 index 00000000000..a6df1ec7452 --- /dev/null +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0697.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-0697", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-24T15:15:12.130", + "lastModified": "2025-01-24T15:15:12.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in Telstra Smart Modem Gen 2 up to 20250115. This affects an unknown part of the component HTTP Header Handler. The manipulation of the argument Content-Disposition leads to injection. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-707" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/bloodbile/Telstra-RHI", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293223", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293223", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.480045", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0698.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0698.json new file mode 100644 index 00000000000..b758ff5cb17 --- /dev/null +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0698.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0698", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-24T16:15:37.717", + "lastModified": "2025-01-24T16:15:37.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. It has been classified as critical. Affected is an unknown function of the file /admin/sys/menu/list. The manipulation of the argument sort/order leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/JoeyBling/bootplus/issues/19", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/JoeyBling/bootplus/issues/19#issue-2786879797", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293226", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293226", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.480827", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0699.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0699.json new file mode 100644 index 00000000000..17a2219ba14 --- /dev/null +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0699.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0699", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-24T16:15:37.977", + "lastModified": "2025-01-24T16:15:37.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/sys/role/list. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/JoeyBling/bootplus/issues/21", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/JoeyBling/bootplus/issues/21#issue-2786893665", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293227", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293227", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.480836", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21654.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21654.json index 6860df58a4d..cb890d559b9 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21654.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21654.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21654", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-19T11:15:11.040", - "lastModified": "2025-01-23T17:15:26.357", + "lastModified": "2025-01-24T16:15:38.177", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -21,14 +21,6 @@ "url": "https://git.kernel.org/stable/c/3c7c90274ae339e1ad443c9be1c67a20b80b9c76", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, - { - "url": "https://git.kernel.org/stable/c/950b604384fd75d62e860bec7135b2b62eb4d508", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/a1a541fbfa7e97c1100144db34b57553d7164ce5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, { "url": "https://git.kernel.org/stable/c/c45beebfde34aa71afbc48b2c54cdda623515037", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22605.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22605.json new file mode 100644 index 00000000000..8798a966a0b --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22605.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2025-22605", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-24T15:15:12.330", + "lastModified": "2025-01-24T15:15:12.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Starting in version 4.0.0-beta.18 and prior to 4.0.0-beta.253, a vulnerability in the execution of commands on remote servers allows an authenticated user to execute arbitrary code on the local Coolify container, gaining access to data and private keys or tokens of other users/teams. The ability to inject malicious commands into the Coolify container gives authenticated attackers the ability to fully retrieve and control the data and availability of the software. Centrally hosted Coolify instances (open registration and/or multiple teams with potentially untrustworthy users) are especially at risk, as sensitive data of all users and connected servers can be leaked by any user. Additionally, attackers are able to modify the running software, potentially deploying malicious images to remote nodes or generally changing its behavior. Version 4.0.0-beta.253 patches this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/coollabsio/coolify/blob/40a239ddda3fc919f57a052d7b52b8e1a6696b81/bootstrap/helpers/remoteProcess.php#L70", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/coollabsio/coolify/commit/353245bb7de9680f238bae30443af1696bc977b0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/coollabsio/coolify/pull/1524", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/coollabsio/coolify/pull/1625", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/coollabsio/coolify/security/advisories/GHSA-9wqm-fg79-4748", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22606.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22606.json new file mode 100644 index 00000000000..d5213b0b1a4 --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22606.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-22606", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-24T16:15:38.307", + "lastModified": "2025-01-24T16:15:38.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In version 4.0.0-beta.358 and possibly earlier versions, when creating or updating a \"project,\" it is possible to inject arbitrary shell commands by altering the project name. If a name includes unescaped characters, such as single quotes (`'`), it breaks out of the intended command structure, allowing attackers to execute arbitrary commands on the host system. This vulnerability allows attackers to execute arbitrary commands on the host server, which could result in full system compromise; create, modify, or delete sensitive system files; and escalate privileges depending on the permissions of the executed process. Attackers with access to project management features could exploit this flaw to gain unauthorized control over the host environment. Version 4.0.0-beta.359 fixes this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/coollabsio/coolify/security/advisories/GHSA-ccp8-v65g-m526", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22607.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22607.json new file mode 100644 index 00000000000..4651469ccb0 --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22607.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-22607", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-24T16:15:38.470", + "lastModified": "2025-01-24T16:15:38.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to fetch the details page for any GitHub / GitLab configuration on a Coolify instance by only knowing the UUID of the model. This exposes the \"client id\", \"client secret\" and \"webhook secret.\" Version 4.0.0-beta.361 fixes this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/coollabsio/coolify/security/advisories/GHSA-8w24-gfgq-jg72", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23991.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23991.json new file mode 100644 index 00000000000..7b20c658c78 --- /dev/null +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23991.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23991", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T16:15:38.723", + "lastModified": "2025-01-24T16:15:38.723", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in theDotstore Product Size Charts Plugin for WooCommerce.This issue affects Product Size Charts Plugin for WooCommerce: from n/a through 2.4.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woo-advanced-product-size-chart/vulnerability/wordpress-product-size-charts-plugin-for-woocommerce-plugin-2-4-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 5fd1c883b3a..117dbe87ee4 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-24T15:00:36.376795+00:00 +2025-01-24T17:00:32.072783+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-24T14:56:33.120000+00:00 +2025-01-24T16:38:39.150000+00:00 ``` ### Last Data Feed Release @@ -33,31 +33,67 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -278765 +278788 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `23` -- [CVE-2022-47090](CVE-2022/CVE-2022-470xx/CVE-2022-47090.json) (`2025-01-24T14:15:29.983`) -- [CVE-2024-10324](CVE-2024/CVE-2024-103xx/CVE-2024-10324.json) (`2025-01-24T14:15:30.837`) -- [CVE-2024-11913](CVE-2024/CVE-2024-119xx/CVE-2024-11913.json) (`2025-01-24T14:15:31.117`) -- [CVE-2024-41739](CVE-2024/CVE-2024-417xx/CVE-2024-41739.json) (`2025-01-24T14:15:31.397`) -- [CVE-2024-57184](CVE-2024/CVE-2024-571xx/CVE-2024-57184.json) (`2025-01-24T14:15:31.793`) +- [CVE-2024-13698](CVE-2024/CVE-2024-136xx/CVE-2024-13698.json) (`2025-01-24T16:15:34.597`) +- [CVE-2024-25034](CVE-2024/CVE-2024-250xx/CVE-2024-25034.json) (`2025-01-24T16:15:34.747`) +- [CVE-2024-40693](CVE-2024/CVE-2024-406xx/CVE-2024-40693.json) (`2025-01-24T16:15:36.003`) +- [CVE-2024-40706](CVE-2024/CVE-2024-407xx/CVE-2024-40706.json) (`2025-01-24T16:15:36.150`) +- [CVE-2024-41757](CVE-2024/CVE-2024-417xx/CVE-2024-41757.json) (`2025-01-24T16:15:36.297`) +- [CVE-2024-45077](CVE-2024/CVE-2024-450xx/CVE-2024-45077.json) (`2025-01-24T16:15:36.903`) +- [CVE-2024-9490](CVE-2024/CVE-2024-94xx/CVE-2024-9490.json) (`2025-01-24T15:15:10.683`) +- [CVE-2024-9491](CVE-2024/CVE-2024-94xx/CVE-2024-9491.json) (`2025-01-24T15:15:10.817`) +- [CVE-2024-9492](CVE-2024/CVE-2024-94xx/CVE-2024-9492.json) (`2025-01-24T15:15:10.940`) +- [CVE-2024-9493](CVE-2024/CVE-2024-94xx/CVE-2024-9493.json) (`2025-01-24T15:15:11.070`) +- [CVE-2024-9494](CVE-2024/CVE-2024-94xx/CVE-2024-9494.json) (`2025-01-24T15:15:11.197`) +- [CVE-2024-9495](CVE-2024/CVE-2024-94xx/CVE-2024-9495.json) (`2025-01-24T15:15:11.323`) +- [CVE-2024-9496](CVE-2024/CVE-2024-94xx/CVE-2024-9496.json) (`2025-01-24T15:15:11.450`) +- [CVE-2024-9497](CVE-2024/CVE-2024-94xx/CVE-2024-9497.json) (`2025-01-24T15:15:11.620`) +- [CVE-2024-9498](CVE-2024/CVE-2024-94xx/CVE-2024-9498.json) (`2025-01-24T15:15:11.793`) +- [CVE-2024-9499](CVE-2024/CVE-2024-94xx/CVE-2024-9499.json) (`2025-01-24T15:15:11.967`) +- [CVE-2025-0697](CVE-2025/CVE-2025-06xx/CVE-2025-0697.json) (`2025-01-24T15:15:12.130`) +- [CVE-2025-0698](CVE-2025/CVE-2025-06xx/CVE-2025-0698.json) (`2025-01-24T16:15:37.717`) +- [CVE-2025-0699](CVE-2025/CVE-2025-06xx/CVE-2025-0699.json) (`2025-01-24T16:15:37.977`) +- [CVE-2025-22605](CVE-2025/CVE-2025-226xx/CVE-2025-22605.json) (`2025-01-24T15:15:12.330`) +- [CVE-2025-22606](CVE-2025/CVE-2025-226xx/CVE-2025-22606.json) (`2025-01-24T16:15:38.307`) +- [CVE-2025-22607](CVE-2025/CVE-2025-226xx/CVE-2025-22607.json) (`2025-01-24T16:15:38.470`) +- [CVE-2025-23991](CVE-2025/CVE-2025-239xx/CVE-2025-23991.json) (`2025-01-24T16:15:38.723`) ### CVEs modified in the last Commit -Recently modified CVEs: `7` +Recently modified CVEs: `83` -- [CVE-2024-28193](CVE-2024/CVE-2024-281xx/CVE-2024-28193.json) (`2025-01-24T14:56:33.120`) -- [CVE-2024-4553](CVE-2024/CVE-2024-45xx/CVE-2024-4553.json) (`2025-01-24T14:42:56.390`) -- [CVE-2024-4619](CVE-2024/CVE-2024-46xx/CVE-2024-4619.json) (`2025-01-24T14:20:44.467`) -- [CVE-2024-4695](CVE-2024/CVE-2024-46xx/CVE-2024-4695.json) (`2025-01-24T14:36:46.677`) -- [CVE-2024-4876](CVE-2024/CVE-2024-48xx/CVE-2024-4876.json) (`2025-01-24T13:44:58.993`) -- [CVE-2024-5025](CVE-2024/CVE-2024-50xx/CVE-2024-5025.json) (`2025-01-24T13:41:01.287`) -- [CVE-2024-9630](CVE-2024/CVE-2024-96xx/CVE-2024-9630.json) (`2025-01-24T14:07:11.977`) +- [CVE-2024-3251](CVE-2024/CVE-2024-32xx/CVE-2024-3251.json) (`2025-01-24T16:31:37.807`) +- [CVE-2024-32760](CVE-2024/CVE-2024-327xx/CVE-2024-32760.json) (`2025-01-24T16:21:55.993`) +- [CVE-2024-3383](CVE-2024/CVE-2024-33xx/CVE-2024-3383.json) (`2025-01-24T15:29:26.313`) +- [CVE-2024-3384](CVE-2024/CVE-2024-33xx/CVE-2024-3384.json) (`2025-01-24T15:54:56.557`) +- [CVE-2024-3385](CVE-2024/CVE-2024-33xx/CVE-2024-3385.json) (`2025-01-24T15:55:48.127`) +- [CVE-2024-3386](CVE-2024/CVE-2024-33xx/CVE-2024-3386.json) (`2025-01-24T15:58:52.233`) +- [CVE-2024-3388](CVE-2024/CVE-2024-33xx/CVE-2024-3388.json) (`2025-01-24T16:16:18.310`) +- [CVE-2024-34161](CVE-2024/CVE-2024-341xx/CVE-2024-34161.json) (`2025-01-24T16:20:57.617`) +- [CVE-2024-35200](CVE-2024/CVE-2024-352xx/CVE-2024-35200.json) (`2025-01-24T16:15:15.340`) +- [CVE-2024-35995](CVE-2024/CVE-2024-359xx/CVE-2024-35995.json) (`2025-01-24T16:15:35.870`) +- [CVE-2024-42067](CVE-2024/CVE-2024-420xx/CVE-2024-42067.json) (`2025-01-24T16:15:36.447`) +- [CVE-2024-42068](CVE-2024/CVE-2024-420xx/CVE-2024-42068.json) (`2025-01-24T16:15:36.613`) +- [CVE-2024-44949](CVE-2024/CVE-2024-449xx/CVE-2024-44949.json) (`2025-01-24T16:15:36.763`) +- [CVE-2024-4618](CVE-2024/CVE-2024-46xx/CVE-2024-4618.json) (`2025-01-24T16:37:51.287`) +- [CVE-2024-47683](CVE-2024/CVE-2024-476xx/CVE-2024-47683.json) (`2025-01-24T16:15:37.083`) +- [CVE-2024-49926](CVE-2024/CVE-2024-499xx/CVE-2024-49926.json) (`2025-01-24T16:15:37.237`) +- [CVE-2024-50010](CVE-2024/CVE-2024-500xx/CVE-2024-50010.json) (`2025-01-24T16:15:37.430`) +- [CVE-2024-50282](CVE-2024/CVE-2024-502xx/CVE-2024-50282.json) (`2025-01-24T16:15:37.570`) +- [CVE-2024-57184](CVE-2024/CVE-2024-571xx/CVE-2024-57184.json) (`2025-01-24T15:15:10.523`) +- [CVE-2024-5913](CVE-2024/CVE-2024-59xx/CVE-2024-5913.json) (`2025-01-24T16:00:42.420`) +- [CVE-2024-5917](CVE-2024/CVE-2024-59xx/CVE-2024-5917.json) (`2025-01-24T16:04:54.887`) +- [CVE-2024-5919](CVE-2024/CVE-2024-59xx/CVE-2024-5919.json) (`2025-01-24T16:06:00.323`) +- [CVE-2024-5920](CVE-2024/CVE-2024-59xx/CVE-2024-5920.json) (`2025-01-24T16:06:43.023`) +- [CVE-2024-7634](CVE-2024/CVE-2024-76xx/CVE-2024-7634.json) (`2025-01-24T16:14:16.497`) +- [CVE-2025-21654](CVE-2025/CVE-2025-216xx/CVE-2025-21654.json) (`2025-01-24T16:15:38.177`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 9f1d58cd9b9..d39d00ae915 100644 --- a/_state.csv +++ b/_state.csv @@ -148399,8 +148399,8 @@ CVE-2020-13364,0,0,53ce55a341dba2b5cde7846e115da63d3b5af1cde2f6f4b9f0b9108c49560 CVE-2020-13365,0,0,f136ff2ce482ec34e26f3ef668ee8ad897f7240d0bbb0f4c0c252369bcc77c0d,2024-11-21T05:01:07.457000 CVE-2020-1337,0,0,9dca45a59737f88b3fbc4ffa0f6072a726fd182df2ab049ca0eb9fa4069ee98e,2024-11-21T05:10:16.580000 CVE-2020-13376,0,0,01c788872deaccf02c44c8959b1cb6541c67a2d8a306ae345b4147aed3a1f40d,2024-11-21T05:01:07.643000 -CVE-2020-13377,0,0,37ecfd48ce0adc1bae3cd40b1ae8001407651f3ae6f793820209828785478268,2024-11-21T05:01:07.813000 -CVE-2020-13378,0,0,4266357f07674a4038905ff6dace68cc09955770c5d0046e5abd2ca1a7ee6e17,2024-11-21T05:01:07.997000 +CVE-2020-13377,0,1,50d2cb2e90399337085a8304893e26f78e454d6bfb2f8538ff93280c08c6a8d2,2025-01-24T16:15:27.070000 +CVE-2020-13378,0,1,79d362d5440535ad8a89cdef5bd40ecd62ca4fccdd7dba3a6e0e06bf6e083af1,2025-01-24T16:15:27.830000 CVE-2020-13379,0,0,6ff176fe592dc5c07f2c5703fe95edcc11613517518704b4ff40ef9da21eff08,2024-11-21T05:01:08.160000 CVE-2020-1338,0,0,5cea49e6e56113cf47ce9434a23de8c063a8817810fe85100e9754046ae01f26,2024-11-21T05:10:16.757000 CVE-2020-13380,0,0,110e61f6e418b6c3ff47b1bd4e2b8c03aefc718d22f8971bfcb5c1b10af9444a,2024-11-21T05:01:08.380000 @@ -184248,7 +184248,7 @@ CVE-2021-42714,0,0,140a3cd5e613fc165c37326bf38fb922982c9fd894685b7a4d43fefb24c5c CVE-2021-42715,0,0,c8bde02f0ab72afb9d2fb48b644a9a783de2cde5ac488a27334e06356251e70d,2024-11-21T06:28:01.600000 CVE-2021-42716,0,0,e8b94a98a1f8c8c4ace912bdc692f2844b824dcc8731c978eb1cf416bf562dab,2024-11-21T06:28:01.797000 CVE-2021-42717,0,0,e0cf32cf401f390ee5050d72c9219b1b18cae5d87b497dbc59e68726d57c7a54,2024-11-21T06:28:01.980000 -CVE-2021-42718,0,0,6fd505bf17750ba7bf6b12f36be700fd4af3e410b56fad1edd51f46f32d0229b,2025-01-23T23:15:07.717000 +CVE-2021-42718,0,1,f953d3282057f93e0ecf49380a977e688d87af4fa7b770ecfb8f3d28fe970821,2025-01-24T15:15:08.273000 CVE-2021-42719,0,0,232b901bd7344df0e76a38bf0733064f0ffc60bd5a3326d6e3679ce2d8d049d8,2024-11-21T06:28:02.177000 CVE-2021-4272,0,0,006f9c0c258b6542fa695fbce9f3e6480d068f1e6d826347b4056504eefe3da7,2024-11-21T06:37:17.187000 CVE-2021-42720,0,0,6c01ada51f5b603949f0fb523bc32a23bc190aeaf3150ba0ad135eaf5048262b,2024-11-21T06:28:02.307000 @@ -187255,7 +187255,7 @@ CVE-2021-47031,0,0,f25d58627717c7a924412e6b385dc0162de8a15a4b87c0428fe4a16ade98f CVE-2021-47032,0,0,f22b5c2b67e4a40c2eae631e37e00c6244655f0e82c48b647957682054f83dad,2024-12-12T15:38:48.267000 CVE-2021-47033,0,0,0c47657436e397a05f9881d648a026b558b2d013a92d5e54cb5a3af71fee4259,2024-12-12T15:39:46.350000 CVE-2021-47034,0,0,24c3e8f7c4176b8f22212c00c61bbb11a7d89013e052d0b7d3fa32ebbfb9913f,2024-11-21T06:35:13.940000 -CVE-2021-47035,0,0,dc54a11a69ec198dc44eaaf29e9f3953f7aa3a74a57d8fb339dec15690dca7f4,2025-01-09T15:15:16.310000 +CVE-2021-47035,0,1,53047d823c2bc5a21fd15a3f65846d517f3d894eb26ec981725bfabe968e651b,2025-01-24T16:15:28.167000 CVE-2021-47036,0,0,5f024a05262de61e5ac08b9d5f719a3994f1541d12133f825b62021cb35ce987,2025-01-10T18:25:11.710000 CVE-2021-47037,0,0,e2a6224280b33eb3dd7afbe5e80331954cdd908902ccf3c78df2c23afa2e92d0,2025-01-09T19:47:04.127000 CVE-2021-47038,0,0,173970a6c5d44bb723efd6b764e694ea73860ece1a8d9e4523c1041c196f5023,2024-12-06T20:56:10.230000 @@ -187535,7 +187535,7 @@ CVE-2021-47311,0,0,98e1520633064ae9e3dacbc844be85413b874bf2f2fbe22abe4dd107f5906 CVE-2021-47312,0,0,ff86c9dd2d16a622215b4ad8e9480ff3358e2ff4844e931b7513ca3679660ed3,2024-11-21T06:35:51.343000 CVE-2021-47313,0,0,174ef32811d7098b5db5ef1f2809acfcc4a86790f0c1c80b5ea6f0036d215f8d,2024-11-21T06:35:51.557000 CVE-2021-47314,0,0,ff82d7f5d9d8e8b670019e9e1121b7bc84e2a204794ea492ea0b9951850e98c8,2024-12-24T16:38:21.477000 -CVE-2021-47315,0,0,5bcaf9c32079e82b705d6ab9332b28d8f144631fd89fee0889f389a7ecac4b28,2024-11-21T06:35:51.877000 +CVE-2021-47315,0,1,1c774c850aa8c008ae669ed9dcdea3d54ed8679a6f9941a33747b5664e8e40c0,2025-01-24T16:15:28.320000 CVE-2021-47316,0,0,84a8b71459e2724b9fd56eaaaa584f59f6bab28499815fcf33aa4c939541d9ec,2024-12-24T16:28:58.957000 CVE-2021-47317,0,0,3838e2614ac7ab009e6914ad0a37d76ff9764506da6fe77773a0c7cb8f8c3855,2024-11-21T06:35:52.117000 CVE-2021-47318,0,0,97c8b27b6e49c8073856d58fa89216b8809f5362835ffff068977fd7df7f93b8,2024-12-26T19:51:01.310000 @@ -187710,7 +187710,7 @@ CVE-2021-47486,0,0,88c8c3df27ba0eeb24fb2b7659c34d77a5973e70158aa708cfc8f1021fd4d CVE-2021-47487,0,0,37fda3dbde69565646173f301baa99f70441700610bcbfc8402f3e27ab23c916,2024-05-28T19:15:08.983000 CVE-2021-47488,0,0,6bd518faf568ee263bd5be6b79978583251019752295859beb9e265d517b8683,2024-12-05T14:15:18.520000 CVE-2021-47489,0,0,7a56ba536c26f6b77795729fd8e0581a390a0f0ae03d489f7fb50e689f3ce146,2025-01-06T19:53:35.453000 -CVE-2021-47490,0,0,22cabcef8825802668c313e6d23eccafa6a43256fc54b1550f934faa77d67183,2025-01-06T19:57:02.840000 +CVE-2021-47490,0,1,151ef266838c7722eaa82f178f6718ea223752e3cd4c4dc0ef3927c3dea46501,2025-01-24T16:15:28.487000 CVE-2021-47491,0,0,a7ae681a6beb6f8d9fda8dae0b15459feddf1ede34bb94ccc2241694dd76ab3c,2024-11-21T06:36:19.300000 CVE-2021-47492,0,0,e82c8d015c8bb1bcf824fdaff87708e8950e6b9aad1aae2306eadf8a5f0445b9,2024-11-21T06:36:19.453000 CVE-2021-47493,0,0,128c39466a91dd489967bfa4d617eb862533ef102769ccf5f2f0167d6d02e0df,2024-11-21T06:36:19.610000 @@ -211632,7 +211632,7 @@ CVE-2022-47087,0,0,71e1d075af60f0196fec030f4063ebef2a527befdf051f7d8aab63cbfb7f1 CVE-2022-47088,0,0,b98f05ebb857ea10095f9123635832e30648965003e7905490df3f376b4f5ac8,2024-11-21T07:31:29.167000 CVE-2022-47089,0,0,c26f1970b9b74981bf0ba358399601b51f970d4bc6d651e1fb898e47882bb5e7,2024-11-21T07:31:29.323000 CVE-2022-4709,0,0,1f437bf2ea3e8e3bab0082991e8fab50396d2759962fdd1fc9d6c440da113a90,2024-11-21T07:35:46.720000 -CVE-2022-47090,1,1,4caefa6e85225d928b863e489054c729d91193c1b2db83b9759d3bf0e02ecd86,2025-01-24T14:15:29.983000 +CVE-2022-47090,0,1,ae01e4c68d48c412bbdcfcb8069a7e5e6d3560c210d94a858acbda148fba9579,2025-01-24T15:15:09.350000 CVE-2022-47091,0,0,db15f4651accf3f758fc133188e22b6d8feea29161132f964d3be0e2cd0a0db6,2024-11-21T07:31:29.467000 CVE-2022-47092,0,0,57a161cd1a90d36624564d6855b7761a383436d80f0225bf005d58c6b513c817,2024-11-21T07:31:29.617000 CVE-2022-47093,0,0,c2cb877abf1ea1738d9899afcbe4c8d2160b9b83bca6cbce52c2f3ad1b51f180,2024-11-21T07:31:29.773000 @@ -212119,7 +212119,7 @@ CVE-2022-47875,0,0,5452f740a78c73caa4a657fddea9b236c0ccab2f61a24d95fc04cf4b9ef18 CVE-2022-47876,0,0,20e65339e4b12003bfe8074da0a3070b01a9d4475680513dd99c3db343e8e56e,2024-11-21T07:32:26.917000 CVE-2022-47877,0,0,f4f2fa3f9619bc52600ea7032a7ebd4771ed2cd68feb9a57717103525e5dbea1,2024-11-21T07:32:27.047000 CVE-2022-47878,0,0,96bb6067105e74676882f6a527181b82486d927c40bffd915863185ad4f54ac6,2024-11-21T07:32:27.203000 -CVE-2022-47879,0,0,ef6bc94ba84f6f100bd6eda583fa782b7f29ce8abe75b4ea77c01a5f96dc00b6,2024-11-21T07:32:27.340000 +CVE-2022-47879,0,1,e171eb85302c2db35aabd0617a1925f41a68d1f3980643b9d1c66f3e17099e71,2025-01-24T16:15:28.653000 CVE-2022-4788,0,0,ae818ad2c7b032c533d8af8074501d3ba3cd4c515b256fa77825654e4447ddf5,2024-11-21T07:35:56.633000 CVE-2022-47880,0,0,2b9b12298f1b7624f9ffa9e5b9503a4a9a483e57014d89d5abe2b7ada15e54e5,2024-11-21T07:32:27.520000 CVE-2022-47881,0,0,34fa102bc5505e6f5f8a5f6eb9d86c65176a3776a73b2e6594f74a0441654a64,2024-11-21T07:32:27.750000 @@ -212876,7 +212876,7 @@ CVE-2022-4885,0,0,3ccdceef4b557bc79233cdb7b14f77a0f886bb4504e564212ba210d67b8e92 CVE-2022-48850,0,0,3b978e81aff8dc66cd596ad9489b1964b8388a9bdaa732c023a8dce60be7c237,2024-11-21T07:34:12.593000 CVE-2022-48851,0,0,b5963e610a6b567ac27737bdbd152c9c020f59e3a839696883f7155074b9e929,2024-11-21T07:34:12.727000 CVE-2022-48852,0,0,9fc4f1c46d46ea22bd79b6cf1608c487939c6d3e31f26d42d2cc7463963bf761,2024-11-21T07:34:12.860000 -CVE-2022-48853,0,0,d66a0b72137df64285211f5f0a2dfd8291835be525683e78c15c3e88c274e908,2024-11-21T07:34:12.970000 +CVE-2022-48853,0,1,8d77c49ee747406f062ef056c2dfb1e00e807558dfcc9efadd667e47932b4d7e,2025-01-24T16:15:28.903000 CVE-2022-48854,0,0,2d778ad3769b2fb042d7b591db0c0b14e6de39464f2c07683bd4152f5e15df97,2024-11-21T07:34:13.107000 CVE-2022-48855,0,0,3440a8fe244e5b729d47867f28dab7872054b8e4a4f1a9a9bdc3539e1e624218,2024-11-21T07:34:13.223000 CVE-2022-48856,0,0,994bd64d45742980b19592d97900b715dbceaf01d7b34b48a35f5cbef2c0d039,2024-11-21T07:34:13.363000 @@ -215554,15 +215554,15 @@ CVE-2023-20715,0,0,8e093ad3da4ecddaecba75d344d8950a8e8f5da70b953ce26dbfe70f2bae9 CVE-2023-20716,0,0,bc3be8c9031ce5b0447b088e80cf2c0fbcfc772b8457c122fb9d1df8c33921cf,2025-01-07T19:15:29.203000 CVE-2023-20717,0,0,b1525d88cbb5a71350e022089167c9477dd4337e8a5f350edb710d89d59053d5,2024-11-21T07:41:24.550000 CVE-2023-20718,0,0,2e64cc91ac3fceb6b2ea1e66c38b215865ab90c7fd81e4e8c5d4727f49967c2a,2024-11-21T07:41:24.663000 -CVE-2023-20719,0,0,45e4dff0160f18a628c25174a9fe687a5bec30bfc32b0dec31f347aba43aa199,2024-11-21T07:41:24.780000 +CVE-2023-20719,0,1,b9a51dcc17d7372cb485458318997bcd2c9a54e6b566b2d8edb56d8e4e7d82bd,2025-01-24T16:15:29.153000 CVE-2023-2072,0,0,4884565e98bb3f8af8c5fb57495cf09e2b7ab12c309a5284f57a5c3408c00f44,2024-11-21T07:57:52.907000 -CVE-2023-20720,0,0,f92d0457152480199ffa5445b7b918e7470b60c778731a251e0475d5347a9344,2024-11-21T07:41:24.890000 -CVE-2023-20721,0,0,4ac0489da75d4749b3cca2d595c249202b58d4263b9ac12b1a7212ea3e62d150,2024-11-21T07:41:24.990000 +CVE-2023-20720,0,1,4a7a68b2c716e4ecb2a5aae90dc33885f65b61eb4754c7c958faef79b057fc00,2025-01-24T15:15:09.510000 +CVE-2023-20721,0,1,a24821403aa253474369b638de67f291e42084a5cf1fffe2e3188c98affac224,2025-01-24T15:15:09.697000 CVE-2023-20722,0,0,8920eb055d033db9af8b82d589874977302f3c6343fff535a2c237261054f9eb,2024-11-21T07:41:25.093000 CVE-2023-20723,0,0,9d0686f907129b6919ada24bf4f11d306c0e127a565ad2d2e14861ae5024a41c,2024-11-21T07:41:25.200000 CVE-2023-20724,0,0,987f1a6ebac7796ad97470c40868ad4c190da72715630d9002692d9f05c5b7e0,2024-11-21T07:41:25.307000 CVE-2023-20725,0,0,f09278808328dfcfcad9a9453e6e7f164215557bbd6c9f4188e9f9b639210912,2025-01-07T21:15:10.227000 -CVE-2023-20726,0,0,0839a4ee0c7a4b353253d289124d14c8c0a8623790680626ad23a3507d551e11,2024-11-21T07:41:25.530000 +CVE-2023-20726,0,1,ea7b2fc029caf76e23c2ddf30e1b5ec45f153a58220b9cdbb3044db4236b67df,2025-01-24T15:15:09.850000 CVE-2023-20727,0,0,12b8e73d1738786379705578d5b084abe724825ea42c8abd1e84732d69f07547,2025-01-08T15:15:10.070000 CVE-2023-20728,0,0,a92d83daff0e8454efbc72619861f5e9876e5beba7cfa77f65738746f6788e6d,2025-01-07T21:15:10.397000 CVE-2023-20729,0,0,f84aa0f145a810d5b9d4006033a907e85d272d4f717361c7926bd179f76d2bd7,2025-01-08T15:15:10.470000 @@ -215713,7 +215713,7 @@ CVE-2023-20873,0,0,cff16cf52797f467ed7c741f13305368b4aeab764d12cb3c66fbc1fcdfdb8 CVE-2023-20877,0,0,b1137b7a4eeb2839e9ccb1d52d41b83ecff55e9d480687605ddf1601b1de1f1a,2024-11-21T07:41:44.253000 CVE-2023-20878,0,0,2b44a2f19288e0e47b5de5247c31e040ccee0af9e3dc60185cd935597e4e9887,2024-11-21T07:41:44.370000 CVE-2023-20879,0,0,eea88eeb6a512c97a72206f821436dcf25752e98f66fc5c1c632c6621e574c15,2024-11-21T07:41:44.493000 -CVE-2023-2088,0,0,9f8e292d651d21c36b9af5b45c9cdffbf076f69eae648c8e10138b7c2bdda769,2024-11-21T07:57:54.757000 +CVE-2023-2088,0,1,24ce61252c8d92165fc18045e361791e8ad1d2941848cbdc61c8790fa17c0641,2025-01-24T16:15:31.020000 CVE-2023-20880,0,0,b89bffd797ab3d3197d8fc9600fb55a084a937e4452f2b287a8d2721678172d5,2024-11-21T07:41:44.600000 CVE-2023-20881,0,0,28548a0f62d733f2b9bfce23b0d5259ba7f92cf2a2fb9432dc94d495c2741f09,2025-01-21T20:15:28.703000 CVE-2023-20882,0,0,1976a8fc4a44fc2bcd0b63f6d8b4f374b2bf769fbb5b3a6e0734bfa5f060d62d,2025-01-16T15:15:09.943000 @@ -220692,8 +220692,8 @@ CVE-2023-26612,0,0,8eccd5871370c46cb1111cb4a17a9c69d073d082ba3a5df5b0e10012d4df5 CVE-2023-26613,0,0,120ba6265fcb3cf19f2357fdcb80ea4c92f5664f2a9334b9149078c19230fca3,2024-11-21T07:51:51.650000 CVE-2023-26615,0,0,b1c0aae5e392c30ce2c4d712f02efcbbe24144b6b4e10ffda1bbc8eaf0b88e1b,2024-11-21T07:51:51.820000 CVE-2023-26616,0,0,2e027fd845621efa326267a94dfcb7cbbd10a7f06b92f1d8d8cd963f5dc12aaf,2024-11-21T07:51:51.963000 -CVE-2023-2662,0,0,32fd4e013c6d2b49c46cb1d75a47283e34891081482572563a4fa6e48025cd79,2024-11-21T07:59:01.810000 -CVE-2023-2663,0,0,8e1f7347a3abf55d5d5cdfdde3dc1e56b86e1f907182b552a946da6e9f67e7c2,2024-11-21T07:59:01.930000 +CVE-2023-2662,0,1,2973a9029829992593f0d5dabe74e36198f558dd0d24ae9660dda7d93b31eb3a,2025-01-24T16:15:31.363000 +CVE-2023-2663,0,1,a3908223a8e03c9451d85e3631bdc1567c5e1863507997b1f9008f1a823a9aa8,2025-01-24T16:15:31.577000 CVE-2023-2664,0,0,e7c36dfaff988feacef4158a2d659b331a7c47d3406f8238770737e676e6c70b,2024-11-21T07:59:02.050000 CVE-2023-2665,0,0,e5b7339a4fcb8032459406e1fe808cdba5855d756319b57a6fa5792c1c96eed2,2024-11-21T07:59:02.170000 CVE-2023-2666,0,0,b098ed80079283f051abeddb7ba88f3806c5b4e359fbb2dc4b53ecc79dfeeafc,2024-11-21T07:59:02.293000 @@ -220755,7 +220755,7 @@ CVE-2023-26812,0,0,405afcd0d18a0ea560dd97c3f75aa90f8bace35b4b99f4dead56b89234a96 CVE-2023-26813,0,0,5fd5450c53d4b7396f768bb50de6f75fc57b355d9cbf4218f0f8b9ab8eee48ea,2024-11-21T07:51:58.173000 CVE-2023-26817,0,0,f8edc25173a549b3f29de504f53c2bc2fcc39d7fa335f22e484d9208ed7a554c,2024-11-21T07:51:58.307000 CVE-2023-26818,0,0,b63145fb84ce562cc723a09a012de7a28b2829ff563282d82a15395b053b2245,2025-01-21T20:15:28.950000 -CVE-2023-2682,0,0,8df08de5b730cee8b528378933734cf2dc739cc79304f7406b7cbe5fa27c1a08,2024-11-21T07:59:04.553000 +CVE-2023-2682,0,1,9b88becbcfacd87e25e1a76055535af24eaf820e5db6040219e10c3c272cab2f,2025-01-24T16:15:31.980000 CVE-2023-26820,0,0,182ac862113fcb9d0cf4004fb66a49fe830229688194874f8f89f805ed1e0bc3,2024-11-21T07:51:58.593000 CVE-2023-26822,0,0,0387f39114a54d5ecb6e5ca3782e1c7b9aa74ae750547fc66c9d140c892e6c1e,2024-11-21T07:51:58.723000 CVE-2023-26823,0,0,204a407be7e9bf57ccaff49b561752927f6e7e4b0c05759cf501f80604a92154,2023-11-07T04:09:42.597000 @@ -223277,14 +223277,14 @@ CVE-2023-29802,0,0,1eb254eb69b96f7a1296ae9e7c3297f84acc11dd6acd6a3dc2b936c6a8a08 CVE-2023-29803,0,0,ee12973661cf31fcd1cca7248d9aae9e24d9e4b28b43bd296556c38847f1c3a4,2024-11-21T07:57:31.977000 CVE-2023-29804,0,0,ed3fbdbc16686992790c75a8a9dc18ab35383ed2351f6345fd5d7360c677e322,2024-11-21T07:57:32.117000 CVE-2023-29805,0,0,eab8f6c7a340db7effd1da4e68fd842071ac192aa93dc09c9185af7e7d598c51,2024-11-21T07:57:32.257000 -CVE-2023-29808,0,0,01aba8d049a230b50434367609c7a5a3cb30e244a2ea58e59c27d1bb65daf87f,2024-11-21T07:57:32.400000 -CVE-2023-29809,0,0,3cedc27efac005cd436a652d0fb105fb3929c99fef4128fba60e7ed17241ac5a,2024-11-21T07:57:32.547000 +CVE-2023-29808,0,1,4b785c8755117024629672fd0053300c9be30727acd66fbd1146301239d1c1d5,2025-01-24T16:15:29.357000 +CVE-2023-29809,0,1,f2324c252c4e3b480546fe0c11564d7532207b0aa3e092380e867cca3e7d94ff,2025-01-24T16:15:29.680000 CVE-2023-2981,0,0,9fb4d1314e0567ac8aec055caebe6d7a58f037e10eefe707bba2b1061e47c270,2024-11-21T07:59:41.567000 CVE-2023-29815,0,0,b2eae5a9d28b68d854f53e61f1466bb75eb7be05b1159364fb38e6c41e10819f,2024-11-21T07:57:32.690000 -CVE-2023-29818,0,0,6de3b31385a10fb0bb9b15bd2b7687f28514d9ba3d25ed03c1e244ca7679bf73,2024-11-21T07:57:32.827000 -CVE-2023-29819,0,0,917bf6fe96e0070d62aace9a9a5faa3cbd8475f6bd674599adbf72aac6b78e65,2024-11-21T07:57:32.987000 +CVE-2023-29818,0,1,2e150953091693314133e4abcfacfde113a23cd4be7a162e0146616bfc82af3a,2025-01-24T16:15:29.943000 +CVE-2023-29819,0,1,42a3e498f4b71e6c349fc664a2c1989d31ee4f09c12e281cbe701df604c85826,2025-01-24T16:15:30.210000 CVE-2023-2982,0,0,8f7ccf530e35fb0c640011a15ad5fe3228bd641c44c701174542b27028f37cf4,2024-11-21T07:59:41.720000 -CVE-2023-29820,0,0,f014981c251dd1a6ad9abb110c2f512dcedf182682caa1cc0bbb446af0cd3063,2024-11-21T07:57:33.133000 +CVE-2023-29820,0,1,51f93390451451f65afce02a06a86e825aec64e5493f58b6321cc01a3852721c,2025-01-24T16:15:30.470000 CVE-2023-29824,0,0,85dedb7352f0727633aeaccc3e41069d9bd5b10e67735c58af0adb8a1e88f624,2024-11-21T07:57:33.280000 CVE-2023-29827,0,0,3e5479e873986015a998b7a860aff400de2c1d5169d2c547e9f9a859a0518a3d,2024-11-21T07:57:33.507000 CVE-2023-2983,0,0,bf27bf48a847d611eb833f14fa2aa7617e37685542c89701a1a81d2cb7aea60a,2024-11-21T07:59:41.843000 @@ -223363,7 +223363,7 @@ CVE-2023-29973,0,0,5d9ee80e86badd3f9db3dbfa1987e97512008502a69f06bef379036dc888d CVE-2023-29974,0,0,ddbcecfa997b6645a33f5ae1f43bd5460df6e86eec2a4de1694b2b486d1c9ddf,2024-11-21T07:57:42.783000 CVE-2023-29975,0,0,40720ee6d47d55a51706f124606d253d1ffa588cef9f156aa93ddba9fbd6c79d,2024-11-21T07:57:43.003000 CVE-2023-2998,0,0,1b6ce606c073f2f25d79f3f75e5e06457895c01800a04a3eca245ac3c767f43f,2024-11-21T07:59:43.453000 -CVE-2023-29983,0,0,d6df98ed72aa45d7a9fc1731ad28a4a7c0bcb225dfb02278d5e3600199fcb6a8,2024-11-21T07:57:43.140000 +CVE-2023-29983,0,1,ed99309646d76794ed687f7b700598e0017fad6201e28c194a1b81153669a24f,2025-01-24T16:15:30.773000 CVE-2023-29984,0,0,849d1d8bb8d1c82dd4465e18dc063bc7bb7d4f6685f858666cc49d05da57a8b5,2024-11-21T07:57:43.273000 CVE-2023-29985,0,0,b12310c1ee5bbdc1261f7a8ed5e13634d33dba6518ddef2866864286487694ec,2025-01-22T17:15:10.717000 CVE-2023-29986,0,0,c0a4da31bf6e6fcd318ed3581b7de177d3f4a8c74bca980aa70eef57c49d0ccc,2024-11-21T07:57:43.767000 @@ -223425,7 +223425,7 @@ CVE-2023-30123,0,0,835c58c9d607f19b1792968c8a910c4fe7fff5d09df3ae6ed77890887498e CVE-2023-30124,0,0,f6d6551541f17153a38fa0c2056b81805b77294c78e3ebdf6e8a039b5b0025e3,2025-01-23T20:15:27.850000 CVE-2023-30125,0,0,ddfbbcc2295c6563d91cd153a8cffb73381935c4f3636f46ef8f6367ce01a373,2024-11-21T07:59:49.257000 CVE-2023-3013,0,0,509acd34da124c1d7d9ccb7ed0713e0819213ff1b5d2ad46c88df5b81dbc0538,2024-11-21T08:16:14.467000 -CVE-2023-30130,0,0,87f54d474660ab1ab4bda0b6f70d52de27483388cc6f240592137e243a7ea98f,2024-11-21T07:59:49.403000 +CVE-2023-30130,0,1,120c6c222af6aa498067e68b2ffbe727b1a681831533898f9c85373164a5a3c7,2025-01-24T16:15:32.220000 CVE-2023-30131,0,0,e098ad323162eb9e1d490a7a0316cb94f586f4d29ed0e78d4772fb619fbcda35,2024-11-21T07:59:49.547000 CVE-2023-30132,0,0,09a73d51f7875d392cb17e57f19213861472198646bd9982466cd1784a4881ea,2024-11-21T07:59:49.727000 CVE-2023-30135,0,0,28029c0c876039a2ea19d0259bbc275264b5b7a69c9301bd02b9aa38cead5fb2,2024-11-21T07:59:49.877000 @@ -223482,7 +223482,7 @@ CVE-2023-3024,0,0,42e16d8797666cef7c2a7af6337cf55918463e43391c3789ce8d44b34ac18f CVE-2023-30242,0,0,8baf24c44e63d1d69a6b0e1808b413624bf1c2f7ebe52100423b7d370d1b23ed,2024-11-21T07:59:55.833000 CVE-2023-30243,0,0,cdd46154297eae24fd51e167aa0472371f4219ce774c3c7239994abd7252160a,2024-11-21T07:59:55.980000 CVE-2023-30245,0,0,a964180dc5b6ec566c747fe0ba5220ac10fc7a3fffcac9a0879e4ba7b66689a8,2025-01-23T19:15:09.430000 -CVE-2023-30246,0,0,8a577b177dc397aafb5a0fb9946df8b4a13e1d2c5bb7571ff9eb57b39df3e8f7,2024-11-21T07:59:56.270000 +CVE-2023-30246,0,1,6dbb071f5e59c28eb4fadaf8cc46d1b6e0a4cacf509deac2c8135d3934a98362,2025-01-24T16:15:32.490000 CVE-2023-30247,0,0,903b7ad5843b2662c72b6532d3f837f2c30e6290bedd17cd01ed26c5389753f9,2024-11-21T07:59:56.410000 CVE-2023-3025,0,0,c446eec5a9db9b12bf1ed2b6e31a26a68cf8f29bc31a0a6681096b8631efaa39,2024-11-21T08:16:16.200000 CVE-2023-30253,0,0,75d2b84f9e9ecd963fdf5317e18b495d544993e124b5902f9ae167bc369b8b60,2025-01-14T17:15:11.487000 @@ -224234,7 +224234,7 @@ CVE-2023-31142,0,0,33067fdc6e10ff5f427c740824ff469ddce2b92b370b26eaf75d5d731d105 CVE-2023-31143,0,0,2638c7f79b5695c01ebe57354879379e7491ecc43d556a05b2051cd682ec1201,2024-11-21T08:01:28.940000 CVE-2023-31144,0,0,aefd10799d469e9493d0436033ef241396b6eb54f10b7a272814c265ede47981,2024-11-21T08:01:29.060000 CVE-2023-31145,0,0,b16492c0519f8c2fb3aae24cf21c34f88419a9f1b541df13b15a193744e29572,2024-11-21T08:01:29.183000 -CVE-2023-31146,0,0,211d335684c67c80ab80b03c333264265bb06bb7eac585f4cf5f0fb1359279b0,2024-11-21T08:01:29.300000 +CVE-2023-31146,0,1,ddea7ce0de4933e85188d8a3462304d8882216c76444e632582120b7101e997b,2025-01-24T16:15:32.803000 CVE-2023-31147,0,0,a85d6b27d5b28162209a154f893b6c9b0bdd5c2b97f32d7e1172a1b844e63736,2024-11-21T08:01:29.420000 CVE-2023-31148,0,0,6ba3950b9b92acae697445dc0ade4cc571b4b156687ce466cb9786eb2249f2a2,2024-11-21T08:01:29.547000 CVE-2023-31149,0,0,6b528c4781f1131663b6a823e21897aa43b0e7160cebc7114ce0c62f0de6da84,2024-11-21T08:01:29.710000 @@ -224548,8 +224548,8 @@ CVE-2023-31617,0,0,75d9dd79575ac8f28eb9201284a3f5e0ae81b07e30f1b178c2044ead3e2db CVE-2023-31618,0,0,17a85dd4b503cf0ee5b6f3d961c3c014ad7924ae5d1d84f5ffb3088162338cd5,2024-11-21T08:02:05.847000 CVE-2023-31619,0,0,1989305e97d99faf58d6c74725a0f7878cfd96344011a42da35e35f910f0de6c,2024-11-21T08:02:05.980000 CVE-2023-3162,0,0,93f3ff20815ae3e12b6e1e87ebab4b734c329261c3fc1a22caf2ae8bad17d55b,2024-11-21T08:16:35.813000 -CVE-2023-31620,0,0,dec28e013281042089bb7e421c94b1bcbd737eca27a818c0f0805c59134c8460,2024-11-21T08:02:06.120000 -CVE-2023-31621,0,0,3fd5946fc1215607951edee5a5d9398a0586d854745a0a70958fb67494b615fd,2024-11-21T08:02:06.273000 +CVE-2023-31620,0,1,2c889dbd711ab948387f355f21dcf0e288fb9b8b250f5b6e8fa6c945ff1f20d3,2025-01-24T15:15:10.067000 +CVE-2023-31621,0,1,6d538cd26d4e963121721fdf4267e59ce563fb20354bcd190cf29f37f327e6c9,2025-01-24T15:15:10.273000 CVE-2023-31622,0,0,6d3ee00752dab7888b5ef240c40e307113fb0e412de484db6d50d599629e9713,2025-01-23T22:15:11.817000 CVE-2023-31623,0,0,03592b0827424f5114a0d73dd38792e305e4e6b2ddd9e78d0778e663e72266bd,2025-01-23T21:15:10.520000 CVE-2023-31624,0,0,cae621723b9750b87aa4d5000c7779c52d24ea1456275041959a50c0c9659878,2025-01-23T21:15:10.720000 @@ -224697,9 +224697,9 @@ CVE-2023-31916,0,0,fbf6f69f7a900c147d3e8aa516a0f5061de70d38760e4be1320b53a2c933e CVE-2023-31918,0,0,26d31462eec110bc0ea4d7b38a27204e297550e7e2ee2c74879290079d6ab345,2024-11-21T08:02:23.490000 CVE-2023-31919,0,0,5c290c97b9b9ec7ec4920d5807b11e284892926ed7c3d8e701e7620a8bb4f1cd,2024-11-21T08:02:23.620000 CVE-2023-3192,0,0,67f6792a55f68a187470b1e218d44e4e8e7549ccaf6c276bb4bb2dd84a9f0b2f,2024-11-21T08:16:39.850000 -CVE-2023-31920,0,0,32ab80b698c9b0af9b11f36313cf92606d53cd7d1ea0415d725a3b30a464917c,2024-11-21T08:02:23.767000 -CVE-2023-31921,0,0,a52d1a217b9ae61fbeea8fe81ecc7dc2f8c671aee8908223ae95b7358fccd996,2024-11-21T08:02:23.900000 -CVE-2023-31922,0,0,0562404f087df51c1d1adea35c3b406dc3d8cfb07b11c7b9472bdc4e2b51f41e,2024-11-21T08:02:24.040000 +CVE-2023-31920,0,1,d49a53c9c78aa04ab2e0f30e554cd510e77c1ff4b3883954eb91c13fa642891f,2025-01-24T16:15:33.003000 +CVE-2023-31921,0,1,cd627c5ee00b8d4c5e43df4d7636a4f1a58f57db000cbc18f8d30097b1567801,2025-01-24T16:15:33.267000 +CVE-2023-31922,0,1,179aaa78aeb2482dd9a931b29484603a17cd110d143d490d4d0f1d7eb31b03b8,2025-01-24T16:15:33.490000 CVE-2023-31923,0,0,59fe50f283e4deac6570c3b41017e54c5113cebda3938e940b39c843e8251edd,2024-11-21T08:02:24.183000 CVE-2023-31925,0,0,02b550c7a751f4def6076f92f5dd28a5d9df4a50deb8b72ad1650fb3add8e2b0,2024-11-21T08:02:24.340000 CVE-2023-31926,0,0,6a7438cae3f0bf677e4b98748d244df1e2362cb69938bab18061fac53cb4b799,2024-11-21T08:02:24.460000 @@ -224733,8 +224733,8 @@ CVE-2023-31979,0,0,d300b44c03bc1c129975cbc0d8f58f0c399ebe733b11f42ec3f8f064dd4e0 CVE-2023-3198,0,0,515e3ed81d0edcf31d10aa5b94b3e10f747e5dbb4ce6303dd1e49d134c7cf2c9,2024-11-21T08:16:40.660000 CVE-2023-31981,0,0,666b12d5370a553f075d14d658af721536fc52e7bd665f1afa358898f4b1824f,2024-11-21T08:02:28.057000 CVE-2023-31982,0,0,011d00f032ef74457029adb163552b051e0086f751339ba3019b8b9f9b887d5c,2024-11-21T08:02:28.193000 -CVE-2023-31983,0,0,ef58504e0a637118d6f8845dd53840a1d2db8ad16799a879832aa8e940c8d91a,2024-11-21T08:02:28.327000 -CVE-2023-31985,0,0,bd98f2530ab95ee94061aa53e90417410a462732cff960d98902197614bfe101,2024-11-21T08:02:28.473000 +CVE-2023-31983,0,1,4efee5b350d93dfdc4cbfa54d890ec60308fe93855ac908b64e93cedc1b42ef4,2025-01-24T16:15:33.787000 +CVE-2023-31985,0,1,8651d59591b6d83f709711685ce799ddf56471be269aa9f26e57da8fd2cfafe2,2025-01-24T16:15:34.033000 CVE-2023-31986,0,0,a86388d12941ca26b2d9e93a6377a46e4cc009c4dc5a8370e0cdf32ce5e6b976,2025-01-23T20:15:29.883000 CVE-2023-3199,0,0,3090d868ba2232b79a6345d288a327f64a94c462d32135357515a4c0d92e958f,2024-11-21T08:16:40.807000 CVE-2023-31994,0,0,f52d122711ee0b067c08e1d09861ac42925c6e7f35be5acf7e4bdc9abaee5571,2025-01-17T17:15:09.097000 @@ -224804,7 +224804,7 @@ CVE-2023-32054,0,0,43f8a478b0cf21abf197ad3f98e1ede0d9dc9fb99f9bb0ffb66bf18dc5003 CVE-2023-32055,0,0,b108e9b579e96e99031370531d8ff900b3636fa0852d0cafd06a706bedfd6bb1,2024-11-21T08:02:37.347000 CVE-2023-32056,0,0,77fc61836a442c4a874042832c90313a78519587674b7788c06635f79aedc787,2024-11-21T08:02:37.493000 CVE-2023-32057,0,0,b876159d1a65a9365a9327fdb6ef4e8a575020a76d0220e7843e508aedff8e36,2024-11-21T08:02:37.617000 -CVE-2023-32058,0,0,62b926d464645a1831d9f3d7b0c52c44091fd8a8d2cbab557d4bd30fc3b038db,2024-11-21T08:02:37.770000 +CVE-2023-32058,0,1,789e3b94446572ab2a285fa05ea7fd78ae8544e9ea5130c19f1905ea8f4962ff,2025-01-24T16:15:34.267000 CVE-2023-32059,0,0,e512bcf8cb4bed5136ca7ce0eff2b0eef46022c2ecb32ed7149e920c3827b07c,2024-11-21T08:02:37.893000 CVE-2023-3206,0,0,7acd6ec61ef74b27192653cb468faadf9b045770661206ef36d1b65ac66d72df,2024-11-21T08:16:41.793000 CVE-2023-32060,0,0,f66ca288fc55d36e8d6dd2f6811e89a1e52aeb1e3d1406c030fa40256315994f,2024-11-21T08:02:38.003000 @@ -231031,7 +231031,7 @@ CVE-2023-39987,0,0,ec7b27858488ad489b9493d29969ba367ac6668558c5ffac734951051d609 CVE-2023-39988,0,0,402c42ea155cdcf9f869ed39cfb2bbf84c23e49800ae97d41b93e428e0ea4bde,2024-11-21T08:16:11.510000 CVE-2023-39989,0,0,726f571ee9bcf5dc47f2c24a51abc27b099f3763e764b9376d48d987eb90930d,2024-11-21T08:16:11.640000 CVE-2023-3999,0,0,e82adc70575076927945c28ec9abdcb884177ca58c4faef374d14bbf4ef780e1,2024-11-21T08:18:29.967000 -CVE-2023-39990,0,0,a4c78890b67a79b9fc139f27febe92aaced711c38be1b74f2baf6ae2267a9427,2024-11-21T08:16:11.787000 +CVE-2023-39990,0,1,296393bd9a9a899690d56e0def8c6c30a2634233a34c3af77d7d07a4fa774f89,2025-01-24T16:08:44.243000 CVE-2023-39991,0,0,74a383be9c4ebbeb72cb131d996b41f84dd1c8560e8c672b2e4694a32709fa2f,2024-11-21T08:16:11.923000 CVE-2023-39992,0,0,7ee9edbf56e39b17fe5662eaa21a6513fdaf7509e9723465071698fc41ff63a9,2024-11-21T08:16:12.073000 CVE-2023-39993,0,0,19bd25bb54abc9b1368859dc49e312bb28d2c35700f33dfb536d772530b61a4a,2024-11-21T08:16:12.203000 @@ -243573,7 +243573,7 @@ CVE-2024-10308,0,0,7d25344eaafedd87dec065a0c2fdf72a371424d31caf12f177490522cd87b CVE-2024-1031,0,0,3efe13ab8e8ca0afb2b2c16acf09e60475f45cbc86bc8540948b9d2e079bf4c2,2024-11-21T08:49:38.437000 CVE-2024-10310,0,0,9ff9c4ae788e99e7944a2ba13b3b5ac1a4941438452794ec0f6f96d02747c9be,2024-11-04T13:06:20.190000 CVE-2024-10311,0,0,99dd0a164fd5d198ec222660ccc9d29dd982dc019194a41db7c03f5195e8b984,2024-11-19T17:03:19.177000 -CVE-2024-10312,0,0,f4bee13663796c96de77dd41365ff084676f3c26fb627eed4b17820ac5728156,2024-10-29T14:34:04.427000 +CVE-2024-10312,0,1,b39994a00b367a3cf6aa78e100276be7193fa2e7a390416f516ca912cdaaafee,2025-01-24T16:38:39.150000 CVE-2024-10313,0,0,8e51257a51d56a046cfe59a44fff727a9a10aea7b003f94d7090952f3eb5e764,2024-10-25T12:56:07.750000 CVE-2024-10314,0,0,f90831d51418d5b65f2e88d951f8cb1edd87a709639989f7c510f0aa8ecf0f49,2024-11-21T08:48:23.997000 CVE-2024-10315,0,0,97fe7043360404cd1fec656a00df0c2acadd9a6f0adabddf28ee8ca2d6ef024d,2024-11-18T22:15:05.550000 @@ -243583,7 +243583,7 @@ CVE-2024-10319,0,0,68d02b703a0a786e535b0c06357fe7c6d9a4d92b566f67658115227be405d CVE-2024-1032,0,0,c6d8d12d638c10dd834e783d36f86ba17d33a36b799d5e13aadbdfedd22b0728,2024-11-21T08:49:38.587000 CVE-2024-10320,0,0,727a463e6d691153e4adf6d21dfba57d62d85f0e63e6347b0c5272cff36a9bf2,2024-12-06T09:15:04.710000 CVE-2024-10323,0,0,781894ff71cd07af43d7b18b6e4bb8d52454b1a7052ea864498633c25d9c7b61,2024-11-12T13:55:21.227000 -CVE-2024-10324,1,1,74a0c860d160a88bd39162dca44cfe03c6b767909913030eb00b826523153a04,2025-01-24T14:15:30.837000 +CVE-2024-10324,0,0,74a0c860d160a88bd39162dca44cfe03c6b767909913030eb00b826523153a04,2025-01-24T14:15:30.837000 CVE-2024-10325,0,0,50164109bc79e97836e82121f62c8560adaed8b05d99b6cbe7e736c6f6cb196a,2024-11-13T20:01:05.097000 CVE-2024-10327,0,0,617a4d395486d23ce50d5a586c94c2ff3daf8827139e812231380168dcff8e94,2024-10-25T12:56:07.750000 CVE-2024-10329,0,0,94fb4c89783f4f56c3fde9a354774d639a28f26feb5034ca8d1df1766578ff46,2024-11-08T15:59:16.407000 @@ -245000,7 +245000,7 @@ CVE-2024-1191,0,0,52c745dba0545bd32cfed56be99d144b4d9a393ab55ee6cd469c74d0a91573 CVE-2024-11910,0,0,7cdc56d220bb226d66f2e09af7dfa09212676d67ef40d93704c67462fa98d7df,2024-12-13T09:15:06.543000 CVE-2024-11911,0,0,caa0b453641ff9f186639ae770eb52db38531714654a626a4eab9e32db68000f,2024-12-13T09:15:07.083000 CVE-2024-11912,0,0,0aaa3071f593c52d1aa93372da39c5543ab6e6ea5c65e9bf469d02aec4ea5907,2024-12-18T12:15:08.950000 -CVE-2024-11913,1,1,eae718f0368f5a319c5a4e8b4adc971faf6912aba614acb5c7eaaf8483eb1ad5,2025-01-24T14:15:31.117000 +CVE-2024-11913,0,0,eae718f0368f5a319c5a4e8b4adc971faf6912aba614acb5c7eaaf8483eb1ad5,2025-01-24T14:15:31.117000 CVE-2024-11914,0,0,fa4ae25ac8caf18cb116501f16c4447bae56afeb864dc904882202ad6cc9632f,2024-12-12T04:15:06.983000 CVE-2024-11915,0,0,28ea0a161b7eefe74ada087940b67270e2ec51b6fcf1def4945f57e6c8ae681f,2025-01-11T08:15:24.680000 CVE-2024-11916,0,0,17cc1576783bac64a1ea783d61b5743105d0ea45a1a64d569e9cb4896ade874f,2025-01-17T20:58:37.443000 @@ -246173,6 +246173,7 @@ CVE-2024-1368,0,0,e78cd290aff3eda879ea71814281e9fb9dbaef60630fac7d18ff14dae3d223 CVE-2024-13680,0,0,62173e4be535780cad87d71db6bb29f755aeab9483d96845d17c346a119fa175,2025-01-24T07:15:06.930000 CVE-2024-13683,0,0,fb57f44e8b2d58d524faa1dd2ea3874f278594c1d56e7f409ae90b680d7e79aa,2025-01-24T07:15:08.523000 CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000 +CVE-2024-13698,1,1,dc17e4312525981bb14f68ea913383417af07334780551d0e9684f2f5489da45,2025-01-24T16:15:34.597000 CVE-2024-1370,0,0,9f0498253935aff35f1be521427ae96ebc633e827d9cc62afad8ecd6626aa44f,2024-11-21T08:50:26.027000 CVE-2024-1371,0,0,700f360c37065b466d7daf295c0b566055365a6732e2b4756cd7fe3bd3dfd8e6,2024-11-21T08:50:26.150000 CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000 @@ -246413,7 +246414,7 @@ CVE-2024-1629,0,0,c74dc0a8115d571151dcc08903e06d82eae076a5e9551b744e94ddebd2daf4 CVE-2024-1630,0,0,9b1d75e935e3c43047021c7db741b2a5e1070d9e69f1d2a3037779c882a9deac,2024-11-21T08:50:57.613000 CVE-2024-1631,0,0,e9e6578f8c2841fcf55accc66d2d8ed4ff49074482673094d89548de7e2bc4e7,2024-11-21T08:50:57.763000 CVE-2024-1632,0,0,2cc9b424d1e45f344508e96412d6a0780302c60e8fef2d13cc2533af910269a7,2024-12-16T21:04:13.760000 -CVE-2024-1633,0,0,c0d1468328b03eafc1bc559a050329dada5554f7d68db0c5b4e0ecac8483aff3,2024-11-21T08:50:58.023000 +CVE-2024-1633,0,1,56d60136a7442b514c5e6b403331b5f9aef17563c47e24eae33412d5bd81684c,2025-01-24T15:21:06.727000 CVE-2024-1634,0,0,45305cb187d566717a04251929f56eb3faac05db3d2b4efc70507b416ff13ab0,2024-11-21T08:50:58.150000 CVE-2024-1635,0,0,720ee7466ccef3685a076ad1a7c9e622aa00228f478532297557f856d0d14af9,2024-11-21T08:50:58.290000 CVE-2024-1636,0,0,39caa7ca41ae1683c62ffcaad59925dff9e09968a84b20eec7448789c4ba6505,2024-12-16T21:05:49.493000 @@ -249713,7 +249714,7 @@ CVE-2024-23603,0,0,385cd1da19f9f814b37d46a252792eece53dc5fba36c8bad0a0244cf15993 CVE-2024-23604,0,0,dc5cd839af33b7b3dcb48b002d81e48ae97043185456c58e26e0040b5dd4ee1e,2024-11-21T08:57:59.313000 CVE-2024-23605,0,0,6feaaf8078973106d62b89fd77d8350c669a4c873ff6f3514aa9598da39c9a5e,2024-11-21T08:57:59.433000 CVE-2024-23606,0,0,bab8065b9d3fb9f309eec8177d382348fc7f7d5cfbe3e357e07d9b91afce2e37,2025-01-22T14:58:56.600000 -CVE-2024-23607,0,0,1e3cde2a3bdd7f2b024b02a6b58595499e745787f58fee09de464f8683b42032,2024-11-21T08:57:59.680000 +CVE-2024-23607,0,1,3fec5058d10d6cf455674d1c6284bb37392a28907ec5aace1fd1b3a1426cb5d1,2025-01-24T16:03:56.080000 CVE-2024-23608,0,0,f4f0d3dc90613d42fc8485a3197c71394b07fbc0df27981f4d6ad3675d04a364,2024-11-21T08:57:59.797000 CVE-2024-23609,0,0,b90f833366370fe43c05814eb1526887e7cb7b82ee5ea7a039ba9de77d7a868d,2024-11-21T08:57:59.930000 CVE-2024-2361,0,0,cdeca1550c32896fb6fcfb15aca13512200106e857f7cb5e97a4410236124f83,2024-11-21T09:09:35.667000 @@ -250651,7 +250652,7 @@ CVE-2024-2496,0,0,051579418359f85bbcda93fbe22a82cdbe6432c139ab0c0ffad8ae83e4581f CVE-2024-24962,0,0,1cebc93e4d6c3df34e57cb9df2964db84f2563e9a4c0bd93e3ff40e70b58c267,2024-11-21T09:00:03.243000 CVE-2024-24963,0,0,f9ad2b45a0d9754f789fd77f11d0d6bd197c6b1494b09d688edc3d878ec75bf1,2024-11-21T09:00:03.350000 CVE-2024-24964,0,0,f2f90e1f53bc2e9057a1ed570baa4ea348ebae1fccc952c0417838ff4dd829be,2024-11-21T09:00:03.480000 -CVE-2024-24966,0,0,e5ccfc0a60b4fda19863bc8d2ceaf6e29e4f65f3934bdfaf53d634ef4f5f0f55,2024-11-21T09:00:03.660000 +CVE-2024-24966,0,1,7f40249452ab29b78281e89da3b43963bc92b9dafe5558c0305b23f778ea8514,2025-01-24T16:03:35.577000 CVE-2024-24968,0,0,400e490118c16083e36fd26c85d27bd24dddeb131874caab82b3947794aa5942,2024-09-16T18:03:16.707000 CVE-2024-2497,0,0,9d5b12a04696101a720d6a6eac03c4a25093d05e266f607e067ae28b468c6315,2024-11-21T09:09:53.157000 CVE-2024-24970,0,0,d539881e528c227f4316b7df6b7900424bfa37663985a5801663f38c22e74e22,2024-11-21T09:00:03.857000 @@ -250669,9 +250670,9 @@ CVE-2024-24984,0,0,567c9bd096a581925e3572e03ea5eeb0f022b51699fa71ede6b70b03cbba4 CVE-2024-24985,0,0,094cf98cc2834beed20248e4007d784f8f54307826d7d129d410921b97d6ed81,2024-11-15T14:00:09.720000 CVE-2024-24986,0,0,b3a0aebd140b4a87042d6dd637f5da69c8a05632aba7bbfe41c00120f8cc0218,2024-09-06T20:23:48.690000 CVE-2024-24988,0,0,74b8e9b9bae0b532768d5857c0d83160975e281bd61a0e187400101505fbc03f,2025-01-10T15:38:05.187000 -CVE-2024-24989,0,0,a402b9aca66cddd4a6464999cbe9e050c337be7f6ecab5c12dea82314322f063,2024-11-21T09:00:05.640000 +CVE-2024-24989,0,1,f047be98a40360e6029f683752a6eb630adb3ff7c0f90a26caacf979b129e4eb,2025-01-24T16:02:33.600000 CVE-2024-2499,0,0,58df8167ded63ef11aaf8fbfc99b0704fcf662a903d318b087b95eac1c8b0467,2024-11-21T09:09:53.297000 -CVE-2024-24990,0,0,ddae5e6b8f48beeb2d8fc8afb6b5ce1d9fdd894c4694e1e800a3548e7f007bc7,2024-11-21T09:00:05.750000 +CVE-2024-24990,0,1,d17c58908f77733e52782cecb6917383244c4086dd34cba8e966554b94ce38ed,2025-01-24T16:01:36.367000 CVE-2024-24991,0,0,ab571423a1a6309b0495c9db088adb19784d1783badb8b28c84a771e894ba6a8,2024-11-21T09:00:05.867000 CVE-2024-24992,0,0,7e6c184fe11d55e75cf8acbe2688410429d81c016034216dd125188eaae17636,2025-01-07T01:15:06.780000 CVE-2024-24993,0,0,705a08374da6010fc88afad1a4ae031351a7f03de838c5465f09adbda3ac0c72,2024-11-21T09:00:06.103000 @@ -250703,9 +250704,10 @@ CVE-2024-25024,0,0,94dc9c631d2c500a02ba69e3d14eb503fd049554240337a94df3486bd1e16 CVE-2024-25026,0,0,55a3a6330c68c45602e09e0075b2dfc62f34bd03a295eb50853e9132b5b631a8,2024-11-21T09:00:08.747000 CVE-2024-25027,0,0,2fd12127e4643c673f529161cf53e4588b217516e68f1d873bb50001abb5936c,2024-11-21T09:00:08.870000 CVE-2024-25029,0,0,b687f5b3fdfbde494167fcb1f03a00ea37c9c79db373d46255ea84ad0b785fd3,2024-11-21T09:00:09.010000 -CVE-2024-2503,0,0,4b065baa17858e99cd3ea1415bc34f8838da412071948a2fb813aac3094d8bea,2024-11-21T09:09:53.790000 +CVE-2024-2503,0,1,0a8ceaf40ee6d348134f20a61aab597ac54c9e02f02542b8489429dec92d39ae,2025-01-24T16:37:14.727000 CVE-2024-25030,0,0,3bf7cf36ab25986b6901ce978418ca57d6fa819b3639e450fc36c96ac4859d66,2024-11-21T09:00:09.137000 CVE-2024-25031,0,0,336ae1209bec97edf2f576f0dbcab4e5fecb1cf28a1e1d867216b37694f08f50,2024-11-21T09:00:09.263000 +CVE-2024-25034,1,1,f5b28464f63bf6a635d09fad6f3f1990324805f265725d58c032aeae574b0cd7,2025-01-24T16:15:34.747000 CVE-2024-25035,0,0,b7214df75690f8a2c0cde375218fa064c6af31099cab5de418b369cfbfb53d96,2024-12-11T03:36:11.700000 CVE-2024-25036,0,0,a0130984c78d987e616d5d6732535de3078a91e4d686daa4bfe8d88a169b88cd,2024-12-11T03:35:51.663000 CVE-2024-25037,0,0,406a4670a9668946e91205c5e64e1ad1fa02a4e9c65ab719dde554f47a137fd7,2025-01-07T16:15:32.937000 @@ -250992,7 +250994,7 @@ CVE-2024-25468,0,0,cb5aee55e71ce49f56a046712ac1820d937431364648488dc2293cc0e2ab5 CVE-2024-25469,0,0,c24aa4c966b6f8ca1870c018453e0f40a0fa553e95decb3ca542d17e0f12dd8b,2024-11-21T09:00:51.693000 CVE-2024-2547,0,0,90d41a91a54e213f02614de06ba4c678c4303a08116eb3638a1bbb2663fbedeb,2024-11-21T09:09:59.170000 CVE-2024-2548,0,0,57d303fa99f890e95aa96c9d5878480469012160c102ad27f1353b533c559154,2024-11-21T09:09:59.307000 -CVE-2024-2550,0,0,2d2df85bf011e59207527946e6d118ad16cdeb5fbed94fcf3f161a8c84ebbefd,2024-11-15T13:58:08.913000 +CVE-2024-2550,0,1,6a5e4b4549d1691f69895d2ae26aa3089594f6d4a17f1da19b8f974387ae9a14,2025-01-24T16:02:49.703000 CVE-2024-25501,0,0,39a441609204709047cecad828c175f01310d82b43dc4ea230772a5942f74b33,2024-11-21T09:00:51.913000 CVE-2024-25502,0,0,307ee5d9dbe09c1fb27075518c1665746aaca342b4f56014c6a6529979fd95f3,2024-11-21T09:00:52.117000 CVE-2024-25503,0,0,889bc4d1c9a45aa9bb9b859681955c4aaa1d9acb88f2328fb5f6d57fdc289c41,2024-11-21T09:00:52.333000 @@ -251000,7 +251002,7 @@ CVE-2024-25506,0,0,99ccba7c267fe812ca9bb7b28c69f180daff3656f6e44ea9e8ba74241c00e CVE-2024-25507,0,0,9fb695733a659130193b6dffa9945f8a8ed837feb8d0501e96411ebc99ee0c9b,2024-11-21T09:00:52.790000 CVE-2024-25508,0,0,92100c80cbaf3affd555a0268d09dfe8052603ae7230d3e82684e82ae3278479,2024-11-21T09:00:53.027000 CVE-2024-25509,0,0,42166eaef9b6e11f6e136286cd09ec43584b64bdc7ebb8394c0e539c7275369d,2024-11-21T09:00:53.257000 -CVE-2024-2551,0,0,1da0e8511bbc6ea1ce21f6529f525c05cc67939e806bd7e1b6c4195cf79043f4,2024-11-15T13:58:08.913000 +CVE-2024-2551,0,1,265d4243e402b72fe267bf4eb2a65ff02428a95be8eae67fcec28c9de21f40ca,2025-01-24T16:03:41.910000 CVE-2024-25510,0,0,ca023eb62a1f2d2a8dd2eb69618a6578d9837cb201f68ac0878463bdd7e27af3,2024-11-21T09:00:53.473000 CVE-2024-25511,0,0,89fd33cc6ec57359271fc422a4771012156ebcebdb7a3eea44ebed0d5ba8b4c7,2024-11-21T09:00:53.693000 CVE-2024-25512,0,0,277e44ad57d9c06ac5cb7ec6742b1e6099c94bdafef27e62796fbd5ad12758bb,2024-11-21T09:00:53.923000 @@ -251010,7 +251012,7 @@ CVE-2024-25515,0,0,68d38ba96813124a972695601e0dbed999c1c927ad3b2b72d0939a042cbb3 CVE-2024-25517,0,0,7b2cb83aafad7b6071344c5946ae488491fb26c2ebef9e68b6df4f0888ce2420,2024-11-21T09:00:54.813000 CVE-2024-25518,0,0,4cb317decfcfaf4255d5f51287437d15cd0df33ab197dad7a3fbf21ce3f3bd38,2024-11-21T09:00:55.037000 CVE-2024-25519,0,0,0a91b08bad19e0fdbaaa75835b391d59df452a42edd620ce62fa3db0b15f6e6f,2024-11-21T09:00:55.263000 -CVE-2024-2552,0,0,427c8f824b1d947429c06943f2077049a254bbaca0ca059e13559bf5d00683af,2024-11-15T13:58:08.913000 +CVE-2024-2552,0,1,e1e47af2cca581ed3c1d289a84cebed34b8405ef991311017d33f7466c7f2211,2025-01-24T16:04:14.430000 CVE-2024-25520,0,0,a042afc7146d2009d90a801983c0709f5132afaabcb5d2ca82f1fb2a77ed3c12,2024-11-21T09:00:55.510000 CVE-2024-25521,0,0,083c1f1eb4798ffdb4595c966aa895d7396995d2d4ba0cc9823f1dd5e3910e90,2024-11-21T09:00:55.743000 CVE-2024-25522,0,0,7e799b51e7c62296447ba9d773094e12c4d4d2ce84aff929f4a3c4d9a1ead2cf,2024-11-21T09:00:55.970000 @@ -252119,11 +252121,11 @@ CVE-2024-26881,0,0,c9147da975715d7d9e15d8a477237dbe48b93c3e840440ef85c748b4931c6 CVE-2024-26882,0,0,bbe489ee29c0a7bd46d4fc46f3291be28306717f3a37638640e3b60d051438f5,2024-12-20T13:15:20.370000 CVE-2024-26883,0,0,d72e5c2a08cc96112a7158053aecf4ca442365affa186e749544aa6413017d60,2024-11-21T09:03:17.527000 CVE-2024-26884,0,0,90485ab2ad08ce5980bd35da2176ba31c8ca763f26d4fd993f1e3d22b12d7886,2024-11-21T09:03:17.677000 -CVE-2024-26885,0,0,446267f933cc671c64b57ab46b84d5d9d05b3aa1cddb1f687f50fb09e97e50f3,2024-11-21T09:03:17.910000 -CVE-2024-26886,0,0,8af5f83b231347feac992ebb8fd9bbe331d78a4bb3749c39f2345a13f62ebd26,2024-12-04T18:15:13.987000 +CVE-2024-26885,0,1,643e9d45f6fe64f6adea383a4fb760538978a2ffe2a06c1ba228c5eda0e1253b,2025-01-24T16:15:35.030000 +CVE-2024-26886,0,1,dd647380a56ebf8acf36498a32884a21c01f77b53c500fad9b448c6df387a244,2025-01-24T16:15:35.193000 CVE-2024-26887,0,0,3251ccc7a70790e196686afa8951af70ae741b2291763bea2e84a28b5f78b248,2025-01-07T17:14:41.810000 CVE-2024-26888,0,0,74846900da7a6f8b09026caa9be4b4eccab844d24d851aaa854a0bea0b7158e6,2025-01-07T16:43:58.107000 -CVE-2024-26889,0,0,0a87ef24881e5a1013b327bce78ea618038475fe9f273fcf03f83972360f57c1,2024-11-21T09:03:18.463000 +CVE-2024-26889,0,1,a7b27130d8d4ed99b70cd338114a084bdd22e0e2f2a4841c89823888e896a69a,2025-01-24T16:15:35.380000 CVE-2024-2689,0,0,efd9c698169d4dc6b507d633d5c5bca5635fd88f4fbab04c5f54592266ffc962,2024-11-21T09:10:17.947000 CVE-2024-26890,0,0,d28148780134fe9d4fd26b89472d475a8cd9fd94507e1d0beb5192c2d01a8c30,2024-11-21T09:03:18.677000 CVE-2024-26891,0,0,18ef1231e3dab94fd46bd51769a57b4742af39b60702f0ac393cf1e3791be7b3,2024-11-21T09:03:18.877000 @@ -252158,7 +252160,7 @@ CVE-2024-26917,0,0,2cd003a990279a581d2d89032bc7892ff8b5c3defd3bdb12211a8ce1d0734 CVE-2024-26918,0,0,e7bb26f389a5a5916198efb78afb6d12bb2b7711e670c6a544e944a53023f715,2024-11-21T09:03:22.790000 CVE-2024-26919,0,0,65366cfef00379b1cbe89481caef89d7fa303ec7586e98fe947563381980ec11,2024-11-21T09:03:22.987000 CVE-2024-2692,0,0,0147b94a8d9835cd65a90208a5c856899384f5cde751849e0130c33d80995457,2024-11-21T09:10:18.387000 -CVE-2024-26920,0,0,a034fa1cdb5da08d34204d4070276ff592e5a2a4e972588a6d10aae096528d7e,2024-11-21T09:03:23.117000 +CVE-2024-26920,0,1,d7279416a2894cecfbf8fec270bbcabcd7898c281d7286399c579e20cfbc82db,2025-01-24T16:15:35.563000 CVE-2024-26921,0,0,2afae4822481354b5c521dafcaca57284a34ebeac04955d03f942de62a10c47a,2024-11-21T09:03:23.263000 CVE-2024-26922,0,0,543a9fc4951028adeeb3e4bf5579492cfa9752e9d6e40dd32a1bedf23a9912cf,2024-11-21T09:03:23.400000 CVE-2024-26923,0,0,71b5d2ab6b3f50fc994e954b457014743a33a8f1bd86858c18a8e502b92aa99b,2024-11-21T09:03:23.543000 @@ -252268,7 +252270,7 @@ CVE-2024-27019,0,0,5376b356b11038167465eeb2add854ab08687e91e3f620fcda48466da383a CVE-2024-2702,0,0,93cfdbae0cec94a9921e2ac66017ddca8c7776b570e8e1183b2d27c638693971,2024-11-21T09:10:19.753000 CVE-2024-27020,0,0,d0573a58ce4f9e18709c724e71edef68802be0cf8cb8b98309fa06e708a79451,2024-11-21T09:03:40.660000 CVE-2024-27021,0,0,9883d71920346bcc78c175d4fa4a33fc9cadf8ed29ca97ea798bc9656135691e,2024-11-21T09:03:40.883000 -CVE-2024-27022,0,0,c833ed98c969f87d6e02d6c4036c297dbc511dd1244ba4bd2afc638ebc88fa83,2024-11-21T09:03:41.010000 +CVE-2024-27022,0,1,dbd739de33657415c11414e3e66c989817b265db76abc8d2ca1d25c1fa75795d,2025-01-24T16:15:35.707000 CVE-2024-27023,0,0,2aaf37192bcf19ff82447827ef1a65b2dac0157dd2feeef8bad9a358df7f5392,2024-11-21T09:03:41.150000 CVE-2024-27024,0,0,ebee5e148de6b3dde2fcaa8816a9f4f8ed64a771f098565be007ca61974f2619,2024-12-23T19:22:58.463000 CVE-2024-27025,0,0,5c3859f46c671ad7ffd95b4676d27d7a5d64666b3d74e9808cc4d7ce65e2e8ff,2024-12-23T19:24:12.370000 @@ -253263,8 +253265,8 @@ CVE-2024-28189,0,0,60ed687c41a6d075b26b2f0112d4217df779ccc45bc9e63ca6d0ed32ad3da CVE-2024-2819,0,0,119e8a694e0c71b2df88a1c46090c184a6155f60a9ebd588d2a9454017e4751d,2025-01-21T19:14:24.217000 CVE-2024-28190,0,0,70b823e132fdaf915de1928040350b0ea87b81d33aa6e2ce37203b7b5b322bfd,2025-01-16T19:54:16.763000 CVE-2024-28191,0,0,5b6c074ab018067c965562c5bbc6ca0ef417251157d63225a65bdafc747bece3,2025-01-17T15:39:22.060000 -CVE-2024-28192,0,0,8ce1d4e61a87cb10a00bdafae803eca98700e4efeb74c80b194aed6b869d7272,2024-11-21T09:05:59.927000 -CVE-2024-28193,0,1,8d227e8eb16fb4de0e704d7a312f2e5ac3bfb0063d0e3bd7134246d61929666c,2025-01-24T14:56:33.120000 +CVE-2024-28192,0,1,7508d9021ccc1565db3035af688147509fee676c90504fc13b4f73c460b6ef3c,2025-01-24T15:11:10.747000 +CVE-2024-28193,0,0,8d227e8eb16fb4de0e704d7a312f2e5ac3bfb0063d0e3bd7134246d61929666c,2025-01-24T14:56:33.120000 CVE-2024-28194,0,0,919f980bb3d86b49fd10405531eb8e0036001d5d3499843f594d6737b1cc5add,2024-11-21T09:06:00.183000 CVE-2024-28195,0,0,1c8cd56ede5413ee2e3fc3f8a72d5ad055ccc2245b1d55d162ea0bb57080f1c2,2024-11-21T09:06:00.303000 CVE-2024-28196,0,0,5935adc603506f91db2ad215ee3616bfe048394ec93eefd8b8d42fb8dd2992e8,2024-11-21T09:06:00.430000 @@ -253703,7 +253705,7 @@ CVE-2024-28948,0,0,1666ae581c80c38aac0ccf842fe7ca7d976d37f538b8ec7b216cab7a6078b CVE-2024-28949,0,0,1f3684a855e01293d9c0333b231907267ad216e334a79f7ff99fcfcf991a1b22,2024-12-12T21:38:08.237000 CVE-2024-2895,0,0,4bca94af9c633d3a7edc0e2eccaef4b77d246f77b868137a5fc657e7e56cfaac,2025-01-22T17:53:34.827000 CVE-2024-28950,0,0,1a05508e6285963097a3b72b652266b51c45af88f660c467f1463d180a5b37f5,2024-11-15T14:00:09.720000 -CVE-2024-28951,0,0,09416b672634bd3150f06f0e71a1c5a6f0ce65faa90f7a522075aea097dec4ac,2024-11-21T09:07:15.640000 +CVE-2024-28951,0,1,96f71bdb0bc6bde80209013921c3a1a19a755665bc8f70524936963fccce5587,2025-01-24T16:25:21.360000 CVE-2024-28952,0,0,a3c4c6996f99d6d10f644fb690635fed6d4bd8920a537bc08e5b50bd933cd304,2024-11-15T14:00:09.720000 CVE-2024-28953,0,0,c901751ea2f147779352c1e947dd13228802aa9d79715e869d0c3f0d67f4b2c7,2024-08-14T17:49:14.177000 CVE-2024-28955,0,0,d25f942d0189970997c9beaa87ecae40becc3e717d61eb7169e70ed01f911452,2024-11-26T08:15:05.043000 @@ -253750,7 +253752,7 @@ CVE-2024-29000,0,0,7a305cccd175671343b97767d7c882563f2afc3a0fbb62aa579187b27944a CVE-2024-29001,0,0,33e499e26ccfffab77e2a9a0196071af4053eafb3c7b487e58f86d3831f9cb69,2024-11-21T09:07:20.983000 CVE-2024-29003,0,0,aa0448857305ef8166f64d09b6a0aecfc681d4d8ef2dd604c70ca9d26cf84df4,2024-11-21T09:07:21.100000 CVE-2024-29004,0,0,e71f6941edb707c0c3bbd70c4cb5ee173fdefaf8a4d65799390c385e184d1124,2024-11-21T09:07:21.257000 -CVE-2024-29006,0,0,3abee45cbfaada31ae0786001965936ff6bb74d5feb252bef431fa2f6d2c4418,2024-11-21T09:07:21.387000 +CVE-2024-29006,0,1,b854f8b85619d78705c55720c54f26685cd56b5a90de3e8463a68d60f0834fc9,2025-01-24T16:19:05.217000 CVE-2024-29007,0,0,9467d08502d3e36b2d3e90e284f19d567ff6430ff612d29071e043652d272704,2024-11-21T09:07:21.500000 CVE-2024-29008,0,0,ca0aecdf68c77dbd22be28cfa60b571dde82304762578b0f93292832da2ce951,2024-11-21T09:07:21.670000 CVE-2024-29009,0,0,d62ab061bcc3cb61c24bc6f5800368ca076909ddd0e49b565343116fd7600952,2024-11-21T09:07:21.850000 @@ -254256,7 +254258,7 @@ CVE-2024-29830,0,0,3f9252519d26c2a44915f75e911a6f26ff92e77c813067ee428ba5c495fa5 CVE-2024-29831,0,0,e6c66beb73404b95bd012a575dfe2fbe460731a7b1a9e842d9b5a35c457e6ea5,2024-11-21T09:08:25.767000 CVE-2024-29832,0,0,6056032a590f7abd34bd12f5925c086bdf38bbd060ac2b171db2d160a1e2f453,2024-11-21T09:08:25.963000 CVE-2024-29833,0,0,749e9d8c64909205659cff602c4225d0cb6353f71312c1f77d5c97e9e9c104c1,2024-11-21T09:08:26.100000 -CVE-2024-29834,0,0,bb1e173c92ca9093a9c57070759cade84ec0204929809afb96971b4501bc96ae,2024-11-21T09:08:26.233000 +CVE-2024-29834,0,1,de32c83406ee0a8ef1956073d47bb9c94eff55af17248af2c5763cb541959bb5,2025-01-24T16:21:24.170000 CVE-2024-29836,0,0,d83ba4e00c62b6e0545f19626ba78475a56ba67b33e57c14cb3ed18d1ffd828a,2024-11-21T09:08:26.370000 CVE-2024-29837,0,0,40cae44464abb484ced0c952d98fd9bc0888dd0bbe7a5abfcd18020cd2f2ce0d,2024-11-21T09:08:26.500000 CVE-2024-29838,0,0,ae26f6d4b8133e525797109d96340fbc53824063f004cbc1496ef814c2ba32fd,2024-11-21T09:08:26.630000 @@ -255266,7 +255268,7 @@ CVE-2024-31074,0,0,01d64d0a51bf3ec3df5d6c59c3da5338deaaf4325178cfa318378ec4fdf90 CVE-2024-31076,0,0,1293d87671585f621e57738a562115aa8563ab94cc4beb2163a9d49bb681d6cc,2024-11-21T09:12:48.140000 CVE-2024-31077,0,0,289d0fa87ed9966f075d7cf387e3721edb9b2f366b0ec4a722be692dbf847080,2024-11-21T09:12:48.273000 CVE-2024-31078,0,0,c685657ef2ddb5a5f6950813502d56bfa1502d3b4d479876fa59d79cc3cba853,2025-01-02T19:04:58.017000 -CVE-2024-31079,0,0,66c97a3115681edfb2af3b3af7e8fefe1cb552f471b53ad7ca4743a6af2ce16f,2024-11-21T09:12:48.597000 +CVE-2024-31079,0,1,165a2aa326e41b281850472925f9b409c38425124b3d29959aeb9d8da9b7e905,2025-01-24T16:01:04.653000 CVE-2024-3108,0,0,0a457dab289bbab6cbbf64df7736b6d0a7c3250fc6713e73c93a6029760a47aa,2024-11-21T09:28:54.970000 CVE-2024-31080,0,0,7985776399695af271a70402c55211a3aadc068d82c4a7fe69b7a47377da62a8,2024-11-21T09:12:48.727000 CVE-2024-31081,0,0,7c181540445311d712c076a10a1507066bfbca47351c61f292adbf4f85ec7de1,2024-11-21T09:12:48.930000 @@ -255498,7 +255500,7 @@ CVE-2024-31306,0,0,6640a1f5d3e61d5729b7ac83396c8252af4bb85df21a084877c89baf912ca CVE-2024-31307,0,0,fe5c146bc2e01b31d10c8798aabeced41a593f46147cc701844fecf521def462,2024-11-21T09:13:14.583000 CVE-2024-31308,0,0,e26bc58410205067bb8d8db3d33abfda2da6af578804048a337db59e83ec9878,2024-11-21T09:13:14.700000 CVE-2024-31309,0,0,4d74e223b139d85cacb1e8588eca9fc311ad79bf20795c25cd105fa0c27c32c5,2024-11-21T09:13:14.817000 -CVE-2024-3131,0,0,e57750da524f00289ab21553f195ebb50a635fe1b30122a399924561108fed30,2024-11-21T09:28:58.147000 +CVE-2024-3131,0,1,8e22343554e72698845385d242f6afc12ef95d3f497368a317d0c8f996647b47,2025-01-24T16:27:37.137000 CVE-2024-31310,0,0,098c3633a4927790e31a6001c9d03c9b41631dbc55201432e5beb837f265765f,2024-12-17T16:31:31.697000 CVE-2024-31311,0,0,1a44e686db557c94dba0ef9b706e10f4ecfa786c8cdc2e5becafc8a2a70a2a92,2024-12-17T17:43:28.493000 CVE-2024-31312,0,0,a6faac328a1918a99ef8645176673fc9899bc26b8ba45d4fcf17774fe9f22e11,2024-12-17T17:32:22.067000 @@ -255580,7 +255582,7 @@ CVE-2024-31386,0,0,3acde958c7031a742cbc4a99febff02b326329be42acd0fe4f94a0fb89ff5 CVE-2024-31387,0,0,51d389c45d4eb19a80768936b92f81f13e6db6da9d727cedb95f8cea10cfa082,2024-11-21T09:13:25.507000 CVE-2024-31388,0,0,969b791e4fda50e2951bfa1c1b7c4b19f1267ec11ef79ab157b990117c9e8ad5,2024-11-21T09:13:25.633000 CVE-2024-31389,0,0,08af152747ff407e3026afce016704b24317def223e62ecb4990aa88b6ae4f5e,2024-11-21T09:13:25.770000 -CVE-2024-3139,0,0,77658101cb47b9df0af7ec6360dde0260231e9127755b511bbd64ee93e9b3138,2024-11-21T09:28:58.927000 +CVE-2024-3139,0,1,ee5d1f7884fa2b89f120299c3dc630a0c1e25c56358d05f6bf675aa682ed34cb,2025-01-24T16:29:06.287000 CVE-2024-31390,0,0,09006f43013da697eb3ff65b55900b18a5bda9bb9eed07955cb886886fd9d7be,2024-11-21T09:13:25.903000 CVE-2024-31391,0,0,dd8e3986c0c7ad42b6bd64a59897a93d1a52069456c096537e64f413a47a9f44,2024-11-21T09:13:26.040000 CVE-2024-31392,0,0,2cf7bb0bb7b3840b5de6d2fa2cf618e252d13dcf4ceb1d56e669ff5d64f29037,2024-11-21T09:13:26.240000 @@ -255591,7 +255593,7 @@ CVE-2024-31396,0,0,12070261c9f4beb75949d082f0abbcd14c87a6065f52201897e85d3106040 CVE-2024-31397,0,0,4669b8c9ee6bff7627f3fabe734097169262ab8e925a351364e2643d116f2d6e,2024-11-21T09:13:27.013000 CVE-2024-31398,0,0,4e751e8f01cc9ca800cdcce821680e0d055f3ced6a85206b209df594140fe40e,2024-11-21T09:13:27.210000 CVE-2024-31399,0,0,69c671b3f2b9824d1d3b88c3a428d3e5889527feac06c7757b6605ccc0413fd9,2024-11-21T09:13:27.323000 -CVE-2024-3140,0,0,80c7d2f962abb48769723f1fccf62f45b955bb05ec055e3729a5a2daf732333e,2024-11-21T09:28:59.070000 +CVE-2024-3140,0,1,581a061887974455c3125abcbc00c0e0813a872379e447821195f0f7416d7105,2025-01-24T16:30:02.737000 CVE-2024-31400,0,0,7e4080f10aa278ce8df7d9488317404c2dff8e1c3510182a88eb3f049386223f,2024-11-21T09:13:27.470000 CVE-2024-31401,0,0,d23bc7e26f4f52e4438758e09d0f4ed266aeb8096cfa9dc7f40d19524690ebfb,2024-11-21T09:13:27.653000 CVE-2024-31402,0,0,29278ec71a42a5755be62c4a283dfbe343c94fd25ddd8f5774b75d48aeecc828,2024-11-21T09:13:27.833000 @@ -256312,7 +256314,7 @@ CVE-2024-32506,0,0,b107e8ddd51e583a9d0ff0af499834d62f7eab2b21288816ce4e8a42d2480 CVE-2024-32507,0,0,adfaa8d5d3c430c1e863ff4b449d0566f7cb0a7900c0306a1fa64b604809d5e4,2024-11-21T09:15:03.640000 CVE-2024-32508,0,0,da8422fd7cf2877f70a79ee64ae7196ed8b1f7a8a2342467127e545489027ed3,2024-11-21T09:15:03.767000 CVE-2024-32509,0,0,d7ae0abbffa293f67efb9678c0e0a3733d5c85e86821f6192484d815522412b8,2024-11-21T09:15:03.920000 -CVE-2024-3251,0,0,8ad0e927340d28d1bd7a9d2da63f34eb26a9db7ce64b3380ff52c462a7f66539,2024-11-21T09:29:14.820000 +CVE-2024-3251,0,1,ad4b385dcf805009255a9412683a7584ffc14abb490dbd9ef4ef7d4beccc9013,2025-01-24T16:31:37.807000 CVE-2024-32510,0,0,d00b602fa3d5cf5b31ed40fc54835d9b4e6454dd89336228be943571d234b5a1,2024-11-21T09:15:04.043000 CVE-2024-32511,0,0,a0a3a03646a71f253902044309a5364d8e403c32206228ffa6c7031f0665cc88,2024-11-21T09:15:04.177000 CVE-2024-32512,0,0,0961b4b29cc71ae859aa6470f1f6fbdb19a6dff97b7a4bce9c9e3de7e85cebde,2024-11-21T09:15:04.307000 @@ -256567,7 +256569,7 @@ CVE-2024-32757,0,0,e90481642b590121fcf0c24df5d47bcb06a24fb8762f227ffbd72b326a384 CVE-2024-32758,0,0,4dff72018711e9f974dd46e5998fd183163f8264bf88908bc63121e1c7db8ae0,2024-08-09T19:00:17.183000 CVE-2024-32759,0,0,b6eb576e54af0c681685d9c2daa75b3ba79d7722c015ec50f117e0f6b8f5a968,2024-11-21T09:15:40.380000 CVE-2024-3276,0,0,231307f572bf201867b6e192771acf6a099f0f7f8523272307912246a8f3de31,2024-11-21T09:29:18.153000 -CVE-2024-32760,0,0,5f080350424ed4877f2eb6ed7b24e2611d09b2a4c5f5be4ecc91259116a48e43,2024-11-21T09:15:40.530000 +CVE-2024-32760,0,1,82505ca8c02cbf457bf78fabc824ccbae8b38186bf945e09d78ea0ddc383e5aa,2025-01-24T16:21:55.993000 CVE-2024-32761,0,0,c1bc30bb1c2e53c2b9b8f210dc65959b2a2346754df853ce010dd8c7e6d36dc4,2024-11-21T09:15:40.690000 CVE-2024-32762,0,0,e2e8b9ba690b7f1e2af2675ee1c4b7f2fa71ca55130e86054a01c63799cb3895,2024-09-13T21:10:30.137000 CVE-2024-32763,0,0,b233e95fe29930be363344f15fe06fe28d2e5c9aeaf866c0ce31a2c3b28d8537,2024-09-20T16:49:08.883000 @@ -257334,18 +257336,18 @@ CVE-2024-33819,0,0,7e61d4c0dd3553f64a2e5fef11b92143383472dd77b567ea2aea59f5055da CVE-2024-3382,0,0,2806fc89766558764c830c6154793a1d7167aad2ece415e69784f0d03afe9946,2025-01-22T15:44:24.527000 CVE-2024-33820,0,0,cfee89ad7ad37aa0a23734591a3b5cbc350282c1f511c40effb3edcabf5bfacf,2024-11-21T09:17:33.030000 CVE-2024-33829,0,0,29c77d19540accb450598443b67b5c2e3910197757a370c151dd370ee4356fa7,2024-11-21T09:17:33.210000 -CVE-2024-3383,0,0,430b0d8561d28c308c86f02f1afeb4736d70095c27a3c26603f2024bafec2629,2024-11-21T09:29:30.393000 +CVE-2024-3383,0,1,2fa83abdea40282e20ea0cdf839990a0c3e4b3915404b86d2e06d5f4bf568349,2025-01-24T15:29:26.313000 CVE-2024-33830,0,0,f1012ab730edcfd864a0644722071cb6ff41ee64e585601d191df590a20be372,2024-11-21T09:17:33.390000 CVE-2024-33831,0,0,f91f34cdd2bcb6e6adcab72045795af979a1b6ad2c28fa652db7625dedd4f35d,2024-11-21T09:17:33.660000 CVE-2024-33832,0,0,4a7de24f1ee6133b608740a244d388457220575de4659dfa0b317191ab265879,2024-11-21T09:17:33.847000 CVE-2024-33835,0,0,3e192c85c2f13a4a00101e791f822c9888ae665f140c80028c35765adbfb6897,2024-11-21T09:17:34.033000 CVE-2024-33836,0,0,e9fdefa6cfdfda12401c899a902faeb54477882eb31bdafd3c99df2e5bfe597c,2024-11-21T09:17:34.227000 -CVE-2024-3384,0,0,facad86ff4605d4f56372449d88ec5ad1f5418a72a35ff65698fd79fc0bebc3a,2024-11-21T09:29:30.517000 +CVE-2024-3384,0,1,c4b2f8ab6758117062890bee73e21a93e57f567211e04646223f4e021cdfaa57,2025-01-24T15:54:56.557000 CVE-2024-33844,0,0,35a52a8744d0fcdfd12df4f953c97083a2e6c4facdb84d82a049304cd05dc966,2024-11-21T09:17:34.417000 CVE-2024-33847,0,0,0e33780554413dd547d01d3bde95dd663b7322b2900748aca98a0a4892461080,2024-11-21T09:17:34.583000 CVE-2024-33848,0,0,02c22cad364477c78ca36f2128f6569adfb33ef435429cacb39caed0aa330e57,2024-09-23T14:43:46.237000 CVE-2024-33849,0,0,780116ff508c226f1ec4e1d18c7cd90231176db688bd866197c7b6a90bb43e99,2024-11-21T09:17:34.747000 -CVE-2024-3385,0,0,f45b1d8ff11b8bd7cda34573a8a36a2428782efa8c12930c8732d992e8eb5e80,2024-11-21T09:29:30.643000 +CVE-2024-3385,0,1,1aefdc6b5adf132a22499a5db66a392a65541d9eaeac4085c3e4e238dd690ba5,2025-01-24T15:55:48.127000 CVE-2024-33850,0,0,d09f2897d6295f52c3c2bcac5bbc4ea50c81fb3650ae3bf505c5df1d1445b584,2024-11-21T20:15:40.613000 CVE-2024-33851,0,0,71d753e61b781c59c22b9dcc54d2b5b30979e95171405bf3f58ea335895d1b3f,2024-11-21T09:17:35.070000 CVE-2024-33852,0,0,507aa966348da8ffb990bc6335d57ea0b339c67384a70120be46bd5c3cf932c1,2024-08-23T18:46:51.787000 @@ -257355,7 +257357,7 @@ CVE-2024-33856,0,0,4f23026493aa3877de0959a38f0b86bb379d7d08470341d0e7ad0ace3b563 CVE-2024-33857,0,0,77d01ceb40c93381f5acf7785a3b669a32af207819ec7333304ce5c0e7a2e411,2024-11-21T09:17:36.067000 CVE-2024-33858,0,0,9114223c43a141912be3f128bc3c8cb62d8a96efd25edc1ab707d8e062b8eb25,2024-11-21T20:15:41.053000 CVE-2024-33859,0,0,dc5b9c20e404e47a5cfff66ccd56d92eacfeafd390052398162be12ecbafe303,2024-11-21T09:17:36.450000 -CVE-2024-3386,0,0,3126fc52eb8f63afc2ddac0716c7f12903a1d94fc28aaaf96513941bc4faa375,2024-11-21T09:29:30.777000 +CVE-2024-3386,0,1,a8c12d05fe38ea5271d49d6a9061440dfc3e3d5a3564de9e097b07b4653f5670,2025-01-24T15:58:52.233000 CVE-2024-33860,0,0,95d43169914403ddcee8d89556509183f9c1c43beb33a9c60855306e26cd6805,2024-11-21T09:17:36.627000 CVE-2024-33862,0,0,bdf330956f292e5af5ddd4f626be2d578dc200b215e50ea65f571e34b29e7064,2024-11-21T09:17:36.807000 CVE-2024-33863,0,0,8463f6379dae00b0b06c14f4b48691e4c00a201a624d971dc6b59809a30da84a,2024-11-21T09:17:37.030000 @@ -257376,7 +257378,7 @@ CVE-2024-33876,0,0,b28633b24e587cf6186cb32ca1f492f3221dfc1bf43fa8aa10c129f615def CVE-2024-33877,0,0,8b1243ef0c134393a090955101488ff5279f60f5bc7848f732464fde40e97709,2024-11-21T09:17:39.600000 CVE-2024-33878,0,0,feb8ae1feff70622d1e1a8722fc435816940bd9a5d61c3251757968e032c5925,2024-05-14T15:38:10.657000 CVE-2024-33879,0,0,6af65bc1296155ce6dcbc637906c4c848f8f160031b78a70bd743f7c6e9a6239,2024-11-21T09:17:39.790000 -CVE-2024-3388,0,0,462a6a3a21154dbcb7ca0dd9b230b2154edbc097a288baa6c71bdd30d43c81c5,2024-11-21T09:29:31.047000 +CVE-2024-3388,0,1,e9b6f72b0b1c0b7f2c418e35fbf58cf2690eb64e09bf5e3388b48417000ae372,2025-01-24T16:16:18.310000 CVE-2024-33880,0,0,e592b0fcc1945574e62b07791cd81dcd61e6efd0a8817280337b8ece817c4469,2024-11-21T09:17:39.983000 CVE-2024-33881,0,0,c1b886fc16abf7aae010d3cd0b6df126ac4a7dacff52bac3f012a72388bd5eb6,2024-11-21T09:17:40.110000 CVE-2024-33883,0,0,a60b6dbe01d0df4525fad217549abc289e2dc3142ec07f81c8d9b45c0506b159,2024-11-21T09:17:40.303000 @@ -257636,7 +257638,7 @@ CVE-2024-34155,0,0,cab98877c86710a24b6232356801c572b3fbc0a3514fafb0f172bdc4e8b16 CVE-2024-34156,0,0,7adeaae3b1acb009065f3eb01e3a00f28dacbe2579f28ba7266c18d1b1e4fbb5,2024-11-21T09:18:12.853000 CVE-2024-34158,0,0,7398f1d9c16e74fe70c443b0a6b141e3a955771017d6bb32731341838047519c,2024-11-21T09:18:13.030000 CVE-2024-3416,0,0,8990a84aa9eece03906a1db0c985ac2a5152501ffa5352a5a85cc2cf3c3c378a,2025-01-17T15:43:40.360000 -CVE-2024-34161,0,0,b4374b0579e0bec61289235f59423416aa3b4bea203a2da7aee69adcbb077d8f,2024-11-21T09:18:13.217000 +CVE-2024-34161,0,1,5868cb2dcd63f0a51da1d8108fc281d18ffadd9e8c16186a6ec7c8d4a07ea395,2025-01-24T16:20:57.617000 CVE-2024-34162,0,0,99e5e0e47ea9cc892ad1a2752ae2eba8b11fb682968d0009729fc7651fc4cff4,2024-11-26T08:15:06.123000 CVE-2024-34163,0,0,ba58e172d2c30fa83f64389865749b115811be245ceff1f9c6ba324a80e84b91,2024-09-12T18:59:30.753000 CVE-2024-34164,0,0,713b6728aabcc03c74788824e129ab8b5a3e89826a8ad42af15ae45f0c2b806c,2024-11-15T14:00:09.720000 @@ -258371,7 +258373,7 @@ CVE-2024-35197,0,0,d5326fe560ecdd602b2f0cfc8c145fa46d88dbe6cb9b3721815d62fb2c64f CVE-2024-35198,0,0,4455bf7a526d840df73bfb7cb5145186815eead54fae8f5c2849b9d59aba3f6d,2024-11-21T09:19:54.920000 CVE-2024-35199,0,0,4bd67b951a6f1baf7a94820b27d8bf9d3eee00ee1362d6edb0456c2376e74606,2024-11-21T09:19:55.093000 CVE-2024-3520,0,0,dea180350db432968451fca16d84d4384456cbdf80b62e14d7f4e13191f01e06,2024-11-21T09:29:46.280000 -CVE-2024-35200,0,0,bacd4121e1a9ba2d558fcc359bcae1c8ec9f12f33485ae6233a8c40e9bf1855b,2024-11-21T09:19:55.233000 +CVE-2024-35200,0,1,89736880248ef57599b5706810af385cc709879fc2cb2afd23c2bd6b336a283e,2025-01-24T16:15:15.340000 CVE-2024-35201,0,0,f8a5b90459cbd11135685faf5240cf25c70e3c2501ebe9a37ca8eacd936ed565,2024-11-15T14:00:09.720000 CVE-2024-35202,0,0,f3502ac16a142c6fa2605a574809aaea3b9f27445139dcbf89ce87db4f63c852,2024-10-15T12:58:51.050000 CVE-2024-35204,0,0,d1b368734e3dc18cc976cbdce89dadd38ac33f61db7221474e1ea942ad215f21,2024-11-21T09:19:55.753000 @@ -259031,7 +259033,7 @@ CVE-2024-35991,0,0,e0023617065fc6765387efe6164edb62b49cf60b15228846cbcdf1b9ebe00 CVE-2024-35992,0,0,bfbb7854dade209905bdfce5443e18018e21600807fcef0e644a216c759cf1dd,2024-11-21T09:21:22.950000 CVE-2024-35993,0,0,25bf5df43ffabcc1c3c39e9ec80b13fc57305035ece44241ce5ce26a94ff2287,2024-11-21T09:21:23.090000 CVE-2024-35994,0,0,fd24b6c74f07d76959a4e5c7dc8fd8b5418060428f4844117d8af41ee7dd54c0,2024-11-21T09:21:23.207000 -CVE-2024-35995,0,0,1242844d24fdf639ce7070fece1f3f90b7ad1c231e4220d5d4a5026de8e89854,2024-12-27T13:15:20.103000 +CVE-2024-35995,0,1,ae0f8c909a8564a625fbf71718d334962c0ebfd15c0e8945ee50dbebfde18cf8,2025-01-24T16:15:35.870000 CVE-2024-35996,0,0,a13038760306c3b9a1782c7a096c6830b6a7c18e69a72b02346120583ee4f780,2024-11-21T09:21:23.480000 CVE-2024-35997,0,0,54bb78c20a7d36c25a4fa0a0731a01d5a6be6d1d88ff50f6dfa8cc7bf2ee119f,2025-01-16T21:15:15.603000 CVE-2024-35998,0,0,73b2fdecdb97facc7eba42971cd617fe0100b4ccdfc7142094bbd0d48c338c30,2025-01-10T18:12:11.843000 @@ -262511,6 +262513,7 @@ CVE-2024-40689,0,0,41d3e4691112f48676cdb44eacf0cb30b856617ce94bb50310ea65e78ab40 CVE-2024-4069,0,0,94f7ce6ab537b8de29354ee99519ed1e16c84a745bc6420413a49d7a75f78144,2024-11-21T09:42:07.833000 CVE-2024-40690,0,0,ac3fd8879f79e94d956d55740e068f2d064b41dedd1ece8ce64e710fe502e9c1,2024-11-21T09:31:28.197000 CVE-2024-40691,0,0,ac3d9a2c16ecf56eb2b1909a87f2673e6fa5961b82ba378fe17aa1da2a76ba35,2024-12-11T03:29:39.627000 +CVE-2024-40693,1,1,a766486a4da8958f3b124ddec503f3d492382c471c0f01cbbb61129bd406d6ad,2025-01-24T16:15:36.003000 CVE-2024-40695,0,0,0d717382495ca983a078932b58ed2224b4fa40332fd067474a8fe684c9650d24,2024-12-20T14:15:24.063000 CVE-2024-40697,0,0,9675ffc87015078088b6658ddad78e8bbe317856a9033b7e633b65273e34d419,2024-08-22T13:27:20.743000 CVE-2024-4070,0,0,228e3a9486746eb131dc1faba8cea69af4b69cb949a0fc5caabe789181f2b9b7,2024-11-21T09:42:07.967000 @@ -262518,6 +262521,7 @@ CVE-2024-40702,0,0,0010d40778f1fffdc1b0664781c513393e67c7620d1ff605f896e7ca8cbe8 CVE-2024-40703,0,0,e703b61d3f8dfe06de226d6f2873ad12453588e6ae0585ecf895673088efbbbb,2024-09-27T16:49:46.177000 CVE-2024-40704,0,0,f1eefecca06d931cc6fa5c315f3cff483d4ea73258582e293da29f36971e3c43,2024-08-15T20:03:13.530000 CVE-2024-40705,0,0,498d1b36f9941cc45abf0a56c450cafece4560bbcc29015fb60565ec3b88fad7,2024-08-15T19:57:34.780000 +CVE-2024-40706,1,1,899648529268b5dd7aa0120ebdf92941e2befeda4e533507eb9ea8893dac3b53,2025-01-24T16:15:36.150000 CVE-2024-40709,0,0,fc599183e9661cbcade523183f2c327fbd248e82b89d065b196cf8d66176a6c5,2024-09-09T15:35:08.283000 CVE-2024-4071,0,0,6b7a15c8812d01f9851365bf0640804d8a54a0d07fe306e122faf1e050f7c253,2024-11-21T09:42:08.097000 CVE-2024-40710,0,0,770af878a2a59ef82e06d03d07cf0408429abb3e03291325079d2d5ef2519547,2024-09-09T17:35:04.207000 @@ -263280,7 +263284,7 @@ CVE-2024-41735,0,0,d9811b499dc8198bf50717331b26ca6d6a5fd0c7e760a456bd73cc62cf4de CVE-2024-41736,0,0,ccfe39b2699cefdafe31e5325ebc4a6c916c4cea7379ba4a84f6abcc62d98d28,2024-09-12T13:51:42.727000 CVE-2024-41737,0,0,caa1e9bd829287349e4cbf783981f079db812c06d630863a988f3d4220e65504,2024-09-12T13:49:41.953000 CVE-2024-41738,0,0,c7561e6ad4785a929b0580514006bb55005a077ac6bb247470d04168551c494a,2024-11-14T20:51:29.847000 -CVE-2024-41739,1,1,0fb511a1c922782bb4958107beda79acdbbea79f966838e8163001f71a6f66e5,2025-01-24T14:15:31.397000 +CVE-2024-41739,0,0,0fb511a1c922782bb4958107beda79acdbbea79f966838e8163001f71a6f66e5,2025-01-24T14:15:31.397000 CVE-2024-4174,0,0,351c15947bb701aa0f06097d0b29e94daa2eeb6bcf3253c51405ecf8081dcae4,2024-11-21T09:42:20.030000 CVE-2024-41741,0,0,87808c3a5a97a8a12b0599786276b0bacbc5a8e2f5d1ce88333c8491b2440d52,2024-11-14T20:42:44.150000 CVE-2024-41742,0,0,14484b0434b26ad2278aaec82da0505e71c565545447852c1b12a67449a9c0fa,2025-01-19T15:15:20.730000 @@ -263290,6 +263294,7 @@ CVE-2024-41745,0,0,6dba06d9ea0cc08ac8425e0341c71668811a6cd02139664e48e7481acbda9 CVE-2024-41746,0,0,989806c900ffd11c21b1fa6f91d833c84f6c1680e4b868bdf0c4c4b2010f26cb,2025-01-16T18:15:22.863000 CVE-2024-4175,0,0,5386392290fa38470dd8910cd3753515f25308d1edd31217aca2a63897449a15,2024-11-21T09:42:20.143000 CVE-2024-41752,0,0,04e93d2aa0d5f5c09f5bd50535183c7216d854c9071e1cb65e129028f085fb9a,2025-01-10T19:33:46.213000 +CVE-2024-41757,1,1,86dee1a63b802864828bfad45904e2d060e928dbf41010ac4693c86a77817ec1,2025-01-24T16:15:36.297000 CVE-2024-4176,0,0,bbebb00d63b41a3619ef35d6461fab3b8fd8271367eb9c2415dbdbc268e57b15,2024-11-21T09:42:20.253000 CVE-2024-41761,0,0,183a2cec18f466d5717e002f6cd6d2700ac207cbdcd434bf78d86f226e394a03,2024-11-23T03:15:08.333000 CVE-2024-41762,0,0,4c983f99fd9207aedd2243856187958b4b9b76b67049382df79da756be6d51c0,2024-12-07T14:15:17.560000 @@ -263555,8 +263560,8 @@ CVE-2024-42063,0,0,1dc0e3eceec7c966a308f5bfbc1a1d7a5f8943e8860cb77572c15e6b32124 CVE-2024-42064,0,0,08c155819ebfecce7f7615d05475c569dcabf51be068ac4564908cf8f26d89ca,2024-11-21T09:33:30.947000 CVE-2024-42065,0,0,6181e79e1aacfa9bc47ded361ef72811ee4410260f401ba29eb5ef6fa08c30a9,2024-11-21T09:33:31.073000 CVE-2024-42066,0,0,3043da0f70a79c3b3b252165c7c5d6ab2c1406becd4a98d662e2104c5401a393,2024-11-21T09:33:31.197000 -CVE-2024-42067,0,0,7a75d880dfde994ff29dff4557fc1381a5b53e7be1054bc8bdcf22572c288eb2,2024-11-21T09:33:31.323000 -CVE-2024-42068,0,0,8f5a694c220d47cd2668f9174a75389b5e4b898e47a5dc030727f1caa1c5389c,2024-11-21T09:33:31.457000 +CVE-2024-42067,0,1,e74017cb9121badb3d2fb0a06ac82142e7bfc44125b2552e8a4ea29e749cb404,2025-01-24T16:15:36.447000 +CVE-2024-42068,0,1,277da9d740ac387d5e0541658098326e17d362c859a2c3c2006284fac9f14160,2025-01-24T16:15:36.613000 CVE-2024-42069,0,0,cce7976497f81a51a3dd28cdcacd5370bce9230faf00619a631b18a83e5d7104,2024-11-21T09:33:31.603000 CVE-2024-4207,0,0,df3204f1d50e212998336445794942adb13216ee6fcfe240a316951ee02db716,2024-09-18T12:41:29.313000 CVE-2024-42070,0,0,0685d29562caf5ed6e4b1e9abe3b5dd5d6edcc1735e178c343170c909a2fcce3,2024-11-21T09:33:31.740000 @@ -265692,7 +265697,7 @@ CVE-2024-44945,0,0,afde5b91f3a8664304268059f4cbadc9815691eec0e16cc58397d9e7c1e15 CVE-2024-44946,0,0,2216be89407f69b7a66d357b00256c887df360d9639d29eeba9dcf5caa3453d6,2024-09-04T12:15:05.150000 CVE-2024-44947,0,0,8f801ba5159e9b8f9b3c4016ab8510468b13ef5ef3423053d9ce1c290e857f10,2024-11-23T23:15:03.810000 CVE-2024-44948,0,0,b6624809fc4e7fad2ef29d7ebf62dc5527a907fa09ba4a21a20058ddaf98aede,2024-09-05T12:53:21.110000 -CVE-2024-44949,0,0,55ad8140bc617622e849ac008e8f50880a32a8026d4cf2a8421c3776671aaa84,2024-12-19T19:15:07.270000 +CVE-2024-44949,0,1,828c604fa57423408676f510060dbc029847256085d4490faaea8281224c06bb,2025-01-24T16:15:36.763000 CVE-2024-4495,0,0,2c130c223b9972e591566196e9584b086727f4fd658b1edaeec00471e6f0d275,2024-11-21T09:42:56.860000 CVE-2024-44950,0,0,27e2180bd27b63f0d75864bb94426d70ed574ad49ccac5abe47c96450a1c2433,2024-12-14T21:15:24.140000 CVE-2024-44951,0,0,aa685e9643193f2a430154fe7087e89f1644d56a299d0e03a2a9efed4e0cdb0e,2024-10-09T14:27:43.973000 @@ -265826,6 +265831,7 @@ CVE-2024-45073,0,0,ddb4c27340658cb42df2ff98e474d882b5cca95df6d9db84fd1527d0e88d9 CVE-2024-45074,0,0,dd8d54c9d4e8a90203500f3837f7a68f83edce575be9eeb01abe4aedec3f0b62,2024-09-06T16:45:32.767000 CVE-2024-45075,0,0,03a325d99e9aaae9ce6cdcda7dc19958a7d4699a1b3c50bb69b2322eb1c7ef52,2024-09-06T16:45:12.980000 CVE-2024-45076,0,0,eb3cee64fe130784cdfbc414736fb4f58d6d633f4eb84170ae099934a833c82b,2024-09-06T16:44:52.310000 +CVE-2024-45077,1,1,b92089d8550178d65063b1d30e3e18ecf0fca6b3a4158f542d9106bdf20baf20,2025-01-24T16:15:36.903000 CVE-2024-4508,0,0,7ab716d1977417cf41aa4b0c86b8c6174f947212dc2b37b9a7b838a9393e9bd5,2024-11-21T09:42:58.970000 CVE-2024-45082,0,0,654e2014bb8a40c3daa06199b4082ee25f295dbbc2190046fcaf39d42d46c651,2025-01-10T19:34:56.253000 CVE-2024-45085,0,0,d83665b902e695b0351a452cf13e24b78d2419ea7439e442327b57c582a16d2d,2024-11-08T15:13:11.307000 @@ -266198,7 +266204,7 @@ CVE-2024-45523,0,0,78921820db852b485259b411f9a0300a9a0274594719508f8ffa7f118abb2 CVE-2024-45526,0,0,5a2809434001f8fa7518dd39e1d76ce252063ceb0c771a1023d6ee67c4c4a925,2024-10-23T19:35:10.713000 CVE-2024-45527,0,0,5b520308e8c1543ba589bbb7fb99705b7715af5ae5704181f6c1c8d8f972f51c,2024-09-03T15:35:13.673000 CVE-2024-45528,0,0,ff006d3788a72915c0ea7e0acb04c7bc391e0a5989792ab2fc5081b004438921,2024-09-03T15:35:14.480000 -CVE-2024-4553,0,1,fb93ea8b9b15d40065d6ae14704246d0707e85e61c82926c0504e92275e39cb7,2025-01-24T14:42:56.390000 +CVE-2024-4553,0,0,fb93ea8b9b15d40065d6ae14704246d0707e85e61c82926c0504e92275e39cb7,2025-01-24T14:42:56.390000 CVE-2024-45537,0,0,597f8cb0bc693defc5493b35ff64dd73b6ef5e1561e8374a576856f0f629ae61,2024-10-01T20:41:33.207000 CVE-2024-4554,0,0,29103eb4d0b8fc6eb1c1a81b44a6bbfd0c979fea9590f8c8dd85408f98483465,2024-09-19T18:15:10.433000 CVE-2024-45541,0,0,7bc24c44f4f9bd7697d862f7d910f24b6bebcc62d1e5328093c22ff5b5ee1516,2025-01-13T21:50:41.947000 @@ -266524,8 +266530,8 @@ CVE-2024-4614,0,0,eca609b72f6d0dbdf3e2930a517382c618b783ca5f3bbd2f9a2c62afa1f7de CVE-2024-4615,0,0,2ef0c847a0e7928efb8e726ca9f8d3082fb4a8f69966f52e098782a2c92ae089,2024-11-21T09:43:13.227000 CVE-2024-4616,0,0,c88a5bb19ffab0b116976f147bd01e0835cf9dd78a3350693b45be3922df36ca,2024-11-21T09:43:13.370000 CVE-2024-4617,0,0,591f2f27c42c02f697911ff625983cd1e4eaf8f3a464b0dba65cf73eb6c11bdb,2024-11-21T09:43:13.580000 -CVE-2024-4618,0,0,7c58b666d3f7a94fba266dc1b68e80219cb03c13535be0bb74dfe81db6042827,2024-11-21T09:43:13.690000 -CVE-2024-4619,0,1,14bb5af1dc671627629008d94a085bd654debd474fde8162d072b32fcf392846,2025-01-24T14:20:44.467000 +CVE-2024-4618,0,1,344fb57e11ecc3269da0e852eb09c883837fdcaedda34c53b2be452ba9572fa9,2025-01-24T16:37:51.287000 +CVE-2024-4619,0,0,14bb5af1dc671627629008d94a085bd654debd474fde8162d072b32fcf392846,2025-01-24T14:20:44.467000 CVE-2024-4620,0,0,ba6cb8b4b90a19279ffa16a083d9166077215ec27ed0288a47d1ce2ebcacc327,2024-11-21T09:43:13.923000 CVE-2024-46209,0,0,d3bbc915447ec1fe735ec63d5553d0fa25a7e9df2ec6f6285302779d3f6b2f93,2025-01-07T16:15:33.800000 CVE-2024-4621,0,0,5b081f12feb85affecbce7e55cb325897bb9294ab5a34846e1b6b33436e2d24d,2024-11-21T09:43:14.093000 @@ -267012,7 +267018,7 @@ CVE-2024-46943,0,0,a2ab43fac07b04c57c15a38e07538d32082401bbe9f47f2f38a4d041803c9 CVE-2024-46946,0,0,a4e07dc5ad75fbae4520cef9e33c0e117d786edf5f3362d441ee46603ff6340e,2024-09-20T12:30:17.483000 CVE-2024-46947,0,0,746e903a7b5d23a7bb52fea9ec922cb555f50088a9805d67f928629a5bb0bbe1,2024-11-08T19:35:17.037000 CVE-2024-46948,0,0,6281b2e205398125081e3b0b5e4daaff40c726def690fb7395c7c14018f3d942,2024-11-13T17:18:21.337000 -CVE-2024-4695,0,1,00f837382e4d9b24c8a9ff611c1a13f1229e1305f19ac6a62e7f8c66c49ac86e,2025-01-24T14:36:46.677000 +CVE-2024-4695,0,0,00f837382e4d9b24c8a9ff611c1a13f1229e1305f19ac6a62e7f8c66c49ac86e,2025-01-24T14:36:46.677000 CVE-2024-46951,0,0,e223ba85d93dd29975b18c8d34d8184a7af1d00272af09e6931db4d92728c791,2024-11-14T02:13:25.587000 CVE-2024-46952,0,0,93dfb1d3e2e3d67b1e0073f3d53cb2d0dfa255f4a4235ef37ffa90b1225f76e9,2024-11-14T02:01:40.953000 CVE-2024-46953,0,0,ae36fe9cfea292fbb6782ec13818f5d95e30d5d46a5da8b15400ca0eed3bb974,2024-11-14T02:01:09.580000 @@ -267653,7 +267659,7 @@ CVE-2024-4768,0,0,549226b47b403dfb616cfdbc2bfe8fadde448b645debb0528dd2ce2cac6cac CVE-2024-47680,0,0,030785e66a4655efa22271cb7b52dcbe897f8c08a5d6064b3e7976d571357bc0,2024-10-24T13:28:28.393000 CVE-2024-47681,0,0,f5a0c6d7379c2cad3ebee4df0e49687fd7f34e91d3784a0eb776da1767bac770,2024-10-22T14:57:47.973000 CVE-2024-47682,0,0,578e24bb5cba83e014986f820ac82ef2b2265b290f4e6502badb63c6fb77e601,2024-10-23T14:57:12.700000 -CVE-2024-47683,0,0,3a4bec09e179f768ad1a3c6578b5f36dc086b7ec164050d47dddb428649a46cc,2024-12-27T13:15:20.820000 +CVE-2024-47683,0,1,8e07ecf8c6937a7659114533b03ec09306e7de866b68b7b273df6c55b4b98c6f,2025-01-24T16:15:37.083000 CVE-2024-47684,0,0,b54a4e64cdf3e2bc4834fecf66556953ac1a50c50eb47e473d91ef6f2eea793f,2024-11-08T16:15:24.967000 CVE-2024-47685,0,0,b4bf99dd84b095e7c0c1dd8bbaa3a6859323c974d3b8d63ad8cb9c5a9a115236,2024-11-08T16:15:25.083000 CVE-2024-47686,0,0,2a051325bb279ce8e81b7086b0e59d3484d9b1441269242f1c6b37a81c55805b,2024-10-23T15:34:50.460000 @@ -268231,7 +268237,7 @@ CVE-2024-48746,0,0,70b1bf92976f7b515824754b06ef5e640b752fe34bb7804f1674438f52e03 CVE-2024-48747,0,0,f03e580691c37a981f499cf0b560468ec0253c9c99edec66cb15f26778f95804,2024-11-26T19:15:26.443000 CVE-2024-4875,0,0,394ece81c68b71b805a6c0937e31042655f5a949977d1cd6a3dfa5931193132c,2024-11-21T09:43:46.460000 CVE-2024-48758,0,0,6d6595f4f9c5157363905a29de4e8aa05d9c595a5b50795bcb679a26374e8aff,2024-10-18T12:53:04.627000 -CVE-2024-4876,0,1,65d8065cbe56070f462c8629050b655fbc478bb065b4ab8ba51acd1e3033dac7,2025-01-24T13:44:58.993000 +CVE-2024-4876,0,0,65d8065cbe56070f462c8629050b655fbc478bb065b4ab8ba51acd1e3033dac7,2025-01-24T13:44:58.993000 CVE-2024-48760,0,0,2c515de9d3808545a7fdee77c025d0a4f76a44cfac1a6b1790d2a3a6eabc5e21,2025-01-23T17:15:13.713000 CVE-2024-48768,0,0,20dc94e5053f6f0d8d7caf706bf6fcb813042430158ff64dc7ecde51efb03a2d,2024-10-15T21:35:32.950000 CVE-2024-48769,0,0,881e0b4b29e63d860dc80c7571762519af749fe3f9ba6f317c2855a4a66d7008,2024-10-15T19:35:39.423000 @@ -269107,7 +269113,7 @@ CVE-2024-49922,0,0,ffc68b36562765fec5170fe1e0345c28c5823e3d8a8ddcb742f1b9dae7699 CVE-2024-49923,0,0,0f879d7a00fcee7bb1596b66dff50f9095438a70fdececb4efcc2dcf410de9a0,2024-10-24T19:43:27.327000 CVE-2024-49924,0,0,dcce4a3a65c168bafbc9d3100a7b0a269bb75445a6fd618835da94050af45267,2024-11-08T16:15:31.683000 CVE-2024-49925,0,0,714d6927cfc4e01a3d694ffed5bbf41505a35a8867ce843e92b14a9ec84eaca2,2024-12-14T21:15:29.247000 -CVE-2024-49926,0,0,d3e59ffbf1565d50354990596655b604b5d871a1a91d2b90d6c4cad62c79d91c,2025-01-02T14:15:07.770000 +CVE-2024-49926,0,1,200369179196012f1051a8d57336f17c55ea7365fe200ed02fb52ba0bbdf5804,2025-01-24T16:15:37.237000 CVE-2024-49927,0,0,d71d574fea6a132e82c12d79453e1a4258a4764d322896864b5eee383c464ecf,2024-11-13T14:58:48.243000 CVE-2024-49928,0,0,cbd6f5f7036a08151d0cdd6cb88f8285591e668c3162320f6d7af1526d159580,2024-10-25T15:22:31.013000 CVE-2024-49929,0,0,373487af66ee96a2d91c144d51abdd656512f5d6c2ef6d16a533e7a3b7e765be,2024-12-14T21:15:30.213000 @@ -269199,7 +269205,7 @@ CVE-2024-50007,0,0,667122f12c20fa78b46cd561aca3115ac4d299b30eab5d8c4c8a5542dd18e CVE-2024-50008,0,0,f218db06e1ea7e9d5e29318f9612994b0254f3a209a365a01b5f859f8d83363d,2024-11-08T16:15:40.927000 CVE-2024-50009,0,0,b4455754b28034e2990cb3358768fa5fb8479755556ce799fd088ea9116c3114,2024-11-01T15:32:35.593000 CVE-2024-5001,0,0,abc48e4949856934e47c869686db6fc0c0e7242aa23f73e6816a27082e1ac83e,2024-11-21T09:46:45.277000 -CVE-2024-50010,0,0,b085f088736717c4a52295da3764b25155284f5d2ef05137e7e3ac450027a4aa,2024-12-05T14:15:21.263000 +CVE-2024-50010,0,1,f2a20aee1e173e2c6989ba644c1d78faf848bcef6e57ac701eaa0329ec04b670,2025-01-24T16:15:37.430000 CVE-2024-50011,0,0,725742d7fb4e740c5027236798b3fe82e1773849d90ded256f9fbd8f0d2a5093,2024-11-01T15:31:48.550000 CVE-2024-50012,0,0,5d59aefb4911863bceaba776dd1be933288e12b3985d3b249b25aeb5d365a9ad,2024-11-08T16:15:41.333000 CVE-2024-50013,0,0,6ed41fb2b9c26cab9746dc35ed920e0024449440410a4f2cef87abdfa896244c,2024-10-25T19:49:36.863000 @@ -269460,7 +269466,7 @@ CVE-2024-50246,0,0,32211f261e8d81c0b0292d19956aae1f5ef3b39d0aba3e7051fec19e05797 CVE-2024-50247,0,0,9d3abb923c032fc6a3030c6d3b6ec3346311ff8137b2e294974523a425e75cdf,2024-11-13T17:58:15.133000 CVE-2024-50248,0,0,f1a032c959acbcb80153da1af58495d325c877e2f62e02b38ba1c40f9b106443,2024-12-14T21:15:33.947000 CVE-2024-50249,0,0,215398c4b9c6d25c369c1f0117ea504f57a76856f2a7358f7351f3234d38eaae,2024-11-14T17:01:11.577000 -CVE-2024-5025,0,1,b31a4bdb7933d2738e35b4037799e2b7b6e34e88c79abf67d1bfd21ebc3de012,2025-01-24T13:41:01.287000 +CVE-2024-5025,0,0,b31a4bdb7933d2738e35b4037799e2b7b6e34e88c79abf67d1bfd21ebc3de012,2025-01-24T13:41:01.287000 CVE-2024-50250,0,0,a88a59f52acddb58b92db7a051d46e9b6e98f7b239ff99a54694f9bb2207689e,2024-11-14T17:04:14.043000 CVE-2024-50251,0,0,0fbc6a09dd5123260d7b8eb94cd30951dbe96e2f241e22fe340c97908ba59c96,2024-11-21T09:44:24.423000 CVE-2024-50252,0,0,4fdb5cb22821dd829bb086a35b2ab57232021a07175f9429b3d44d003751d22a,2024-11-14T18:08:17.857000 @@ -269494,7 +269500,7 @@ CVE-2024-50279,0,0,57b9eb4bee2e4b8c746696d2f77e4b7a23b660ba2233137329bda9edd3e5a CVE-2024-5028,0,0,dd1dfc08c8c4ad0249eff6068a8953d40d7e70c3ce4697c65d3cb70a1f48c49d,2024-11-21T09:46:48.530000 CVE-2024-50280,0,0,b6a13b4a1bf730cfee2fa214d3a5f3f7f9268a884bdb652dd0a2e1369ec157e6,2024-12-11T15:15:14.733000 CVE-2024-50281,0,0,9089d0de95391a0377f6af8be3fbc8b5c88017f220930e10bade7b480247946e,2024-11-21T19:27:19.097000 -CVE-2024-50282,0,0,48044e9927ec28eff75399be71bb53423a5f79de17c68ddd264fd54e5c0b89a9,2024-11-21T21:14:20.060000 +CVE-2024-50282,0,1,367c60d00902691cdb758438489880cd1d46074aa3eed6b968ca8c1faa501adb,2025-01-24T16:15:37.570000 CVE-2024-50283,0,0,f017f793453930cb04082ccfcfbd81c76f41fa2bfe137a71097ab2aa218aa805,2024-12-14T21:15:34.663000 CVE-2024-50284,0,0,0dd2f3e0d578dbadc046954dcf53364b51273841493d336e73c7cec144ecffef,2024-11-27T16:20:08.917000 CVE-2024-50285,0,0,57dd7110572199115d76d8b0594b83deda57634c8161b67a640ec65820d64279,2024-11-27T15:31:58.063000 @@ -273489,7 +273495,7 @@ CVE-2024-57161,0,0,a5c89c4fcaf2013dde33803c2e35f39270b837cce1b452b06abc4903399ec CVE-2024-57162,0,0,60c182cc7bdecdf8663a17fa18a906ebc08420924403492f251bb25cb53c4f36,2025-01-17T18:15:27.240000 CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000 CVE-2024-5718,0,0,5319c47b63a6835fedbdcd43dc1fd8b869ba81977081921f790378b370cee719,2024-11-22T20:15:10.340000 -CVE-2024-57184,1,1,d700ebbebf77f71b4ac6cc22f616f313f5c4e14ed7b19523fced5b38c696d324,2025-01-24T14:15:31.793000 +CVE-2024-57184,0,1,565cb1daf3da7d9569f4e11c18c75b0033fb6d108d599aa1c7bcfb5bc83ec4a1,2025-01-24T15:15:10.523000 CVE-2024-5719,0,0,3d2db656c5d1f0a79b62bae36bd1cd10161f3160ac0d855266c2bbd4d021243f,2024-11-22T20:15:10.450000 CVE-2024-5720,0,0,eb323a155cad85d456bd7c0f7894b5f9589ce98c04e2db5736a7c40744f539a9,2024-11-22T20:15:10.563000 CVE-2024-5721,0,0,f143dbbb695fa9f83fd9d3c9d9d3aaa920ced069d4617f7e2c69a39cb694b5ad,2024-11-22T20:15:10.677000 @@ -273909,14 +273915,14 @@ CVE-2024-5909,0,0,752d08318e9e6996c653a0326b8d95c79f41544af48e9d464337fb383cdb6a CVE-2024-5910,0,0,809032c1554caf15adc6ef3696e5c072f55bc8cbc0c3da859c4558e159670420,2024-11-27T17:23:02.910000 CVE-2024-5911,0,0,bb61927263d2341e1e4d29b238efafb06329a5341e4f6454fe7fa777b88bca98,2024-11-21T09:48:34.027000 CVE-2024-5912,0,0,f1baa69f560eb481c58139293216d53ba8d136d42bf8e87cbef3628e1730e90c,2024-11-21T09:48:34.157000 -CVE-2024-5913,0,0,f59104a6203550fd8acaa98aa373922d13ba1ceb7cd1bbdf0a7a9087953eee4b,2024-11-21T09:48:34.290000 +CVE-2024-5913,0,1,7b1aa68ac0a4e9d9faa00942977fd6e9a638109385352a73d7f7681b334c4e01,2025-01-24T16:00:42.420000 CVE-2024-5914,0,0,3ca964506b372b7ffd07173f52014abfedaf98e8c4cf22e70771102b1e6d61bf,2024-08-20T16:22:06.357000 CVE-2024-5915,0,0,73dadb526b2278e8453a98017da373ea86e9cba97e030683507d80a084bc54bb,2024-08-20T16:23:10.493000 CVE-2024-5916,0,0,449c4ba8257ad29baaab31d93eb064a26b6b13371041c634469bfc65dbf3a0e5,2024-08-20T19:30:11.980000 -CVE-2024-5917,0,0,272d652cf41d3aad469bb45aa0e3183b7b36fc559fe5e5e43b68af7df46e0ec9,2025-01-15T23:15:09.910000 +CVE-2024-5917,0,1,0374c61ca43711fa0007048763452cf624fe05803520f6b8df2b2915e1805e7c,2025-01-24T16:04:54.887000 CVE-2024-5918,0,0,81bdc2190125b670e90203f3548cb48aebcc8fef030a219189e3db9809744209,2024-11-15T13:58:08.913000 -CVE-2024-5919,0,0,67b8d2fb49dfd173dec60605261aa31c7ca5d39f2057503325cf3a3e3dcc6386,2024-11-15T13:58:08.913000 -CVE-2024-5920,0,0,1971b636615c5415ea8fdd130d1fa401352be920104e2a15042d7f8eff9520e1,2024-11-15T13:58:08.913000 +CVE-2024-5919,0,1,943f6ef8006790db3993b9e7e6be9754f42ed6ca13d49343ae1cb352e31363f6,2025-01-24T16:06:00.323000 +CVE-2024-5920,0,1,ecad2ed64a53475eca59c712b0209a60d186710654efe9484b614512aad9b560,2025-01-24T16:06:43.023000 CVE-2024-5921,0,0,7b078ebfa77a04f80dea3bb6728403f1db96a3dfaed7c57f149ae4e2d1706244,2024-11-27T04:15:14.687000 CVE-2024-5922,0,0,695f58e2e058442a55c514d990c8f571599bfa26e88ff8cd313f759acf5777fc,2024-11-21T09:48:35.113000 CVE-2024-5924,0,0,317522f79ef7e40c3687a78a629fe3c643f265f4648ccabd8de5057b9325f402,2024-11-23T00:42:38.983000 @@ -275441,7 +275447,7 @@ CVE-2024-7628,0,0,4bd4e14d76545c2e8bcfc51a6645f197df19cd176fabd50da5276351688734 CVE-2024-7629,0,0,7bc9d72619eba9ce5af5b25ffde36344f5d4d93091888459c631aca72d1ccb16,2024-09-27T17:32:43.853000 CVE-2024-7630,0,0,33c672fc773a2e63190d08a9eecf4698c94fc6c6c155959cec5f133d4ce8f81f,2024-08-19T13:00:23.117000 CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000 -CVE-2024-7634,0,0,0f7e3d961fc6e1e7c31e9322917d09811bd28394c23d3a5146dc935bb296d7e3,2024-08-23T16:18:28.547000 +CVE-2024-7634,0,1,b54395f95ee21bd46b61f00e1c7ee926a7e23332c8330b5915a810a5ca726cf2,2025-01-24T16:14:16.497000 CVE-2024-7635,0,0,e36460d792c677fe4e87c32f8cc026963fda07d9440df512b0c7708b6927bc4e,2024-08-15T18:12:33.270000 CVE-2024-7636,0,0,60015977cfe4883a2345c9a11b46d14d60bae0b5a7fde2defe825bd04da7318c,2024-08-15T18:13:23.327000 CVE-2024-7637,0,0,10c37678741a2b4d17f774df181bb3827d620076d9c9c2981d772a89161feb4c,2024-08-15T18:15:15.667000 @@ -276975,6 +276981,16 @@ CVE-2024-9486,0,0,1b452503ede893d3e65a266241174108341b71fe44b15ee4fda7b816f6d955 CVE-2024-9487,0,0,ef00514eadc513cfacaedd7ee676be1805a7bd58524a19dd000f6c5f96f55cef,2024-11-15T16:57:10.080000 CVE-2024-9488,0,0,24a104ee042d409dac1b47e91dfe4fa3675de573a6d9c7b27917f05025555890,2024-11-06T14:57:04.457000 CVE-2024-9489,0,0,9258045c083103dfa924748299ab5c4dd4ec8da1f0d3cf12ca2c7454235f3440,2024-11-01T16:27:25.937000 +CVE-2024-9490,1,1,ab04b668e0c521a847b2aaa11d06587bbc09a902c191754c9e97a565e768a21e,2025-01-24T15:15:10.683000 +CVE-2024-9491,1,1,43c6b9a8aae248ac81ab7c5ee79c7044433359d7194a08285887dccec0f3f64c,2025-01-24T15:15:10.817000 +CVE-2024-9492,1,1,c68cb05c88b87e0dbb6f1ef756e5ab375c960cba332e04db69b17600fd8fa21e,2025-01-24T15:15:10.940000 +CVE-2024-9493,1,1,67366c07e7940df3be3d897e23f91d98274f158210428d808e8254875dbf3ac6,2025-01-24T15:15:11.070000 +CVE-2024-9494,1,1,66ef413896e37aa12e9f09732f37c9583004eac0a8813940db7445ea3b2cfdc6,2025-01-24T15:15:11.197000 +CVE-2024-9495,1,1,206dfae85689a14dde9f1c44758dc5f3f38f42fe28c7091bf63cd6ff42092e3c,2025-01-24T15:15:11.323000 +CVE-2024-9496,1,1,077109bca2695469d58b8fc88ae0bb712c25d887c3c51c44fe8c2d8e4b6352e7,2025-01-24T15:15:11.450000 +CVE-2024-9497,1,1,1e774906922e0bfcf1efa1909937432401699e57994a4a391072037afa9afc9d,2025-01-24T15:15:11.620000 +CVE-2024-9498,1,1,ef5be852619c204f6c541782d054b5851ae0a2d2a7d6f85fa22e6b6571a9188c,2025-01-24T15:15:11.793000 +CVE-2024-9499,1,1,eedfc8112fc604ecadcde80d6d4015b8d7b2c82dbba54f9ae94def5859549ccc,2025-01-24T15:15:11.967000 CVE-2024-9500,0,0,d281910094387755c33adda8658eb046790675cd4af5161b6589be051fe5cd55,2024-11-18T17:11:17.393000 CVE-2024-9501,0,0,6a54c1f4c2f1d131dc91aaf803ea2d16e3173972cc5357c7b11859daf18eeb84,2024-10-28T13:58:09.230000 CVE-2024-9502,0,0,e3fb711f67887d1258017667f51437e489fede52d407ba36dbc6fd6d3d71d276,2025-01-07T07:15:28.360000 @@ -277082,7 +277098,7 @@ CVE-2024-9626,0,0,e9628917bf466150170ade3c83ea1ca0718a402c4f4e3732ac05e432b077af CVE-2024-9627,0,0,bbd2150f084c7938e6b0ce316fceb9870286e9cb9ca4f5a3efb37d7b055e03d3,2024-10-25T21:19:48.757000 CVE-2024-9628,0,0,379a0ee64af50eb2e6716feea87eed622bba704469c3d96a0f120705cdd189d2,2025-01-23T21:17:43.533000 CVE-2024-9629,0,0,ccb2809be6fc0297c8318e4c1f923a6148830a550a06f81de03fb80d95b6e694,2024-10-29T14:34:50.257000 -CVE-2024-9630,0,1,c5bfebdfc374c6829acf4f216485f47c7193dffe76ae06b5710261faf3a923c2,2025-01-24T14:07:11.977000 +CVE-2024-9630,0,0,c5bfebdfc374c6829acf4f216485f47c7193dffe76ae06b5710261faf3a923c2,2025-01-24T14:07:11.977000 CVE-2024-9632,0,0,239a4c189d3eed560921482fe12c18bb19732b61a1100ff2b6e56460beb86ea5,2024-11-21T19:15:14.210000 CVE-2024-9633,0,0,464719aabf82d4c51da737aba0ef58dd3d7e243c61253713abe304606828160b,2024-12-12T21:43:44.480000 CVE-2024-9634,0,0,7b5dabf15ae54de4daab48b64d2e27f430eb55d7ab2217a5e19376e8531d6f32,2024-10-16T16:38:14.557000 @@ -277641,6 +277657,9 @@ CVE-2025-0648,0,0,f9d79465ad3803b75ff57d725f789e40aa0e726161afba05440d8db3881a47 CVE-2025-0650,0,0,c255caf8716f9fc68172a701cd0571e8e2d98976a4a7a688b3c43cb943fe86cc,2025-01-23T18:15:33.110000 CVE-2025-0651,0,0,8c67aa0f80c9f1e30412c542495f9f971e1fa118a8f80db65a60da0b955bdf05,2025-01-22T18:15:20.363000 CVE-2025-0693,0,0,2dbd0ee2fa3f9bda7df2c547c0b425cdbbb9ef75c33ee753ae3804f02fa74725,2025-01-23T22:15:15.397000 +CVE-2025-0697,1,1,2b300d6fe20cc05389e1f1da76da10c584853d80e73da80ea6280f5fc93d0276,2025-01-24T15:15:12.130000 +CVE-2025-0698,1,1,41b2c00dd6b2e11497e6ad0d5935ff7e418c7e8ce23cb7590bf86289758b8bd6,2025-01-24T16:15:37.717000 +CVE-2025-0699,1,1,a52cce5fc729b9f7c244ab5c5dc069fe63ab6c6e0e5e97843aece40a8ddee923,2025-01-24T16:15:37.977000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000 @@ -277974,7 +277993,7 @@ CVE-2025-21650,0,0,8999d80331f22604edddfd75667fe17eab77150206057afd0258b361cf1da CVE-2025-21651,0,0,08b0d285d803ce14ca95c51ff0bb6822af7a1dfa543a30bb044ccb678d352dfa,2025-01-19T11:15:10.733000 CVE-2025-21652,0,0,781ce4cdff4e60cfb6f8b0eb373b8634b7b2c8bf54de4c678c30aac3d57ceb30,2025-01-19T11:15:10.830000 CVE-2025-21653,0,0,e35c4eae1c7c810cbfb3e7931a2f36e3cb97bd011910726fd74483aea7a0d58a,2025-01-23T17:15:26.243000 -CVE-2025-21654,0,0,06d99080b6a40fa78f95e6ac01db95e000b9c079a96bcddf48fa7b17f747b5f7,2025-01-23T17:15:26.357000 +CVE-2025-21654,0,1,4ec90f1484bdb180e8872bd379989357ef5549f6f68655399ae0221a6a448c8e,2025-01-24T16:15:38.177000 CVE-2025-21655,0,0,e5a98c6155ef95beaa77c8f70c04ef1a52b9c9b57ffc8aa737b1a8a15dabbd07,2025-01-20T14:15:27.027000 CVE-2025-21656,0,0,e08de214fec57f5455004c22ab31652820945256042ce332af5f60bc4ee6b0eb,2025-01-21T13:15:09.240000 CVE-2025-21657,0,0,58d21ab8ed420cad449dc9439925bd7a4bd93e784737aa1340191a73104f8bd9,2025-01-21T13:15:09.340000 @@ -278190,6 +278209,9 @@ CVE-2025-22597,0,0,42b7f0ad3f97eec140e81e3432e0004fde0e857d31ddfb4970711f713c779 CVE-2025-22598,0,0,71a9628cd5b8a378efc6a4f0fbba9bc5be356eced51ee0c58585106238174184,2025-01-10T16:15:30.540000 CVE-2025-22599,0,0,b57c2c3eae861ece051af1f1ef69acd0bb3a29c0b52e5a721d4d190a6e483927,2025-01-10T16:15:30.737000 CVE-2025-22600,0,0,d4d2827dc6878ccbad7b7bb4cb346a62426d6f55b5376cb57fe133465e20f0b1,2025-01-10T16:15:30.940000 +CVE-2025-22605,1,1,8133d836964af94521533e50666e61283a9b57a268e19bb256ac814dc1dfcd5e,2025-01-24T15:15:12.330000 +CVE-2025-22606,1,1,3d923e303b156c53bd4343472a4e5b113d35cd4273c3f9114587d96dd8d17f7e,2025-01-24T16:15:38.307000 +CVE-2025-22607,1,1,168bb9e66a3ed8b4ee8d63dbea88df36b4ba59b92d437413a77aabe7acfe1fcf,2025-01-24T16:15:38.470000 CVE-2025-22613,0,0,aad2f12635038b5a8cde416e18c507c3fb94ff08ed3ac7216fed29e0755971c1,2025-01-14T01:15:17.580000 CVE-2025-22614,0,0,d656f7b32b5f198b4bb45970b1a94ba1a87474675109e3354122f9cf920f1c84,2025-01-13T21:15:14.967000 CVE-2025-22615,0,0,2a8f7e50fe035fc366011623a2b600d00f80d19938ec5c5a0af1c9fd13d1c4e2,2025-01-13T21:15:15.110000 @@ -278727,6 +278749,7 @@ CVE-2025-23962,0,0,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96 CVE-2025-23963,0,0,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000 CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000 CVE-2025-23966,0,0,fc7e5999f530a14a10296c13e28375f3f98dfdb4b4ec37b22cf284eaa57194f2,2025-01-22T15:15:26.950000 +CVE-2025-23991,1,1,09c292242e39739888eb9fe6d97bdb10055d45d713f6ffa829b0733e0b5456d2,2025-01-24T16:15:38.723000 CVE-2025-23992,0,0,b353942bf3f0d4eb4ddb991ecb2094a0114d56869df6885590beeb621557c514,2025-01-22T16:15:32.120000 CVE-2025-23994,0,0,70f6bae30845c345a2a47659ac6161a5d38902de51586bdd3566df0acd6686b4,2025-01-21T18:15:17.313000 CVE-2025-23996,0,0,ae90e408390ff598631802aba137fcf08482552e78b237e33cc88a7d0fe325b3,2025-01-21T18:15:17.503000