From c2e6e0d6238006fe6cd07db8b92e80f62f61ae40 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 28 Jan 2025 21:03:49 +0000 Subject: [PATCH] Auto-Update: 2025-01-28T21:00:21.071918+00:00 --- CVE-2017/CVE-2017-133xx/CVE-2017-13317.json | 39 +- CVE-2017/CVE-2017-133xx/CVE-2017-13318.json | 43 +- CVE-2018/CVE-2018-93xx/CVE-2018-9373.json | 39 +- CVE-2018/CVE-2018-93xx/CVE-2018-9378.json | 39 +- CVE-2022/CVE-2022-482xx/CVE-2022-48240.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48241.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48242.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48246.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48247.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48248.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48249.json | 32 +- CVE-2022/CVE-2022-482xx/CVE-2022-48250.json | 32 +- CVE-2022/CVE-2022-483xx/CVE-2022-48368.json | 32 +- CVE-2022/CVE-2022-483xx/CVE-2022-48369.json | 32 +- CVE-2022/CVE-2022-483xx/CVE-2022-48370.json | 32 +- CVE-2022/CVE-2022-483xx/CVE-2022-48371.json | 32 +- CVE-2022/CVE-2022-483xx/CVE-2022-48386.json | 32 +- CVE-2023/CVE-2023-265xx/CVE-2023-26595.json | 22 +- CVE-2023/CVE-2023-290xx/CVE-2023-29092.json | 12 +- CVE-2023/CVE-2023-300xx/CVE-2023-30056.json | 32 +- CVE-2023/CVE-2023-300xx/CVE-2023-30083.json | 32 +- CVE-2023/CVE-2023-318xx/CVE-2023-31804.json | 32 +- CVE-2023/CVE-2023-319xx/CVE-2023-31974.json | 32 +- CVE-2023/CVE-2023-487xx/CVE-2023-48777.json | 53 +- CVE-2023/CVE-2023-62xx/CVE-2023-6214.json | 64 ++- CVE-2024/CVE-2024-00xx/CVE-2024-0044.json | 36 +- CVE-2024/CVE-2024-120xx/CVE-2024-12085.json | 6 +- CVE-2024/CVE-2024-134xx/CVE-2024-13484.json | 16 +- CVE-2024/CVE-2024-20xx/CVE-2024-2084.json | 74 ++- CVE-2024/CVE-2024-20xx/CVE-2024-2085.json | 74 ++- CVE-2024/CVE-2024-21xx/CVE-2024-2120.json | 74 ++- CVE-2024/CVE-2024-21xx/CVE-2024-2139.json | 74 ++- CVE-2024/CVE-2024-22xx/CVE-2024-2203.json | 80 ++- CVE-2024/CVE-2024-22xx/CVE-2024-2210.json | 60 ++- CVE-2024/CVE-2024-231xx/CVE-2024-23138.json | 24 +- CVE-2024/CVE-2024-231xx/CVE-2024-23139.json | 24 +- CVE-2024/CVE-2024-259xx/CVE-2024-25962.json | 61 ++- CVE-2024/CVE-2024-263xx/CVE-2024-26317.json | 45 +- CVE-2024/CVE-2024-27xx/CVE-2024-2790.json | 74 ++- CVE-2024/CVE-2024-299xx/CVE-2024-29911.json | 52 +- CVE-2024/CVE-2024-299xx/CVE-2024-29913.json | 52 +- CVE-2024/CVE-2024-301xx/CVE-2024-30182.json | 52 +- CVE-2024/CVE-2024-33xx/CVE-2024-3307.json | 84 +++- CVE-2024/CVE-2024-33xx/CVE-2024-3308.json | 76 ++- CVE-2024/CVE-2024-347xx/CVE-2024-34732.json | 21 + CVE-2024/CVE-2024-347xx/CVE-2024-34733.json | 21 + CVE-2024/CVE-2024-347xx/CVE-2024-34748.json | 21 + CVE-2024/CVE-2024-389xx/CVE-2024-38998.json | 114 +---- CVE-2024/CVE-2024-39xx/CVE-2024-3990.json | 94 +++- CVE-2024/CVE-2024-406xx/CVE-2024-40649.json | 21 + CVE-2024/CVE-2024-406xx/CVE-2024-40651.json | 21 + CVE-2024/CVE-2024-406xx/CVE-2024-40669.json | 21 + CVE-2024/CVE-2024-406xx/CVE-2024-40670.json | 21 + CVE-2024/CVE-2024-406xx/CVE-2024-40672.json | 25 + CVE-2024/CVE-2024-406xx/CVE-2024-40673.json | 25 + CVE-2024/CVE-2024-406xx/CVE-2024-40674.json | 25 + CVE-2024/CVE-2024-406xx/CVE-2024-40675.json | 25 + CVE-2024/CVE-2024-406xx/CVE-2024-40676.json | 25 + CVE-2024/CVE-2024-406xx/CVE-2024-40677.json | 25 + CVE-2024/CVE-2024-484xx/CVE-2024-48416.json | 45 +- CVE-2024/CVE-2024-484xx/CVE-2024-48417.json | 45 +- CVE-2024/CVE-2024-484xx/CVE-2024-48418.json | 45 +- CVE-2024/CVE-2024-484xx/CVE-2024-48419.json | 45 +- CVE-2024/CVE-2024-484xx/CVE-2024-48420.json | 45 +- CVE-2024/CVE-2024-486xx/CVE-2024-48662.json | 41 +- CVE-2024/CVE-2024-48xx/CVE-2024-4875.json | 64 ++- CVE-2024/CVE-2024-51xx/CVE-2024-5173.json | 74 ++- CVE-2024/CVE-2024-52xx/CVE-2024-5215.json | 114 ++++- CVE-2024/CVE-2024-547xx/CVE-2024-54728.json | 45 +- CVE-2024/CVE-2024-552xx/CVE-2024-55228.json | 45 +- CVE-2024/CVE-2024-561xx/CVE-2024-56178.json | 41 +- CVE-2024/CVE-2024-563xx/CVE-2024-56316.json | 41 +- CVE-2024/CVE-2024-569xx/CVE-2024-56947.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56948.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56949.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56950.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56951.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56952.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56953.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56954.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56955.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56957.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56959.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56960.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56962.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56963.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56964.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56965.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56966.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56967.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56968.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56969.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56971.json | 49 +- CVE-2024/CVE-2024-569xx/CVE-2024-56972.json | 49 +- CVE-2024/CVE-2024-570xx/CVE-2024-57052.json | 41 +- CVE-2024/CVE-2024-572xx/CVE-2024-57272.json | 45 +- CVE-2024/CVE-2024-573xx/CVE-2024-57373.json | 41 +- CVE-2024/CVE-2024-575xx/CVE-2024-57546.json | 41 +- CVE-2024/CVE-2024-575xx/CVE-2024-57547.json | 41 +- CVE-2024/CVE-2024-575xx/CVE-2024-57548.json | 41 +- CVE-2024/CVE-2024-575xx/CVE-2024-57549.json | 41 +- CVE-2024/CVE-2024-575xx/CVE-2024-57590.json | 45 +- CVE-2025/CVE-2025-06xx/CVE-2025-0631.json | 78 +++ CVE-2025/CVE-2025-07xx/CVE-2025-0783.json | 145 ++++++ CVE-2025/CVE-2025-07xx/CVE-2025-0784.json | 141 ++++++ CVE-2025/CVE-2025-222xx/CVE-2025-22217.json | 56 +++ CVE-2025/CVE-2025-241xx/CVE-2025-24137.json | 45 +- CVE-2025/CVE-2025-244xx/CVE-2025-24478.json | 78 +++ CVE-2025/CVE-2025-244xx/CVE-2025-24479.json | 78 +++ CVE-2025/CVE-2025-244xx/CVE-2025-24480.json | 78 +++ README.md | 92 ++-- _state.csv | 510 ++++++++++---------- 112 files changed, 5098 insertions(+), 705 deletions(-) create mode 100644 CVE-2024/CVE-2024-347xx/CVE-2024-34732.json create mode 100644 CVE-2024/CVE-2024-347xx/CVE-2024-34733.json create mode 100644 CVE-2024/CVE-2024-347xx/CVE-2024-34748.json create mode 100644 CVE-2024/CVE-2024-406xx/CVE-2024-40649.json create mode 100644 CVE-2024/CVE-2024-406xx/CVE-2024-40651.json create mode 100644 CVE-2024/CVE-2024-406xx/CVE-2024-40669.json create mode 100644 CVE-2024/CVE-2024-406xx/CVE-2024-40670.json create mode 100644 CVE-2024/CVE-2024-406xx/CVE-2024-40672.json create mode 100644 CVE-2024/CVE-2024-406xx/CVE-2024-40673.json create mode 100644 CVE-2024/CVE-2024-406xx/CVE-2024-40674.json create mode 100644 CVE-2024/CVE-2024-406xx/CVE-2024-40675.json create mode 100644 CVE-2024/CVE-2024-406xx/CVE-2024-40676.json create mode 100644 CVE-2024/CVE-2024-406xx/CVE-2024-40677.json create mode 100644 CVE-2025/CVE-2025-06xx/CVE-2025-0631.json create mode 100644 CVE-2025/CVE-2025-07xx/CVE-2025-0783.json create mode 100644 CVE-2025/CVE-2025-07xx/CVE-2025-0784.json create mode 100644 CVE-2025/CVE-2025-222xx/CVE-2025-22217.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24478.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24479.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24480.json diff --git a/CVE-2017/CVE-2017-133xx/CVE-2017-13317.json b/CVE-2017/CVE-2017-133xx/CVE-2017-13317.json index 959512178b8..89211296065 100644 --- a/CVE-2017/CVE-2017-133xx/CVE-2017-13317.json +++ b/CVE-2017/CVE-2017-133xx/CVE-2017-13317.json @@ -2,7 +2,7 @@ "id": "CVE-2017-13317", "sourceIdentifier": "security@android.com", "published": "2025-01-28T17:15:08.180", - "lastModified": "2025-01-28T17:15:08.180", + "lastModified": "2025-01-28T20:15:26.523", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In HeifDecoderImpl::getScanline of HeifDecoderImpl.cpp, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2018-05-01", diff --git a/CVE-2017/CVE-2017-133xx/CVE-2017-13318.json b/CVE-2017/CVE-2017-133xx/CVE-2017-13318.json index 71949ad1fae..d8ad85643d7 100644 --- a/CVE-2017/CVE-2017-133xx/CVE-2017-13318.json +++ b/CVE-2017/CVE-2017-133xx/CVE-2017-13318.json @@ -2,7 +2,7 @@ "id": "CVE-2017-13318", "sourceIdentifier": "security@android.com", "published": "2025-01-28T17:15:08.310", - "lastModified": "2025-01-28T17:15:08.310", + "lastModified": "2025-01-28T20:15:27.443", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,46 @@ "value": "In HeifDataSource::readAt of HeifDecoderImpl.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2018-05-01", diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9373.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9373.json index c963528e02b..bc4c39f8cd9 100644 --- a/CVE-2018/CVE-2018-93xx/CVE-2018-9373.json +++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9373.json @@ -2,7 +2,7 @@ "id": "CVE-2018-9373", "sourceIdentifier": "security@android.com", "published": "2025-01-28T17:15:08.427", - "lastModified": "2025-01-28T17:15:08.427", + "lastModified": "2025-01-28T20:15:27.593", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In TdlsexRxFrameHandle of the MTK WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2018-06-01", diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9378.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9378.json index 8d12cc56a55..2ad3e1d4731 100644 --- a/CVE-2018/CVE-2018-93xx/CVE-2018-9378.json +++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9378.json @@ -2,7 +2,7 @@ "id": "CVE-2018-9378", "sourceIdentifier": "security@android.com", "published": "2025-01-28T17:15:08.530", - "lastModified": "2025-01-28T17:15:08.530", + "lastModified": "2025-01-28T20:15:27.727", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In BnAudioPolicyService::onTransact of IAudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2018-06-01", diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48240.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48240.json index 70329e90e52..08dfdd5d7c6 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48240.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48240.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48240", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.540", - "lastModified": "2024-11-21T07:33:01.640", + "lastModified": "2025-01-28T19:15:08.860", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48241.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48241.json index cfa028ebaf9..c68bb27e9cf 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48241.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48241.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48241", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.587", - "lastModified": "2024-11-21T07:33:01.753", + "lastModified": "2025-01-28T19:15:10.233", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48242.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48242.json index dfc7a85e5a0..15090ad5d21 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48242.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48242.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48242", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.633", - "lastModified": "2024-11-21T07:33:01.867", + "lastModified": "2025-01-28T19:15:10.467", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48246.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48246.json index 99a4f36144a..806b49e84e3 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48246.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48246.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48246", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.817", - "lastModified": "2024-11-21T07:33:02.350", + "lastModified": "2025-01-28T20:15:27.897", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48247.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48247.json index 807fe2f9885..b3ffd31b41e 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48247.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48247.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48247", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.867", - "lastModified": "2024-11-21T07:33:02.467", + "lastModified": "2025-01-28T20:15:28.050", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48248.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48248.json index 38b15c2d47e..5c2c9e71962 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48248.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48248.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48248", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.910", - "lastModified": "2024-11-21T07:33:02.590", + "lastModified": "2025-01-28T20:15:28.203", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48249.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48249.json index 9cf59f09668..6b982640827 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48249.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48249.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48249", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.957", - "lastModified": "2024-11-21T07:33:02.707", + "lastModified": "2025-01-28T20:15:28.360", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48250.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48250.json index c2f32efe5d5..99ee7b4d9e2 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48250.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48250.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48250", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:10.997", - "lastModified": "2024-11-21T07:33:02.830", + "lastModified": "2025-01-28T20:15:28.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48368.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48368.json index 1807964bb0e..703e092772f 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48368.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48368.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48368", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:11.037", - "lastModified": "2024-11-21T07:33:16.043", + "lastModified": "2025-01-28T20:15:28.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48369.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48369.json index 944a2a59097..c4deac4a170 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48369.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48369.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48369", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:11.083", - "lastModified": "2024-11-21T07:33:16.170", + "lastModified": "2025-01-28T19:15:10.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48370.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48370.json index cac71dd45af..7c3becc59da 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48370.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48370.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48370", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:11.120", - "lastModified": "2024-11-21T07:33:16.287", + "lastModified": "2025-01-28T19:15:10.870", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48371.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48371.json index 278fdf8b3c5..78e0a7e727d 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48371.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48371.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48371", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:11.163", - "lastModified": "2024-11-21T07:33:16.403", + "lastModified": "2025-01-28T19:15:11.250", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48386.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48386.json index 8d4a217091f..a5d8a77bcee 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48386.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48386.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48386", "sourceIdentifier": "security@unisoc.com", "published": "2023-05-09T02:15:11.877", - "lastModified": "2024-11-21T07:33:18.177", + "lastModified": "2025-01-28T20:15:28.820", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26595.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26595.json index 6e2478819dc..8a482311384 100644 --- a/CVE-2023/CVE-2023-265xx/CVE-2023-26595.json +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26595.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26595", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.353", - "lastModified": "2024-11-21T07:51:49.420", + "lastModified": "2025-01-28T19:15:11.500", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29092.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29092.json index 16614b27cf4..ea554943f73 100644 --- a/CVE-2023/CVE-2023-290xx/CVE-2023-29092.json +++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29092.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29092", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T02:15:12.127", - "lastModified": "2024-11-21T07:56:31.913", + "lastModified": "2025-01-28T20:15:29.033", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-755" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30056.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30056.json index fbb1dabd4be..c159e73f599 100644 --- a/CVE-2023/CVE-2023-300xx/CVE-2023-30056.json +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30056.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30056", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T21:15:11.673", - "lastModified": "2024-11-21T07:59:45.070", + "lastModified": "2025-01-28T20:15:29.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-384" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30083.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30083.json index 883baab2d71..cdf5dc12f08 100644 --- a/CVE-2023/CVE-2023-300xx/CVE-2023-30083.json +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30083.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30083", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T16:15:14.373", - "lastModified": "2024-11-21T07:59:46.473", + "lastModified": "2025-01-28T20:15:29.483", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31804.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31804.json index 43098ccdb73..e55276736af 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31804.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31804.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31804", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T16:15:14.993", - "lastModified": "2024-11-21T08:02:16.610", + "lastModified": "2025-01-28T19:15:12.820", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31974.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31974.json index 9e1a7c1e104..4be66e73b4f 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31974.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31974.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31974", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T13:15:18.550", - "lastModified": "2024-11-21T08:02:27.473", + "lastModified": "2025-01-28T20:15:30.003", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -52,6 +72,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48777.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48777.json index 7d4f839fec6..71243cea728 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48777.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48777.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48777", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-26T21:15:52.350", - "lastModified": "2024-11-21T08:32:25.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T19:20:32.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elementor:website_builder:*:*:*:*:free:wordpress:*:*", + "versionStartIncluding": "3.3.0", + "versionEndExcluding": "3.18.2", + "matchCriteriaId": "5734EBDA-44EA-4977-9F7F-6E561FEADF99" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/elementor/wordpress-elementor-plugin-3-18-0-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/elementor/wordpress-elementor-plugin-3-18-0-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6214.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6214.json index 560b715ed1b..d5bfabfd0bb 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6214.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6214.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6214", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:07.970", - "lastModified": "2024-11-21T08:43:23.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T19:28:35.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.4.7", + "matchCriteriaId": "F64698EC-D902-4904-80B0-DF35E6C2E51F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.3.6/extensions/wc-sales-notification/classes/class.sale_notification.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3048999/ht-mega-for-elementor/trunk/extensions/wc-sales-notification/classes/class.sale_notification.php?old=2654447&old_path=ht-mega-for-elementor%2Ftrunk%2Fextensions%2Fwc-sales-notification%2Fclasses%2Fclass.sale_notification.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/54043c6a-48a1-48e8-ba61-a7e8a1773036?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.3.6/extensions/wc-sales-notification/classes/class.sale_notification.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3048999/ht-mega-for-elementor/trunk/extensions/wc-sales-notification/classes/class.sale_notification.php?old=2654447&old_path=ht-mega-for-elementor%2Ftrunk%2Fextensions%2Fwc-sales-notification%2Fclasses%2Fclass.sale_notification.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/54043c6a-48a1-48e8-ba61-a7e8a1773036?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0044.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0044.json index 436dbccba32..3a7751cba32 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0044.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0044.json @@ -2,13 +2,13 @@ "id": "CVE-2024-0044", "sourceIdentifier": "security@android.com", "published": "2024-03-11T17:15:45.450", - "lastModified": "2024-12-17T15:50:36.227", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-28T20:15:30.207", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n" + "value": "In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." }, { "lang": "es", @@ -115,34 +115,16 @@ ], "references": [ { - "url": "https://android.googlesource.com/platform/frameworks/base/+/65bd134b0a82c51a143b89821d5cdd00ddc31792", - "source": "security@android.com", - "tags": [ - "Mailing List", - "Patch" - ] + "url": "https://android.googlesource.com/platform/frameworks/base/+/836750619a8bce0bf78fe0549f9990e294671563", + "source": "security@android.com" }, { - "url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-m7fh-f3w4-r6v2", - "source": "security@android.com", - "tags": [ - "Third Party Advisory" - ] + "url": "https://android.googlesource.com/platform/frameworks/base/+/954b2874b85b6cd0d6bb12cd677cdf22e5dbd77b", + "source": "security@android.com" }, { - "url": "https://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.html", - "source": "security@android.com", - "tags": [ - "Exploit", - "Third Party Advisory" - ] - }, - { - "url": "https://source.android.com/security/bulletin/2024-03-01", - "source": "security@android.com", - "tags": [ - "Not Applicable" - ] + "url": "https://source.android.com/security/bulletin/2024-10-01", + "source": "security@android.com" }, { "url": "https://android.googlesource.com/platform/frameworks/base/+/65bd134b0a82c51a143b89821d5cdd00ddc31792", diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json index 4dd4ee31c3b..ca901e9ce58 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12085", "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-14T18:15:25.123", - "lastModified": "2025-01-28T08:15:28.440", + "lastModified": "2025-01-28T19:15:13.630", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -72,6 +72,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:0714", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:0774", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-12085", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13484.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13484.json index 593b5ce2f08..6564e08b6fd 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13484.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13484.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13484", "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-28T18:15:32.537", - "lastModified": "2025-01-28T18:15:32.537", + "lastModified": "2025-01-28T19:15:13.753", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-668" + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-13484", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2084.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2084.json index 1bb3524df4e..ff5cd9bc54b 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2084.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2084.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2084", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:15.543", - "lastModified": "2024-11-21T09:09:00.623", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T19:27:44.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.4.7", + "matchCriteriaId": "F64698EC-D902-4904-80B0-DF35E6C2E51F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3048999/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e5417d3-c466-4caf-9fb6-26d6e2c06fe1?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3048999/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e5417d3-c466-4caf-9fb6-26d6e2c06fe1?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2085.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2085.json index dce78ef6615..385c638e09a 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2085.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2085.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2085", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:15.710", - "lastModified": "2024-11-21T09:09:00.743", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T19:27:14.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.4.7", + "matchCriteriaId": "F64698EC-D902-4904-80B0-DF35E6C2E51F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3048999/ht-mega-for-elementor/trunk/includes/widgets/htmega_accordion.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f9c5bed-a399-43e2-be40-d669e90d3736?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3048999/ht-mega-for-elementor/trunk/includes/widgets/htmega_accordion.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f9c5bed-a399-43e2-be40-d669e90d3736?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2120.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2120.json index 73b77f4ef31..70253983e58 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2120.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2120.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2120", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-27T07:15:53.447", - "lastModified": "2024-11-21T09:09:04.350", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T20:31:11.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elementor:website_builder:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "3.20.2", + "matchCriteriaId": "8DCAEDE1-337C-4805-8D80-262C0EA00332" + } + ] + } + ] + } + ], "references": [ { "url": "https://elementor.com/pro/changelog/?utm_source=wp-plugins&utm_campaign=pro-changelog&utm_medium=wp-dash", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de1742d4-f498-4ad4-b6a1-88cb60e83afc?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://elementor.com/pro/changelog/?utm_source=wp-plugins&utm_campaign=pro-changelog&utm_medium=wp-dash", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de1742d4-f498-4ad4-b6a1-88cb60e83afc?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2139.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2139.json index a66a5d957d4..d221005022a 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2139.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2139.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2139", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-27T03:15:12.510", - "lastModified": "2024-11-21T09:09:06.763", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T19:24:14.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:master-addons:master_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.5.7", + "matchCriteriaId": "792C9386-3384-486A-A9DD-F833F6144331" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3050636/master-addons", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8910b6f0-1bf4-4ac0-93b7-54db7c15392c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3050636/master-addons", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8910b6f0-1bf4-4ac0-93b7-54db7c15392c?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2203.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2203.json index 17e8394aa6a..6e16380ce1e 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2203.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2203.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2203", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-27T03:15:12.737", - "lastModified": "2024-11-21T09:09:14.967", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T19:35:13.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,93 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "5.4.2", + "matchCriteriaId": "4B36FF78-C353-4F77-B50A-80BB7E081A6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "5.4.2", + "matchCriteriaId": "D2E71713-0C46-41F0-89D3-E6DE9EA4762C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3056776/the-plus-addons-for-elementor-page-builder", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dc7ff863-3a8e-41cd-ae20-78bb4577c16a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3056776/the-plus-addons-for-elementor-page-builder", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dc7ff863-3a8e-41cd-ae20-78bb4577c16a?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2210.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2210.json index 537caeb7820..43823f025fb 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2210.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2210.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2210", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-27T03:15:12.937", - "lastModified": "2024-11-21T09:09:15.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T20:21:57.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,70 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "5.4.2", + "matchCriteriaId": "4B36FF78-C353-4F77-B50A-80BB7E081A6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "5.4.2", + "matchCriteriaId": "D2E71713-0C46-41F0-89D3-E6DE9EA4762C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3056776/the-plus-addons-for-elementor-page-builder", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/30579058-54f4-4496-9275-078faf99823f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3056776/the-plus-addons-for-elementor-page-builder", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/30579058-54f4-4496-9275-078faf99823f?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23138.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23138.json index be36c4b5848..66f684a8223 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23138.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23138.json @@ -2,13 +2,13 @@ "id": "CVE-2024-23138", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-03-18T00:15:07.587", - "lastModified": "2024-11-21T08:57:02.143", + "lastModified": "2025-01-28T19:15:13.887", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A maliciously crafted DWG file when parsed through Autodesk DWG TrueView can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.\n" + "value": "A maliciously crafted DWG file when parsed through Autodesk DWG TrueView can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23139.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23139.json index 1a0f124f324..2a57ac530e6 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23139.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23139.json @@ -2,13 +2,13 @@ "id": "CVE-2024-23139", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-03-18T00:15:07.663", - "lastModified": "2024-11-21T08:57:02.360", + "lastModified": "2025-01-28T20:15:30.430", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An Out-Of-Bounds Write Vulnerability in Autodesk FBX Review version 1.5.3.0 and prior may lead to code execution or information disclosure through maliciously crafted ActionScript Byte Code \u201cABC\u201d files. ABC files are created by the Flash compiler and contain executable code. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.\n" + "value": "An Out-Of-Bounds Write Vulnerability in Autodesk FBX Review version 1.5.3.0 and prior may lead to code execution or information disclosure through maliciously crafted ActionScript Byte Code \u201cABC\u201d files. ABC files are created by the Flash compiler and contain executable code. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25962.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25962.json index 44f3166d936..aeba37d0c89 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25962.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25962.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25962", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-27T11:15:46.240", - "lastModified": "2024-11-21T09:01:39.420", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T20:34:04.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,49 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:insightiq:5.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5569D676-3632-4002-A1FF-56DCF5B2489C" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000223551/dsa-2024-134-security-update-for-dell-insightiq-for-proprietary-code-vulnerability", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dell.com/support/kbdoc/en-us/000223551/dsa-2024-134-security-update-for-dell-insightiq-for-proprietary-code-vulnerability", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26317.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26317.json index ca0b535adf5..5c965804987 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26317.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26317.json @@ -2,16 +2,55 @@ "id": "CVE-2024-26317", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T18:15:38.613", - "lastModified": "2025-01-27T18:15:38.613", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:30.597", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In illumos illumos-gate 2024-02-15, an error occurs in the elliptic curve point addition algorithm that uses mixed Jacobian-affine coordinates, causing the algorithm to yield a result of POINT_AT_INFINITY when it should not. A man-in-the-middle attacker could use this to interfere with a connection, resulting in an attacked party computing an incorrect shared secret." + }, + { + "lang": "es", + "value": "En illumos illumos-gate 2024-02-15, se produce un error en el algoritmo de suma de puntos de curva el\u00edptica que utiliza coordenadas afines a jacobianas mixtas, lo que hace que el algoritmo arroje un resultado de POINT_AT_INFINITY cuando no deber\u00eda. Un atacante intermediario podr\u00eda utilizar esto para interferir en una conexi\u00f3n, lo que provocar\u00eda que la parte atacada calcule un secreto compartido incorrecto." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://drive.google.com/file/d/1aGLAFz20-fc7ZLiWouegyK_65jCkGTDb/view?usp=sharing", diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2790.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2790.json index 13c923a0ab6..b05c96d49ae 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2790.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2790.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2790", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:19.513", - "lastModified": "2024-11-21T09:10:31.453", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T19:26:37.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.4.9", + "matchCriteriaId": "E6BEFE54-3972-44AD-99BA-B0453EAF3803" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3063395%40ht-mega-for-elementor&new=3063395%40ht-mega-for-elementor&sfp_email=&sfph_mail=#file4", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/52ba91f1-21a2-4d7c-8801-b5e72a00c37d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3063395%40ht-mega-for-elementor&new=3063395%40ht-mega-for-elementor&sfp_email=&sfph_mail=#file4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/52ba91f1-21a2-4d7c-8801-b5e72a00c37d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29911.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29911.json index ea4e027c5ab..439e7f0b916 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29911.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29911.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29911", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T07:15:51.690", - "lastModified": "2024-11-21T09:08:36.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T20:25:31.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:master-addons:master_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.5.6", + "matchCriteriaId": "64DD097A-EC4F-409B-BCE5-05EFE3E9282C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/master-addons/wordpress-master-addons-for-elementor-plugin-2-0-5-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/master-addons/wordpress-master-addons-for-elementor-plugin-2-0-5-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29913.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29913.json index 4f7840c2fc6..cc485630977 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29913.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29913.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29913", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T07:15:52.420", - "lastModified": "2024-11-21T09:08:36.307", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-28T20:29:09.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeum:tutor_lms_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.4", + "matchCriteriaId": "AC3061D3-CAFC-4E42-9348-E5ACA1D534B7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/tutor-lms-elementor-addons/wordpress-tutor-lms-elementor-addons-plugin-2-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/tutor-lms-elementor-addons/wordpress-tutor-lms-elementor-addons-plugin-2-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30182.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30182.json index de170e3eca2..159d40cb441 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30182.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30182.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30182", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T12:15:12.320", - "lastModified": "2024-11-21T09:11:22.890", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T20:39:34.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "53BB2AD6-F72F-4564-B8DF-F6E51A3129E3" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ht-mega-for-elementor/wordpress-ht-mega-absolute-addons-for-elementor-plugin-2-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/ht-mega-for-elementor/wordpress-ht-mega-absolute-addons-for-elementor-plugin-2-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3307.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3307.json index 5627ae147f7..8f3d8fd4beb 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3307.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3307.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3307", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:24.357", - "lastModified": "2024-11-21T09:29:21.743", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T19:25:45.740", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.5.0", + "matchCriteriaId": "462E1B57-9BD7-4DA5-91A9-8ACA0F8195BE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/includes/widgets/htmega_countdown.php#L1251", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3071480%40ht-mega-for-elementor%2Ftrunk&old=3063395%40ht-mega-for-elementor%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8452e54-7a81-4921-b531-8cb3b0953dab?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/includes/widgets/htmega_countdown.php#L1251", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3071480%40ht-mega-for-elementor%2Ftrunk&old=3063395%40ht-mega-for-elementor%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8452e54-7a81-4921-b531-8cb3b0953dab?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3308.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3308.json index 4d93c0bf7ba..8aaa9e12926 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3308.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3308.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3308", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:24.520", - "lastModified": "2024-11-21T09:29:21.867", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T19:24:31.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,89 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.5.0", + "matchCriteriaId": "462E1B57-9BD7-4DA5-91A9-8ACA0F8195BE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3071480%40ht-mega-for-elementor%2Ftrunk&old=3063395%40ht-mega-for-elementor%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch", + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/33b5e231-1b53-4646-ae9c-48babf1ebbd7?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3071480%40ht-mega-for-elementor%2Ftrunk&old=3063395%40ht-mega-for-elementor%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/33b5e231-1b53-4646-ae9c-48babf1ebbd7?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34732.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34732.json new file mode 100644 index 00000000000..b15da23ce68 --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34732.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-34732", + "sourceIdentifier": "security@android.com", + "published": "2025-01-28T20:15:30.790", + "lastModified": "2025-01-28T20:15:30.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In RGXMMUCacheInvalidate of rgxmem.c, there is a possible arbitrary code execution due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/2024-10-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34733.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34733.json new file mode 100644 index 00000000000..cf81fbbd364 --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34733.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-34733", + "sourceIdentifier": "security@android.com", + "published": "2025-01-28T20:15:30.893", + "lastModified": "2025-01-28T20:15:30.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In DevmemXIntMapPages of devicemem_server.c, there is a possible arbitrary code execution due to an integer overflow. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/2024-10-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34748.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34748.json new file mode 100644 index 00000000000..96bd597d4eb --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34748.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-34748", + "sourceIdentifier": "security@android.com", + "published": "2025-01-28T20:15:30.993", + "lastModified": "2025-01-28T20:15:30.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In _DevmemXReservationPageAddress of devicemem_server.c, there is a possible use-after-free due to improper casting. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/2024-10-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38998.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38998.json index 4c26e89e98b..3636df84985 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38998.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38998.json @@ -2,119 +2,15 @@ "id": "CVE-2024-38998", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.223", - "lastModified": "2024-11-21T09:27:04.827", - "vulnStatus": "Modified", + "lastModified": "2025-01-28T20:15:31.103", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "jrburke requirejs v2.3.6 was discovered to contain a prototype pollution via the function config. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." - }, - { - "lang": "es", - "value": "Se descubri\u00f3 que jrburke requirejs v2.3.6 conten\u00eda un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n config. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 8.4, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 2.5, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-1321" - } - ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-1321" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:requirejs:requirejs:*:*:*:*:*:*:*:*", - "versionEndExcluding": "2.3.7", - "matchCriteriaId": "9EEBD183-40A2-4E15-9050-33423032DF4C" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://gist.github.com/mestrtee/9acae342285bd2998fa09ebcb1e6d30a", - "source": "cve@mitre.org", - "tags": [ - "Exploit", - "Third Party Advisory" - ] - }, - { - "url": "https://gist.github.com/mestrtee/9acae342285bd2998fa09ebcb1e6d30a", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Exploit", - "Third Party Advisory" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3990.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3990.json index 21d93128baf..6ce73902d61 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3990.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3990.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3990", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:42:40.570", - "lastModified": "2024-11-21T09:30:51.623", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T19:23:34.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,41 +36,115 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.5.1", + "matchCriteriaId": "4A112023-A359-490A-BBC3-36BD55B0F376" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.5.0/includes/widgets/htmega_tooltip.php#L620", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3074490%40ht-mega-for-elementor&new=3074490%40ht-mega-for-elementor&sfp_email=&sfph_mail=#file4", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3074490%40ht-mega-for-elementor&new=3074490%40ht-mega-for-elementor&sfp_email=&sfph_mail=#file5", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/98e74a23-b586-4d6a-b1ab-78838b0eed61?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.5.0/includes/widgets/htmega_tooltip.php#L620", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3074490%40ht-mega-for-elementor&new=3074490%40ht-mega-for-elementor&sfp_email=&sfph_mail=#file4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3074490%40ht-mega-for-elementor&new=3074490%40ht-mega-for-elementor&sfp_email=&sfph_mail=#file5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/98e74a23-b586-4d6a-b1ab-78838b0eed61?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40649.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40649.json new file mode 100644 index 00000000000..bba37a644d6 --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40649.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40649", + "sourceIdentifier": "security@android.com", + "published": "2025-01-28T20:15:49.063", + "lastModified": "2025-01-28T20:15:49.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In TBD of TBD, there is a possible use-after-free due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/2024-10-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40651.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40651.json new file mode 100644 index 00000000000..3b0dae472a6 --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40651.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40651", + "sourceIdentifier": "security@android.com", + "published": "2025-01-28T20:15:49.160", + "lastModified": "2025-01-28T20:15:49.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In TBD of TBD, there is a possible use-after-free due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/2024-10-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40669.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40669.json new file mode 100644 index 00000000000..98c2bba7678 --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40669.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40669", + "sourceIdentifier": "security@android.com", + "published": "2025-01-28T20:15:49.250", + "lastModified": "2025-01-28T20:15:49.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In TBD of TBD, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/2024-10-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40670.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40670.json new file mode 100644 index 00000000000..5d8f69e118f --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40670.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40670", + "sourceIdentifier": "security@android.com", + "published": "2025-01-28T20:15:49.343", + "lastModified": "2025-01-28T20:15:49.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In TBD of TBD, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/2024-10-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40672.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40672.json new file mode 100644 index 00000000000..a37054cef7d --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40672.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40672", + "sourceIdentifier": "security@android.com", + "published": "2025-01-28T20:15:49.433", + "lastModified": "2025-01-28T20:15:49.433", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In onCreate of ChooserActivity.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://android.googlesource.com/platform/packages/modules/IntentResolver/+/ccd29124d0d2276a3071c0418c14dec188cd3727", + "source": "security@android.com" + }, + { + "url": "https://source.android.com/security/bulletin/2024-10-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40673.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40673.json new file mode 100644 index 00000000000..a4410866a70 --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40673.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40673", + "sourceIdentifier": "security@android.com", + "published": "2025-01-28T20:15:49.530", + "lastModified": "2025-01-28T20:15:49.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Source of ZipFile.java, there is a possible way for an attacker to execute arbitrary code by manipulating Dynamic Code Loading due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://android.googlesource.com/platform/libcore/+/b17fd2f8fe468e7d32e713b442f610cd33e4e7a9", + "source": "security@android.com" + }, + { + "url": "https://source.android.com/security/bulletin/2024-10-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40674.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40674.json new file mode 100644 index 00000000000..115bae08eca --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40674.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40674", + "sourceIdentifier": "security@android.com", + "published": "2025-01-28T20:15:49.620", + "lastModified": "2025-01-28T20:15:49.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In validateSsid of WifiConfigurationUtil.java, there is a possible way to overflow a system configuration file due to a logic error in the code. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://android.googlesource.com/platform/packages/modules/Wifi/+/debc548ac085ba1ab0582172b97d965e9a1ea43a", + "source": "security@android.com" + }, + { + "url": "https://source.android.com/security/bulletin/2024-10-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40675.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40675.json new file mode 100644 index 00000000000..ef0592e5883 --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40675.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40675", + "sourceIdentifier": "security@android.com", + "published": "2025-01-28T20:15:49.710", + "lastModified": "2025-01-28T20:15:49.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In parseUriInternal of Intent.java, there is a possible infinite loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://android.googlesource.com/platform/frameworks/base/+/c6b5490ec659b5854fd429f453f75de5befa6359", + "source": "security@android.com" + }, + { + "url": "https://source.android.com/security/bulletin/2024-10-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40676.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40676.json new file mode 100644 index 00000000000..84bbcf8e956 --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40676.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40676", + "sourceIdentifier": "security@android.com", + "published": "2025-01-28T20:15:49.800", + "lastModified": "2025-01-28T20:15:49.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In checkKeyIntent of AccountManagerService.java, there is a possible way to bypass intent security check and install an unknown app due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://android.googlesource.com/platform/frameworks/base/+/e8a53246607b52b15269f97aef9ba7e928ba2473", + "source": "security@android.com" + }, + { + "url": "https://source.android.com/security/bulletin/2024-10-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40677.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40677.json new file mode 100644 index 00000000000..5eba98101da --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40677.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40677", + "sourceIdentifier": "security@android.com", + "published": "2025-01-28T20:15:49.890", + "lastModified": "2025-01-28T20:15:49.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In shouldSkipForInitialSUW of AdvancedPowerUsageDetail.java, there is a possible way to bypass factory reset protections due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/db26138f07db830e3fb78283d37de3c0296d93cb", + "source": "security@android.com" + }, + { + "url": "https://source.android.com/security/bulletin/2024-10-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48416.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48416.json index 154000e1a5c..73f4b484449 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48416.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48416.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48416", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T17:15:15.770", - "lastModified": "2025-01-27T17:15:15.770", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:49.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 is vulnerable to Buffer Overflow via /goform/fromSetLanDhcpsClientbinding." + }, + { + "lang": "es", + "value": "Edimax AC1200 Wi-Fi 5 de doble banda router BR-6476AC 1.06 es vulnerable a un desbordamiento de b\u00fafer a trav\u00e9s de /goform/fromSetLanDhcpsClientbinding." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://edimax.com", diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48417.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48417.json index 366cd7f6359..f4be25fbd64 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48417.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48417.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48417", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T17:15:15.867", - "lastModified": "2025-01-27T17:15:15.867", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:50.143", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 is vulnerable to Cross Site Scripting (XSS) in : /bin/goahead via /goform/setStaticRoute, /goform/fromSetFilterUrlFilter, and /goform/fromSetFilterClientFilter." + }, + { + "lang": "es", + "value": "Edimax AC1200 Wi-Fi 5 de doble banda router BR-6476AC 1.06 es vulnerable a Cross Site Scripting (XSS) en: /bin/goahead a trav\u00e9s de /goform/setStaticRoute, /goform/fromSetFilterUrlFilter y /goform/fromSetFilterClientFilter." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.2, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://edimax.com", diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48418.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48418.json index 0840aa0b04e..44f829d99b4 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48418.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48418.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48418", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T17:15:15.960", - "lastModified": "2025-01-27T17:15:15.960", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:50.283", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06, the request /goform/fromSetDDNS does not properly handle special characters in any of user provided parameters, allowing an attacker with access to the web interface to inject and execute arbitrary shell commands." + }, + { + "lang": "es", + "value": "En Edimax AC1200 Wi-Fi 5 Dual-Band router BR-6476AC 1.06, la solicitud /goform/fromSetDDNS no gestiona correctamente los caracteres especiales en ninguno de los par\u00e1metros proporcionados por el usuario, lo que permite que un atacante con acceso a la interfaz web inyecte y ejecute comandos de shell arbitrarios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://edimax.com", diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48419.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48419.json index dfb97f732a0..9a921765aa2 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48419.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48419.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48419", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T17:15:16.053", - "lastModified": "2025-01-27T17:15:16.053", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:50.423", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 suffers from Command Injection issues in /bin/goahead. Specifically, these issues can be triggered through /goform/tracerouteDiagnosis, /goform/pingDiagnosis, and /goform/fromSysToolPingCmd Each of these issues allows an attacker with access to the web interface to inject and execute arbitrary shell commands, with \"root\" privileges." + }, + { + "lang": "es", + "value": "Edimax AC1200 Wi-Fi 5 Dual-Band router BR-6476AC 1.06 presenta problemas de inyecci\u00f3n de comandos en /bin/goahead. En concreto, estos problemas se pueden desencadenar a trav\u00e9s de /goform/tracerouteDiagnosis, /goform/pingDiagnosis y /goform/fromSysToolPingCmd. Cada uno de estos problemas permite que un atacante con acceso a la interfaz web inyecte y ejecute comandos de shell arbitrarios, con privilegios de \"superusuario\"." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://edimax.com", diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48420.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48420.json index f6de9041087..51ec2f39af5 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48420.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48420.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48420", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T17:15:16.153", - "lastModified": "2025-01-27T17:15:16.153", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:50.573", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 is vulnerable to Buffer Overflow via /goform/getWifiBasic." + }, + { + "lang": "es", + "value": "Edimax AC1200 Wi-Fi 5 de doble banda router BR-6476AC 1.06 es vulnerable a un desbordamiento de b\u00fafer a trav\u00e9s de /goform/getWifiBasic." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://edimax.com", diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48662.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48662.json index 1fae642fcf8..60ce7dc8e69 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48662.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48662.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48662", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T23:15:08.843", - "lastModified": "2025-01-27T23:15:08.843", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:50.727", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "Cross Site Scripting vulnerability in AdGuard Application v.7.18.1 (4778) and before allows an attacker to execute arbitrary code via a crafted payload to the fontMatrix component." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/VuDuc09/vuln_research/tree/main/CVE-2024-48662", diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4875.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4875.json index 82ff7e40c97..c1150a2f687 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4875.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4875.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4875", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-21T09:15:09.103", - "lastModified": "2024-11-21T09:43:46.460", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T19:20:29.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.5.3", + "matchCriteriaId": "9F8E02F4-4CC0-4308-ABF8-BBE1284D6154" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/admin/include/class.dynamic-notice.php#L52", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3088899/ht-mega-for-elementor/trunk/admin/include/class.dynamic-notice.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bdd3868a-d741-42b4-bc7f-6fb5d33bb71b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/admin/include/class.dynamic-notice.php#L52", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3088899/ht-mega-for-elementor/trunk/admin/include/class.dynamic-notice.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bdd3868a-d741-42b4-bc7f-6fb5d33bb71b?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5173.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5173.json index 8c2555bb606..1fc26100a5a 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5173.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5173.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5173", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-26T02:15:09.340", - "lastModified": "2024-11-21T09:47:07.830", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T19:18:40.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.5.6", + "matchCriteriaId": "5D86A6BF-ECC5-44FA-8DF1-FF16B0310E93" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.5.3/includes/widgets/htmega_videoplayer.php#L549", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aac9569e-d33d-45b3-bd03-2e7f48536ae5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.5.3/includes/widgets/htmega_videoplayer.php#L549", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aac9569e-d33d-45b3-bd03-2e7f48536ae5?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5215.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5215.json index a4ba70f0564..51164f39a67 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5215.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5215.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5215", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-26T07:15:11.013", - "lastModified": "2024-11-21T09:47:12.033", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-28T19:17:56.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,57 +36,143 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.5.6", + "matchCriteriaId": "5D86A6BF-ECC5-44FA-8DF1-FF16B0310E93" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/includes/widgets/htmega_user_login_form.php#L1961", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/includes/widgets/htmega_user_register_form.php#L2910", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/includes/widgets/htmega_videoplayer.php#L520", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3106524/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/ht-mega-for-elementor/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/86dfdc4f-1cc2-4b0d-b79c-bee3d6956eb4?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/includes/widgets/htmega_user_login_form.php#L1961", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/includes/widgets/htmega_user_register_form.php#L2910", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/includes/widgets/htmega_videoplayer.php#L520", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3106524/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/ht-mega-for-elementor/#developers", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/86dfdc4f-1cc2-4b0d-b79c-bee3d6956eb4?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54728.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54728.json index 4538d3cce01..1c0c7ab25bc 100644 --- a/CVE-2024/CVE-2024-547xx/CVE-2024-54728.json +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54728.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54728", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T23:15:09.353", - "lastModified": "2025-01-27T23:15:09.353", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:50.873", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,46 @@ "value": "Incorrect access control in BYD QIN PLUS DM-i Dilink OS 3.0_13.1.7.2204050.1 allows unauthorized attackers to access system logcat logs." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/xu-yanbo202000460009/00dacd7bfede713a0f052a531da4fabd", diff --git a/CVE-2024/CVE-2024-552xx/CVE-2024-55228.json b/CVE-2024/CVE-2024-552xx/CVE-2024-55228.json index c5a2bfe0514..d45c7c6588e 100644 --- a/CVE-2024/CVE-2024-552xx/CVE-2024-55228.json +++ b/CVE-2024/CVE-2024-552xx/CVE-2024-55228.json @@ -2,16 +2,55 @@ "id": "CVE-2024-55228", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T17:15:16.633", - "lastModified": "2025-01-27T17:15:16.633", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:51.017", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the Product module of Dolibarr v21.0.0-beta allows attackers to execute arbitrary web scripts or HTMl via a crafted payload injected into the Title parameter." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de cross-site scripting (XSS) en el m\u00f3dulo Producto de Dolibarr v21.0.0-beta permite a los atacantes ejecutar web scripts o HTMl arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro T\u00edtulo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/Dqtdqt/a942bbce9a5fc851dce366902411c768", diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56178.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56178.json index e6d9327b9b6..7f5ac357cd6 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56178.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56178.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56178", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T23:15:09.480", - "lastModified": "2025-01-27T23:15:09.480", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:51.173", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "An issue was discovered in Couchbase Server 7.6.x through 7.6.3. A user with the security_admin_local role can create a new user in a group that has the admin role." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], "references": [ { "url": "https://www.couchbase.com/alerts/", diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56316.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56316.json index a5f082b9396..41f33f36d56 100644 --- a/CVE-2024/CVE-2024-563xx/CVE-2024-56316.json +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56316.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56316", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T23:15:09.607", - "lastModified": "2025-01-27T23:15:09.607", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:51.320", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "In AXESS ACS (Auto Configuration Server) through 5.2.0, unsanitized user input in the TR069 API allows remote unauthenticated attackers to cause a permanent Denial of Service via crafted TR069 requests on TCP port 9675 or 7547. Rebooting does not resolve the permanent Denial of Service." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://www.y-security.de/news-en/axess-auto-configuration-server-denial-of-service-cve-2024-56316/", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56947.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56947.json index f93f77de6cf..192ad8ce6d1 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56947.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56947.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56947", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:16.187", - "lastModified": "2025-01-27T19:15:16.187", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:51.500", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Xiamen Meitu Technology Co., Ltd. BeautyCam iOS v12.3.60 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Xiamen Meitu Technology Co., Ltd. BeautyCam iOS v12.3.60 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/241208-BeautyCam/241208-BeautyCam.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56948.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56948.json index 6b6eacc58a5..f15c9f51efd 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56948.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56948.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56948", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:16.290", - "lastModified": "2025-01-27T19:15:16.290", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:51.650", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in KuGou Technology CO. LTD KuGou Music iOS v20.0.0 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en KuGou Technology CO. LTD KuGou Music iOS v20.0.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/241211-KuGouMusic/241211-KuGouMusic.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56949.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56949.json index c7196945430..214a5af28ab 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56949.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56949.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56949", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:16.383", - "lastModified": "2025-01-27T19:15:16.383", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:51.797", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Guangzhou Polar Future Culture Technology Co., Ltd University Search iOS 2.27.0 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Guangzhou Polar Future Culture Technology Co., Ltd University Search iOS 2.27.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/241212-UniversitySearch/241212-UniversitySearch.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56950.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56950.json index 257b02360d7..76652b9c964 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56950.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56950.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56950", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:16.480", - "lastModified": "2025-01-27T19:15:16.480", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:51.960", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in KuGou Technology Co., Ltd KuGou Concept iOS 4.0.61 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en KuGou Technology Co., Ltd KuGou Concept iOS 4.0.61 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/241213-KuGouConcept/241213-KuGouConcept.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56951.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56951.json index 83ab6951510..155d2f28f11 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56951.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56951.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56951", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:16.583", - "lastModified": "2025-01-27T19:15:16.583", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:52.107", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Hangzhou Bobo Technology Co Ltd UU Game Booster iOS 10.6.13 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Hangzhou Bobo Technology Co Ltd UU Game Booster iOS 10.6.13 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/241216-UUGameBooster/241216-UUGameBooster.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56952.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56952.json index 1ec8ec63676..d38d292a23a 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56952.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56952.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56952", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:16.697", - "lastModified": "2025-01-27T19:15:16.697", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:52.250", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Beijing Baidu Netcom Science & Technology Co Ltd Baidu Lite app (iOS version) 6.40.0 allows attackers to access user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en la aplicaci\u00f3n Baidu Lite (versi\u00f3n iOS) 6.40.0 de Beijing Baidu Netcom Science & Technology Co Ltd permite a los atacantes acceder a informaci\u00f3n del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/241217-BaiduLite/241217-BaiduLite.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56953.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56953.json index ce2778692bc..250b3ffc01c 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56953.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56953.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56953", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:16.823", - "lastModified": "2025-01-27T19:15:16.823", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:52.390", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Baidu (China) Co Ltd Baidu Input Method (iOS version) v12.6.13 allows attackers to access user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Baidu (China) Co Ltd Baidu Input Method (versi\u00f3n iOS) v12.6.13 permite a los atacantes acceder a informaci\u00f3n del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/241217-BaiduInput/241217-BaiduInput.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56954.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56954.json index 503d82466d1..baf56d029a6 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56954.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56954.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56954", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:16.933", - "lastModified": "2025-01-27T19:15:16.933", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:52.540", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Beijing Baidu Netcom Science & Technology Co Ltd Haokan Video iOS 7.70.0 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Beijing Baidu Netcom Science & Technology Co Ltd Haokan Video iOS 7.70.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/241219-HaokanVideo/241219-HaokanVideo.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56955.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56955.json index 91f66eee6bb..9975aeb9736 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56955.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56955.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56955", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:17.040", - "lastModified": "2025-01-27T19:15:17.040", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:52.693", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Tencent Technology (Shenzhen) Company Limited QQMail iOS 6.6.4 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en QQMail iOS 6.6.4 de Tencent Technology (Shenzhen) Company Limited permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/241220-QQMail/241220-QQMail.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56957.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56957.json index 30b06d4629e..938880557a5 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56957.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56957.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56957", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:17.147", - "lastModified": "2025-01-27T19:15:17.147", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:52.837", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Kingsoft Office Software Corporation Limited WPS Office iOS 12.20.0 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Kingsoft Office Software Corporation Limited WPS Office iOS 12.20.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/241222-WPSOffice/241222-WPSOffice.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56959.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56959.json index 390d01258e1..126a41ac62e 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56959.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56959.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56959", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:17.247", - "lastModified": "2025-01-27T19:15:17.247", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:52.987", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Mashang Consumer Finance Co., Ltd Anyihua iOS 3.6.2 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Mashang Consumer Finance Co., Ltd Anyihua iOS 3.6.2 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/241225-Anyihua/241225-Anyihua.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56960.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56960.json index a888bccc7d7..77cb7acbaf6 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56960.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56960.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56960", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:17.347", - "lastModified": "2025-01-27T19:15:17.347", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:53.127", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Tianjin Xiaowu Information technology Co., Ltd BeiKe Holdings iOS 1.3.50 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Tianjin Xiaowu Information technology Co., Ltd BeiKe Holdings iOS 1.3.50 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/241226-BeiKeHoldings/241226-BeiKeHoldings.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56962.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56962.json index f7fdc830394..d45cbcfafae 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56962.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56962.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56962", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:17.447", - "lastModified": "2025-01-27T19:15:17.447", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:53.273", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Tencent Technology (Shanghai) Co., Ltd WeSing iOS v9.3.39 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Tencent Technology (Shanghai) Co., Ltd WeSing iOS v9.3.39 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/241227-WeSing/241227-WeSing.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56963.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56963.json index df3c15fccbc..e865d177a09 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56963.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56963.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56963", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:17.547", - "lastModified": "2025-01-27T19:15:17.547", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:53.423", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Beijing Sogou Technology Development Co., Ltd Sogou Input iOS 12.2.0 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Beijing Sogou Technology Development Co., Ltd Sogou Input iOS 12.2.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/241228-SogouInput/241228-SogouInput.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56964.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56964.json index 9f546758481..e790dce8314 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56964.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56964.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56964", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:17.647", - "lastModified": "2025-01-27T19:15:17.647", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:53.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Che Hao Duo Used Automobile Agency (Beijing) Co., Ltd Guazi Used Car iOS 10.15.1 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Che Hao Duo Used Automobile Agency (Beijing) Co., Ltd Guazi Used Car iOS 10.15.1 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/241229-GuaziUsedCar/241229-GuaziUsedCar.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56965.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56965.json index 72b1333b133..3b647451e53 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56965.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56965.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56965", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:17.747", - "lastModified": "2025-01-27T19:15:17.747", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:53.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Shanghai Shizhi Information Technology Co., Ltd Shihuo iOS 8.16.0 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Shanghai Shizhi Information Technology Co., Ltd Shihuo iOS 8.16.0 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/241230-Shihuo/241230-Shihuo.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56966.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56966.json index 5845229c148..a25e53d16e3 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56966.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56966.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56966", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:17.850", - "lastModified": "2025-01-27T19:15:17.850", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:53.873", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Shanghai Xuan Ting Entertainment Information & Technology Co., Ltd Qidian Reader iOS 5.9.384 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Shanghai Xuan Ting Entertainment Information & Technology Co., Ltd Qidian Reader iOS 5.9.384 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/241231-QidianReader/241231-QidianReader.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56967.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56967.json index b0ad9ba30be..d2492dd4f96 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56967.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56967.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56967", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:17.947", - "lastModified": "2025-01-27T19:15:17.947", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:54.010", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Cloud Whale Interactive Technology LLC. PolyBuzz iOS 2.0.20 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Cloud Whale Interactive Technology LLC. PolyBuzz iOS 2.0.20 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250103-PolyBuzz/250103-PolyBuzz.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56968.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56968.json index f5d50babb7f..66c89b16e0a 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56968.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56968.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56968", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:18.057", - "lastModified": "2025-01-27T19:15:18.057", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:54.157", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Shenzhen Intellirocks Tech Co. Ltd Govee Home iOS 6.5.01 allows attackers to access sensitive user information via supplying a crafted payload." + }, + { + "lang": "es", + "value": "Un problema en Govee Home iOS 6.5.01 de Shenzhen Intellirocks Tech Co. Ltd permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un payload manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250106-GoveeHome/250106-GoveeHome.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56969.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56969.json index 67a3b3b0e82..9395765dedd 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56969.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56969.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56969", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:18.157", - "lastModified": "2025-01-27T19:15:18.157", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:54.297", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Pixocial Technology (Singapore) Pte. Ltd BeautyPlus iOS 7.8.010 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Pixocial Technology (Singapore) Pte. Ltd BeautyPlus iOS 7.8.010 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250107-BeautyPlus/250107-BeautyPlus.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56971.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56971.json index 8852f9251cf..0f1640b4313 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56971.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56971.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56971", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:18.260", - "lastModified": "2025-01-27T19:15:18.260", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:54.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Zhiyuan Yuedu (Guangzhou) Literature Information Technology Co., Ltd Shuqi Novel iOS 5.3.8 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Zhiyuan Yuedu (Guangzhou) Literature Information Technology Co., Ltd Shuqi Novel iOS 5.3.8 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250108-ShuqiNovel/250108-ShuqiNovel.pdf", diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56972.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56972.json index 41f23b9c265..88ab704052c 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56972.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56972.json @@ -2,16 +2,59 @@ "id": "CVE-2024-56972", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T19:15:18.360", - "lastModified": "2025-01-27T19:15:18.360", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:54.580", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Midea Group Co., Ltd Midea Home iOS 9.3.12 allows attackers to access sensitive user information via supplying a crafted link." + }, + { + "lang": "es", + "value": "Un problema en Midea Group Co., Ltd Midea Home iOS 9.3.12 permite a los atacantes acceder a informaci\u00f3n confidencial del usuario mediante el suministro de un enlace manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ZhouZiyi1/Vuls/blob/main/250109-MideaHome/250109-MideaHome.pdf", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57052.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57052.json index e229e4e2a34..9f712866f1d 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57052.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57052.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57052", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T23:15:09.723", - "lastModified": "2025-01-27T23:15:09.723", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:54.727", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "An issue in youdiancms v.9.5.20 and before allows a remote attacker to escalate privileges via the sessionID parameter in the index.php file." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/yahaha9/720fb45bbebda62dc198568c8d275df8", diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57272.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57272.json index 6840a306f38..edf91121b4e 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57272.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57272.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57272", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T17:15:16.730", - "lastModified": "2025-01-27T17:15:16.730", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:54.870", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SecuSTATION Camera V2.5.5.3116-S50-SMA-B20160811A and lower is vulnerable to Cross Site Scripting (XSS)." + }, + { + "lang": "es", + "value": "SecuSTATION Camera V2.5.5.3116-S50-SMA-B20160811A y versiones anteriores es vulnerable a Cross Site Scripting (XSS)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/kklzzcun/Camera/blob/main/SecureSTATION%20%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%B0%84%E5%BD%A2XSS%E6%BC%8F%E6%B4%9E.md", diff --git a/CVE-2024/CVE-2024-573xx/CVE-2024-57373.json b/CVE-2024/CVE-2024-573xx/CVE-2024-57373.json index 2205b58bb69..e156b765559 100644 --- a/CVE-2024/CVE-2024-573xx/CVE-2024-57373.json +++ b/CVE-2024/CVE-2024-573xx/CVE-2024-57373.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57373", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T23:15:09.830", - "lastModified": "2025-01-27T23:15:09.830", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:55.040", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "Cross Site Request Forgery vulnerability in LifestyleStore v.1.0 allows a remote attacker to execute arbitrary cod and obtain sensitive information." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://github.com/cypherdavy/CVE-2024-57373", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57546.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57546.json index 52d7f298a37..9f23cc0cd66 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57546.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57546.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57546", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T23:15:09.947", - "lastModified": "2025-01-27T23:15:09.947", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:55.203", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "An issue in CMSimple v.5.16 allows a remote attacker to obtain sensitive information via a crafted script to the validate link function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/h4ckr4v3n/afbb87b5a05f283dbee705709c2769eb", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57547.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57547.json index c6debe54990..ca84fc09613 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57547.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57547.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57547", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T23:15:10.057", - "lastModified": "2025-01-27T23:15:10.057", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:55.367", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "Insecure Permissions vulnerability in CMSimple v.5.16 allows a remote attacker to obtain sensitive information via a crafted script to the Functionality of downloading php backup files." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/h4ckr4v3n/afbb87b5a05f283dbee705709c2769eb", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57548.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57548.json index ca05911061d..779dfe65e17 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57548.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57548.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57548", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T23:15:10.180", - "lastModified": "2025-01-27T23:15:10.180", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:55.547", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "CMSimple 5.16 allows the user to edit log.php file via print page." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/h4ckr4v3n/afbb87b5a05f283dbee705709c2769eb", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57549.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57549.json index cce496f65aa..900ce09516c 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57549.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57549.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57549", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T23:15:10.303", - "lastModified": "2025-01-27T23:15:10.303", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:55.810", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "CMSimple 5.16 allows the user to read cms source code through manipulation of the file name in the file parameter of a GET request." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/h4ckr4v3n/afbb87b5a05f283dbee705709c2769eb", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57590.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57590.json index 698c6e9377e..6926aa9748a 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57590.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57590.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57590", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T15:15:11.463", - "lastModified": "2025-01-27T15:15:11.463", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:55.973", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TRENDnet TEW-632BRP v1.010B31 devices have an OS command injection vulnerability in the CGl interface \"ntp_sync.cgi\",which allows remote attackers to execute arbitrary commands via parameter \"ntp_server\" passed to the \"ntp_sync.cgi\" binary through a POST request." + }, + { + "lang": "es", + "value": "Los dispositivos TRENDnet TEW-632BRP v1.010B31 tienen una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la interfaz CGl \"ntp_sync.cgi\", que permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s del par\u00e1metro \"ntp_server\" pasado al binario \"ntp_sync.cgi\" mediante una solicitud POST." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/IdaJea/IOT_vuln_1/blob/master/tew632/ntp_sync.md", diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0631.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0631.json new file mode 100644 index 00000000000..a9b274849cf --- /dev/null +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0631.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-0631", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-01-28T19:15:14.270", + "lastModified": "2025-01-28T19:15:14.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Credential Exposure Vulnerability exists in the above-mentioned product and version. The vulnerability is due to using HTTP resulting in credentials being sent in clear text." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1717.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0783.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0783.json new file mode 100644 index 00000000000..b32e87eebed --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0783.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0783", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-28T19:15:14.410", + "lastModified": "2025-01-28T19:15:14.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in pankajindevops scale up to 20241113. This affects an unknown part of the component API Endpoint. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://docs.google.com/document/d/1FCJveTlXtJd8EJRW2-LXwuhno92JaVt3_98Iqrdoc6M/edit?tab=t.0#heading=h.bbpri264qnth", + "source": "cna@vuldb.com" + }, + { + "url": "https://drive.google.com/file/d/1KqzS5bMyPtgO9eIk_-que50tZU097RVi/view", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293907", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293907", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.480350", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0784.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0784.json new file mode 100644 index 00000000000..c7bd38d0010 --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0784.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-0784", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-28T20:15:56.230", + "lastModified": "2025-01-28T20:15:56.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in Intelbras InControl up to 2.21.58 and classified as problematic. This vulnerability affects unknown code of the file /v1/usuario/ of the component Registered User Handler. The manipulation leads to cleartext transmission of sensitive information. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.21.59 is able to address this issue. It is recommended to upgrade the affected component." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 2.6, + "accessVector": "NETWORK", + "accessComplexity": "HIGH", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 4.9, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-310" + }, + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://eldruin.notion.site/Intelbras-InControl-v2-21-57-Password-exposed-in-clear-text-17d27474cccb806fba1efda195c78258?pvs=4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293908", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293908", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.483835", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22217.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22217.json new file mode 100644 index 00000000000..5cb54d310cc --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22217.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22217", + "sourceIdentifier": "security@vmware.com", + "published": "2025-01-28T19:15:14.640", + "lastModified": "2025-01-28T19:15:14.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Avi Load Balancer contains an unauthenticated blind SQL Injection vulnerability which was privately reported to VMware. Patches are available to remediate this vulnerability in affected VMware products.\u00a0\n\nA malicious user with network access may be able to use specially crafted SQL queries to gain database access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25346", + "source": "security@vmware.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24137.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24137.json index ab42521fe13..20fec407a88 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24137.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24137.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24137", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:18.433", - "lastModified": "2025-01-27T22:15:18.433", - "vulnStatus": "Received", + "lastModified": "2025-01-28T20:15:56.410", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A type confusion issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A remote attacker may cause an unexpected application termination or arbitrary code execution." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de confusi\u00f3n de tipos con comprobaciones mejoradas. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. Un atacante remoto puede provocar la finalizaci\u00f3n inesperada de una aplicaci\u00f3n o la ejecuci\u00f3n de c\u00f3digo arbitrario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/122066", diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24478.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24478.json new file mode 100644 index 00000000000..af457f4622f --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24478.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-24478", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-01-28T19:15:14.777", + "lastModified": "2025-01-28T19:15:14.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A denial-of-service vulnerability exists in the affected products. The vulnerability could allow a remote, non-privileged user to send malicious requests resulting in a major nonrecoverable fault causing a denial-of-service." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1718.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24479.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24479.json new file mode 100644 index 00000000000..69eba57de34 --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24479.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-24479", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-01-28T19:15:14.910", + "lastModified": "2025-01-28T19:15:14.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Local Code Execution Vulnerability exists in the product and version listed above. The vulnerability is due to a default setting in Windows and allows access to the Command Prompt as a higher privileged user." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1719.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24480.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24480.json new file mode 100644 index 00000000000..4346f3327d9 --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24480.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-24480", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-01-28T19:15:15.033", + "lastModified": "2025-01-28T19:15:15.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Remote Code Execution Vulnerability exists in the product and version listed above. The vulnerability is due to lack of input sanitation and could allow a remote attacker to run commands or code as a high privileged user." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1719.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 296dd984cd4..967d368c810 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-28T19:00:21.857271+00:00 +2025-01-28T21:00:21.071918+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-28T18:57:49.143000+00:00 +2025-01-28T20:39:34.613000+00:00 ``` ### Last Data Feed Release @@ -33,56 +33,64 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -279305 +279325 ``` ### CVEs added in the last Commit -Recently added CVEs: `12` +Recently added CVEs: `20` -- [CVE-2017-13317](CVE-2017/CVE-2017-133xx/CVE-2017-13317.json) (`2025-01-28T17:15:08.180`) -- [CVE-2017-13318](CVE-2017/CVE-2017-133xx/CVE-2017-13318.json) (`2025-01-28T17:15:08.310`) -- [CVE-2018-9373](CVE-2018/CVE-2018-93xx/CVE-2018-9373.json) (`2025-01-28T17:15:08.427`) -- [CVE-2018-9378](CVE-2018/CVE-2018-93xx/CVE-2018-9378.json) (`2025-01-28T17:15:08.530`) -- [CVE-2024-13484](CVE-2024/CVE-2024-134xx/CVE-2024-13484.json) (`2025-01-28T18:15:32.537`) -- [CVE-2024-8401](CVE-2024/CVE-2024-84xx/CVE-2024-8401.json) (`2025-01-28T17:15:25.467`) -- [CVE-2025-0781](CVE-2025/CVE-2025-07xx/CVE-2025-0781.json) (`2025-01-28T17:15:25.947`) -- [CVE-2025-23053](CVE-2025/CVE-2025-230xx/CVE-2025-23053.json) (`2025-01-28T18:15:38.987`) -- [CVE-2025-23054](CVE-2025/CVE-2025-230xx/CVE-2025-23054.json) (`2025-01-28T18:15:39.147`) -- [CVE-2025-23055](CVE-2025/CVE-2025-230xx/CVE-2025-23055.json) (`2025-01-28T18:15:39.317`) -- [CVE-2025-23056](CVE-2025/CVE-2025-230xx/CVE-2025-23056.json) (`2025-01-28T18:15:39.500`) -- [CVE-2025-23057](CVE-2025/CVE-2025-230xx/CVE-2025-23057.json) (`2025-01-28T18:15:39.677`) +- [CVE-2024-34732](CVE-2024/CVE-2024-347xx/CVE-2024-34732.json) (`2025-01-28T20:15:30.790`) +- [CVE-2024-34733](CVE-2024/CVE-2024-347xx/CVE-2024-34733.json) (`2025-01-28T20:15:30.893`) +- [CVE-2024-34748](CVE-2024/CVE-2024-347xx/CVE-2024-34748.json) (`2025-01-28T20:15:30.993`) +- [CVE-2024-40649](CVE-2024/CVE-2024-406xx/CVE-2024-40649.json) (`2025-01-28T20:15:49.063`) +- [CVE-2024-40651](CVE-2024/CVE-2024-406xx/CVE-2024-40651.json) (`2025-01-28T20:15:49.160`) +- [CVE-2024-40669](CVE-2024/CVE-2024-406xx/CVE-2024-40669.json) (`2025-01-28T20:15:49.250`) +- [CVE-2024-40670](CVE-2024/CVE-2024-406xx/CVE-2024-40670.json) (`2025-01-28T20:15:49.343`) +- [CVE-2024-40672](CVE-2024/CVE-2024-406xx/CVE-2024-40672.json) (`2025-01-28T20:15:49.433`) +- [CVE-2024-40673](CVE-2024/CVE-2024-406xx/CVE-2024-40673.json) (`2025-01-28T20:15:49.530`) +- [CVE-2024-40674](CVE-2024/CVE-2024-406xx/CVE-2024-40674.json) (`2025-01-28T20:15:49.620`) +- [CVE-2024-40675](CVE-2024/CVE-2024-406xx/CVE-2024-40675.json) (`2025-01-28T20:15:49.710`) +- [CVE-2024-40676](CVE-2024/CVE-2024-406xx/CVE-2024-40676.json) (`2025-01-28T20:15:49.800`) +- [CVE-2024-40677](CVE-2024/CVE-2024-406xx/CVE-2024-40677.json) (`2025-01-28T20:15:49.890`) +- [CVE-2025-0631](CVE-2025/CVE-2025-06xx/CVE-2025-0631.json) (`2025-01-28T19:15:14.270`) +- [CVE-2025-0783](CVE-2025/CVE-2025-07xx/CVE-2025-0783.json) (`2025-01-28T19:15:14.410`) +- [CVE-2025-0784](CVE-2025/CVE-2025-07xx/CVE-2025-0784.json) (`2025-01-28T20:15:56.230`) +- [CVE-2025-22217](CVE-2025/CVE-2025-222xx/CVE-2025-22217.json) (`2025-01-28T19:15:14.640`) +- [CVE-2025-24478](CVE-2025/CVE-2025-244xx/CVE-2025-24478.json) (`2025-01-28T19:15:14.777`) +- [CVE-2025-24479](CVE-2025/CVE-2025-244xx/CVE-2025-24479.json) (`2025-01-28T19:15:14.910`) +- [CVE-2025-24480](CVE-2025/CVE-2025-244xx/CVE-2025-24480.json) (`2025-01-28T19:15:15.033`) ### CVEs modified in the last Commit -Recently modified CVEs: `148` +Recently modified CVEs: `90` -- [CVE-2024-30020](CVE-2024/CVE-2024-300xx/CVE-2024-30020.json) (`2025-01-28T17:15:23.177`) -- [CVE-2024-30025](CVE-2024/CVE-2024-300xx/CVE-2024-30025.json) (`2025-01-28T17:15:23.407`) -- [CVE-2024-30030](CVE-2024/CVE-2024-300xx/CVE-2024-30030.json) (`2025-01-28T17:15:23.673`) -- [CVE-2024-30039](CVE-2024/CVE-2024-300xx/CVE-2024-30039.json) (`2025-01-28T17:15:23.990`) -- [CVE-2024-30040](CVE-2024/CVE-2024-300xx/CVE-2024-30040.json) (`2025-01-28T17:15:24.213`) -- [CVE-2024-31874](CVE-2024/CVE-2024-318xx/CVE-2024-31874.json) (`2025-01-28T17:31:15.617`) -- [CVE-2024-3337](CVE-2024/CVE-2024-33xx/CVE-2024-3337.json) (`2025-01-28T18:10:03.600`) -- [CVE-2024-3338](CVE-2024/CVE-2024-33xx/CVE-2024-3338.json) (`2025-01-28T18:09:40.723`) -- [CVE-2024-3340](CVE-2024/CVE-2024-33xx/CVE-2024-3340.json) (`2025-01-28T18:07:32.970`) -- [CVE-2024-36999](CVE-2024/CVE-2024-369xx/CVE-2024-36999.json) (`2025-01-28T18:15:37.430`) -- [CVE-2024-37002](CVE-2024/CVE-2024-370xx/CVE-2024-37002.json) (`2025-01-28T17:15:24.460`) -- [CVE-2024-37006](CVE-2024/CVE-2024-370xx/CVE-2024-37006.json) (`2025-01-28T17:15:24.670`) -- [CVE-2024-41174](CVE-2024/CVE-2024-411xx/CVE-2024-41174.json) (`2025-01-28T17:27:44.077`) -- [CVE-2024-50664](CVE-2024/CVE-2024-506xx/CVE-2024-50664.json) (`2025-01-28T17:15:24.847`) -- [CVE-2024-54468](CVE-2024/CVE-2024-544xx/CVE-2024-54468.json) (`2025-01-28T17:15:25.057`) -- [CVE-2024-54520](CVE-2024/CVE-2024-545xx/CVE-2024-54520.json) (`2025-01-28T17:15:25.187`) -- [CVE-2024-54537](CVE-2024/CVE-2024-545xx/CVE-2024-54537.json) (`2025-01-28T17:15:25.320`) -- [CVE-2024-9861](CVE-2024/CVE-2024-98xx/CVE-2024-9861.json) (`2025-01-28T18:56:36.567`) -- [CVE-2024-9862](CVE-2024/CVE-2024-98xx/CVE-2024-9862.json) (`2025-01-28T18:57:49.143`) -- [CVE-2025-0282](CVE-2025/CVE-2025-02xx/CVE-2025-0282.json) (`2025-01-28T17:15:25.620`) -- [CVE-2025-23211](CVE-2025/CVE-2025-232xx/CVE-2025-23211.json) (`2025-01-28T17:15:26.160`) -- [CVE-2025-23212](CVE-2025/CVE-2025-232xx/CVE-2025-23212.json) (`2025-01-28T17:15:26.273`) -- [CVE-2025-24108](CVE-2025/CVE-2025-241xx/CVE-2025-24108.json) (`2025-01-28T17:15:26.433`) -- [CVE-2025-24109](CVE-2025/CVE-2025-241xx/CVE-2025-24109.json) (`2025-01-28T17:15:26.610`) -- [CVE-2025-24124](CVE-2025/CVE-2025-241xx/CVE-2025-24124.json) (`2025-01-28T17:15:26.753`) +- [CVE-2024-56953](CVE-2024/CVE-2024-569xx/CVE-2024-56953.json) (`2025-01-28T20:15:52.390`) +- [CVE-2024-56954](CVE-2024/CVE-2024-569xx/CVE-2024-56954.json) (`2025-01-28T20:15:52.540`) +- [CVE-2024-56955](CVE-2024/CVE-2024-569xx/CVE-2024-56955.json) (`2025-01-28T20:15:52.693`) +- [CVE-2024-56957](CVE-2024/CVE-2024-569xx/CVE-2024-56957.json) (`2025-01-28T20:15:52.837`) +- [CVE-2024-56959](CVE-2024/CVE-2024-569xx/CVE-2024-56959.json) (`2025-01-28T20:15:52.987`) +- [CVE-2024-56960](CVE-2024/CVE-2024-569xx/CVE-2024-56960.json) (`2025-01-28T20:15:53.127`) +- [CVE-2024-56962](CVE-2024/CVE-2024-569xx/CVE-2024-56962.json) (`2025-01-28T20:15:53.273`) +- [CVE-2024-56963](CVE-2024/CVE-2024-569xx/CVE-2024-56963.json) (`2025-01-28T20:15:53.423`) +- [CVE-2024-56964](CVE-2024/CVE-2024-569xx/CVE-2024-56964.json) (`2025-01-28T20:15:53.577`) +- [CVE-2024-56965](CVE-2024/CVE-2024-569xx/CVE-2024-56965.json) (`2025-01-28T20:15:53.733`) +- [CVE-2024-56966](CVE-2024/CVE-2024-569xx/CVE-2024-56966.json) (`2025-01-28T20:15:53.873`) +- [CVE-2024-56967](CVE-2024/CVE-2024-569xx/CVE-2024-56967.json) (`2025-01-28T20:15:54.010`) +- [CVE-2024-56968](CVE-2024/CVE-2024-569xx/CVE-2024-56968.json) (`2025-01-28T20:15:54.157`) +- [CVE-2024-56969](CVE-2024/CVE-2024-569xx/CVE-2024-56969.json) (`2025-01-28T20:15:54.297`) +- [CVE-2024-56971](CVE-2024/CVE-2024-569xx/CVE-2024-56971.json) (`2025-01-28T20:15:54.437`) +- [CVE-2024-56972](CVE-2024/CVE-2024-569xx/CVE-2024-56972.json) (`2025-01-28T20:15:54.580`) +- [CVE-2024-57052](CVE-2024/CVE-2024-570xx/CVE-2024-57052.json) (`2025-01-28T20:15:54.727`) +- [CVE-2024-57272](CVE-2024/CVE-2024-572xx/CVE-2024-57272.json) (`2025-01-28T20:15:54.870`) +- [CVE-2024-57373](CVE-2024/CVE-2024-573xx/CVE-2024-57373.json) (`2025-01-28T20:15:55.040`) +- [CVE-2024-57546](CVE-2024/CVE-2024-575xx/CVE-2024-57546.json) (`2025-01-28T20:15:55.203`) +- [CVE-2024-57547](CVE-2024/CVE-2024-575xx/CVE-2024-57547.json) (`2025-01-28T20:15:55.367`) +- [CVE-2024-57548](CVE-2024/CVE-2024-575xx/CVE-2024-57548.json) (`2025-01-28T20:15:55.547`) +- [CVE-2024-57549](CVE-2024/CVE-2024-575xx/CVE-2024-57549.json) (`2025-01-28T20:15:55.810`) +- [CVE-2024-57590](CVE-2024/CVE-2024-575xx/CVE-2024-57590.json) (`2025-01-28T20:15:55.973`) +- [CVE-2025-24137](CVE-2025/CVE-2025-241xx/CVE-2025-24137.json) (`2025-01-28T20:15:56.410`) ## Download and Usage diff --git a/_state.csv b/_state.csv index bb7950e2b1e..eb984b82c82 100644 --- a/_state.csv +++ b/_state.csv @@ -77563,7 +77563,7 @@ CVE-2015-4491,0,0,8c4eea49b374751f373f9757f99924867ab35f3581f4fb432be32e8f4349ca CVE-2015-4492,0,0,4a0ed69bdf6458fd91948247cb9637a217530f4f23c1481cab494b1d02abf7f5,2024-11-21T02:31:11.717000 CVE-2015-4493,0,0,390d1532e2721a6f4ceb8dab48e5b0501bcdd6d2325831da7245de1c4d882972,2024-11-21T02:31:11.890000 CVE-2015-4494,0,0,1aba749a4f5ce1c5d1359656774d573e3251cd6776c8506f8239e41482efb6b5,2024-11-21T02:31:12.053000 -CVE-2015-4495,0,1,dd4ca0822b305f69b2879910b09b9b7a39bd4c6ade4d707b14b8f3a767a11793,2025-01-28T18:27:02.210000 +CVE-2015-4495,0,0,dd4ca0822b305f69b2879910b09b9b7a39bd4c6ade4d707b14b8f3a767a11793,2025-01-28T18:27:02.210000 CVE-2015-4496,0,0,de69d405419a0bbd48743aa44b5c1ac8878942f07d33dc56c199c5bf1c0fd875,2024-11-21T02:31:12.337000 CVE-2015-4497,0,0,4b08eaf1ec8312ce907c7860a913ad5cd3275afc8afce41935954e78e896f07a,2024-11-21T02:31:12.467000 CVE-2015-4498,0,0,145bd10d195fb719d1c3af1fad900cfa1866bb6419b7ba07f6b72592ce9ee8f8,2024-11-21T02:31:12.593000 @@ -77865,7 +77865,7 @@ CVE-2015-4848,0,0,750d7ea2fe5e28106aadd0a3084b9228071088aa6e5db2f42974ef5cdb6da5 CVE-2015-4849,0,0,6b86c817f1babbb9d16eb1d46adb56b1cd43ff753862b97640fc51580b2c70f0,2024-11-21T02:31:52.557000 CVE-2015-4850,0,0,c757cb4f4f0fea29c5eaf2fc7e2266e0e51cd5a712fd3896ab26008767dc60d2,2024-11-21T02:31:52.673000 CVE-2015-4851,0,0,a2130ce7be15a90b933eb8e4fbae047b8ce822785a0d48fb0b6fdfe2c89b4eb9,2024-11-21T02:31:52.787000 -CVE-2015-4852,0,1,95168c62c26062479da93b29f6627838a52dc4fd060a810626aa24c3f02f2218,2025-01-28T18:48:45.013000 +CVE-2015-4852,0,0,95168c62c26062479da93b29f6627838a52dc4fd060a810626aa24c3f02f2218,2025-01-28T18:48:45.013000 CVE-2015-4853,0,0,ecd9661ce16a834dcc07b12bf2e769dc04bd4672748e88851b80b52aeb5a32b3,2023-11-07T02:25:58.210000 CVE-2015-4854,0,0,b610b2f8e7049df196042453871a69c9d80548566da024722248913f46b3f3c4,2024-11-21T02:31:53.113000 CVE-2015-4855,0,0,b733bffd8e496cf35a751c917a5993a27d945bb8485db7a284952bc997748445,2023-11-07T02:25:58.463000 @@ -77915,7 +77915,7 @@ CVE-2015-4898,0,0,9a4331a0aa6e4189e4bea01f6235a6b6a9d82e643e1796fa40866333e06d26 CVE-2015-4899,0,0,0ff8d0d8a04b4fc3bde3898387d4a4300ad9d14ebb4a2909c3f5397a3179b5d7,2024-11-21T02:31:58.997000 CVE-2015-4900,0,0,2ffc0604c5d679e7aafc2ed181a906cad562a82f4c606d673470926b4c3cdc9e,2024-11-21T02:31:59.100000 CVE-2015-4901,0,0,170e13edb001c0e4b204b5d1893427ac8b65cb6632299b658698c6d2e4062550,2024-11-21T02:31:59.203000 -CVE-2015-4902,0,1,1977c6dbb3f9d4f70317deedc1ca36f0de3708d7d923a936718cafe3d84e474e,2025-01-28T18:48:38.157000 +CVE-2015-4902,0,0,1977c6dbb3f9d4f70317deedc1ca36f0de3708d7d923a936718cafe3d84e474e,2025-01-28T18:48:38.157000 CVE-2015-4903,0,0,88c33678cc95c478318871357faaa5d68d1d3cba886c25e49c2a558febc7dc11,2024-11-21T02:31:59.500000 CVE-2015-4904,0,0,9111a1bfdd93e26af23204ff21b2510d9af1aa581b929731d3b27c1fdc1abe8c,2024-11-21T02:31:59.640000 CVE-2015-4905,0,0,dfd4d6fc5d6900efa8f87e3ba4ba61f33973bdc27a34a33c62734278a55c334e,2024-11-21T02:31:59.760000 @@ -78288,7 +78288,7 @@ CVE-2015-5313,0,0,d3576caa883342e80ecf64dbf17b78573cadfe7ded598f5fc735a27079375c CVE-2015-5314,0,0,a9a94c5c60a3732bc046c0b2055c472a728cb04c101455e8018df228e886a08c,2024-11-21T02:32:46.673000 CVE-2015-5315,0,0,053b67fb2a3ba7b72dcedd4c558befe342ae8fa2daf1049cf1699b366628f3bc,2024-11-21T02:32:46.793000 CVE-2015-5316,0,0,39c0ea269fddc858458abd197121cbe8edd08e9d7b6d2329e7aa2bcba1f4d1b9,2024-11-21T02:32:46.903000 -CVE-2015-5317,0,1,b440253393e5f1af765669e4caeb8a2966f5ac66f5a31c4624ddec4c886ca770,2025-01-28T18:48:58.657000 +CVE-2015-5317,0,0,b440253393e5f1af765669e4caeb8a2966f5ac66f5a31c4624ddec4c886ca770,2025-01-28T18:48:58.657000 CVE-2015-5318,0,0,c2359442951b13db9bef56efda91bffc5ac107484beb1d09af9b1f9a53f27ee1,2024-11-21T02:32:47.127000 CVE-2015-5319,0,0,590e1d00bb509853ed13f87fca91bc58586d6586a8b3a14e87ca072b88f76ae5,2024-11-21T02:32:47.240000 CVE-2015-5320,0,0,be0edfeab2636cefb8071966348caf575a167bdcf3863e37d17896657713bd13,2024-11-21T02:32:47.353000 @@ -79104,7 +79104,7 @@ CVE-2015-6171,0,0,598993a6790294058cbf359dbc3f3114da2458dcea6daeb7ae692c12929e0c CVE-2015-6172,0,0,6d427d4a3bfeb1d2f2b5a2f8481311c46c1de24e8b5e991078590f71f7fc4b9c,2024-11-21T02:34:34.683000 CVE-2015-6173,0,0,fcc0bc4d8a60a980b86173dc62058418cdcac913a253d6713112e21b999f7b1e,2024-11-21T02:34:34.797000 CVE-2015-6174,0,0,0f9be3dc28f7d6e9a4c66517cbfb9789a94f7709ed3a58bb99b7686a6db32226,2024-11-21T02:34:34.930000 -CVE-2015-6175,0,1,86df1f29244ef2a4fe8c80d2482d02af75361bd043c1b7e82cfce82b1c3d0b3b,2025-01-28T18:49:04.947000 +CVE-2015-6175,0,0,86df1f29244ef2a4fe8c80d2482d02af75361bd043c1b7e82cfce82b1c3d0b3b,2025-01-28T18:49:04.947000 CVE-2015-6176,0,0,0a8eb8510c36bd4deb003f2eac1508e47a97227f6af94dbd358dc37755316b3f,2024-11-21T02:34:35.167000 CVE-2015-6177,0,0,7fdac18cb59836c74dd1e85c0abc3794ad988cd7ffc79f1d1c37e4125a59ae79,2024-11-21T02:34:35.290000 CVE-2015-6178,0,0,1bf56a91030dd59d65ca8bee85e32760901278b2eccd1f61024bceb0138549db,2023-11-07T02:26:33.597000 @@ -80279,7 +80279,7 @@ CVE-2015-7446,0,0,4408d712db309590000f8d49d950570c16d9b38717ddc8a65189cc89f0454d CVE-2015-7447,0,0,e55faf4adb449699acf0a3d77f9db0047f28bdb1e1048058843d6b5bd14981a8,2024-11-21T02:36:48.397000 CVE-2015-7448,0,0,a2240599ef822032be2565a57d10c55f47d70c56a1531ccbf00381d739347477,2024-11-21T02:36:48.513000 CVE-2015-7449,0,0,05e00f69fd9fbf840052a09d02c3f32ac18eab63dff52173a175355f4ec6eb26,2024-11-21T02:36:48.630000 -CVE-2015-7450,0,1,8fed76d23b94cf5060229eb3de3686828ae9bb1705f83c72f01b490c4203fffa,2025-01-28T18:49:08.963000 +CVE-2015-7450,0,0,8fed76d23b94cf5060229eb3de3686828ae9bb1705f83c72f01b490c4203fffa,2025-01-28T18:49:08.963000 CVE-2015-7451,0,0,3cb8a45f37ce10b54da691c117905594e5f8a702160d03215807ca198d92be66,2024-11-21T02:36:48.880000 CVE-2015-7452,0,0,bf345883402eaad8adbd20fbae43b92aaaaf0c2e9ccbc4c71e2d4f902a4eb4fd,2024-11-21T02:36:48.987000 CVE-2015-7453,0,0,910457479a0baa218b21460a837949bffa30b5886fff7532f7329978bf5a0077,2024-11-21T02:36:49.100000 @@ -82379,9 +82379,9 @@ CVE-2016-0161,0,0,e386e6e5fa4e155c5292a188ff768e6b59c10c7cfd776ecaeac25df09bfd56 CVE-2016-0162,0,0,04220bd69cb4586c89089666215c124fc819c87a7971a10720aa1a5bf0b41760,2025-01-23T18:54:05.493000 CVE-2016-0163,0,0,ad012537ac7387ed104107f6ad783b07e56491dc0f59c8c36f5426188f5ab08d,2023-11-07T02:29:06.743000 CVE-2016-0164,0,0,0cc7e74697a6f509ee78bbcf4160b49e7dce65514e4212ffcddb9e5d137b4b53,2024-11-21T02:41:11.287000 -CVE-2016-0165,0,1,e369a45477b15128a6c0dd9d2492d8895c6daf097fa84ac0bb882675530bb823,2025-01-28T18:49:19.287000 +CVE-2016-0165,0,0,e369a45477b15128a6c0dd9d2492d8895c6daf097fa84ac0bb882675530bb823,2025-01-28T18:49:19.287000 CVE-2016-0166,0,0,69549e127809e10bba9b84ab535c37c1e9aa646d5feea4f44f99415cac724c19,2024-11-21T02:41:11.537000 -CVE-2016-0167,0,1,3eebde8197b7824cb3befa578322f622b635812f0623cf27f4045a33789b042f,2025-01-28T18:49:24.557000 +CVE-2016-0167,0,0,3eebde8197b7824cb3befa578322f622b635812f0623cf27f4045a33789b042f,2025-01-28T18:49:24.557000 CVE-2016-0168,0,0,6b24f5181c25e3f3dae828dadcc4e6a1555c84285f49ce491ea3c12cbed265f7,2024-11-21T02:41:11.770000 CVE-2016-0169,0,0,003d5efe96740f169b652b428cb5685e37d75ad4854a16deb0552c8bb38c5283,2024-11-21T02:41:11.907000 CVE-2016-0170,0,0,187de215368ba02754a0c90078b26b4cd7d0baf66dd498b953572ae9f0984e11,2024-11-21T02:41:12.020000 @@ -82399,11 +82399,11 @@ CVE-2016-0181,0,0,ae01f4ace243428d22268ff51e846d5ad6964599551130edd131689bd133c1 CVE-2016-0182,0,0,6fb883c276c290c9f8df233ef856aa51adf75e5a98e7f967c3fb960e8c9e124c,2024-11-21T02:41:13.537000 CVE-2016-0183,0,0,82e02504eb740e52c6df437a7265f911c20b6d96633279aa3ae3ffe9c4a4e755,2024-11-21T02:41:13.653000 CVE-2016-0184,0,0,be31b3f2dd06d598707d7878c1dd51f7f8cb2ba0bd7476e4a334b10cffbb46c4,2024-11-21T02:41:13.760000 -CVE-2016-0185,0,1,1641f2add8d7a15fbe35655d38f90f88f15f407374010eb544bba594c7836518,2025-01-28T18:49:41.717000 +CVE-2016-0185,0,0,1641f2add8d7a15fbe35655d38f90f88f15f407374010eb544bba594c7836518,2025-01-28T18:49:41.717000 CVE-2016-0186,0,0,195bcfa5a8530274e284532031535eaeade49072b00901ae3a4a15ace1083158,2024-11-21T02:41:13.990000 CVE-2016-0187,0,0,b4a85d3c2059c7b0a2f2929488d121ad49cbbf045fc09f7f39bfaa9d67da4c5f,2024-11-21T02:41:14.100000 CVE-2016-0188,0,0,ec99129c3974ac62012853aaa8152132e434c26eb18cfcf825678705e1ea8d09,2024-11-21T02:41:14.210000 -CVE-2016-0189,0,1,c3b9355c11a8ce3222e7669ed7b051af9dc89b5e041a1bf9012ad40fa13e1c34,2025-01-28T18:18:29.837000 +CVE-2016-0189,0,0,c3b9355c11a8ce3222e7669ed7b051af9dc89b5e041a1bf9012ad40fa13e1c34,2025-01-28T18:18:29.837000 CVE-2016-0190,0,0,e1d6f1fc8234ca5e4d36ae5747c72ca6fa437ddfedd68839e4738219dbb7e9c8,2024-11-21T02:41:14.443000 CVE-2016-0191,0,0,c57af6eff531fcc735e82119cecc3e7e46e19b2893c402bc0b6158d02e32a751,2024-11-21T02:41:14.567000 CVE-2016-0192,0,0,ab5b7be141be42650e6f03796d8bedae00de895de94b1fad76bcd038e0f160e7,2024-11-21T02:41:14.683000 @@ -82946,7 +82946,7 @@ CVE-2016-0747,0,0,658bf021d2078ac58daea5f9a7101e0ab9c6482217feede7762850a3c1d1df CVE-2016-0749,0,0,5d8b926c399674f591ff34d41c6003b58648d1953fceabe026812e87fa98b6cf,2024-11-21T02:42:18.057000 CVE-2016-0750,0,0,fa34ed8c4ad13ce67ea98905d7586e6467600b53d5dec1df6d3d7b5791b87521,2024-11-21T02:42:18.180000 CVE-2016-0751,0,0,611dc4b2c50ba47f2baa8b8283697b31a138ba6f777e71841d48f17c8e27142a,2024-11-21T02:42:18.350000 -CVE-2016-0752,0,1,de8d674a000c961fc2d538f7e25193f45dedec5d96d4f0e2d5a41fb903c68c73,2025-01-28T18:49:12.863000 +CVE-2016-0752,0,0,de8d674a000c961fc2d538f7e25193f45dedec5d96d4f0e2d5a41fb903c68c73,2025-01-28T18:49:12.863000 CVE-2016-0753,0,0,8293fd73e1d78f4ff3da4f0c08455661272ce89da72f1d1b0231b9f31c4eacdf,2024-11-21T02:42:18.643000 CVE-2016-0754,0,0,698741e9381fa9cff9326f05a765a4f4833576a92fe8868e5042d934a734d629,2024-11-21T02:42:18.783000 CVE-2016-0755,0,0,d92d406a30e2205d0398dadb3f9f3942b0e68d3fb59989c9c0816c3fe8f52857,2024-11-21T02:42:18.890000 @@ -84939,7 +84939,7 @@ CVE-2016-1548,0,0,e414be2c06473d6fbe33c95a23d42aa77a453e97b5aee6d31bc19a7fe02208 CVE-2016-1549,0,0,fcbf62acb0ec1d965ad546e0587da0ae4dee368b77f9d5101bb3ee182ddb678e,2024-11-21T02:46:37.430000 CVE-2016-1550,0,0,1cf262d9a8c6d7f26bb89471991e900e6e3ba22b7a15d00d1fd1284a89976634,2024-11-21T02:46:37.563000 CVE-2016-1551,0,0,272a7ce629bccb1323f718036d5b4ca82fdee3c8d072e91f2869c843800e0892,2024-11-21T02:46:37.710000 -CVE-2016-1555,0,1,00ccb1cb9e49459a5d95d6584404026b9c98292da825dba23d2cfd282302d65a,2025-01-28T17:30:11.167000 +CVE-2016-1555,0,0,00ccb1cb9e49459a5d95d6584404026b9c98292da825dba23d2cfd282302d65a,2025-01-28T17:30:11.167000 CVE-2016-1556,0,0,9acdbfa1b90efaaef5e4098967e8eacd0b267b60bb78187980ad4a13b1de3806,2024-11-21T02:46:37.960000 CVE-2016-1557,0,0,77e9a6b93558bc7ab187ec7ff7ede1f6a26aba867d9e0ac67d5c6542393b11a6,2024-11-21T02:46:38.070000 CVE-2016-1558,0,0,e99308e966da0aabfe0a3119b2b40f57c8b739b5527f6cf9434ff9e50b26f51d,2024-11-21T02:46:38.180000 @@ -85029,7 +85029,7 @@ CVE-2016-1642,0,0,66841ee498ca853ea6b5936c383c57d7698ce1fabf9c8ee7451137702466df CVE-2016-1643,0,0,42a0f14881456f59b972cc3a93852e36631b4c9be928ccf9872f9dd28f88d14f,2024-11-21T02:46:48.240000 CVE-2016-1644,0,0,b3b28a4b3543f909beb5109e758edb8e660120ad9a32629ead0d455446752dab,2024-11-21T02:46:48.350000 CVE-2016-1645,0,0,c6fd969932556e60d0bd2093779d4a9531ece63c642981335df9f0ae9ef57939,2024-11-21T02:46:48.453000 -CVE-2016-1646,0,1,ae91296f089d6f40e8dd5a38f0c95a12927f46777b2c5ee5f5af5f2e0d6b19ff,2025-01-28T18:49:16.247000 +CVE-2016-1646,0,0,ae91296f089d6f40e8dd5a38f0c95a12927f46777b2c5ee5f5af5f2e0d6b19ff,2025-01-28T18:49:16.247000 CVE-2016-1647,0,0,e08338c6621bdf3b997998680f254b4dd517410fe6cc2425120e41567d57f615,2024-11-21T02:46:48.697000 CVE-2016-1648,0,0,774476717a95c723bbddd1c1af5822e5c17b3d5d970f0feb63f42e149e060d29,2024-11-21T02:46:48.807000 CVE-2016-1649,0,0,3906b2c16ac489a143a7354ad8ab0a053bc66d60da97153cc6f9deacbf4ffa8b,2024-11-21T02:46:48.917000 @@ -86389,7 +86389,7 @@ CVE-2016-3084,0,0,25e3e713743b201b6e03b6363be051dc3f604dabf81882e48cafcee0d19fa7 CVE-2016-3085,0,0,f0368fb38e853a9db5547055d38f26557d9239b54602c082e0b8d13e28e71eb3,2024-11-21T02:49:20.027000 CVE-2016-3086,0,0,59633a3f418d14c3d438a3bf51c98c30a8cd099e807b004b2d43536f6616785c,2024-11-21T02:49:20.120000 CVE-2016-3087,0,0,21d4cb01cf897d7c3a159c08d06be41302c1e753c0803ad8da3b6543f996201f,2024-11-21T02:49:20.233000 -CVE-2016-3088,0,1,1b5145944ceef770c64d3617ea421ac6991a5bf29988e1e6225352e8f939d28b,2025-01-28T18:18:39.370000 +CVE-2016-3088,0,0,1b5145944ceef770c64d3617ea421ac6991a5bf29988e1e6225352e8f939d28b,2025-01-28T18:18:39.370000 CVE-2016-3089,0,0,c6402560615d14f4514f1660f87517bf7f4221b884bfa5da46462e64dd48fa81,2024-11-21T02:49:20.490000 CVE-2016-3090,0,0,f0f5970104443f7d32d03042b275bbb19b617588eea12627e43949a7cb8a4447,2024-11-21T02:49:20.620000 CVE-2016-3091,0,0,358705bf70c14d2c8244998cb7781e733436939df7c5e0d4c2d3d4555f3f40d8,2024-11-21T02:49:20.747000 @@ -86525,7 +86525,7 @@ CVE-2016-3231,0,0,1b8994d34616231f8b2629e144b9c83fced1dcd28656d4b30fe8f59b6539bc CVE-2016-3232,0,0,db4c30ad4fc286ac92f1983dad78c347148ccec9509b0b98bd5d718221a615d3,2024-11-21T02:49:38.557000 CVE-2016-3233,0,0,576aec2de861097213f61e3ebf81e01b2126377ccceda00e38bbc3cc54ace1a8,2024-11-21T02:49:38.657000 CVE-2016-3234,0,0,74c3a797857929d232599ac0e7c16a46c2770d425b20625643d216fce4e200eb,2024-11-21T02:49:38.760000 -CVE-2016-3235,0,1,9790114ede75ac862d0481e4024b75e68ce48c3c35d6a5dd398ba4dbd4ed2a6c,2025-01-28T18:19:16.473000 +CVE-2016-3235,0,0,9790114ede75ac862d0481e4024b75e68ce48c3c35d6a5dd398ba4dbd4ed2a6c,2025-01-28T18:19:16.473000 CVE-2016-3236,0,0,74efd0a7920309837d6ee90a95feee2f77951868b4987abaa5775121f95c0200,2024-11-21T02:49:39.010000 CVE-2016-3237,0,0,7917f86dd5920f7ccb411d6e64ecda62f67b50f1667f8344ec9016cc62d2c3a2,2024-11-21T02:49:39.117000 CVE-2016-3238,0,0,43aa7e3e55884598e8aeb168106d150403ba258f8c9b1866a99e297dd1a40e45,2024-11-21T02:49:39.233000 @@ -86588,7 +86588,7 @@ CVE-2016-3294,0,0,0d2dca08aaf94a45941dfc23f8220305633f05a53b056ab037526ea1181c29 CVE-2016-3295,0,0,876a0990cd3283957e60bb272a85affb953ee9b98079533a1ce07488a6f0bf0e,2024-11-21T02:49:44.970000 CVE-2016-3296,0,0,748ee55d36db3b5b94621881749d0604908f96ebb9fbf34d99c3c2576fc0f247,2024-11-21T02:49:45.083000 CVE-2016-3297,0,0,fabb107b3d72b0299e4c4de873ce89b1e35c5ca36f99da7182d0d940fdfdf45b,2024-11-21T02:49:45.200000 -CVE-2016-3298,0,1,940286620455f1f7c61ce6d37022b965efc6594b57d3b25c3bca7dda143709b6,2025-01-28T18:19:22.623000 +CVE-2016-3298,0,0,940286620455f1f7c61ce6d37022b965efc6594b57d3b25c3bca7dda143709b6,2025-01-28T18:19:22.623000 CVE-2016-3299,0,0,51950c2c80c1b0efa5118283fe26fa8c980a4d00b6bb33a05f75103809a18638,2024-11-21T02:49:45.450000 CVE-2016-3300,0,0,84d18bd8b4037fdf0de017bcf3ddd4036253b98861059de64753d930b5356da0,2024-11-21T02:49:45.577000 CVE-2016-3301,0,0,5b1f7cc7741fe7edc91bde5ed52e53bc3812ef0aae23336ef962ac17c4621055,2024-11-21T02:49:45.703000 @@ -86599,7 +86599,7 @@ CVE-2016-3305,0,0,02a908aae6166a138ba1f8f12b42f2bdd7e54a07e7d08419a131c2dfdd34ac CVE-2016-3306,0,0,9873c13060926bf0f474b8d365fff9ae13b1c5332200a7d4c39afc90d2a663b3,2024-11-21T02:49:46.300000 CVE-2016-3307,0,0,99073aee719387e70a28f875a7af8b1163249e7072ed298b0e88be214a437ede,2023-11-07T02:32:15.973000 CVE-2016-3308,0,0,2db34a3a4bb8ff09d435b464ab2769827624330871488d59fdfe975b052f76f6,2024-11-21T02:49:46.443000 -CVE-2016-3309,0,1,496611ee048e2daebcaac574059cc5f66e5d12e211b2adbf4c80cedfa6f311cd,2025-01-28T18:19:06.723000 +CVE-2016-3309,0,0,496611ee048e2daebcaac574059cc5f66e5d12e211b2adbf4c80cedfa6f311cd,2025-01-28T18:19:06.723000 CVE-2016-3310,0,0,6f5c8e40e865d982ccefe1b509a4bd32ec3cc9323fc3bb74c30165d908c504aa,2024-11-21T02:49:46.697000 CVE-2016-3311,0,0,a02fb44b3a08feefe0c38831a45cc9da76c5d591fbbc26e16088ec7dabe595f3,2024-11-21T02:49:46.823000 CVE-2016-3312,0,0,4544c74bf0460529c87593ab335e7a61940bf83114e7d143339713344f24b8d2,2024-11-21T02:49:46.940000 @@ -86641,7 +86641,7 @@ CVE-2016-3347,0,0,3b568e712df77cf1f06910c638e7ead9940658acd277c3ed992aeac2620c6e CVE-2016-3348,0,0,ea34b0548f18647a9da780368ace2c7e88970f575527953172eae4efd6a83243,2024-11-21T02:49:50.403000 CVE-2016-3349,0,0,5c36e8700dedd9989b755ac2536a14dbf87747a0fa865aec7d9e2c91c468333e,2024-11-21T02:49:50.510000 CVE-2016-3350,0,0,a28a03ba2d18d5913f9999585014ef056c685a32bd13907f5d35c3f9790f7266,2024-11-21T02:49:50.607000 -CVE-2016-3351,0,1,4b051b3dc0c22e7930a6ec7a4e213520a7419fb3c701c74edeff8caee50d51a6,2025-01-28T18:19:10.320000 +CVE-2016-3351,0,0,4b051b3dc0c22e7930a6ec7a4e213520a7419fb3c701c74edeff8caee50d51a6,2025-01-28T18:19:10.320000 CVE-2016-3352,0,0,1e3e435200d3512ea9725c14b654e8b40fe381a9f602b6134fd20cb24d7982b5,2024-11-21T02:49:50.823000 CVE-2016-3353,0,0,98d1280ae7a66bc5d4ea0f791f6fc383bbbe4f7e9f26dad34b9afc4d717a2ec1,2024-11-21T02:49:50.920000 CVE-2016-3354,0,0,cfc5edc326e2f59d1cd62f9cfc1ed24a4ee1c2acfd49f19ea484ed09e6bd7ac2,2024-11-21T02:49:51.023000 @@ -86683,7 +86683,7 @@ CVE-2016-3389,0,0,795da1b2d2a33bdab675485c2e18b59e7cf76680a298afc76f16049b5d8bea CVE-2016-3390,0,0,d8c15cb9ba7ab1118f9f7239ade2a6a8c1f8f548816f8782ee66bd9a1734a2fd,2024-11-21T02:49:54.813000 CVE-2016-3391,0,0,1f70c143400de91e6c7f02d7ca2f8da2d7032dbd3a86d9a60afb2d6059d419cf,2024-11-21T02:49:54.923000 CVE-2016-3392,0,0,62f92c5bbc0338508e0201964747d344e0cb9942852692584c7cb0dc2431e516,2024-11-21T02:49:55.033000 -CVE-2016-3393,0,1,b79acdd334b4de1c429f5aed4f359a5f827233a50873a8e2bddeb0fe4390142c,2025-01-28T18:19:26.667000 +CVE-2016-3393,0,0,b79acdd334b4de1c429f5aed4f359a5f827233a50873a8e2bddeb0fe4390142c,2025-01-28T18:19:26.667000 CVE-2016-3394,0,0,7e99c4ea2e0a86e9886d5868f29d9ce69260ede59677ae2733a74b59d4067f0a,2023-11-07T02:32:18.753000 CVE-2016-3395,0,0,45519b5d321d74661c9d0f78c5e1c8bfd350d0fdf5da9fb776b47cb63b1f2f96,2023-11-07T02:32:18.990000 CVE-2016-3396,0,0,5b51e61bff71eb7dc141c717b6d4c5d5fb6c4d0f5f237322b7cd07853d039485,2024-11-21T02:49:55.293000 @@ -86984,11 +86984,11 @@ CVE-2016-3710,0,0,de10537e2b33e229fb40bd75b03eb52740c4bbc4938a69e5e46c380d1cee17 CVE-2016-3711,0,0,9790a921b61f09b1c3ecdc814ddae7e8bf09f655f643f0512f5328ca8e2691fe,2024-11-21T02:50:33.090000 CVE-2016-3712,0,0,6a7022fd9b0205ca1ccbbe7e43b24320fa24485e3875f0fc4d672702b3366210,2024-11-21T02:50:33.190000 CVE-2016-3713,0,0,d33c4cb9e1b43d2b8d52f56893351827f4bfafb64f39ea1e7696a8413bf2a14c,2024-11-21T02:50:33.313000 -CVE-2016-3714,0,1,6cfee21f70c47e4aa9e6ba381e2f107903f94588029015995915d1e597f6c4c5,2025-01-28T18:49:32.310000 -CVE-2016-3715,0,1,4b0cacc7cce6a90c165630675cdc3d7689d6fa2d6f40c7816b0037a9f750acd3,2025-01-28T18:49:35.433000 +CVE-2016-3714,0,0,6cfee21f70c47e4aa9e6ba381e2f107903f94588029015995915d1e597f6c4c5,2025-01-28T18:49:32.310000 +CVE-2016-3715,0,0,4b0cacc7cce6a90c165630675cdc3d7689d6fa2d6f40c7816b0037a9f750acd3,2025-01-28T18:49:35.433000 CVE-2016-3716,0,0,f61b251f5875dca14e4c1eb77b0a6e92c1e277fd042d559a4e87be7fb1c6861f,2024-11-21T02:50:33.823000 CVE-2016-3717,0,0,f1e44b3d2ef462485a6b9f2d553269c3229028b52e3b8a4b92f442b963b343ab,2024-11-21T02:50:33.967000 -CVE-2016-3718,0,1,631e4a965b131d42a47f9af737775a56a179380606148105a4509f8d2bfe645f,2025-01-28T18:49:38.637000 +CVE-2016-3718,0,0,631e4a965b131d42a47f9af737775a56a179380606148105a4509f8d2bfe645f,2025-01-28T18:49:38.637000 CVE-2016-3719,0,0,06298023ce26190463946472029ea0cb30a258e565da712e8d83d7855e5af9f0,2023-11-07T02:32:25.260000 CVE-2016-3720,0,0,134e5ebb136d9c02318eba80e6f2e060ebf4806dcf3d61b8128ab888c98c5353,2024-11-21T02:50:34.280000 CVE-2016-3721,0,0,4361fcaa0db0102e6eb6c0feb77ca63b9439ca949c16d2edf59f4f949f808530,2024-11-21T02:50:34.390000 @@ -87677,7 +87677,7 @@ CVE-2016-4433,0,0,d81af4d050501425d493077f4c3f988224895ea29faa807fa982f788a11f96 CVE-2016-4434,0,0,78b8f26d9d81a875ed7a6ec4edec7ecd92d12f3c8f65a3011206ac4c18cf0ffd,2024-11-21T02:52:10.617000 CVE-2016-4435,0,0,45254d83767a3fcf73f069e3a8610026958815464b73a72d5a6f4bb72a77aef9,2024-11-21T02:52:11.303000 CVE-2016-4436,0,0,74b0fcf41020bf3e6e28f116e50d64bf32fe6667f8bf65aa53ed26b826107d1b,2024-11-21T02:52:11.490000 -CVE-2016-4437,0,1,345d82bd9dde2f33d44b287ae666172890b0f3e56de22174e8427be901137283,2025-01-28T18:18:48.517000 +CVE-2016-4437,0,0,345d82bd9dde2f33d44b287ae666172890b0f3e56de22174e8427be901137283,2025-01-28T18:18:48.517000 CVE-2016-4438,0,0,572edfd13e63854eb7bfd29f186b87eaf0cde6cf688fdcf159fa05d02c35f85d,2024-11-21T02:52:11.850000 CVE-2016-4439,0,0,e0b2ffa85c916211e338a645d507ad27f8f8e5c8ebb0f2ecbfa6ffc817e869d4,2024-11-21T02:52:12.033000 CVE-2016-4440,0,0,baaae3ac6286c8adb64184d8c5f721cf64fa89dd250fbe7ba507ef77e352e458,2024-11-21T02:52:12.230000 @@ -87760,7 +87760,7 @@ CVE-2016-4519,0,0,c5b70b67666a961a00804327e40f3ac1c218a36fbf31a37786da9ea1bc01e2 CVE-2016-4520,0,0,2406e24abd34f637b10673f224bb644210fcab7420eb1d51c73a53ab9a51c0c5,2024-11-21T02:52:23.400000 CVE-2016-4521,0,0,89e83db1ab938a9e35786e70470ce5eb8f6651900996864d67458602d00dc929,2024-11-21T02:52:23.513000 CVE-2016-4522,0,0,c2e058d2d5e6bdcf8d345e7d61fe6080df60daa1accca7b33edf50985354bd96,2024-11-21T02:52:23.627000 -CVE-2016-4523,0,1,d4817ac5e2ae2afe11dcb9f68ce656456f1cc555122d17019360e9ed66114002,2025-01-28T18:18:53.680000 +CVE-2016-4523,0,0,d4817ac5e2ae2afe11dcb9f68ce656456f1cc555122d17019360e9ed66114002,2025-01-28T18:18:53.680000 CVE-2016-4524,0,0,e081aaab2695eea668ff43171cb10bdd554ba5b142cb107070098389777276ac,2024-11-21T02:52:23.873000 CVE-2016-4525,0,0,8af5b6d43f0aeb0096ca96002db5f1138ef1573038074ff94eea8117e26741b2,2024-11-21T02:52:24.450000 CVE-2016-4526,0,0,0a0f5ec0c3eb07585f38f677ba557bc11c43c3c5749b8c6b32655a871e9c3705,2024-11-21T02:52:24.560000 @@ -88397,10 +88397,10 @@ CVE-2016-5191,0,0,e832a2fb565762fab465e468041eda30d89e55480b8578c32f1baf2cfe1248 CVE-2016-5192,0,0,7757e47b18dd071c8f5f898dfe4dfaed0fb7a2163f8c74dc19911d16258132a3,2024-11-21T02:53:48.470000 CVE-2016-5193,0,0,2605ee92a09a71c4845c3613185e94857066a09aa717d01fe88e85d455273b3a,2024-11-21T02:53:48.593000 CVE-2016-5194,0,0,8185033d9012165cc31acb2382c5db14cc153b70b8e1ec74f008137fb7447233,2024-11-21T02:53:48.713000 -CVE-2016-5195,0,1,ba962934faa72ee106454edd5fe818a9e0b027af26670d07d1e40ef5594f7fcd,2025-01-28T17:30:01.083000 +CVE-2016-5195,0,0,ba962934faa72ee106454edd5fe818a9e0b027af26670d07d1e40ef5594f7fcd,2025-01-28T17:30:01.083000 CVE-2016-5196,0,0,85d60c53c34b34a94d1179275edd2dbc1908adaf314ce782eec74fdc214d2790,2024-11-21T02:53:49.200000 CVE-2016-5197,0,0,74734dde4ecc6b3409ed55059c42eca7f8eadfb7f8d2fce0bff152caf355fae2,2024-11-21T02:53:49.310000 -CVE-2016-5198,0,1,01c7705b9bea1f30ff1b253ca49a3e814994d6bd280c09b8c738c78a199f922c,2025-01-28T17:30:06.970000 +CVE-2016-5198,0,0,01c7705b9bea1f30ff1b253ca49a3e814994d6bd280c09b8c738c78a199f922c,2025-01-28T17:30:06.970000 CVE-2016-5199,0,0,af7b883c8a25a0fc5ef58d60a01c24f776d4e2af270560d9047cac249fd826e1,2024-11-21T02:53:49.563000 CVE-2016-5200,0,0,1d9761eb86b4904ddf3bd2084d1f12a47f7ac16df3c584bddaa4d78dfb4b4351,2024-11-21T02:53:49.680000 CVE-2016-5201,0,0,49d7d942f4c2bb57ec7aa33d38d6bb1a8c5b2ba43e61df8ba5cec080a29e6c6c,2024-11-21T02:53:49.790000 @@ -97070,8 +97070,8 @@ CVE-2017-13313,0,0,0d6ac6befe081fba487675eab4252804ea375d01dfaa562bad14e41aa9aac CVE-2017-13314,0,0,33c48e6d8e6524fa065f82448defa764b8b3b9330b06ac294ae8e04b2d271ecd,2024-12-18T14:36:21.610000 CVE-2017-13315,0,0,a6c9ce499de7cc31ed3e6113da58d1ddbfa19fcf87a648f22bfa38731642b2e7,2024-12-18T14:23:37.877000 CVE-2017-13316,0,0,c19a74b376c80a4ddbedf3bda0070b9916cdc47d09974bb08101db1b768f4ae3,2024-12-18T19:49:51.540000 -CVE-2017-13317,1,1,13c24464f2ee23af3c2f75fc8efac7aa172d5b7da8fb1e44e3573daa5bd8cdd7,2025-01-28T17:15:08.180000 -CVE-2017-13318,1,1,5f52e791818c62f2b708204dd7f0f7a91441b303a32bd86c87da5418671a26c2,2025-01-28T17:15:08.310000 +CVE-2017-13317,0,1,22c87537b4dba4ccc4db24baf661558fbb9461010c81c50a2b8bd0345ffc517a,2025-01-28T20:15:26.523000 +CVE-2017-13318,0,1,3549211391f6d954bc139cf5a9e74a6e64a15ee1f58069202065bd8479204de1,2025-01-28T20:15:27.443000 CVE-2017-13319,0,0,5342c9254a7aa93c30e3821bff0d04f61fa0f453e54198ca596e0a2ca08f2630,2024-12-18T20:30:33.813000 CVE-2017-1332,0,0,0269de81100b11e03b79ed33c30dc865a85b59fb90a2c2fe1abeaca397fa8d4e,2024-11-21T03:21:43.893000 CVE-2017-13320,0,0,0c48fd68654bc947b8b2708cab8c3d479d7ae69efe9b849697f59b556d05bfda,2024-12-18T20:30:58.303000 @@ -103978,7 +103978,7 @@ CVE-2017-3502,0,0,3ea00a6a7f668b4d48adb3368123436b52ac21350e1eb22567a2d8f88f614f CVE-2017-3503,0,0,90f3de9a387943622acdb552d9f22c7904b6284a253fe673e47e92303f16f0c1,2024-11-21T03:25:40.753000 CVE-2017-3504,0,0,022ba11b423c06d78971e91a80e59e68001f0bf7995af1a9b7ee4ce23885610c,2024-11-21T03:25:40.873000 CVE-2017-3505,0,0,9cd32dd4b55bea54f8934e3875e131e5604540037ea75ca548cc28dc61584413,2024-11-21T03:25:41 -CVE-2017-3506,0,1,388ba879bad293b571b57ca5806e750fa8af65c9e6244e410cf3fcbdd6b8a98d,2025-01-28T18:13:53.443000 +CVE-2017-3506,0,0,388ba879bad293b571b57ca5806e750fa8af65c9e6244e410cf3fcbdd6b8a98d,2025-01-28T18:13:53.443000 CVE-2017-3507,0,0,3338081cd17593ce03dc2a71b935f61a9c36a7e80427861129d7789edd63829e,2024-11-21T03:25:41.347000 CVE-2017-3508,0,0,1338590ff09608d982779f91930e40b4d06febf70eb961b8cb6d337a1fda8445,2024-11-21T03:25:41.473000 CVE-2017-3509,0,0,a37db3adc52e5f7e64a05b2f1bdb5c2cc8a8863559e9e86a39c539a84905d515,2024-11-21T03:25:41.600000 @@ -105417,7 +105417,7 @@ CVE-2017-5026,0,0,d5a38725a31f738366f1beee032cbd89dd10b4653b84108a8a2d10586c7523 CVE-2017-5027,0,0,3faa021617bb8d53bbbd89ee85f4d713e0f72f31c3a228d4fdb19e5be10c868e,2024-11-21T03:26:53.583000 CVE-2017-5028,0,0,95c1b912517beef415dde1d0fc022d559f040e8de5930a425edb5c27b84a546a,2024-11-21T03:26:53.707000 CVE-2017-5029,0,0,9dd4f9a8e4f58ca0f045826febe4afe3ab6de659018279e9cb2f9d10cd599fde,2024-11-21T03:26:53.837000 -CVE-2017-5030,0,1,5b78d7cca1ec88bd7b096466bbf3d95ba49997ac9b027b59224a7838e802b473,2025-01-28T18:14:01.280000 +CVE-2017-5030,0,0,5b78d7cca1ec88bd7b096466bbf3d95ba49997ac9b027b59224a7838e802b473,2025-01-28T18:14:01.280000 CVE-2017-5031,0,0,9fb7bb74b87cbc7d0714ba0a0e2e38a87e2994b27b2b7d0d433ca78776958806,2024-11-21T03:26:54.123000 CVE-2017-5032,0,0,710ce084d71a97ad9230e94b0ab051f5fe7b6da6649d98398e5e6becf0de3373,2024-11-21T03:26:54.253000 CVE-2017-5033,0,0,61cd2f4ffd1551497a52b52be639018e94b322c5e70f38acc7f84cb2af939762,2024-11-21T03:26:54.380000 @@ -105958,7 +105958,7 @@ CVE-2017-5685,0,0,7e2720838bf75ba8df74963aa0d44d19823c3d3d8b4fe77ca70634fd4621ee CVE-2017-5686,0,0,1b6369a18bc3048e4f5052404b083fde204cc03e4b3610174df32e9ea98ad410,2024-11-21T03:28:13.317000 CVE-2017-5687,0,0,f3eb17158e526c11205277eb0aa51c4ed790e3b3585c712351e750176ecd3553,2023-11-07T02:49:31.080000 CVE-2017-5688,0,0,3047ed52c924afc3b53203936d7a15635d5467cdf666d3ad272cabd19d6b23ec,2024-11-21T03:28:13.447000 -CVE-2017-5689,0,1,de9b61db8ee6c051a7daafd1fc4d0a2e4386a139206564b58c562889d67622ba,2025-01-28T18:14:20.510000 +CVE-2017-5689,0,0,de9b61db8ee6c051a7daafd1fc4d0a2e4386a139206564b58c562889d67622ba,2025-01-28T18:14:20.510000 CVE-2017-5690,0,0,bde03df0f672bdcf5869f8d1b70ef297085f4350e41728ecf5ca86e2a8b87d57,2023-11-07T02:49:31.310000 CVE-2017-5691,0,0,d124b3c9ec131ae52624cc95825b560339c2db7bdf908a63b5224cac4d8b5e72,2024-11-21T03:28:13.767000 CVE-2017-5692,0,0,46649fd68ecee01e250c40c3b478483a6b0a25ec2e017585bff790e16bee79ad,2024-11-21T03:28:13.920000 @@ -106956,7 +106956,7 @@ CVE-2017-6849,0,0,c87a3d14034618258dcaa1d38546542b91edb7da2cf34fe76a2481d208cb7b CVE-2017-6850,0,0,ecdf301b79b09e8ddbeca44bb35325e49781ce82d77bcec81ba07775afdd69b8,2024-11-21T03:30:40.730000 CVE-2017-6851,0,0,a53e3803f720f8b430644b0fe96cfb6a6dc10d34766fa4003bc8f3fe159f9ea1,2024-11-21T03:30:40.883000 CVE-2017-6852,0,0,99a1fb15db442be975b34d7b40bd97bd3a7d4f39ea7f5795df52204fd0e411e6,2024-11-21T03:30:41.033000 -CVE-2017-6862,0,1,94fa5b53125a820635bb9d801165ec3aa36b34bbda766eb64d493afcc8b34083,2025-01-28T18:14:23.897000 +CVE-2017-6862,0,0,94fa5b53125a820635bb9d801165ec3aa36b34bbda766eb64d493afcc8b34083,2025-01-28T18:14:23.897000 CVE-2017-6864,0,0,17dcd3a7c1bd7b1c45121ae1c99ac6e7c4158aec469add0c6096632ec9e8e6d5,2024-11-21T03:30:41.317000 CVE-2017-6865,0,0,996a39dbcd58e23a9bba2c0b62d1614d77e7acdfe49f45b27aa51c1bd61f4d99,2024-11-21T03:30:41.443000 CVE-2017-6866,0,0,d052d39abcfd2e686b21beb68ba70f23eb207cc7c304c204d614557d08f37bcf,2024-11-21T03:30:41.580000 @@ -107507,7 +107507,7 @@ CVE-2017-7490,0,0,564db9b2380ca9e6f7fc8c4dd40edaf11a0beb3966b14816d5824cc041bac8 CVE-2017-7491,0,0,a2f3a79b7e81145346fc0d3815d2f4bea285c747a012306028156c34fc389ed5,2024-11-21T03:32:00.600000 CVE-2017-7492,0,0,ba9ab540baa59470295f026caec8df78add0fa0b402b49db449fff9c6dab8892,2023-11-07T02:50:10.280000 CVE-2017-7493,0,0,efa15b4b5e79fc17c5cb5cd255db84b75095d5eb84054f659ecc54e395d484a2,2024-11-21T03:32:00.737000 -CVE-2017-7494,0,1,4e9ff71a24c32c0fb60fa42d73dfbf19c8ebd8db5fb1db3298aa762ad4dd0ece,2025-01-28T18:17:24.297000 +CVE-2017-7494,0,0,4e9ff71a24c32c0fb60fa42d73dfbf19c8ebd8db5fb1db3298aa762ad4dd0ece,2025-01-28T18:17:24.297000 CVE-2017-7495,0,0,4222dd1b73dd21ba5e6fa28448130bc72f8abf4c1cb91ef79d45f6430a0b4ffa,2024-11-21T03:32:01.007000 CVE-2017-7496,0,0,7b7c3f6b58903108e7fc2badb2557a22b9d027b0067a849336b63899e802d03d,2024-11-21T03:32:01.130000 CVE-2017-7497,0,0,cd56a990e2f050d1eb96d1904c401477015038d4f62128ed7b7ac897f7c3c50d,2024-11-21T03:32:01.240000 @@ -126945,12 +126945,12 @@ CVE-2018-9369,0,0,efe398d86f896ce0829c7cd80bba8188348d4bc41763d145022ec16c1945c7 CVE-2018-9370,0,0,87030da3b46653701fd5f7a865aef8798fab0242623ea0d195e8be90ff192871,2024-11-22T21:24:57.467000 CVE-2018-9371,0,0,222c2e4987b2e2d5c2e561d322c2393abcf0b781445c771ce77d7eaa6ac4047b,2024-11-22T21:25:48.853000 CVE-2018-9372,0,0,bf802d4801f9f860b3a398478713fbe7b249ed3f9ce1e6995b2077a1cb556211,2024-11-21T16:15:17.900000 -CVE-2018-9373,1,1,57bafa41138ebf3a04ca4aa2ea624bd6876663a3e907e7d5cc1b0a2fa81f36b7,2025-01-28T17:15:08.427000 +CVE-2018-9373,0,1,1386bccd621f7d6b4565fbffb3401da4425a8a96e4cf92a79db9b6bd44f6ba27,2025-01-28T20:15:27.593000 CVE-2018-9374,0,0,3b6a94c92c93496e3937aecbafbcea0b081d505aad2846a5e6172408cea8db66,2024-12-18T20:25:33.723000 CVE-2018-9375,0,0,796c07416acf8cde600391dade7cacc2539272542d56dc601f7717adecb5bfb4,2025-01-21T17:15:11.717000 CVE-2018-9376,0,0,cc980c27d3656c448822c55fa140694c851c62fa72e54df15333c7855bb4f3dc,2024-12-18T19:37:08.323000 CVE-2018-9377,0,0,1a76ca591c622e996437a337b98c1fab200dd33e77f24b21e234d68799ab4b2c,2025-01-17T23:15:11.617000 -CVE-2018-9378,1,1,cfa089d77d350728fb23d20c68fd2362e2bcc1124b6ffacdec7daef7cc7ca5aa,2025-01-28T17:15:08.530000 +CVE-2018-9378,0,1,0cf283c2cd4aa210cc5807c75a4e4064d295b5244dc90c6f3eefe91377a4e115,2025-01-28T20:15:27.727000 CVE-2018-9379,0,0,3c4d0b24777c1bb158fa692a2de5b655465acc34135122c5d837cf9bf5f58562,2025-01-21T17:15:11.873000 CVE-2018-9380,0,0,e12a43dbeeb8da1df7c5ede895c56553a0364f94530599aafaca6e6f3326ce02,2024-12-18T19:42:11.093000 CVE-2018-9381,0,0,2ce1fffdcf5aa87d66006064137212243a0a262bfc7f2cf820777dea17a7c8cc,2024-12-18T19:39:05.097000 @@ -205741,7 +205741,7 @@ CVE-2022-39085,0,0,4cb2ae08796622d3fba256bd7fcc77e04572f3c0c62a888fbc6edc3c9234c CVE-2022-39086,0,0,8906205a624d2f605a2c02b0103224d475a2bfd0a164ea3e9d895d2a085ee467,2024-11-21T07:17:31.340000 CVE-2022-39087,0,0,fffcc564a8363659b49fa951ea72a7be74735a19fe79524ef64f0b7bbcd27c7c,2024-11-21T07:17:31.480000 CVE-2022-39088,0,0,743d2fc83dea0326539ffccd079a190510e6171368fd4d9aa8fe758ffc3d30fe,2024-11-21T07:17:31.620000 -CVE-2022-39089,0,1,d4c6a0a34585250e90230fa2b16259123e87d70bf70852436109cf9e7ecb6f50,2025-01-28T18:15:26.883000 +CVE-2022-39089,0,0,d4c6a0a34585250e90230fa2b16259123e87d70bf70852436109cf9e7ecb6f50,2025-01-28T18:15:26.883000 CVE-2022-3909,0,0,7e2377db8388138c1a87a7fd6fbf5a9af2504a665f9c3a4ade146435b5971da3,2024-11-21T07:20:30.733000 CVE-2022-39090,0,0,d9baf1e6ef244bf8e235a0be4c538e60e0156454bd4644b8c8b7c7cd33788533,2024-11-21T07:17:31.877000 CVE-2022-39091,0,0,93b7e769e23fcf3952bbe4202b3d395cdddfa10990085f50dbeeb16412860784,2024-11-21T07:17:32.597000 @@ -209786,9 +209786,9 @@ CVE-2022-44411,0,0,13757bc340c3bc1252d8dd62e5bc9774a30ce416134d3d63f6d96aca2754d CVE-2022-44413,0,0,6a62ebb5d24cd2de0996250fc6339c605c998d176b623742dab65c51155c67a1,2024-11-21T07:27:58.767000 CVE-2022-44414,0,0,b71d6403569be8c16e0e037b382af26d2dc1abe034d965988ece41662b9159a3,2024-11-21T07:27:58.900000 CVE-2022-44415,0,0,178d0be67a325f02fd2c67522d81dd1b7826c40d5252346c500ba9bcbd749950,2024-11-21T07:27:59.040000 -CVE-2022-44419,0,1,6a727dab633571fe6481c53cd72e4e8c2203bb1cfca28817af1e0d0544a9e61b,2025-01-28T17:15:08.797000 +CVE-2022-44419,0,0,6a727dab633571fe6481c53cd72e4e8c2203bb1cfca28817af1e0d0544a9e61b,2025-01-28T17:15:08.797000 CVE-2022-4442,0,0,1740a9780118523d10de3216fec549482d7a9aa79f033a181f84593f69dc3bde,2024-11-21T07:35:16.250000 -CVE-2022-44420,0,1,a85fc762ee45f344cf3503d11aa65ca22215f5cf4f451fd29b0f7ac3ae73574e,2025-01-28T17:15:09.023000 +CVE-2022-44420,0,0,a85fc762ee45f344cf3503d11aa65ca22215f5cf4f451fd29b0f7ac3ae73574e,2025-01-28T17:15:09.023000 CVE-2022-44421,0,0,0b74d7e9653151d2da77e456e163cc92ad72d2314c8adbb4e6940d4cb832217c,2024-11-21T07:27:59.427000 CVE-2022-44422,0,0,67f4d09da2513cf7e8f2d61f9b02da3a46aa7b25fcdcfbca799bf120bdede910,2024-11-21T07:27:59.550000 CVE-2022-44423,0,0,eb340c1c6883427289d3cf2ad338f905a4557f4f71fccddfef080bc6990c3763,2024-11-21T07:27:59.673000 @@ -209802,7 +209802,7 @@ CVE-2022-4443,0,0,6155c792e48a39e60c8281d916cdb6cea658bcd3495f7a8ee2ef11f7f78bb9 CVE-2022-44430,0,0,6cf9e74bac6802d6a51ec35b8312d5a298da1a03dcb8b7b258c297d44dd1ca9a,2024-11-21T07:28:00.487000 CVE-2022-44431,0,0,b782e744904b8423ea4ec81b9dfef4ef22c6a2b069149bd2454a3de689d81f99,2024-11-21T07:28:00.613000 CVE-2022-44432,0,0,39343344ac1dc2c7c18d4746b49018197b2f0a40d8b872a509d734ee1ca92654,2024-11-21T07:28:00.730000 -CVE-2022-44433,0,1,b2801eacc8e38c3f8299d89a1d5ac5fd9fbe5efa11d39dbd133be8dbf453d797,2025-01-28T17:15:09.187000 +CVE-2022-44433,0,0,b2801eacc8e38c3f8299d89a1d5ac5fd9fbe5efa11d39dbd133be8dbf453d797,2025-01-28T17:15:09.187000 CVE-2022-44434,0,0,8ef02e77783eebd49873c39a83db9ae701d7e49987b86ea92f0645fc1827355d,2024-11-21T07:28:00.960000 CVE-2022-44435,0,0,6578c0a609030d63b1576b0b4b133322867d565df7b267a026d2d532b7912381,2024-11-21T07:28:01.080000 CVE-2022-44436,0,0,ee204a9c97e9d25c50cdc60f00e27165261e03dbca52745fafa007b5b2e2d0c6,2024-11-21T07:28:01.203000 @@ -211773,14 +211773,14 @@ CVE-2022-47330,0,0,85a4a57af31008da3df89e202cecb177ab359c603025cd5154f14828cadff CVE-2022-47331,0,0,fefae5473b2a134cbbd47633d54db7948927a072d6bbbcf8c31886a084257835,2024-11-21T07:31:44.507000 CVE-2022-47332,0,0,df4a869bc27df4ccc5cdd75a5d42e95190d4d508f368a0952433a428bbbb2fde,2024-11-21T07:31:44.633000 CVE-2022-47333,0,0,85acb4ec1539f5e778d6bc3e7f4a7f82e765434978b41c39b8cb6bc88bad5ee2,2024-11-21T07:31:44.763000 -CVE-2022-47334,0,1,79697999df090a6112af4776243e1d4cdac5ba6c9d4bf6c9080c00663bf9e733,2025-01-28T17:15:09.353000 +CVE-2022-47334,0,0,79697999df090a6112af4776243e1d4cdac5ba6c9d4bf6c9080c00663bf9e733,2025-01-28T17:15:09.353000 CVE-2022-47335,0,0,4b65f1290489aa1181bbfaa03027c8336468a4ee72d8f3247ba42d5d065ff9da,2024-11-21T07:31:45.003000 CVE-2022-47336,0,0,dc2c03aead6d30f31c78fd301bfab68236356d212053d1bccf1962ae6dbaf266,2024-11-21T07:31:45.107000 CVE-2022-47337,0,0,64845ac50638664d5a7a84630d6329dd3a039d845027e34a07002d19987c87b4,2024-11-21T07:31:45.220000 CVE-2022-47338,0,0,0a13890e7a3e55d2c4e00804fc3ed4650004d44152ef671a97e69234e7365635,2024-11-21T07:31:45.330000 CVE-2022-47339,0,0,5f9e961fef8454aa61538ef54d66e71c4da6cabbf4aedeea88c027cbdfe52db8,2024-11-21T07:31:45.440000 CVE-2022-4734,0,0,3e3f895b4ca74c84b0fb151d8268a7f8b991a926d79e2ed84ec0f21e7438c93c,2024-11-21T07:35:50.207000 -CVE-2022-47340,0,1,6028ec2b2df7cf335147b50331bfd8125f68753f9e3796dc8e5ffbdd41658212,2025-01-28T18:15:27.967000 +CVE-2022-47340,0,0,6028ec2b2df7cf335147b50331bfd8125f68753f9e3796dc8e5ffbdd41658212,2025-01-28T18:15:27.967000 CVE-2022-47341,0,0,91090ccb682915a12137a405b12a324109569ab1480bf23881dff52d521b3d1a,2024-11-21T07:31:45.663000 CVE-2022-47342,0,0,c60c630cb85f62e1c030b08a25c7b7c662833e2bae752772a071268f4db3f1cd,2024-11-21T07:31:45.777000 CVE-2022-47343,0,0,0a8e29cd5462a24f61106178417bbea442dc59f90da83ce7c5c12fd324c69fda,2024-11-21T07:31:45.887000 @@ -211926,7 +211926,7 @@ CVE-2022-47481,0,0,072bed160efe1946057d40d4bdf9af2bed0116fb51202061337233938be48 CVE-2022-47482,0,0,bba60f47d2c4b14e5e60bc809caf93734e38c1bd1d297867ae40bb729f81dfbd,2024-11-21T07:32:03.223000 CVE-2022-47483,0,0,db9be835628e60778bc7c7bdc9b6e53d3d9c0458990254351b7137c6b5b9e146,2024-11-21T07:32:03.347000 CVE-2022-47484,0,0,95cdc3653454b17f6b32a877606b56ec144381ab971b9c79d156105dbc65645e,2024-11-21T07:32:03.470000 -CVE-2022-47485,0,1,eecb5b3928cede1970d9d92d33ff0363db96bd500ebfeeb15737e71a65f95750,2025-01-28T17:15:09.557000 +CVE-2022-47485,0,0,eecb5b3928cede1970d9d92d33ff0363db96bd500ebfeeb15737e71a65f95750,2025-01-28T17:15:09.557000 CVE-2022-47486,0,0,7e6f65785d737ef03f38d76dcd40df32b26b715f28aa4c6c3bb6ba0deeb24577,2024-11-21T07:32:03.727000 CVE-2022-47487,0,0,b397bc50d67e61bd3bcf80d9acb2e84501baac8f716d706444c8a8edf2666d05,2024-11-21T07:32:03.840000 CVE-2022-47488,0,0,3f6b9a4dbe2e8648f93df0b16394694f75a411bff21553d7e1b4f5d9cc9c9e6a,2024-11-21T07:32:03.953000 @@ -212320,18 +212320,18 @@ CVE-2022-48237,0,0,09a44b6c8dbc11d4ea437d19447b085b327512ea8d832526b9ce5917a25aa CVE-2022-48238,0,0,d486e56ccd1af28989a3754396bfc4b9d71bc34e77685fdbed6c1a537eded12b,2024-11-21T07:33:01.407000 CVE-2022-48239,0,0,2b36af9631c5a605819f3a69da61c23f2a7c5a22328bff5e976273847904c542,2024-11-21T07:33:01.520000 CVE-2022-4824,0,0,cb365ab5076f58d6fea721db695d23f4ab58de5df6a90af86982f551b2e2c2cb,2024-11-21T07:36:01.127000 -CVE-2022-48240,0,0,3048f0959551e24d8ce4e47c5afe044fd4ac5895af115ddf9f5640c44b54fee1,2024-11-21T07:33:01.640000 -CVE-2022-48241,0,0,4367fdd2d027d091f2d080e7838cd73bff2f1b94d7219419567a5ccecf29c0fb,2024-11-21T07:33:01.753000 -CVE-2022-48242,0,0,c41fec37ef695e616b5f031411921d611ca9953c0b6b51ca0dd59bbff132bbe9,2024-11-21T07:33:01.867000 +CVE-2022-48240,0,1,b83423ba575e6be2e559f2f6a79613f36da5350453969e7c1b98d66b15908cb8,2025-01-28T19:15:08.860000 +CVE-2022-48241,0,1,a632f9d07ce4128422cead40398fa41d5943354be2b7b89da53b23cc8bf4cf53,2025-01-28T19:15:10.233000 +CVE-2022-48242,0,1,eaa3bc520a98e7911f4dff06b93742735f3b6cf14f5bffae1782f9ec6e714cc1,2025-01-28T19:15:10.467000 CVE-2022-48243,0,0,efc81e05681a71fa1d0d717d3f4824c2ccc1ff4367a6cc1269cb108bea8983a3,2024-11-21T07:33:01.990000 CVE-2022-48244,0,0,c0a9f3091e6daed6f5d2adffee9bed2c575662b1c969e371545656f0380875e2,2024-11-21T07:33:02.110000 CVE-2022-48245,0,0,c1abdc1f0b29b08650e52bea057da6827ae90741d71e3cd1ebf0698cfe7619e1,2024-11-21T07:33:02.230000 -CVE-2022-48246,0,0,50b7a9da988b9d525f9839708c9db57f249f79f91226c2b50f3404657153e92e,2024-11-21T07:33:02.350000 -CVE-2022-48247,0,0,ec8290bcd1d8f57be235a919eb26c4c47d337e20362fddedcd9679d70f1a54ef,2024-11-21T07:33:02.467000 -CVE-2022-48248,0,0,628744de31d06e52506fd291bae3fa9d49a04459161c9a9d394492689cd37819,2024-11-21T07:33:02.590000 -CVE-2022-48249,0,0,56970bf721966bd06e96192f93f1a30011dd46a7fb9be8163a8341f88287e77b,2024-11-21T07:33:02.707000 +CVE-2022-48246,0,1,0e2de9fa82b9bc5c7edd41fd60a423841fe138543b259f1f97e1f572e4e640b4,2025-01-28T20:15:27.897000 +CVE-2022-48247,0,1,2517aa9e3d05f5877bf973eca5aca5c06102ce3db34f69f12e8b6905f11dc832,2025-01-28T20:15:28.050000 +CVE-2022-48248,0,1,32ea41c3012e34cf8d62e6da6f2d133fda00feb21017bd31c777968e1af27a76,2025-01-28T20:15:28.203000 +CVE-2022-48249,0,1,833ae9290bc0a168f29c1144597cb148b7be34d38329348bf389d6ee38544add,2025-01-28T20:15:28.360000 CVE-2022-4825,0,0,a3ffc0bb7f78ec2b636b60f1a7d983f98ae406222a6201d2ddd2d5539f181aac,2024-11-21T07:36:01.247000 -CVE-2022-48250,0,0,d74a4a547d628e0e4d5005325c95cf068026aa32b240eee0832344d08421ab19,2024-11-21T07:33:02.830000 +CVE-2022-48250,0,1,57c4e2446f9c884baecc212717f599ba9cb23b07216eae905c88d4442b6ecd50,2025-01-28T20:15:28.510000 CVE-2022-48251,0,0,8c71538d3404e9a1a3a4cd540197959121e289beafc0cb1a9c886f3e624f08da,2024-11-21T07:33:02.947000 CVE-2022-48252,0,0,194dbe0e436336a7bdafcbc5c839c752d4a600d25c08f75a4322184473044b50,2024-11-21T07:33:03.123000 CVE-2022-48253,0,0,1e4b796ce980fd2d3ea2e1e61412d6274998adb73a4c43c69235da32887f01a1,2024-11-21T07:33:03.267000 @@ -212439,30 +212439,30 @@ CVE-2022-48364,0,0,389a006950dbd3156debcd5c772205d3b42a4dd07de138f247cf906a4a434 CVE-2022-48365,0,0,b935554843b9537d40e30b971626a708eb32cc0a7c1c7683e5ed169f2896d8ea,2024-11-21T07:33:15.613000 CVE-2022-48366,0,0,75258b876168fcbd6991b11ddddb8498c473455509bd89f55e02878066d92c9b,2024-11-21T07:33:15.753000 CVE-2022-48367,0,0,a624f3e93dd4cc5a193c7e3b785ef14b07571b38121346de63f21b74f0211e42,2024-11-21T07:33:15.907000 -CVE-2022-48368,0,0,bfe1a128c2648391eeefaf027317261431f6822c34b38089fd4046dfa49695ad,2024-11-21T07:33:16.043000 -CVE-2022-48369,0,0,9c05f5876f7c5a1095b2d973564acef887581a1af89336c566f30e201dd2de46,2024-11-21T07:33:16.170000 +CVE-2022-48368,0,1,cfdf0fb927519fcc4fbf933573497ea0bbcaa6b18dba88de4bcc45d5ac302c81,2025-01-28T20:15:28.660000 +CVE-2022-48369,0,1,54899196847c57d74a4cd598c1dede975771f962361a60ace2f6c23d87bd0a2b,2025-01-28T19:15:10.660000 CVE-2022-4837,0,0,6d97788184674a1102a7bec1dd87cf23022e3b52a475e5f5f22f1d81fba5b96b,2024-11-21T07:36:02.690000 -CVE-2022-48370,0,0,effe9b2663f5146ee9f5523989ce48f6851874976a910e260c7aa7f70d8b2536,2024-11-21T07:33:16.287000 -CVE-2022-48371,0,0,24bce955c1dbcae76a2644c8c108864bff8f500a5abd43770084c6fd033fe019,2024-11-21T07:33:16.403000 -CVE-2022-48372,0,1,cee9e4f50c2de00fb1bd4bf85525c958e40829d57632d79830560c7c3825d513,2025-01-28T18:15:28.183000 -CVE-2022-48373,0,1,988993806e15f13df3e38568ed2ffa5bcced6d63f9c3e1206d384f5306ba21f4,2025-01-28T18:15:28.393000 -CVE-2022-48374,0,1,abf6979ae807a73d1146c040741a222b9f21355bd114489463b4b5f76b24dbb7,2025-01-28T18:15:28.607000 -CVE-2022-48375,0,1,2a31f7b51f79ab57d956270d01ac97bbd33467b6652d120d35e0b823933d2983,2025-01-28T18:15:28.833000 -CVE-2022-48376,0,1,7b223f996cc8962e8587bf9f80d68c8f04d776141c9f440aab63783df17538e9,2025-01-28T18:15:29.027000 -CVE-2022-48377,0,1,386663ef7811e094d063d55b19834ae580c0d288022e06859c517bf417a95244,2025-01-28T18:15:29.250000 -CVE-2022-48378,0,1,b9e38a45bc88c504c9f7abd692508df2dad1a18ecb6f0b0dc9e5999b21e0a607,2025-01-28T18:15:29.463000 -CVE-2022-48379,0,1,00cf4a72a4e4617c0f6ccd6066f05bc70669039ff74f3654d55cef9d98efd69e,2025-01-28T18:15:29.663000 +CVE-2022-48370,0,1,e52f6ce1025b703fa07b1d91079e4e082c808ff0743ca27417eb52c3734175f3,2025-01-28T19:15:10.870000 +CVE-2022-48371,0,1,a463a72667e09565998c6cff8e92196ff6d2cf0b44fb388fd0c2580dbbc84031,2025-01-28T19:15:11.250000 +CVE-2022-48372,0,0,cee9e4f50c2de00fb1bd4bf85525c958e40829d57632d79830560c7c3825d513,2025-01-28T18:15:28.183000 +CVE-2022-48373,0,0,988993806e15f13df3e38568ed2ffa5bcced6d63f9c3e1206d384f5306ba21f4,2025-01-28T18:15:28.393000 +CVE-2022-48374,0,0,abf6979ae807a73d1146c040741a222b9f21355bd114489463b4b5f76b24dbb7,2025-01-28T18:15:28.607000 +CVE-2022-48375,0,0,2a31f7b51f79ab57d956270d01ac97bbd33467b6652d120d35e0b823933d2983,2025-01-28T18:15:28.833000 +CVE-2022-48376,0,0,7b223f996cc8962e8587bf9f80d68c8f04d776141c9f440aab63783df17538e9,2025-01-28T18:15:29.027000 +CVE-2022-48377,0,0,386663ef7811e094d063d55b19834ae580c0d288022e06859c517bf417a95244,2025-01-28T18:15:29.250000 +CVE-2022-48378,0,0,b9e38a45bc88c504c9f7abd692508df2dad1a18ecb6f0b0dc9e5999b21e0a607,2025-01-28T18:15:29.463000 +CVE-2022-48379,0,0,00cf4a72a4e4617c0f6ccd6066f05bc70669039ff74f3654d55cef9d98efd69e,2025-01-28T18:15:29.663000 CVE-2022-4838,0,0,925dc0ce62f993db39ee78f8a2b400af3e100b581bde23452ad979b5b82ada2e,2024-11-21T07:36:02.797000 -CVE-2022-48380,0,1,40bdf44300f3dd297bf2682cbe7968c3d4becf853024d48677dd603a6ef5a410,2025-01-28T18:15:29.880000 -CVE-2022-48381,0,1,dfcd0287aa17a2ba559c39c05cd7eec54cf81da62ea584c43fcafe631f0711da,2025-01-28T18:15:30.097000 -CVE-2022-48382,0,1,5d4b342e5702d881a06d100296f68f84ef99cd757bf0509dc62882ed886484ee,2025-01-28T18:15:30.310000 -CVE-2022-48383,0,1,492fcc50d1c7bfc23e86f8eea4c6d0334ce7e29e2814f49cfccf4e757e18b78d,2025-01-28T18:15:30.513000 -CVE-2022-48384,0,1,15df557c5c25862d281f07ed843dce275dd44e2518418119ba6e21471184a6ba,2025-01-28T18:15:30.723000 -CVE-2022-48385,0,1,935cdd5a21c4c93631f7b55995f9a219bd1aba80c9a128a597723754b20e43f4,2025-01-28T18:15:30.937000 -CVE-2022-48386,0,0,016435a9c254552b854d44c1b8f5a0e81b6a80263d6f3a385ef30de3f6b54129,2024-11-21T07:33:18.177000 -CVE-2022-48387,0,1,1c2ad655a31d609b4e92c1c03e9e9c170d9bf550fff2f1639c112969268cff33,2025-01-28T18:15:31.167000 -CVE-2022-48388,0,1,d5f5dbbcdc282d063f3dfa8f77867431998ba29e6e7bb60f7db301be0bcebfb4,2025-01-28T17:15:09.743000 -CVE-2022-48389,0,1,46046daa2f674ae4e2aee4dad333bff605876107bccb40f7db1c08b670f9ac30,2025-01-28T17:15:09.960000 +CVE-2022-48380,0,0,40bdf44300f3dd297bf2682cbe7968c3d4becf853024d48677dd603a6ef5a410,2025-01-28T18:15:29.880000 +CVE-2022-48381,0,0,dfcd0287aa17a2ba559c39c05cd7eec54cf81da62ea584c43fcafe631f0711da,2025-01-28T18:15:30.097000 +CVE-2022-48382,0,0,5d4b342e5702d881a06d100296f68f84ef99cd757bf0509dc62882ed886484ee,2025-01-28T18:15:30.310000 +CVE-2022-48383,0,0,492fcc50d1c7bfc23e86f8eea4c6d0334ce7e29e2814f49cfccf4e757e18b78d,2025-01-28T18:15:30.513000 +CVE-2022-48384,0,0,15df557c5c25862d281f07ed843dce275dd44e2518418119ba6e21471184a6ba,2025-01-28T18:15:30.723000 +CVE-2022-48385,0,0,935cdd5a21c4c93631f7b55995f9a219bd1aba80c9a128a597723754b20e43f4,2025-01-28T18:15:30.937000 +CVE-2022-48386,0,1,d7a31ae9e838f26fc3329e48aa130eebdfa8d86844b5ea09d934b579be3ca0b8,2025-01-28T20:15:28.820000 +CVE-2022-48387,0,0,1c2ad655a31d609b4e92c1c03e9e9c170d9bf550fff2f1639c112969268cff33,2025-01-28T18:15:31.167000 +CVE-2022-48388,0,0,d5f5dbbcdc282d063f3dfa8f77867431998ba29e6e7bb60f7db301be0bcebfb4,2025-01-28T17:15:09.743000 +CVE-2022-48389,0,0,46046daa2f674ae4e2aee4dad333bff605876107bccb40f7db1c08b670f9ac30,2025-01-28T17:15:09.960000 CVE-2022-4839,0,0,71e9ea09316157b1d161766da1ca86a6c0636a9e403561b03ca92cbf29b77453,2024-11-21T07:36:02.903000 CVE-2022-48390,0,0,2118f140d5a464f1e6eb994741768b9d34b16134f7a115aa13be1e0c15719039,2025-01-07T21:15:07.953000 CVE-2022-48391,0,0,f0df4ac89a14bd04b2e3255027b9378110b488fdd508ecb0d7b41f885e40b677,2025-01-08T16:15:27.090000 @@ -214490,7 +214490,7 @@ CVE-2023-1385,0,0,f4730f4c2553bfeb0e604f17e12e8db99d18e397b3d43e414768bd333fdc66 CVE-2023-1386,0,0,6a8f74aa440f2d0a2d832e90d4ff11d3fff3ffff3c712540d05584c700a164b4,2024-11-21T07:39:05.003000 CVE-2023-1387,0,0,e6c10ad9ac3fda3b26cc345237cb94c9e2bf4c2513d5681957dcbecaac351e51,2024-11-21T07:39:05.150000 CVE-2023-1388,0,0,61491955fbf08f96f9dda67bb4675d7b983660c4a4844e2bd1ddb53a61ff4965,2024-11-21T07:39:05.287000 -CVE-2023-1389,0,1,8f89074c1a8c711e2bea4af4fa5338deb195b223e2e7cd99c3f8e764bed12e56,2025-01-28T17:15:10.167000 +CVE-2023-1389,0,0,8f89074c1a8c711e2bea4af4fa5338deb195b223e2e7cd99c3f8e764bed12e56,2025-01-28T17:15:10.167000 CVE-2023-1390,0,0,7331f03e3563907490d577cc29d15ce6567f80dbbe2b65c66cec2bf6df79abee,2024-11-21T07:39:05.540000 CVE-2023-1391,0,0,dd784b997154ae9f5feebc422fa4117056b904bb755b97ad2709765998f29aae,2024-11-21T07:39:05.680000 CVE-2023-1392,0,0,cde70ca055d8e11ec46365f3d51bb4ad97c60b1b0f1dc3f20fa372e18083459c,2024-11-21T07:39:05.823000 @@ -215370,7 +215370,7 @@ CVE-2023-2029,0,0,ba151be9f7ae969a9a0157d785c56b6d4e8ae0a9b47c84689d2c70b4386089 CVE-2023-2030,0,0,4a4f70c8d39484ef1d071a6ed8a04127994a4513b0213c0996e2b3291edde9d1,2024-11-21T07:57:47.593000 CVE-2023-2031,0,0,4d9ad115a9dcd7a3c0a7dcac165bc24a881d48c48905f292e24838d7b258ff5e,2024-11-21T07:57:47.723000 CVE-2023-2032,0,0,da29bb2cbb2751ed3fea0a67b9dacd9aede17b853d6e29bd913ee86e0124e640,2024-11-21T07:57:47.850000 -CVE-2023-2033,0,1,298584ce194f02b703fb55c5e32bfe6cafb6b0e70393debf70327f9d85057c9f,2025-01-28T17:15:13.517000 +CVE-2023-2033,0,0,298584ce194f02b703fb55c5e32bfe6cafb6b0e70393debf70327f9d85057c9f,2025-01-28T17:15:13.517000 CVE-2023-2034,0,0,b24f8566765c775e830d0cbaf2dde84d605de8afbbaf5fc6b7eb63817a207e2c,2024-11-21T07:57:48.120000 CVE-2023-2035,0,0,392d348d322c5c6e86e27340c4e25999364cefb25ad94f1496333c0309c6dc1a,2024-11-21T07:57:48.240000 CVE-2023-2036,0,0,4e78f0553209fba8cfb589b2986efdcf20028b22cce4d419006bfa5d1cfd11bf,2024-11-21T07:57:48.390000 @@ -216231,7 +216231,7 @@ CVE-2023-21356,0,0,da897bcbd3795c44ddc437132652504b4f41e3142fe2d355d4bc7976c7b76 CVE-2023-21357,0,0,4aa191a7fa744b5b2647cc452ef4e188649661374a5f43fedf07a60f816ddfa3,2024-11-21T07:42:42.560000 CVE-2023-21358,0,0,f761f215d289c9d092f4fb52e2fb8893a6d6f5e7dcd7f11bc480c40e1930a7c9,2024-11-21T07:42:42.667000 CVE-2023-21359,0,0,c13f91abbf99e00cebc557a86b2b9d603b80c3c273ef3f36cd20330d383d2e5c,2024-11-21T07:42:42.767000 -CVE-2023-2136,0,1,e6c3bccfe6d3c3d3e5bba8d3cfd9b048e07d20a59caa8265153902f56fc5d65b,2025-01-28T17:15:13.850000 +CVE-2023-2136,0,0,e6c3bccfe6d3c3d3e5bba8d3cfd9b048e07d20a59caa8265153902f56fc5d65b,2025-01-28T17:15:13.850000 CVE-2023-21360,0,0,5e67c128ac8e59b31b94b7b2aa9f1e6bf5c8bf1fc3218995db8b67bd529a71d9,2024-11-21T07:42:42.870000 CVE-2023-21361,0,0,4ca59136dc493240fec7b946d5a8b143e727e96efc9a29ee545042200ed4e5c7,2024-11-21T07:42:42.977000 CVE-2023-21362,0,0,b196d1d03c69ff99930d79c4a0ede4b9b10ff2478e3f854437753f21e23c26b5,2024-11-21T07:42:43.080000 @@ -218087,7 +218087,7 @@ CVE-2023-23574,0,0,23eae727ebe892e77e6fc27b40f8572f25526b3a3ab402532acdb9ccb6dd1 CVE-2023-23575,0,0,cca35de8ea89ee6df319094b3fd0dc28cba70671679a78109c0e50af5273de69,2024-11-21T07:46:27.547000 CVE-2023-23576,0,0,b405b358621de0304b34c52606701f079a0d031c87fbc51e9c9871767414aeb6,2024-11-21T07:46:27.683000 CVE-2023-23577,0,0,35e6d00d873e75d44ccd785241ea1e21f439594a9f2f964d4076d28e241d691a,2024-11-21T07:46:27.793000 -CVE-2023-23578,0,1,de6e80af3c1c3458c7f214539244fb6ed6766d417d21dc49a84cbc58b2b01418,2025-01-28T17:15:10.473000 +CVE-2023-23578,0,0,de6e80af3c1c3458c7f214539244fb6ed6766d417d21dc49a84cbc58b2b01418,2025-01-28T17:15:10.473000 CVE-2023-23579,0,0,73a201a0fbb6243a3c0da6edfc40e0d0c406787dd0755b91a1069fbd5332b85a,2024-11-21T07:46:28.007000 CVE-2023-2358,0,0,741ea2baf1c1b42cad77b16eb938e0e69bff6fd0ba50c2237729dcc1a88e2951,2024-11-21T07:58:27.127000 CVE-2023-23580,0,0,9115984e8fce0dd4844d20c5a2e10543d36040e5e8b799529ac40ba1aff6054b,2024-11-21T07:46:28.143000 @@ -218415,7 +218415,7 @@ CVE-2023-23901,0,0,344c9b14eaafed66deb1aaa0c65d5ef4cdc05f637a8487121a44a1e9ce583 CVE-2023-23902,0,0,a31c827d3e2fa5446e634865420275a55f7452fd17cd9c80d50dac6f7835b71f,2024-11-21T07:47:03.990000 CVE-2023-23903,0,0,9fe01002f68287d61dec7d5aff1f25809735a4f8bd044b98cd8aba89a80c2007,2024-11-21T07:47:04.113000 CVE-2023-23904,0,0,ad6cc32bebdd6972b54f01035b888089f4021c96fb0041b93db1421a564e8dfc,2024-09-16T18:03:16.707000 -CVE-2023-23906,0,1,2ecdd32694c2bb092c95ca0af2b0f2afbb7c73799606fa623a3363321e9e8d84,2025-01-28T17:15:11.117000 +CVE-2023-23906,0,0,2ecdd32694c2bb092c95ca0af2b0f2afbb7c73799606fa623a3363321e9e8d84,2025-01-28T17:15:11.117000 CVE-2023-23907,0,0,504b493fcb607670bacb1abb8087c9569f3e7c2546a659197d8c9e2048059bc8,2024-11-21T07:47:04.487000 CVE-2023-23908,0,0,ae08482f5e646e1701e95877b751c03321b66a7bdd26f3c5a54776c2eef28f20,2024-11-21T07:47:04.603000 CVE-2023-23909,0,0,1188f2bb92b84d29835a6ef7f04a6e8438af4b71b214260a7f4be315b3ae57de,2024-11-21T07:47:04.870000 @@ -220682,7 +220682,7 @@ CVE-2023-26590,0,0,81026d0b9b1c018466411e0285636898c1c4b1f8c2710904882ad94fa0193 CVE-2023-26591,0,0,cb8b1433788fd981cf324c451c550b68d1d16a2521cc103f97b7a22224911fc2,2024-11-21T07:51:49.050000 CVE-2023-26592,0,0,25cf56c806a537b19ae74f034c88077cfa1cf5258e7f9d2da830d0ca93b65355,2024-11-21T07:51:49.167000 CVE-2023-26593,0,0,602b25afeb2bba96821ac41e04ec66b11e15122d78baba05d0b03413cc5b4c8d,2024-11-21T07:51:49.287000 -CVE-2023-26595,0,0,04344e2401c7ce98c0143d2d0d5275c14deb36b2fb712d71e2c152ccc7fd16d3,2024-11-21T07:51:49.420000 +CVE-2023-26595,0,1,24284420d89a05f6e69fa31b2fed484c822ce9177d22aea9b492fabed05f885f,2025-01-28T19:15:11.500000 CVE-2023-26596,0,0,473d756e5fc103c72c25cb52f36d58f77ec5ae61a2a53c9a3dc335fe84d6a907,2024-11-21T07:51:49.530000 CVE-2023-26597,0,0,aacf593fde559d15ce4638d00292bbc24591756418f0523c6654e6c81acd48a7,2024-11-21T07:51:49.657000 CVE-2023-26599,0,0,1dbb1f2d05db14b400489b090477c44b30116883ba51ce5b297c4ac394001c52,2024-11-21T07:51:49.787000 @@ -220866,7 +220866,7 @@ CVE-2023-2699,0,0,1c04a3cc51ebb405d698cee0fe2e32f286ab499340c1d6cc19532b802b686f CVE-2023-26991,0,0,bc9214a7877aa8bb477fb62bafde115ab21b561f5c8b6dcb774e044fa6a65647,2024-11-21T07:52:09.787000 CVE-2023-26998,0,0,70b29c0ae973491d7cc5b4fabac39d4344cee5de103e705010b9f8f4a253d792,2024-11-21T07:52:09.940000 CVE-2023-26999,0,0,0a6e26719d32d20a55674544c2b16e84e883bad504358330da63d67239bce96a,2024-11-21T07:52:10.107000 -CVE-2023-2700,0,1,39eae528fab2c9005417e2728ba40351fd5c31be39110f823a95f3ceafdaaa56,2025-01-28T17:15:14.093000 +CVE-2023-2700,0,0,39eae528fab2c9005417e2728ba40351fd5c31be39110f823a95f3ceafdaaa56,2025-01-28T17:15:14.093000 CVE-2023-27000,0,0,e7632f817e61d8a12de30f7cfd641dc1805aa79e66ef1ddb4d0513ee23d486e3,2024-11-21T07:52:10.270000 CVE-2023-27001,0,0,3ac29dffc9689e6b71694979be6cfa0bad2c5d91addbadb78a74143a10316adc,2024-11-21T07:52:10.427000 CVE-2023-27008,0,0,966e0ad8470614ad457da5ec0fa9421d6ba81c40af729c99be173c8fdbdcdefb,2024-11-21T07:52:10.577000 @@ -221888,7 +221888,7 @@ CVE-2023-28202,0,0,191014a0200c592d291fa5fba60b126bce7fe013f7105ee7dd188bda0cdcf CVE-2023-28203,0,0,4cb19dbc67823a1f2ef0f3a0d6b749db68c9403e1ae6273e5d0d612a7d2831a7,2024-11-21T07:54:35.627000 CVE-2023-28204,0,0,d29b1bc8f2cad26e0d01ee6d8c1150ddfc2761a38a4996cd387e5b09f29ccca7,2024-11-21T07:54:35.760000 CVE-2023-28205,0,0,5c84232494f2fcfdae49b4240e0969a21c90ed06bcedd6171dec390938943816,2024-11-21T07:54:35.903000 -CVE-2023-28206,0,1,666a3e14555d676a13efe3acbe928335c4d89b72343fe44661b875103c70a379,2025-01-28T17:15:12.633000 +CVE-2023-28206,0,0,666a3e14555d676a13efe3acbe928335c4d89b72343fe44661b875103c70a379,2025-01-28T17:15:12.633000 CVE-2023-28208,0,0,8fc033bc09b7b40815121b04865c55bdd349e84c32a87bcecfbf9bec0bf2a61e,2024-12-12T14:26:18.893000 CVE-2023-28209,0,0,ae4ef08c6845cc374897f4c97156cf6614c7c1aa7babc4b8a598ea53ad27998a,2024-11-21T07:54:36.330000 CVE-2023-28210,0,0,0a0bf3ceb4448c02d2ec01f4d787a866c183ef21b5c4e0a2261156a4b2c55497,2024-11-21T07:54:36.460000 @@ -222733,7 +222733,7 @@ CVE-2023-29089,0,0,d85533a74d47c8d2841cf73e04fcac4d562826480d2fdb7ae49c1f88a1d3f CVE-2023-2909,0,0,d1bf84ead080ed8e90f328532d5e1433894dd97c42e77dc617b5e17290a3d612,2024-11-21T07:59:32.860000 CVE-2023-29090,0,0,29d32b8166cdadf0338f1af592d525e8f00355f6737f5b19a267a4eb5199d1b0,2024-11-21T07:56:31.600000 CVE-2023-29091,0,0,29fb982a573d689a1e353a14e8bcfdeb8f73611968f5f342d71177e2e85efada,2024-11-21T07:56:31.763000 -CVE-2023-29092,0,0,2e91689db5dbbfab8452cb801a2778bbd950da4df65dfbc79e477546d8e0d5f0,2024-11-21T07:56:31.913000 +CVE-2023-29092,0,1,78d46fd02421b8fb1a4b0beaff36cb561ac519804476bf8bda47e40c197ff4c7,2025-01-28T20:15:29.033000 CVE-2023-29093,0,0,8db0f3ef581aad0c15089a1d41ee2ea51332d7a374d1f3b78f90753b48f03f94,2024-11-21T07:56:32.070000 CVE-2023-29094,0,0,0b1844e618070b846757399db0685c29737a5f4ff0c735214a0e1051b08654c9,2024-11-21T07:56:32.190000 CVE-2023-29095,0,0,3107a19b7d2a05a7dbb94a58a0adef40fed506d7acf001bcc7db430f18afd771,2024-11-21T07:56:32.310000 @@ -223396,7 +223396,7 @@ CVE-2023-3004,0,0,3397d0ff6d0c8243a1e902db02a3821e65a0625ad95eab454e899fc6a06c20 CVE-2023-3005,0,0,3bba8cacc036632961efeac95189798a09bffe62ba77b928588a5fed8bf055ce,2024-11-21T08:16:13.250000 CVE-2023-30053,0,0,f3bd1468b26518ad8d3304e0e8b887484d598f74b9be177880ff58c73fc48dcf,2024-11-21T07:59:44.783000 CVE-2023-30054,0,0,ce3a10e2e89bc097c6e0a1d7f7c4c67a67ab7f61c38515ebef8f05d7357297ae,2024-11-21T07:59:44.927000 -CVE-2023-30056,0,0,b397b3d3648e6058454619f14740d188995287f1d1d54cb406ec8692a68d3123,2024-11-21T07:59:45.070000 +CVE-2023-30056,0,1,6d95d7c9a372d8253025b83485bbae5471165bbe0390d508b2d82c8663003e40,2025-01-28T20:15:29.300000 CVE-2023-30057,0,0,1097e9c9efa4bc678fcfc635b3ea4a844ea8e292f33ae43e51d6b408894c0f64,2024-11-21T07:59:45.233000 CVE-2023-30058,0,0,a14c637e7ed9b07c2ce1d3897753efad75676fa7cd24b43bab168d6ecf9c03ed,2024-11-21T07:59:45.390000 CVE-2023-3006,0,0,57110f4979d3de6105b8e337e633736e1bd96816739ef045414e50bfe2f4ef02,2025-01-09T21:15:24.500000 @@ -223410,7 +223410,7 @@ CVE-2023-30078,0,0,b59993147a62c797f33e7c496e57076f579e3cbe18fcb581691b3e11b875e CVE-2023-30079,0,0,1864953fe33081a6ea74d96fafa4bcbdbe00bfd5214eb8cad4b963faa87f65ad,2023-11-07T04:13:39.547000 CVE-2023-3008,0,0,b8bd483b2ec70b6ad2626cdc7694f3bc2e5a2939898ff1ee6f945c20cd116aa1,2024-11-21T08:16:13.703000 CVE-2023-30082,0,0,9bb92d956ae82dd34b1e5eff81dd134b18a6dbb5022b10b0299f85bc1e4eed12,2025-01-06T17:15:12.460000 -CVE-2023-30083,0,0,d237da15d0b2a95c9c4c46fd34706df203c3d2e551e0d0053bf138798e83ced4,2024-11-21T07:59:46.473000 +CVE-2023-30083,0,1,8888e61bd828ffb4ab2bc9196072c75f60937c3595712f3dab71d9b2499fbdd3,2025-01-28T20:15:29.483000 CVE-2023-30084,0,0,7552fbb903af88672409296a89ad83fd9ad9d43cf09e45ece4226f8cda3ea36a,2024-11-21T07:59:46.620000 CVE-2023-30085,0,0,8c1db376031a008fa08bd255201efb63329805c701c8606c89bd9a319998c4ed,2024-11-21T07:59:46.773000 CVE-2023-30086,0,0,8f278bd8578fae9ef0ccc8fe776e9cb44e07a988c299c5c62b0c5d5bbb0f6978,2024-11-21T07:59:46.917000 @@ -224222,7 +224222,7 @@ CVE-2023-31122,0,0,775fb6ca489442b871f995b94e395eecdc6cd94f9e7eb529e9f77ce9781aa CVE-2023-31123,0,0,ea5a6bfa14cbab83c854da8d4aca838cc24c3e204831291f3a9eee8f9ee2648a,2024-11-21T08:01:26.327000 CVE-2023-31124,0,0,ad27b593c9f2559114b4239ee25e39a511e90690f6539697b08032a62fd968ad,2024-11-21T08:01:26.447000 CVE-2023-31125,0,0,2c3705123695b57bd770ec9bc6bec7c7cfef71a0e74612fee3cf57263e396c91,2024-11-21T08:01:26.583000 -CVE-2023-31126,0,1,e7eb1dff8e3acdcd8c08b5b69e4b83b62af9843dc93cff36b018f5426612c998,2025-01-28T18:15:31.827000 +CVE-2023-31126,0,0,e7eb1dff8e3acdcd8c08b5b69e4b83b62af9843dc93cff36b018f5426612c998,2025-01-28T18:15:31.827000 CVE-2023-31127,0,0,70d9f4cc3954ea14223e59b4ee7cd4b42fcf31ee80507713112e1c8ff29c984c,2024-11-21T08:01:26.830000 CVE-2023-31128,0,0,e942d94fd4df2eab25192122c1ab639422fc4c02fcf672751a32048d8943a973,2025-01-14T20:15:26.653000 CVE-2023-31129,0,0,823f30525b3a4d1eb0d70ecfb658c34099f50df7fe396f436fdb9f80fa46b6ac,2024-11-21T08:01:27.083000 @@ -224634,7 +224634,7 @@ CVE-2023-31761,0,0,c57341aba924ff1aff3fc07fbbcb36e447d1450125869ef758718f7cb2a2f CVE-2023-31762,0,0,532d0e70760fe217951cfb4965d85bd3fc3a6855eabc78cfef04cbef357982d3,2025-01-17T20:15:26.797000 CVE-2023-31763,0,0,706e05d2d51a686562a1101f8bd8dcfea6102f1ec5076cccd54be2f7389c13d2,2025-01-17T18:15:22.763000 CVE-2023-3177,0,0,f3764f4c236d0ab0117ed89ccad93e42a68d1a0bf6301e7696daca10e17bf0f4,2024-11-21T08:16:37.877000 -CVE-2023-31779,0,1,d83ed5b350578db6ddd3c21b782cc400b6e2d20a7ddec8521be0a0404c73acd9,2025-01-28T17:15:14.843000 +CVE-2023-31779,0,0,d83ed5b350578db6ddd3c21b782cc400b6e2d20a7ddec8521be0a0404c73acd9,2025-01-28T17:15:14.843000 CVE-2023-3178,0,0,3137810340e9e86c4c3b5db496a9f5d0dabc9dbc8cd8490fceb40dfc4e419573,2024-11-21T08:16:38.017000 CVE-2023-3179,0,0,1232ae4c9719e6d16d77eea1af5631a06d487115eb4166670d2bcfeeb5adf5fb,2024-11-21T08:16:38.150000 CVE-2023-31794,0,0,8ae5e5ef16681fb440aeba37cf49e46015866fac220db6443a40bb1cd627e505,2024-11-21T08:02:15.753000 @@ -224644,7 +224644,7 @@ CVE-2023-31800,0,0,af6ce8518ad24ea6710bf61afe7d846aadd9ce7ee7c03f64251354ea9dea8 CVE-2023-31801,0,0,13ecab2491d6df94e55dde8f3c37f05217a38b6649e753d445e5caf8b2bd281a,2024-11-21T08:02:16.170000 CVE-2023-31802,0,0,f0728119a871e0027ecea2b0a581fa9f335ffdae83f4194131ed673e7baa1470,2024-11-21T08:02:16.310000 CVE-2023-31803,0,0,800ae3c57d9288a134a1ea859a6f85039e2c82a3a7f17be54a3e49f209338f2a,2024-11-21T08:02:16.467000 -CVE-2023-31804,0,0,7e3cd2630b8abf5690ecd6cdd7fa2a627cd8cee44b2e01078085e9742a22e02a,2024-11-21T08:02:16.610000 +CVE-2023-31804,0,1,5cb1d476c1c8df09517ccb8636302ef3d00d168a6cc1e7e3db5dbfd871586c55,2025-01-28T19:15:12.820000 CVE-2023-31805,0,0,a85b70a2e43a651d059757e2e3cbdc6001b49a95b69b7027ca531ba7c2f429f8,2024-11-21T08:02:16.740000 CVE-2023-31806,0,0,776868ba1c7234e5d033ad4f6401b2f8c7396411a3eec3d1a962b69c16581ca4,2024-11-21T08:02:16.873000 CVE-2023-31807,0,0,767b5f080466fa8df5df923ded96cba99455e65929a37edf8f27f16c63dcd589,2024-11-21T08:02:17.007000 @@ -224652,7 +224652,7 @@ CVE-2023-31808,0,0,4b91e1f555e81a8997ddae2e290898c6d0be80669ff94777a810f5c7a28d6 CVE-2023-3181,0,0,f85113ad48f7de9b5138016b5a769db3ba1263ef4e9bd2ae1e4348037f618738,2024-11-21T08:16:38.460000 CVE-2023-31813,0,0,8e8fc395bcbeac8e899865e7f66dbb1c6df21b82d10cdc9a327fabcc1831a1ae,2023-12-16T02:15:07.263000 CVE-2023-31814,0,0,63e15e3e48004d4af1bddab36ab4ec66f76fbc3890eef88216b584ab5e7988f8,2025-01-17T18:15:23.030000 -CVE-2023-31816,0,1,c7bdc561f4ea752af0182c7f12a56910b1ac3d783b4e6fe4968c0c45b806f02e,2025-01-28T17:15:15.123000 +CVE-2023-31816,0,0,c7bdc561f4ea752af0182c7f12a56910b1ac3d783b4e6fe4968c0c45b806f02e,2025-01-28T17:15:15.123000 CVE-2023-31818,0,0,e2293c2ab2a56409b4ddc5add2c2e04bfaa690b925948f5dfb2f11b0fa3fe3f6,2024-11-21T08:02:17.570000 CVE-2023-31819,0,0,f8ffea9ec7bbc711c06c9fb7fdeb8d6590e2c99b3e86e7a8fedc11e5f8dc25dc,2024-11-21T08:02:17.720000 CVE-2023-3182,0,0,3b2300229ec0aa5997ffefd1e9635c473cd54cfbacdd0f3d9a3acc08e6324f20,2024-11-21T08:16:38.597000 @@ -224698,9 +224698,9 @@ CVE-2023-31903,0,0,a3023f52d7e22480a288e446117b00904a8b5413bd2b31816281c6bab2ecb CVE-2023-31904,0,0,f318ebe4f1e995c606297cf984e3deb2bb7dae615c713345d091fe18a45204b8,2025-01-21T20:15:30.193000 CVE-2023-31906,0,0,aadab67cf767d0d7f94f9b2c6c9fcb1cc155aada60b8b6a419a0d0846b6786da,2025-01-27T18:15:35.793000 CVE-2023-31907,0,0,9fe5dbd79634a9bf43f4e546c4e8c73a027608e875e37a97a027eba41bfaf8a9,2025-01-27T19:15:15.597000 -CVE-2023-31908,0,1,0a37c183f632b652857446a16f8ecaf497f89371a1f2ffe9017b21b2d4282f3c,2025-01-28T17:15:15.367000 +CVE-2023-31908,0,0,0a37c183f632b652857446a16f8ecaf497f89371a1f2ffe9017b21b2d4282f3c,2025-01-28T17:15:15.367000 CVE-2023-3191,0,0,6d5b8163594269d541d9b945b744164903108dc6d9fb58a1266c95089a1b3503,2024-11-21T08:16:39.710000 -CVE-2023-31910,0,1,34e768ed9cfe290cba6bc32f50fefc981e1c4f4f4d71cc7fc25c001b75aa33a3,2025-01-28T17:15:15.610000 +CVE-2023-31910,0,0,34e768ed9cfe290cba6bc32f50fefc981e1c4f4f4d71cc7fc25c001b75aa33a3,2025-01-28T17:15:15.610000 CVE-2023-31913,0,0,6b18f7f06cc36e42afc3182bbc9134d703327b78c9c0a6b1735d70a7dfcf3c0d,2025-01-24T20:15:30.967000 CVE-2023-31914,0,0,a76467eeb22d8403ef01085642d9d400a725a2085ae6416fdd6af063ecc8f93d,2025-01-24T20:15:31.147000 CVE-2023-31916,0,0,b2ba581a50a8b818d1f24ebba35e6212bc03e423016659d3acf4da3cd3b0f54d,2025-01-24T17:15:14.200000 @@ -224736,13 +224736,13 @@ CVE-2023-3196,0,0,d9b74784bc7d9de14374aeeeebebc3ddf62cc6edcb1cdf15b53d8b927a02c1 CVE-2023-3197,0,0,2d2e228fa09a2cb7e9c716d1dd42b1ee0f8a840566c154f582461284f14d7376,2024-11-21T08:16:40.487000 CVE-2023-31972,0,0,4c381c0d0cc489fc90337811824d6e246d546c134e95dd0e4281ffe93a045819,2024-11-21T08:02:27.123000 CVE-2023-31973,0,0,6e6456171b37f2aaa7526d83df1ab82731bec2c18d070bee86a23239fc3d74d5,2024-11-21T08:02:27.260000 -CVE-2023-31974,0,0,4d583d06bda5fdaffc79c237eefd93fccc2429ff658f523872f16b19377927d9,2024-11-21T08:02:27.473000 +CVE-2023-31974,0,1,3ffd996cd56c246f73da803263bf054a81dfca920177bd51e1c810a3441bbf56,2025-01-28T20:15:30.003000 CVE-2023-31975,0,0,28b90207c43a24d10a54e70cf5bc0be424f3d9cc362fd41b85a6d4489464641c,2024-11-21T08:02:27.610000 CVE-2023-31976,0,0,a897a1e839bbc6dcf8baaa5bf238a96d494424ea15f869705f8885d9aa51fa2d,2024-11-21T08:02:27.783000 CVE-2023-31979,0,0,d300b44c03bc1c129975cbc0d8f58f0c399ebe733b11f42ec3f8f064dd4e0d42,2024-11-21T08:02:27.920000 CVE-2023-3198,0,0,515e3ed81d0edcf31d10aa5b94b3e10f747e5dbb4ce6303dd1e49d134c7cf2c9,2024-11-21T08:16:40.660000 CVE-2023-31981,0,0,666b12d5370a553f075d14d658af721536fc52e7bd665f1afa358898f4b1824f,2024-11-21T08:02:28.057000 -CVE-2023-31982,0,1,646e17213b0b411a32af49a01a8beffa5c8830249db5358a3ccf04591da6b7bc,2025-01-28T17:15:15.850000 +CVE-2023-31982,0,0,646e17213b0b411a32af49a01a8beffa5c8830249db5358a3ccf04591da6b7bc,2025-01-28T17:15:15.850000 CVE-2023-31983,0,0,4efee5b350d93dfdc4cbfa54d890ec60308fe93855ac908b64e93cedc1b42ef4,2025-01-24T16:15:33.787000 CVE-2023-31985,0,0,8651d59591b6d83f709711685ce799ddf56471be269aa9f26e57da8fd2cfafe2,2025-01-24T16:15:34.033000 CVE-2023-31986,0,0,a86388d12941ca26b2d9e93a6377a46e4cc009c4dc5a8370e0cdf32ce5e6b976,2025-01-23T20:15:29.883000 @@ -226012,7 +226012,7 @@ CVE-2023-33291,0,0,98a73c5a299c04428af908a2bd26a9c74200b238c366aa50af50fa19f5b47 CVE-2023-33293,0,0,cfe60fb4dee332098bb146cbe5bf0bcf3e4a3808e6a5a29d7ca64da2b297f396,2024-11-21T08:05:21.227000 CVE-2023-33294,0,0,67e4e087f87956f02c241439994f50b66633d486e428257c08fea9d29c8f1928,2024-11-21T08:05:21.393000 CVE-2023-33295,0,0,b39ab5e6e701a543c377db1fc8e83478ec93c62322fa6d291ef9af194c9c3e82,2024-11-21T08:05:21.550000 -CVE-2023-33297,0,1,cd9d50ccb82068af339967e8b83fbca7481a158822d6c7da9af2b74a717aa839,2025-01-28T18:15:32.103000 +CVE-2023-33297,0,0,cd9d50ccb82068af339967e8b83fbca7481a158822d6c7da9af2b74a717aa839,2025-01-28T18:15:32.103000 CVE-2023-33298,0,0,e6807bb120ed528f6bb6a498cf3fde144b5e9bbb47f26a66ce325564392ac08a,2024-11-27T17:15:06.230000 CVE-2023-33299,0,0,27187b22bcf5b692e8c22c11eab27d8b578f609f08467595ce9608c2ca052fd6,2024-11-21T08:05:22.070000 CVE-2023-3330,0,0,79701b2c45499bdd043c812cb833ad5abf5c67d1a07608a303232abd8861bd69,2024-11-21T08:17:01.777000 @@ -235205,7 +235205,7 @@ CVE-2023-4574,0,0,2bd07f1604111f58b955fec3d55bc53098ede40a2810e7f595f8038daee654 CVE-2023-45740,0,0,1e75a1fafaf1ea81b7aae27a54c3ccccc7b12b9476126bdb28670f05e1ab052f,2024-11-21T08:27:16.987000 CVE-2023-45741,0,0,ae46c6e6dc9fc9986ac7f3ef68667fd290a9e00ed5c2397ef7e3906173fba358,2024-11-21T08:27:17.107000 CVE-2023-45742,0,0,424b3b687184cc66ed363f44f7235fec7f8365e35ded73cd84c847ad39a5d951,2024-11-21T08:27:17.230000 -CVE-2023-45743,0,1,a7ecb0d4645afc6024724ec3e62915bdbe9250eb40baa9d0f0b206851cea4af3,2025-01-28T17:37:52.427000 +CVE-2023-45743,0,0,a7ecb0d4645afc6024724ec3e62915bdbe9250eb40baa9d0f0b206851cea4af3,2025-01-28T17:37:52.427000 CVE-2023-45744,0,0,53c0556ca940959fc5d73afaf67665d38debb63703247d8f816d6a2a8cb2b863,2024-11-21T08:27:17.497000 CVE-2023-45745,0,0,1904f27d1096debbcbbee99a874397c5ca6986feaaf777646bd8358fa305421c,2024-11-21T08:27:17.623000 CVE-2023-45746,0,0,28000d3f2f072b911541906685719c47e23a0d51142df750bbb32a543ba6e18f,2024-11-21T08:27:17.743000 @@ -235740,7 +235740,7 @@ CVE-2023-46394,0,0,15a2be266882ce5c7996f06599828c0429faf292e647b8839449e98272146 CVE-2023-46396,0,0,bb4fd6eafc5e30939b253d28c3e2b3924dc41a01338566a01d248def0231db21,2024-11-21T08:28:26.537000 CVE-2023-4640,0,0,ed87e5f4e497c402b3df3f1a5218899f4400a69977f8db760ed9d0e7a2c9a13b,2024-11-21T08:35:35.697000 CVE-2023-46400,0,0,16632e3aaa7622a4553afaf2c4a313997dabfa16c487987445350e26eecc26ff,2025-01-24T20:15:31.663000 -CVE-2023-46401,0,1,182a212b6863a152807c1d8ebcb9d32de1557c3e8663ff927c964131e493d7dc,2025-01-28T17:15:16.307000 +CVE-2023-46401,0,0,182a212b6863a152807c1d8ebcb9d32de1557c3e8663ff927c964131e493d7dc,2025-01-28T17:15:16.307000 CVE-2023-46402,0,0,aaa3ff7a897d6cf9e33dcc787240acf7209bc0069ec2781169e797f5937f8833,2024-11-21T08:28:26.690000 CVE-2023-46404,0,0,244272f7668dd1e0a9457a738847246c64d5c278ad9643e94570e35173b604fc,2024-11-21T08:28:26.833000 CVE-2023-46407,0,0,d6e8ac167c972268f692c22c875fda8a199da0dab23b54b173e8a98d59734b57,2024-11-21T08:28:27.067000 @@ -237594,7 +237594,7 @@ CVE-2023-48773,0,0,69c2d10ce53d5bed5abbbabd5452f88c034b79ad27513b7475e9a369aba8c CVE-2023-48774,0,0,df67987526796cf9139d3a58e2031842a7b4119a36678e2120d6525442d00f66,2024-12-09T13:15:33.937000 CVE-2023-48775,0,0,fa9fe58a38a9119748279127f270d1ac54cb2b2cc1527bcfb3bd7dca7deb38b1,2024-12-31T13:15:05.650000 CVE-2023-48776,0,0,60422db6013f51551677e22d94d4d864bd4aac472b3cb692bc594e8b25dde16d,2024-12-09T13:15:34.077000 -CVE-2023-48777,0,0,da2fb312c81f4d39e1f6b619e89a76e40c7e69d7c2693339a128d1645085873b,2024-11-21T08:32:25.547000 +CVE-2023-48777,0,1,b0a93df6a0e18e79dba0cb647c4faeffcb98e189411bc565757fca1aa71f049e,2025-01-28T19:20:32.813000 CVE-2023-48778,0,0,65cedce3479eb1a4b909913b713ad810f6c269d477fecb40f5921fedfb5b424e,2024-11-21T08:32:25.667000 CVE-2023-48779,0,0,ad26cfd6164ac54f543ef8fcb8307e29b6d3a58bbc35c290479288585f2a9880,2024-12-09T13:15:34.210000 CVE-2023-4878,0,0,47f789f232cb16fc017c697089a246311874c0e5f962f77cee0a6f5aad57d8ef,2024-11-21T08:36:10.537000 @@ -238712,7 +238712,7 @@ CVE-2023-50377,0,0,2e55e5dd0b9ea749ddd96251ca5ab5ff90e2e8f4b180745130261f7bd6023 CVE-2023-50378,0,0,0454eb883a7466b810642c469a3a15f6ba9e92155bb9f1e7524280e2f82c443b,2024-11-21T08:36:55.923000 CVE-2023-50379,0,0,465b9ef3245385cb0e3864f75d17a3bc17c56278d0bda52c13989cf1c4f66bbd,2024-11-21T08:36:56.110000 CVE-2023-5038,0,0,0c14545fbe065a76fb3622ab72cbbe110aa299cbbc565cc917bde9e771ff322c,2024-11-21T08:40:56.980000 -CVE-2023-50380,0,1,10e4077eaa20a176223f03a5a0f054d0a8f1af1cb7012e81cb447562909ebe22,2025-01-28T17:44:54.047000 +CVE-2023-50380,0,0,10e4077eaa20a176223f03a5a0f054d0a8f1af1cb7012e81cb447562909ebe22,2025-01-28T17:44:54.047000 CVE-2023-50381,0,0,ee7d57e36ca60df4250d44e574938eb8ddcf3bd310f31deb1c9d78f7fa4c00b0,2024-11-21T08:36:56.433000 CVE-2023-50382,0,0,cbcc81630f09b2c4cfb0c22d8dc9844a60d0e20289efc5af82ef418493cd09c9,2024-11-21T08:36:56.563000 CVE-2023-50383,0,0,e859d76f4d38e71520f31d9bb502fae7a56c4ad7c8e60650734d136fd3214959,2024-11-21T08:36:56.687000 @@ -241481,7 +241481,7 @@ CVE-2023-6210,0,0,02c9290708fde95949b1ca151f139c7c9b43a2860ff7716fb8f4c4c67f645c CVE-2023-6211,0,0,d92c46b01202ad02f1d65f49f37de45debc7ccbd90a49f886a3603bf953d5a13,2024-11-21T08:43:22.777000 CVE-2023-6212,0,0,e9cd8209e77de729765985589d614d64d3b20aad5238302e5d7e04d402eddb50,2024-11-21T08:43:22.893000 CVE-2023-6213,0,0,69c26f6e0d3c3ec1f9e8e383df5c98725fada25a86e2146248059d9eac690155,2024-11-21T08:43:23.027000 -CVE-2023-6214,0,0,5f6bcb33c9de70af0acb1d90a2ef6271d5e6b5583c9dbad33ee4a121cbafe090,2024-11-21T08:43:23.150000 +CVE-2023-6214,0,1,388f603da21edb792f4384dfd717a62e7eaf2c425137df621a2f7ce84c952a94,2025-01-28T19:28:35.700000 CVE-2023-6217,0,0,9810ecf6c59d7329e827cb6762f25b7a286bf752aa3fb224aef47a9922d524e1,2024-11-21T08:43:23.267000 CVE-2023-6218,0,0,6b136ed227e6d9a106a997506bd0ab6d1193880266b28ad779eecdafbfc0d320,2024-11-21T08:43:23.390000 CVE-2023-6219,0,0,234e803ae44ea198b1c5cbc3f7d287ef9f28d26cb17bcbe2e74596b21799789c,2024-11-21T08:43:23.520000 @@ -242474,7 +242474,7 @@ CVE-2024-0040,0,0,482e23ff76f3327407e40e3d508d01e97e22ee3b05630d7571f0b9bc84b628 CVE-2024-0041,0,0,30f391e32967bb0baf25d8a5436bac2e10d105d6b34926d3751c53b398bda865,2024-12-16T14:47:50.477000 CVE-2024-0042,0,0,7265bcce4e87025566b81559e9a2a904d94427e17ed2d8159b49b70351e50b78,2024-12-17T16:47:02.183000 CVE-2024-0043,0,0,9c5415d367b2b00fbb658ba49909a69019febd5394910268036d8c799fd4ab53,2024-12-17T16:47:21.967000 -CVE-2024-0044,0,0,7c8a4839c2df19abeeef8e0c01f0e50a286efe78d2cfd1756a2fe162cd4e15cd,2024-12-17T15:50:36.227000 +CVE-2024-0044,0,1,390eee44c5719eb873a39ca1024261a0f80c6eacd2c165a8bb8bd19adf315b80,2025-01-28T20:15:30.207000 CVE-2024-0045,0,0,79d340372a8bb81ede9a0a5d782b03df861935527e1c69e6ad93b624934fbb31,2024-12-17T15:41:13.637000 CVE-2024-0046,0,0,d4f36216fab9e1ec2581ea3be4963a14d313be96285938f258349eb3ea9d310f,2024-12-16T19:50:16.587000 CVE-2024-0047,0,0,7dc617adc08be9f641c1e332a4f76abbe58d0e1d5c3bf8c9b4fcfd4d9ad9ba53,2024-11-21T21:26:15.987000 @@ -242830,7 +242830,7 @@ CVE-2024-0442,0,0,2ff92b8b200597432f6da5c6788d273b9eceb23b02f2972bbbcd8fd6e4cd3a CVE-2024-0443,0,0,aeba6274837992658e2c4b7edb27871e8468430250a040ff0202a08869d47769,2024-11-21T08:46:36.010000 CVE-2024-0444,0,0,e6663164bed0caa54a1cce1846baba77384cf71afcffd2a64cf92ab0d873e3d8,2024-12-27T18:57:15.007000 CVE-2024-0445,0,0,7bdf4aad36e4a762070f2d5a62a4b8c11814b769ee88b7035b4639eded1b0516,2025-01-27T18:41:19.177000 -CVE-2024-0446,0,1,3ef7e61ab623d333e19b04500db233fcec1c53b9017a80b0455c72635b130598,2025-01-28T17:15:16.593000 +CVE-2024-0446,0,0,3ef7e61ab623d333e19b04500db233fcec1c53b9017a80b0455c72635b130598,2025-01-28T17:15:16.593000 CVE-2024-0447,0,0,ef82dbacc24448559fe1360e1922a6f76a74074d981e7a70149369df2daa3ad4,2024-11-21T08:46:36.667000 CVE-2024-0448,0,0,9120a64f9c77d8a38d373d6fe54e6100ce718af346116758489835a3dad287da,2024-11-21T08:46:36.780000 CVE-2024-0449,0,0,8854cd54724d4c1c1b7e946964875052779b5112bde9aaed91a265191b2b3659,2024-11-21T08:46:36.907000 @@ -245177,7 +245177,7 @@ CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669 CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000 CVE-2024-12083,0,0,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753fb3,2025-01-14T01:15:09.267000 CVE-2024-12084,0,0,85dd725fc2f0b24c79e999378b1f0199fad5fe5d164b31609c57a84bcb434c0d,2025-01-15T15:15:10.537000 -CVE-2024-12085,0,0,361e9a9925e6779c2e5182f87b38769550d7e2123100d9311b38d13009c01154,2025-01-28T08:15:28.440000 +CVE-2024-12085,0,1,0b3f67b146b5cf234037ad71331d36ffee2667252d390f670b9aee26d30279b7,2025-01-28T19:15:13.630000 CVE-2024-12086,0,0,e5130c03152639985c3e2f822b45f241716bd573825b1ce309364a23fc10467b,2025-01-14T22:15:26.370000 CVE-2024-12087,0,0,083db16c2a7b9baa1b397fd2cd269bff2aa8f7c2646d1851d134f1f8a052e34a,2025-01-14T22:15:26.503000 CVE-2024-12088,0,0,789608af69629f4130f54998ea59694fde701c19a329a9d8093e26a51277e55d,2025-01-14T22:15:26.600000 @@ -246212,7 +246212,7 @@ CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc2 CVE-2024-13467,0,0,bcd6474463b1a69c9a46d9b4d6f6f02b302b85f9777a4b31585c7467fbf3f38a,2025-01-25T08:15:09.520000 CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000 CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000 -CVE-2024-13484,1,1,3470041962a22ff8db31f15e868d05773e5221f6098e510ca6faf0e8cdc6b349,2025-01-28T18:15:32.537000 +CVE-2024-13484,0,1,712c057c7d39146a8afa657b40a8d67e5499db561a28666fb52dbcced8221de3,2025-01-28T19:15:13.753000 CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000 CVE-2024-13495,0,0,7a8bc062291cac2ab3dfb8a0fb7feeecd31abf131df44b7d6a18b1140227b207,2025-01-24T20:46:53.307000 CVE-2024-13496,0,0,192a8533534e044b339576d96e9cea7e19a2bbd248a7b183889cec35656a4f79,2025-01-24T20:45:57.463000 @@ -246408,7 +246408,7 @@ CVE-2024-1508,0,0,fcb12e81603518991b3714d0146406aa3ba4165f2bbbda4d728b388f1cec3c CVE-2024-1510,0,0,c76f27d463e131a290976dcdb39e753c0c1cc63cd998480dfc45ef7b6e61c01e,2024-11-21T08:50:44.030000 CVE-2024-1511,0,0,b11b362f2acbc196f43a92e45bae6b3316a9a34999d9162dab309d4eea0f751a,2024-11-21T08:50:44.160000 CVE-2024-1512,0,0,26a89e8ea4daeb69acb8ef0a5290d443e1fbb4f0997b4751a3c4b63986c14001,2024-12-18T17:23:15.360000 -CVE-2024-1514,0,1,d48ad0f68b905db26eea1aa20744620a566afbd3308a47eaec63aadfb7f0edf5,2025-01-28T17:50:30.417000 +CVE-2024-1514,0,0,d48ad0f68b905db26eea1aa20744620a566afbd3308a47eaec63aadfb7f0edf5,2025-01-28T17:50:30.417000 CVE-2024-1515,0,0,a3add1da137a72880095a1615a74b53662a1751b21dec935a7c4b7d184dd4113,2024-02-16T18:15:07.820000 CVE-2024-1516,0,0,ae0dda1e388fbe9bb68c26e49d1e55447c78bca551e4128fdafd45f882514681,2024-11-21T08:50:44.537000 CVE-2024-1519,0,0,ef8db52d6697b00e9b63b12b86b1ca9a8ef9f7b004809c241d596d1b84437d97,2025-01-22T16:38:11.330000 @@ -246452,7 +246452,7 @@ CVE-2024-1559,0,0,c17b64cfd0e83b2d4fb7ab79c711db870f119c0c741a43bc21718babeeef90 CVE-2024-1560,0,0,8dd9abc0c577440971d225dbc6a8e81069010ffa8a7a8e97c3dc513e9885573f,2024-11-21T08:50:50.183000 CVE-2024-1561,0,0,9457196c919808e64e590d1e9a9ff260bf5140b029d38454414502236a9f1f29,2024-11-21T08:50:50.303000 CVE-2024-1562,0,0,7bced421d9d1c5ec08794008917f5dc4be04ce09fa4c889fd9ceda829269300c,2024-11-21T08:50:50.427000 -CVE-2024-1563,0,1,6793d0a12b61b4bac1ff66a2c864b448499a7b8ce03c21bccda3674836e700d0,2025-01-28T17:39:20.570000 +CVE-2024-1563,0,0,6793d0a12b61b4bac1ff66a2c864b448499a7b8ce03c21bccda3674836e700d0,2025-01-28T17:39:20.570000 CVE-2024-1564,0,0,84ceb93463fa25d921ef01feb499d06d312a061c27da82d4c95abef3e4e86329,2024-11-21T08:50:50.673000 CVE-2024-1565,0,0,00fc6a5125264a59a67555b8c8202352f41a7d44a1f5f9ff79d0346bf16d4f67,2024-11-21T08:50:50.860000 CVE-2024-1566,0,0,4ac720135761f12018d810740b03599e211c6d2088b3ec7481b0c1665640c9db,2024-11-21T08:50:51.007000 @@ -246477,7 +246477,7 @@ CVE-2024-1586,0,0,144006dc8298658f36c42ff60c9cadfbdad98ca8bc7a054017cbeac82a094f CVE-2024-1587,0,0,0cff38464f774ff9b10376db58b2d57a0e75f7ce9a5aabc4bb410f90a081be1f,2024-11-21T08:50:53.557000 CVE-2024-1588,0,0,064c6c0dd6f975ea15e06fcb223479e78a68292a40c160ed7cd24d23d617f190,2024-11-21T08:50:53.673000 CVE-2024-1589,0,0,1931589006a4c51bc1b5b6052d50e4e25fdb31d7b1487761957f59c98cc0a546,2024-11-21T08:50:53.787000 -CVE-2024-1590,0,1,6d9b04d7b981210b45fa2f9cd9264abc183d984b67f454db5f762b263d057df6,2025-01-28T17:32:02.713000 +CVE-2024-1590,0,0,6d9b04d7b981210b45fa2f9cd9264abc183d984b67f454db5f762b263d057df6,2025-01-28T17:32:02.713000 CVE-2024-1591,0,0,fdacf83330a01a977bb97372c215a2802e538c5ea7c288c69493936a1bb317d5,2024-11-21T08:50:54.090000 CVE-2024-1592,0,0,22e091e91f9551746ee97464de3b99184eb3e5de07904bb056b791931902b874,2025-01-16T18:44:36.740000 CVE-2024-1593,0,0,7feac5f0a5cadbbf58b4c0b31b75dde3c63971b255bbc39c231bcdd5c3a47e80,2024-11-21T08:50:54.320000 @@ -246666,7 +246666,7 @@ CVE-2024-1790,0,0,3a79f763660fa01aa4e9e14b4bfe838dd8ad674d5888cd672cbe685b1f521b CVE-2024-1791,0,0,790165eac04c41eeaada5a69f38b45865b25fcff13de4477996f4823948e4dd0,2024-11-21T08:51:19.037000 CVE-2024-1792,0,0,5c91c39087a11a285932b6df2f786b9ee27b789c298d617daf628ee7a5671929,2024-11-21T08:51:19.200000 CVE-2024-1793,0,0,1247321dd371ac163a2d163c7822069c7d100252b9c561f2f44a64adcc334d96,2024-11-21T08:51:20.010000 -CVE-2024-1794,0,1,3f088b1fd94616444859b14a55400372064f248f46015ad0daa63ebd323d0a5b,2025-01-28T17:23:12.147000 +CVE-2024-1794,0,0,3f088b1fd94616444859b14a55400372064f248f46015ad0daa63ebd323d0a5b,2025-01-28T17:23:12.147000 CVE-2024-1795,0,0,4ef4dfd797803f3a4d665ee53166b7f9d7037f714f2f1a9c25a5d71418cad4cc,2025-01-23T19:27:09.377000 CVE-2024-1796,0,0,68e9ddfacf3afc0af79bfa53830daae380aee08e50d59d0729da4a8eb41d2478,2024-11-21T08:51:20.390000 CVE-2024-1797,0,0,183002d6382a038d76709953f57646b35469fe82c13c2541a9bb1173360c659e,2024-11-21T08:51:20.520000 @@ -246738,7 +246738,7 @@ CVE-2024-1866,0,0,b664e93f02eb3409a7f947b52c90652e506a03ffc3ea2701191144838f6db8 CVE-2024-1867,0,0,4e12d0852b28f992e23427cfbaa926d6a44817b7dffab20633169a35f375d8e6,2025-01-03T20:47:30.137000 CVE-2024-1868,0,0,83c67024374f71918a9df0f8b29be6dc72b544ec466a440d982e855d227963c9,2025-01-03T20:47:05.937000 CVE-2024-1869,0,0,f8c69f612e814c4bd9b0f3c1664eca33f449de845c31ce2038b5c1d00298a8db,2024-11-21T08:51:29.133000 -CVE-2024-1870,0,1,3f149c457e935bdda85e43595e1b93659a191be053c8a4f915679b91b527080a,2025-01-28T18:13:19.037000 +CVE-2024-1870,0,0,3f149c457e935bdda85e43595e1b93659a191be053c8a4f915679b91b527080a,2025-01-28T18:13:19.037000 CVE-2024-1871,0,0,ee81c97983aa7443f5b5c8df7b73a58bc5b442ad6448ba9043e72031ddc435ff,2024-12-23T16:33:20.680000 CVE-2024-1872,0,0,ad000dac8ef2496ce597bea5013bb4d9bc4a26c36c7428589e16338d8f525adf,2024-11-21T08:51:29.627000 CVE-2024-1873,0,0,a265a1d37162e1ced49567600aa7a85cd5a363ca73d2786d74178f5bd173cc9d,2024-11-21T08:51:29.750000 @@ -247535,7 +247535,7 @@ CVE-2024-20836,0,0,1cfb139c5fb15644ed863a471c42220304cb4d42cf03f8dad6e2f163b2928 CVE-2024-20837,0,0,1ea011c20c86433e1c029228a453e044085a95c2512bef655a258579d60b71a3,2024-12-23T16:29:57.827000 CVE-2024-20838,0,0,193a829a6abad700065cea67ae6d6da4eeca804ff07b3f78a7faeb13b32a7f01,2024-12-23T16:32:27.623000 CVE-2024-20839,0,0,0dad1e579794cb822858fc7ebd1b2881483c934995edeb7d585b194dfae8079d,2024-12-23T16:33:22.507000 -CVE-2024-2084,0,0,2e40ba3b9cc7edf04b201d0c0262dc909bc5491ebe21e1ebb4a3d7029d2395e4,2024-11-21T09:09:00.623000 +CVE-2024-2084,0,1,84be56f3117849cd0550ae8ef2dfc84e39601b1de1af7c967911547c2487dddc,2025-01-28T19:27:44.577000 CVE-2024-20840,0,0,207567d3518e4e0e6d1c96900c417915f9a3790743557a4f0f1dce6cd2f27677,2024-11-21T08:53:15.390000 CVE-2024-20841,0,0,4053c739c188c4b176a35a8fa2e16319a04cc752f349d61c40ff8d8ac8883c65,2024-11-21T08:53:15.503000 CVE-2024-20842,0,0,6fb79e2268b97e65756cbd5ade232276cfe51b41a89d06fad53a11a9ab8651ac,2024-11-21T08:53:15.610000 @@ -247546,7 +247546,7 @@ CVE-2024-20846,0,0,bc4e3fe1d50b31f61b6ac1da5770d0c4dff063a4417ff487ea47947485a28 CVE-2024-20847,0,0,57318bd88c923081f6d381fb4f5c100e7e50c82e6140bd69ed80aa961c5b4273,2024-11-21T08:53:16.147000 CVE-2024-20848,0,0,76b8aebe2905b056865c6c0fa1c2e6bcdf4e740ce81db55fdd3aab14598caabf,2024-11-21T08:53:16.253000 CVE-2024-20849,0,0,a73545b74afff54f13d51b7a5641ad3675049c12eac4aea829ffa7cf418fbbee,2024-11-21T08:53:16.370000 -CVE-2024-2085,0,0,8fa6cad8404917da0aa417af19e0e7bf0d6dbfe20e23634b6c499527033f04c8,2024-11-21T09:09:00.743000 +CVE-2024-2085,0,1,1db3a54c8307495e311c7c78ac150ad661c01218fb44cce083981ea17f7c4e23,2025-01-28T19:27:14.843000 CVE-2024-20850,0,0,97a54f55ccc9fbf195322d9227a778c55548e1d783b11b773c4adcc2f8897573,2024-11-21T08:53:16.483000 CVE-2024-20851,0,0,35a513acde1e6621ca1425ee6ddec43d9098535ab1322b3aa397b5c2494dea2b,2024-11-21T08:53:16.597000 CVE-2024-20852,0,0,8673afaa1d4ca323d012a77e1a19bb7fa65ca513d00b5410776b96de94a41877,2024-11-21T08:53:16.710000 @@ -247916,7 +247916,7 @@ CVE-2024-21196,0,0,c09115a9c3d33c01e7962ae18835b5d9480efc2e7ae28d629a08afd0978ed CVE-2024-21197,0,0,4714519a65d14fa8d4fea5ce4608dffe4c7e68af6a036065aee47618e64253f7,2024-10-16T20:48:51.590000 CVE-2024-21198,0,0,1706f048845f31e4047a8593f5b5788106716f057c9bc3abeb4f55d89c90fe97,2024-10-16T20:48:23.717000 CVE-2024-21199,0,0,f0424484aecf7099f0bedb70cab86e537dad23819f94d2fe1202f5bc6486026f,2024-10-16T20:48:06.233000 -CVE-2024-2120,0,0,fb48ad04efc070a848d26549757ee7d461978d6def9529f0efebcdb9859e1e2b,2024-11-21T09:09:04.350000 +CVE-2024-2120,0,1,97f83d97687dc11c3f08225df181cf8dbf8b4720c8a9fe5e972062c01d6136c9,2025-01-28T20:31:11.527000 CVE-2024-21200,0,0,2f122e998cd9b5cc1d47decd6a3e9c5c01911ad36b3575e08aa6f8c0007bcd19,2024-11-21T08:53:57.940000 CVE-2024-21201,0,0,bf402ba1a290f3d7a7e2218df736cbda3d038903f134e0f74980ef0ef3e1d14b,2024-10-16T20:46:55.087000 CVE-2024-21202,0,0,e790e96ac9350d46b4daec1a5a8e4fc84bfdd7dd3cb1e532ff6a2225b3f1081d,2024-10-18T18:58:24.417000 @@ -248098,7 +248098,7 @@ CVE-2024-21386,0,0,eee79b8341607bedacf91830f98e4d64d25fef67a94fd024489dd6b6dd762 CVE-2024-21387,0,0,90a38bc91324a0c4880a21b6b5b4b93910ef49cd5f95d39193e84c0c2b1973e3,2024-11-21T08:54:15.393000 CVE-2024-21388,0,0,c067a17177c7600714a83673ef800bf5f9e218ecffe79bb5e4529d6d2f807d9f,2024-11-21T08:54:15.523000 CVE-2024-21389,0,0,66346b5dd34932fd47b098540a659ffee9af1224ddeca02865b34d3619c10e3d,2024-11-21T08:54:15.643000 -CVE-2024-2139,0,0,bb00e09e82b7eca83540db09e99978b8e124451b01e4b3b3bf83fe94e92d5867,2024-11-21T09:09:06.763000 +CVE-2024-2139,0,1,c3911d55c764c07fd06be1319f30937814d9f024c1c1abdf50f5dc909b49ba4f,2025-01-28T19:24:14.513000 CVE-2024-21390,0,0,a5074eedd13a3365a29cac23272e831776e56651731246287bb462c43630f117,2024-11-21T08:54:15.763000 CVE-2024-21391,0,0,312bd39d59508ef1ca59592577f992c0665dd2a98faf802735d1d704cbd948a5,2024-11-21T08:54:15.893000 CVE-2024-21392,0,0,598fd112e75abba3c6c252ea490de4c6a8e36349ae35cf809de012c4cd6c1364,2024-11-29T20:52:32.870000 @@ -248471,7 +248471,7 @@ CVE-2024-21772,0,0,f310ab481479ca6605eb33ed866f077d30a9cc043049a45b9dca7b65aacae CVE-2024-21773,0,0,18ffd55c3b3bc88b769a0a60072a06b2f11c2c5bd2e42489d365ecf87e312471,2024-11-21T08:54:58.750000 CVE-2024-21774,0,0,9dbd9d2730674cbb6b04cd32f96f031daf4202c8c95abac61f10ac5023434369,2024-11-21T08:54:58.900000 CVE-2024-21775,0,0,47f96747d440c6bdfc57b6dcff5e30996dbaa9514148a866fef0d4c01b291f4b,2024-11-26T16:34:43.767000 -CVE-2024-21777,0,1,9d9da8fd426a048a07298737e57d1d9170bf2ffe1a77d8fcf54bf75758ed7581,2025-01-28T17:39:26.460000 +CVE-2024-21777,0,0,9d9da8fd426a048a07298737e57d1d9170bf2ffe1a77d8fcf54bf75758ed7581,2025-01-28T17:39:26.460000 CVE-2024-21778,0,0,253f2dd3bc0112951c08e71c3370ea10726979e1470a6565609d98589cb5f4e7,2024-11-21T08:54:59.287000 CVE-2024-2178,0,0,0d4bed552ad270d43f6485dbf10a48ba6bf9393b5aca825626247e7e4691ff2e,2024-11-21T09:09:11.810000 CVE-2024-21780,0,0,be626ac394fffeb02631c37e137c9a3f6d67dc7a247b963a8b4e90b25404f3bd,2024-11-21T08:54:59.457000 @@ -248502,12 +248502,12 @@ CVE-2024-21805,0,0,78da5cddaa000cadbfc8c97e4677a4a341010cf31e46cdb8666986000b870 CVE-2024-21806,0,0,76d4e18b277b03f4ae237a28217dbc1a6a11559f17846f037fef87ba1a7f83ba,2024-08-14T17:49:14.177000 CVE-2024-21807,0,0,529e9675184111d1bad446f22de504075505951db4aacf2389a43e129efb9085,2024-08-14T17:49:14.177000 CVE-2024-21808,0,0,99c06a6ac8aafd8cfc1be0a3ffe3830fb507906fc97acb50afd6274df8d9a629,2024-11-15T14:00:09.720000 -CVE-2024-21809,0,1,49e374c114ed25fa678cf84b2d8cd3753c59531608c0b8f33e512fea1f0e8480,2025-01-28T17:40:40.167000 +CVE-2024-21809,0,0,49e374c114ed25fa678cf84b2d8cd3753c59531608c0b8f33e512fea1f0e8480,2025-01-28T17:40:40.167000 CVE-2024-2181,0,0,bc2ca43c87e79a2ce51f96614a32ea2ecec3c3ecdc0cc0dd84d4621bf4f6ed8d,2025-01-09T17:23:38.353000 CVE-2024-21810,0,0,4ec81a42073da00ef760857683f4253a4873020979c4273351a33968fe90eb90,2024-08-14T17:49:14.177000 CVE-2024-21812,0,0,fd10867a720f6263954e045c13d1c258dd90a67ea316bc4589a90c69d1a61663,2025-01-21T18:34:57.640000 CVE-2024-21813,0,0,b1fc9b3e97ad72485455a9afd1ff849eaab839871473b3dbd01f9dd0eb9be42d,2024-11-21T08:55:02.970000 -CVE-2024-21814,0,1,9528b4b387874da522773af8ac3f83adb93026eb560ac52dcba9c254061b5303,2025-01-28T17:43:38.947000 +CVE-2024-21814,0,0,9528b4b387874da522773af8ac3f83adb93026eb560ac52dcba9c254061b5303,2025-01-28T17:43:38.947000 CVE-2024-21815,0,0,6eff960e1f541f7cf6bcb270c61969ce74c3ff8a38acc23b5eb922fcde8f2832,2024-11-21T08:55:03.257000 CVE-2024-21816,0,0,00e0d4daeacd1d3fd9f793d2784b325bb5c289ba9a07a2898d50d384b4599340,2024-12-16T20:03:26.960000 CVE-2024-21818,0,0,b1e856eb827784a1939e1134bc57b77b239e4d10e05f897aba399bcfdc19b54d,2024-11-21T08:55:03.570000 @@ -248528,7 +248528,7 @@ CVE-2024-21833,0,0,5474c8e97495795e56bb5529245d9c4477df95df31071d5afcbaf12bbac86 CVE-2024-21834,0,0,aba5ecdbe6fdbff707907f54f191da45860fa668c1ffa6152c0ea4e0ceacebca,2025-01-02T19:13:29.017000 CVE-2024-21835,0,0,5ca067d858621cfd38789265a3fcddae8684932d6a7c154737e5c2eccf5ad481,2024-11-21T08:55:05.610000 CVE-2024-21836,0,0,e88af3400ff3424f7f8c555ab05b9703c4631aecd39cbbe5cfd2b7581a0399cc,2024-11-21T08:55:05.760000 -CVE-2024-21837,0,1,71f7abc838656a9c79c8fa7b732ccc7b5e4b357ba54c21e9fc22a0ecd879c129,2025-01-28T17:40:57.187000 +CVE-2024-21837,0,0,71f7abc838656a9c79c8fa7b732ccc7b5e4b357ba54c21e9fc22a0ecd879c129,2025-01-28T17:40:57.187000 CVE-2024-21838,0,0,10b474ee89e23525651741f37955dbec52a7ba213ee35fcad19906f3e1d08b45,2024-11-21T08:55:06.030000 CVE-2024-2184,0,0,9e5c40c8a32d1851a954f24d7355c1d9d3bac3a50d336011aa25e72d44ef35b7,2024-11-21T09:09:12.673000 CVE-2024-21840,0,0,55fc6ef95d87e31db483091255ba705fe253037c3a3ea9d0fe7844b5b3411826,2024-11-21T08:55:06.183000 @@ -248549,7 +248549,7 @@ CVE-2024-21857,0,0,c575350fcef843725e7ef275d0f3a96677c72165608cfb91eba4d11094a1a CVE-2024-2186,0,0,e7b9bc33689c26748efbb2d9800c342e319e02f8dc6c3d554b2a80d535cba19e,2025-01-07T20:42:22.523000 CVE-2024-21860,0,0,c33a33edbd83b6963f5e370eb0c3bd18861faf04570d72f488d2420923622b3b,2024-11-21T08:55:07.907000 CVE-2024-21861,0,0,3a7f9befc113ffb23875efbe3d70cf01c22adb8b0631739aca4be1bb65b609fe,2025-01-23T18:36:34.593000 -CVE-2024-21862,0,1,d1a916702185a96c58d5a48bea3eb8288c4be744e585ef9068b323222010f8e8,2025-01-28T17:38:46.637000 +CVE-2024-21862,0,0,d1a916702185a96c58d5a48bea3eb8288c4be744e585ef9068b323222010f8e8,2025-01-28T17:38:46.637000 CVE-2024-21863,0,0,55f366380fbe866d6e020d9802a7829de46bf002961a873cc4fea65ba7605dda,2024-11-21T08:55:08.337000 CVE-2024-21864,0,0,1ad6c5ce84b48a780ceb370fb663156ccd2e7fcace23a3692a69ffb642270962,2024-11-21T08:55:08.513000 CVE-2024-21865,0,0,583fd7dd0aa12097e737a2985a06d8c2e10647eb7bd05007cef306e8670a0ed2,2024-11-21T08:55:08.667000 @@ -248666,7 +248666,7 @@ CVE-2024-22026,0,0,95ce485539115bc058c0d5e366224e51c8b45b49a0d3c411939b9a286d310 CVE-2024-22027,0,0,a7c9d5934453bf5491b14a748b6f63eed219ee655c259739b4569f7e9106ab3b,2024-11-21T08:55:25.607000 CVE-2024-22028,0,0,dc1d72f35c957d83174df179949d0c9b62a42ce5572e7016a9a9c3503481ee68,2024-11-21T08:55:25.737000 CVE-2024-22029,0,0,61b99797aa6a231a618162f9f5b74eca0d25567efbf111a10b650373d323aaba,2025-01-27T18:15:37.237000 -CVE-2024-2203,0,0,60f6909e8cbce0dd59e60f2c5d1689346b33bbb4517abf9349fed4a4ff3f3873,2024-11-21T09:09:14.967000 +CVE-2024-2203,0,1,a1dbf17e8623e342c5dbc7964579ef9e95cc5b4f168448d3f20b2a34388d28be,2025-01-28T19:35:13.377000 CVE-2024-22030,0,0,e02699b846d34a18e8b7b6cf5888c535b133634cfe2a017ed58e28205a0d0b6d,2024-10-16T16:38:14.557000 CVE-2024-22032,0,0,beac3563a832af7ad2bb10e838ed7f4dba057a283ad9b47518d8f50d442b7b4f,2024-10-16T16:38:14.557000 CVE-2024-22033,0,0,67af1c2c407114537d4e89679db2f98dbaf388289faa0caf8bebb547f121bb48,2024-10-16T16:38:14.557000 @@ -248695,9 +248695,9 @@ CVE-2024-2206,0,0,5cd23aee739a1ecf37ee5d3e204017ea16f7e42bf349d33e84a18d1c299546 CVE-2024-22060,0,0,ed9ba15c4f298a42f28462f758b92465c987f6953d9ba6f5dbcd801f1adca5dc,2024-11-21T08:55:28.887000 CVE-2024-22061,0,0,4e49e7ee2ac0573d3a15781d9f6f6ecd7315900601a66368e5ff6a2c6b1140a1,2024-11-21T08:55:29.030000 CVE-2024-22062,0,0,da1c4f953be52e42b827ad2ec6c6d58ba39e293c190ae3c2d554c8747cf109b8,2025-01-28T15:29:07.970000 -CVE-2024-22063,0,1,729a99c3fa71071807a793f15d012c7ab9b2dccc5c2151e99efcc890a8dd39b7,2025-01-28T17:05:45.353000 +CVE-2024-22063,0,0,729a99c3fa71071807a793f15d012c7ab9b2dccc5c2151e99efcc890a8dd39b7,2025-01-28T17:05:45.353000 CVE-2024-22064,0,0,8d540dd94bb5f229f66fba83ffdffbac152147b35ab3dd7610555afda1d84b7b,2025-01-28T16:12:31.863000 -CVE-2024-22065,0,1,468329178617235b8e1148d9d28bdcf990a1a6d34ab1d925888cb05da845cd7c,2025-01-28T17:13:43.877000 +CVE-2024-22065,0,0,468329178617235b8e1148d9d28bdcf990a1a6d34ab1d925888cb05da845cd7c,2025-01-28T17:13:43.877000 CVE-2024-22066,0,0,70d4e3985898c8aa9a39f7f36b8d64c8bac198bd9861f8715ebb57132067fd4b,2024-11-08T14:31:32.933000 CVE-2024-22067,0,0,add51247fb7aba56da0e38fb655dd5fa3255e9b0defa9f5c297e2ca7bc9d5649,2024-11-20T16:24:47.843000 CVE-2024-22068,0,0,0e45a086c8936add37b1df8d7acf50cd02d24eaf181f002cc54878d9c8f7a945,2024-10-10T12:51:56.987000 @@ -248728,7 +248728,7 @@ CVE-2024-22096,0,0,c4602d88323b3424c44a18b3f76c72f6c73d14d53cf003d62bcccec494853 CVE-2024-22097,0,0,97b4a2d3ddf01aba1af28d36995be50ecee98d5bd6611f7b972a75fde029820f,2025-01-21T18:34:45.217000 CVE-2024-22098,0,0,aa82bbcfcdad7de5e03fc60fafc6844d23ca04b30a801f37c32f229b85434f4a,2025-01-02T19:12:54.717000 CVE-2024-22099,0,0,2aab8d395d6a42ecb54cfd21d97687ce18aadc84db395b6c4859d28ef1982d01,2024-11-21T08:55:34.813000 -CVE-2024-2210,0,0,95e72181c5a1bdd35257cb7f5e159971c82da0f8c14cdd173762c1d4d384b5b7,2024-11-21T09:09:15.777000 +CVE-2024-2210,0,1,781f7a99572141e6915772531482d19d913a07c99a5f42cc4423bbfd10e50c1a,2025-01-28T20:21:57.503000 CVE-2024-22100,0,0,56f2af5bc1323d1c0ca1ddfc53290dc26ed685c2c5fdf820f38f4660cad65dae,2024-11-21T08:55:35.003000 CVE-2024-22102,0,0,84892b7b6e5d83a9d6c16f8dffd5e79d322057a8d97be177a66169a0e45abea6,2024-11-21T08:55:35.143000 CVE-2024-22103,0,0,21b0d01eb857ccfc96a63302f1d9c85525df74135dcbdd1b5b1e8e0e0ba5b800,2024-11-21T08:55:35.383000 @@ -248974,7 +248974,7 @@ CVE-2024-22352,0,0,903d5c6f0448bdc0bf08006216f6899a3c5646dd96e9c8f6bb1e8c750ccd8 CVE-2024-22353,0,0,0ea4428102047b2faffc31e2ac25c47aff142899beade323ab31892621a6fc1f,2024-11-21T08:56:06.147000 CVE-2024-22354,0,0,36f7376c3e5da5bc5ebfbf6d09dfb90cb4ef7e55cdcf69f513547ace7e0b27a3,2024-11-21T08:56:06.303000 CVE-2024-22355,0,0,26ed86c646b6a6b7eb9c356ba84e79063a2db5147bda7948a2078523655c8623,2024-12-23T18:01:08.250000 -CVE-2024-22356,0,1,ed30716104bbf693467cdd18759a21c6311e77f0a3478862b5dac33d1b33aa9c,2025-01-28T18:43:25.843000 +CVE-2024-22356,0,0,ed30716104bbf693467cdd18759a21c6311e77f0a3478862b5dac33d1b33aa9c,2025-01-28T18:43:25.843000 CVE-2024-22357,0,0,192cb22e74dbc037b857b15528d854633c03a12cf462a0d18eadc196dd9a0ccc,2024-11-21T08:56:06.710000 CVE-2024-22358,0,0,6157f99a7878956c21bf5fdc02860c4e99702f3939ef3bcb021a336848c09424,2024-11-21T08:56:06.843000 CVE-2024-22359,0,0,45f87f321a83ef51f76917d53714e9a7b93f437f8b2b9fa127f418c3e22f7b6b,2024-11-21T08:56:06.980000 @@ -249348,49 +249348,49 @@ CVE-2024-23117,0,0,2723ffb08e2fa42d77628c672090a9156d914a031de751687882cd4b692b3 CVE-2024-23118,0,0,817e88344ff95e9db8ea70c429b33c05a365f3917b5984c57bb7b15ad54dd85a,2024-11-21T08:56:58.303000 CVE-2024-23119,0,0,577ca2840cec8c21d56af62b774eb09eb70d2a894b98eb2d89c94cb8000470fa,2024-11-21T08:56:58.437000 CVE-2024-2312,0,0,fa862e094112931ec9e9a806d5cc57677b4d6391dd24ccf16ffe3e5a73f11e35,2024-11-21T09:09:29.133000 -CVE-2024-23120,0,1,d51120d5798d85987d1e83e772da2acf13d6b61256f224c76710adce704de61c,2025-01-28T17:15:16.890000 -CVE-2024-23121,0,1,5f2ef567c67535c6ab1492cb4acf6213ecd932e7367f434103eb5717de8c97e7,2025-01-28T17:15:17.300000 -CVE-2024-23122,0,1,b5bd738fa6a4e96d7a1b1dde7ab823d55c28ae2bf837f672731722f99790deab,2025-01-28T17:15:17.923000 -CVE-2024-23123,0,1,3c228f684e00d2f0971598b5b84aa28661050ea5392c5b8f7f3978bfa9aaa123,2025-01-28T17:15:18.190000 +CVE-2024-23120,0,0,d51120d5798d85987d1e83e772da2acf13d6b61256f224c76710adce704de61c,2025-01-28T17:15:16.890000 +CVE-2024-23121,0,0,5f2ef567c67535c6ab1492cb4acf6213ecd932e7367f434103eb5717de8c97e7,2025-01-28T17:15:17.300000 +CVE-2024-23122,0,0,b5bd738fa6a4e96d7a1b1dde7ab823d55c28ae2bf837f672731722f99790deab,2025-01-28T17:15:17.923000 +CVE-2024-23123,0,0,3c228f684e00d2f0971598b5b84aa28661050ea5392c5b8f7f3978bfa9aaa123,2025-01-28T17:15:18.190000 CVE-2024-23124,0,0,cf624f3b7cab7fb6fee299c2ba5a965e125ffc8d32f57a5bc3192c1a58f0ad11,2025-01-17T18:15:25.030000 CVE-2024-23125,0,0,da781c693b4317a80e1df4fcd91718ac887a899e618a773fc568b137eb28ae4c,2025-01-27T18:15:37.520000 CVE-2024-23126,0,0,94b86fa0654d11cc11379fa4fff40550cc0630f184b5f46acfa47287368e03ef,2025-01-27T18:15:37.747000 -CVE-2024-23127,0,1,8dcc8ddf0d4e2def5ae340d1ba9340ce1961448980d99b9603675634e8cb1fa3,2025-01-28T17:15:18.453000 -CVE-2024-23128,0,1,568659ca0b2646057a1930b3fc5207142ce502f53cc8bde6455fbac644718d43,2025-01-28T17:15:18.740000 -CVE-2024-23129,0,1,bf17ba2e34b6136ed47f29d779709441ad7131d61581e95b9f2f99510649a711,2025-01-28T17:15:18.953000 +CVE-2024-23127,0,0,8dcc8ddf0d4e2def5ae340d1ba9340ce1961448980d99b9603675634e8cb1fa3,2025-01-28T17:15:18.453000 +CVE-2024-23128,0,0,568659ca0b2646057a1930b3fc5207142ce502f53cc8bde6455fbac644718d43,2025-01-28T17:15:18.740000 +CVE-2024-23129,0,0,bf17ba2e34b6136ed47f29d779709441ad7131d61581e95b9f2f99510649a711,2025-01-28T17:15:18.953000 CVE-2024-2313,0,0,4de26ca804f65cab5a465cfcb9fd22699fb9eaf6a9ce523e3456f1db3dfc9527,2024-11-21T09:09:29.277000 -CVE-2024-23130,0,1,292d962f5b416fdb579fd4b5818c20dd81c19f657241f7dc26212765f62bed9f,2025-01-28T17:15:19.190000 -CVE-2024-23131,0,1,1d576b97cff73e97656c773b87f244870db0716cc04e1c440f47a47297eb6b4f,2025-01-28T17:15:19.420000 +CVE-2024-23130,0,0,292d962f5b416fdb579fd4b5818c20dd81c19f657241f7dc26212765f62bed9f,2025-01-28T17:15:19.190000 +CVE-2024-23131,0,0,1d576b97cff73e97656c773b87f244870db0716cc04e1c440f47a47297eb6b4f,2025-01-28T17:15:19.420000 CVE-2024-23132,0,0,e9248c2178f8f63a22b7c15ed27370a3b934315488dfa0e209d25147e3c49159,2025-01-27T18:15:37.980000 CVE-2024-23133,0,0,b1474dd84eb3c446392a0992a388c8841a35971de2a3b30c91010470ea4fea78,2025-01-27T18:15:38.187000 -CVE-2024-23134,0,1,0c652e256ce1f1fe7bfba98b0ae69d91fff14eaa969ed8e44915edef715a20d5,2025-01-28T17:15:19.660000 +CVE-2024-23134,0,0,0c652e256ce1f1fe7bfba98b0ae69d91fff14eaa969ed8e44915edef715a20d5,2025-01-28T17:15:19.660000 CVE-2024-23135,0,0,1c8ff4eb793abf6bcefbc0298485ccba7517f2f24b525939fa1ae9cfa5c974b6,2025-01-27T18:15:38.410000 CVE-2024-23136,0,0,0046a6fd6fa44480b309f723d133fe296b6446f9789a2ab6ce58b95a26a887ef,2025-01-27T19:15:15.900000 -CVE-2024-23137,0,1,92324c318cd782f982d568bd84207a9460f216993788cadf6603af1edcab4fb8,2025-01-28T17:15:19.903000 -CVE-2024-23138,0,0,5f1cf6df53872d96cd81f8d3d5f642840af9c940a03c8f7b6fa2400eef2671cd,2024-11-21T08:57:02.143000 -CVE-2024-23139,0,0,cf479d99920f9cda76655ef30f4e950ff9932853a7d815d66918624961b44631,2024-11-21T08:57:02.360000 +CVE-2024-23137,0,0,92324c318cd782f982d568bd84207a9460f216993788cadf6603af1edcab4fb8,2025-01-28T17:15:19.903000 +CVE-2024-23138,0,1,b2d5820d9a8ff916772a159e535653f2d5e83911cd64ad8ff5c2251901c1d396,2025-01-28T19:15:13.887000 +CVE-2024-23139,0,1,d15285a78b27fd72b039332b633e3504f9965450ced531c8004addb1e10784db,2025-01-28T20:15:30.430000 CVE-2024-2314,0,0,e806b8e37c6871dfa18c0f6b69456ba8f142074dd0ab76f05a48a4f9265c7aee,2024-11-21T09:09:29.397000 -CVE-2024-23140,0,1,a608c27fe00da622de4dd63352d746221407ae1df769bafbd230a2a5b2e3d26f,2025-01-28T17:15:20.130000 -CVE-2024-23141,0,1,05044574b36911681114c4427416fb6a71ae34b244f5eefc39ea7e82eea53477,2025-01-28T17:15:20.363000 -CVE-2024-23142,0,1,55326eaa9cfd42ad25d81196fc52146dc37462071981d33b2b737d45274cde13,2025-01-28T17:15:20.577000 -CVE-2024-23143,0,1,654540728008dcdf4662fc79576dc29794366745481f8c8c58e576660249cf8a,2025-01-28T17:15:20.763000 -CVE-2024-23144,0,1,96f1780abc398646735b39da3cec301d86c2807a8f1d1cb0a16a5875cc03edbb,2025-01-28T17:15:20.953000 -CVE-2024-23145,0,1,4d97f44400ca1ad5775c333b617a4f0daf7a649627bf1aa407d68000e3e289fe,2025-01-28T17:15:21.153000 -CVE-2024-23146,0,1,498f9880d8e0c2a490090c1c56d9f0d431f727c36bfcf5ffafe97cb612fbfe6f,2025-01-28T17:15:21.380000 -CVE-2024-23147,0,1,6d67d141bef8865a4f0a3e8f65970f2b2063d0804d5123ef9740711d8f19c5bd,2025-01-28T17:15:21.603000 +CVE-2024-23140,0,0,a608c27fe00da622de4dd63352d746221407ae1df769bafbd230a2a5b2e3d26f,2025-01-28T17:15:20.130000 +CVE-2024-23141,0,0,05044574b36911681114c4427416fb6a71ae34b244f5eefc39ea7e82eea53477,2025-01-28T17:15:20.363000 +CVE-2024-23142,0,0,55326eaa9cfd42ad25d81196fc52146dc37462071981d33b2b737d45274cde13,2025-01-28T17:15:20.577000 +CVE-2024-23143,0,0,654540728008dcdf4662fc79576dc29794366745481f8c8c58e576660249cf8a,2025-01-28T17:15:20.763000 +CVE-2024-23144,0,0,96f1780abc398646735b39da3cec301d86c2807a8f1d1cb0a16a5875cc03edbb,2025-01-28T17:15:20.953000 +CVE-2024-23145,0,0,4d97f44400ca1ad5775c333b617a4f0daf7a649627bf1aa407d68000e3e289fe,2025-01-28T17:15:21.153000 +CVE-2024-23146,0,0,498f9880d8e0c2a490090c1c56d9f0d431f727c36bfcf5ffafe97cb612fbfe6f,2025-01-28T17:15:21.380000 +CVE-2024-23147,0,0,6d67d141bef8865a4f0a3e8f65970f2b2063d0804d5123ef9740711d8f19c5bd,2025-01-28T17:15:21.603000 CVE-2024-23148,0,0,4281c2dd379ac2da7616044d57baa1d5fab351ae30cdd886610a8d8e479a32d0,2025-01-27T22:15:11.403000 -CVE-2024-23149,0,1,e271c5320be64d5c3b6453676d8f16a8303c6b86429fc10c660d52356b40a66a,2025-01-28T17:15:21.800000 +CVE-2024-23149,0,0,e271c5320be64d5c3b6453676d8f16a8303c6b86429fc10c660d52356b40a66a,2025-01-28T17:15:21.800000 CVE-2024-2315,0,0,3fdbc8f67f2f12bb5cfbb7c5abc541b94d2aa7c9aae376fbe2a623d354e495d1,2024-11-21T17:15:12.817000 -CVE-2024-23150,0,1,6702cfa1b7298addde6ff427c8cdda6eb56dc420a383faf40fdb42e9c4cb151d,2025-01-28T18:15:33.550000 +CVE-2024-23150,0,0,6702cfa1b7298addde6ff427c8cdda6eb56dc420a383faf40fdb42e9c4cb151d,2025-01-28T18:15:33.550000 CVE-2024-23151,0,0,b17c0fdb77e6f4b45e85cc27b353b53ccc11fe1caaf3f38183945b65353acb1d,2024-11-21T08:57:04.723000 -CVE-2024-23152,0,1,c55ad4566b5bec255a350daa25f864eca976f58e85cdeb47085fd1ff558ff2d9,2025-01-28T18:15:34.123000 -CVE-2024-23153,0,1,396063c89ada1b47c8d941163a22169513de7924f707e9d687e8d6d509b3cc6d,2025-01-28T18:15:34.403000 -CVE-2024-23154,0,1,e60fd35a957f0b29774b749a33d73c78d6704303d2ab465f5afd787cdcab4d18,2025-01-28T18:15:34.673000 +CVE-2024-23152,0,0,c55ad4566b5bec255a350daa25f864eca976f58e85cdeb47085fd1ff558ff2d9,2025-01-28T18:15:34.123000 +CVE-2024-23153,0,0,396063c89ada1b47c8d941163a22169513de7924f707e9d687e8d6d509b3cc6d,2025-01-28T18:15:34.403000 +CVE-2024-23154,0,0,e60fd35a957f0b29774b749a33d73c78d6704303d2ab465f5afd787cdcab4d18,2025-01-28T18:15:34.673000 CVE-2024-23155,0,0,25d30aa54251768bd0c707ff3a72bf2a4266f4a5b675b554364024381f04e1f7,2024-11-21T08:57:05.500000 CVE-2024-23156,0,0,5b1fd72e3de55aa778253ae4b0a60a7f14fdda3c29a9a1bfdd30f235c9584ca7,2024-11-21T08:57:05.690000 -CVE-2024-23157,0,1,22dc84604a856aa7b754d635be48ab6b2fbad48efabede87eb773a3c55273ec6,2025-01-28T18:15:36.170000 -CVE-2024-23158,0,1,1f3c0438d650bfaf474ab8211c4f7f7d8ab35a503ed9ec36c17b870c88173989,2025-01-28T18:15:36.657000 -CVE-2024-23159,0,1,17f9618d779e6067e5fdd2980c955bd551b1f15a6ad974e2af8f8fa3e6bf07cd,2025-01-28T18:15:36.913000 +CVE-2024-23157,0,0,22dc84604a856aa7b754d635be48ab6b2fbad48efabede87eb773a3c55273ec6,2025-01-28T18:15:36.170000 +CVE-2024-23158,0,0,1f3c0438d650bfaf474ab8211c4f7f7d8ab35a503ed9ec36c17b870c88173989,2025-01-28T18:15:36.657000 +CVE-2024-23159,0,0,17f9618d779e6067e5fdd2980c955bd551b1f15a6ad974e2af8f8fa3e6bf07cd,2025-01-28T18:15:36.913000 CVE-2024-2316,0,0,ee29ae3167a36262b7a58d53684a0d8cac470ca2adc0d0d3230de0911e5105e4,2024-11-21T09:09:29.647000 CVE-2024-23168,0,0,2aa18f1b49da1e0964e0bd3c314ad28ba6c11c2b0afd22534b6b4245d90b594b,2024-08-19T13:00:23.117000 CVE-2024-23169,0,0,082b720683f3e21b7d47db625d5710583514f62debf5a7d0b4b55633c65d78f9,2024-11-18T17:11:56.587000 @@ -250114,7 +250114,7 @@ CVE-2024-23916,0,0,9c55120004f40a293b3022ed63da1ebaa9df79a22e914b08a159d3664843c CVE-2024-23917,0,0,87446e79af64f56ab4b2f0757fc8cfd7321e882a0255933c4f0f19299c37c4e8,2024-11-21T08:58:42.443000 CVE-2024-23918,0,0,b899df058c396303cc4d9dbbab88919628903240d3fbc9fd19e8667d12d0e55c,2024-11-15T14:00:09.720000 CVE-2024-23919,0,0,058e35e0621537e23cbd18e05aae6e013440d01fecbaaddd297d731639d19875,2024-11-15T14:00:09.720000 -CVE-2024-2392,0,1,eeaf76ffa059802be448df469408e08c4579d4ec4b5263bd4359d00f105d8d03,2025-01-28T18:32:57.513000 +CVE-2024-2392,0,0,eeaf76ffa059802be448df469408e08c4579d4ec4b5263bd4359d00f105d8d03,2025-01-28T18:32:57.513000 CVE-2024-23922,0,0,2d559582d23c0b1aa77c5c48b51f0b0c564ebc51a759834728fd4f27625943e0,2024-09-30T15:37:28.453000 CVE-2024-23923,0,0,2b299af07539c6b04589d5f4cb78313212c713b14e6f4111f325ca8810b2cf16,2024-10-03T18:07:35.977000 CVE-2024-23924,0,0,465231a82fd4648306cddbdcd0ef7925a0538a8b613742d6302b13e6441b1caf,2024-10-03T18:06:54.180000 @@ -250136,7 +250136,7 @@ CVE-2024-2395,0,0,af5ee44ed4e5a55dc7cee72e73dd87c7eca19f4fdfa76a380a7f63de620cfa CVE-2024-23950,0,0,fc22aca121744540088f0a682a9a12e51b13e88920d5f4c103703a8401d15b2a,2024-11-21T08:58:44.840000 CVE-2024-23951,0,0,90949de6749d1342df813fafd173be208f7c748b51ad2522c41738d2f7a7174f,2024-11-21T08:58:44.960000 CVE-2024-23952,0,0,d956573f944b52b54178c073558282ca45131f0d187b6cc2538746038d148592,2024-11-21T08:58:45.077000 -CVE-2024-23953,0,1,b18e485d26476339a0c73b8f254106e44a18e9b30b8620dab84c1da9491e76cc,2025-01-28T18:15:37.223000 +CVE-2024-23953,0,0,b18e485d26476339a0c73b8f254106e44a18e9b30b8620dab84c1da9491e76cc,2025-01-28T18:15:37.223000 CVE-2024-23957,0,0,ccb57b4ba0507fbac13ac2445d2cac9760854f91ae7da4707e72f394ea98e263,2024-10-03T17:37:47.743000 CVE-2024-23958,0,0,6fe18b86fa35472f01534c3eeba14711dd9e2cdb206262a323b3a33e5af27e3a,2024-10-03T17:42:05.553000 CVE-2024-23959,0,0,55515de9820dc00037a0b8188d9aae2673ee68b5d649634b981bc6ce6024af1f,2024-10-03T17:42:03.650000 @@ -251429,14 +251429,14 @@ CVE-2024-25952,0,0,8b4dc52fef57d8fbb31cf0abecc11b9407a392d8739ad988ca812690eccbf CVE-2024-25953,0,0,74ac51aa7b4ec3952ee05415e1fa81324d23d22db93c284a18c79c7efa39180c,2025-01-09T16:50:14.040000 CVE-2024-25954,0,0,5d01606b94c030f235ff4e0c4da0130514bf93e9c2f019089ce1ed2db6bae818,2025-01-09T16:08:40.410000 CVE-2024-25955,0,0,1b47dd1c38579fd26816983115f141a46e8da2462bc9d9dc03fbe2f8fd959722,2025-01-27T18:57:51.763000 -CVE-2024-25956,0,1,bbf76d1a49ba222274ba32cf565187c2fd7c4e684858964ac8467e2807f20edd,2025-01-28T18:47:46.663000 -CVE-2024-25957,0,1,cb0e9adbf6a7a50e3620204033aa8fffb22de6cb894450b6b77c5b7528a5ed25,2025-01-28T18:54:00.797000 -CVE-2024-25958,0,1,204b963b0dd1547dfcec502bc7853f4ace486e1fc59f0e0ac4ef3f0d2853b000,2025-01-28T18:55:24.740000 +CVE-2024-25956,0,0,bbf76d1a49ba222274ba32cf565187c2fd7c4e684858964ac8467e2807f20edd,2025-01-28T18:47:46.663000 +CVE-2024-25957,0,0,cb0e9adbf6a7a50e3620204033aa8fffb22de6cb894450b6b77c5b7528a5ed25,2025-01-28T18:54:00.797000 +CVE-2024-25958,0,0,204b963b0dd1547dfcec502bc7853f4ace486e1fc59f0e0ac4ef3f0d2853b000,2025-01-28T18:55:24.740000 CVE-2024-25959,0,0,eeae5a284a4ab1415fc3493674e6d3373472ea1d7e22b72b0b2c652574d3cffa,2025-01-09T16:45:52.213000 CVE-2024-2596,0,0,6dae988370d6f22930ca41007288616d27291686c0799763d555ed4df2872133,2024-11-21T09:10:05.403000 CVE-2024-25960,0,0,f38ab1330997f4540b80aaede2ea75ba850d5750f8beec406ca741c932d2b424,2025-01-09T16:24:23.357000 CVE-2024-25961,0,0,29b890f356bf7ac64312af353b2e03345318684d64a96bf6eceadc52768a0c28,2025-01-09T16:48:12.033000 -CVE-2024-25962,0,0,7b866daca3dd48bb6834774905f9d5c147eadab236f932077b0d39f55c394d90,2024-11-21T09:01:39.420000 +CVE-2024-25962,0,1,9fedca5de3f5bf630fc8a16e46a9281ff8d18f912b1963232a0d25d365fc8dfd,2025-01-28T20:34:04.520000 CVE-2024-25963,0,0,55fd859077dae39a86a32c5c77a28b3577d5b4f4d96d0903b9bd6f018ae9069e,2025-01-09T16:39:54.173000 CVE-2024-25964,0,0,3764efeb8c8e0b62c6b081fdaaa5a3bf3bc8f0a0ad347ed98fc853921ba33307,2025-01-09T16:44:51.983000 CVE-2024-25965,0,0,107bd6e82d1ce0bcc13e7dc9edc522431fd55397802e60806e92ba102bd7f0e3,2025-01-09T16:42:17.140000 @@ -251797,7 +251797,7 @@ CVE-2024-26311,0,0,eccd625bfc3960072c1c96a8fc8ef57d0c8f8ecfdb1ef82d95f6e017b6260 CVE-2024-26312,0,0,bd29f61468e0d592b162f1b9bca8f7cdfe3ab243569e230296a7e2555de1ea3c,2024-11-21T09:02:21.183000 CVE-2024-26313,0,0,e95d02de1d4052be713c0be90ef61847e38271af8acd03c78fcc8ef33c2d3d5f,2024-11-21T09:02:21.417000 CVE-2024-26314,0,0,16b14b790b204a9dce3861ce2b360799ee7dfafcd5ac190bba6e667b6569b4c3,2024-11-21T09:02:21.567000 -CVE-2024-26317,0,0,3da96839833b08e8c6d726e07bda0f53903e5c5b277a52f6e1d788ff6d44eb8b,2025-01-27T18:15:38.613000 +CVE-2024-26317,0,1,1d8dd478405205f5413ee335572758a0bcbe89ffb7397dbf28481b9d00567bcd,2025-01-28T20:15:30.597000 CVE-2024-26318,0,0,906eb8b230325eda251dececda86313ac591223ac614c32b0aa55e4dcc7ca895,2024-11-21T09:02:21.757000 CVE-2024-2632,0,0,300d9ac42b8f019a855e8e9024543531f20a59a664cf33a5a9a35b4647186c67,2024-11-21T09:10:10.750000 CVE-2024-26327,0,0,72a77ae0b6d90693319dc4a70872140f4bf0e1116dd5bbfb2cdcf10d61353777,2024-11-21T09:02:21.927000 @@ -253079,7 +253079,7 @@ CVE-2024-27896,0,0,cefb57e4fd2360f9ca76121f5d55c0879f2b9778073436f6d450ff9f01865 CVE-2024-27897,0,0,e0fd628e199d1ad9f7d1973d04b30e3b226e987f2d07bcbb58339313ac383abd,2024-11-21T09:05:22.297000 CVE-2024-27898,0,0,af89e17a8df4c3a779fd434e3e11879bb6cd54de374fc7845601631da86da367,2024-11-21T09:05:22.490000 CVE-2024-27899,0,0,a604999ac254f893bf484b56f8c916b1c621d5e943e54c837b0fa2e56a53a410,2024-11-21T09:05:22.627000 -CVE-2024-2790,0,0,f35a3cdce10227f574bb5bead9302c19b42eeb1b5078e42d79625047e3d807db,2024-11-21T09:10:31.453000 +CVE-2024-2790,0,1,46430baf671506f8e8e0e96de5abb2a9dbcf4a843ba1d0b27f99c14044a5e043,2025-01-28T19:26:37.203000 CVE-2024-27900,0,0,0959b2054b27454fdc1ef4ac218f2c38f403415af9de5e09c07c2e491cac493b,2024-11-21T09:05:22.767000 CVE-2024-27901,0,0,446889df5d6f342bce9db6ffc9b1986b1759b684a2d1d50d324de40c727810fd,2024-11-21T09:05:22.907000 CVE-2024-27902,0,0,3ed35f57e19fea9dc67cc2f0d80160581d1f940b7dddb56881544543ee19baa8,2024-11-21T09:05:23.040000 @@ -253188,7 +253188,7 @@ CVE-2024-28000,0,0,b8bf3c28e31af787d661eff07324dafbb0f033f16c73a80ef6c694d709cc8 CVE-2024-28001,0,0,f4eb06df3530e1997d166a642d7fa8af6bff2e5a17b3a688669d50585c305328,2024-11-21T09:05:36.283000 CVE-2024-28002,0,0,904502bf78aba90ddf91ba1222073bccd0c322349e6a1c2472d455abd67e739f,2024-11-21T09:05:36.413000 CVE-2024-28003,0,0,9de581c0a89ffca55ba717b6e86d85f87dca3f2529eff590e3efb77ede4629e6,2024-11-21T09:05:36.567000 -CVE-2024-28004,0,1,e4597900ef4bb74db4b6eebd41445f719fcd699c6b38b8afbc154793172c1cec,2025-01-28T18:12:55.983000 +CVE-2024-28004,0,0,e4597900ef4bb74db4b6eebd41445f719fcd699c6b38b8afbc154793172c1cec,2025-01-28T18:12:55.983000 CVE-2024-28005,0,0,bce9e851b8f0583763e40fe34f2a38decc80487cf1ddfc104dbe207af73e2c86,2025-01-14T04:15:09.883000 CVE-2024-28006,0,0,468c0cf70f068488e15d53d785f593f274940dadd648f1e8566b286f97bdb8b9,2025-01-14T03:15:06.857000 CVE-2024-28007,0,0,c7a70ff3fa87c34a8edb92a66b06aab94d035b9b027dc8c7cae7f48dfaf2c8f2,2025-01-14T04:15:10.180000 @@ -253471,7 +253471,7 @@ CVE-2024-28386,0,0,edeac53a83a8822b50d31d5b403af1a1addf4eb177afa9c4bbe5f0717fd0f CVE-2024-28387,0,0,edcf845b6fe208900e49529598d8e9e75d7f2e72dd97a85453bae639adf9ed5c,2024-11-21T09:06:14.523000 CVE-2024-28388,0,0,95b64f8911ba70a40936aac75bd6274ffeb9103197023d39d5c96d0976370013,2024-11-21T09:06:14.763000 CVE-2024-28389,0,0,94fdc93233da7727f0a9074cdad3ddf52c584c8e8f2b21467b47ad4499de76ba,2024-11-21T09:06:14.990000 -CVE-2024-2839,0,1,bbe9f5435e5c7bdec670ff8dd9c7f0c19451bb7cce7859cd58a9f3bb599942ce,2025-01-28T18:11:04.917000 +CVE-2024-2839,0,0,bbe9f5435e5c7bdec670ff8dd9c7f0c19451bb7cce7859cd58a9f3bb599942ce,2025-01-28T18:11:04.917000 CVE-2024-28390,0,0,d8cc4c3ca2b065f434b3a72f6e2cc5ffe2f819ed7fce0e06214acf67ea99db46,2024-11-21T09:06:15.217000 CVE-2024-28391,0,0,73a11028a3462639bec211b4ea8963bd22b1b69f527f00f4163ada857a56364f,2024-11-21T09:06:15.450000 CVE-2024-28392,0,0,d390c6938d5b44056d413b2b408bcc32550deb780a0d9ab9cc047b0024cc367e,2024-11-21T09:06:15.677000 @@ -253959,7 +253959,7 @@ CVE-2024-29103,0,0,d41735cb9da95e849a5b45306d53d28ce564494ecee17e60023a3cbe91f78 CVE-2024-29104,0,0,f1f189a63b7a01d1d49f3a6b0cae20a47961d88101d8514d2c423c4ec2f149ef,2024-11-21T09:07:33.760000 CVE-2024-29105,0,0,c66a7fda0a5c9f8df47a07bbce9c424c595eafc32fe89bcf2c583a37e4654e1f,2024-11-21T09:07:33.893000 CVE-2024-29106,0,0,5a400ac8943d75afdda2010adfe40fe98b71565a3f87da2e7f1bf30416ae4ab8,2025-01-27T16:11:23.087000 -CVE-2024-29107,0,1,5c398c480f65085a3e8653bb64aba1d65c753cd7eb31a17471c019ab2a8a55dc,2025-01-28T18:25:39.037000 +CVE-2024-29107,0,0,5c398c480f65085a3e8653bb64aba1d65c753cd7eb31a17471c019ab2a8a55dc,2025-01-28T18:25:39.037000 CVE-2024-29108,0,0,0ae5c87de818ee6d85336d44fecde11bf0ad3f784ce5bb54a4b6c764bf7af8c3,2025-01-08T16:30:17.263000 CVE-2024-29109,0,0,4d51f8f3341e8657e6c8c880f4f2d73bd95482441c6ac3a26d0a8cd436b3b41c,2024-11-21T09:07:34.440000 CVE-2024-2911,0,0,947f33674e3a84a4df184fca1e8444d630bfce299331118affd153d9859966df,2024-11-21T09:10:49.123000 @@ -254439,9 +254439,9 @@ CVE-2024-29908,0,0,2015ea0a79e2dfbfcfcc8c9f56219cb4aa05d88d8743a9e6a62e5bb7ea1c4 CVE-2024-29909,0,0,fb9ae7b23fa5013e6341fa9c080778ffeab890f332e295ba676aa55a587bf1de,2024-11-21T09:08:35.787000 CVE-2024-2991,0,0,f0d75c29e897c922f15c2f748d83b090b7fdb8711147be6c36e835f48c893bd7,2025-01-22T17:59:21.180000 CVE-2024-29910,0,0,c41d09944920a9d8d61c20066a9b3c470d9f0156387a3f57445729a2f0a08722,2024-11-21T09:08:35.910000 -CVE-2024-29911,0,0,5ae28372f5af08c3e1887f676ae9a2bc6b1682d2f9adce9a9ce29199c6d86ad0,2024-11-21T09:08:36.040000 +CVE-2024-29911,0,1,f25c0b2d785ce28963e6e183efa13436d6a827fc049625dbca68cd0b77dfe5c4,2025-01-28T20:25:31.467000 CVE-2024-29912,0,0,4295d9a37bfaa06115d9f12a98aef4d1b4334764122065277f0bd2af0a62ed4a,2024-11-21T09:08:36.173000 -CVE-2024-29913,0,0,6321dd97e2e2fb1a17ebb2d8ac37ebcc68f67e77055c298825e1ba4924fd5c34,2024-11-21T09:08:36.307000 +CVE-2024-29913,0,1,4b95f6d7b2415812dbf11ebb30932ca1a187037482b34219d7dffd7469624706,2025-01-28T20:29:09.363000 CVE-2024-29914,0,0,7c5531720064523c200888ff21e4ecd129aa835bc9d9b4bbb5043cd65c102278,2024-11-21T09:08:36.433000 CVE-2024-29915,0,0,102e298fb86162b5224bdef00b35afccefc860b69e50236c5b86acf8ef4309f0,2024-11-21T09:08:36.560000 CVE-2024-29916,0,0,fed07f372a294d1dc418025e45647dee93bbfe0cfafb11ea87699b7604e5c33d,2024-11-21T09:08:36.687000 @@ -254545,27 +254545,27 @@ CVE-2024-30008,0,0,184e27992dff98b931bdb1cdf87558ed39bf1df29ad79a5d33d6bc08dc38a CVE-2024-30009,0,0,2091b88189900c68040dba1bcb5fcb6679fa444deb61d6cce70b651d2c2660c3,2025-01-16T19:12:54.190000 CVE-2024-3001,0,0,a7374e476d7442a06066a14e1bd58098fcf6ff210b0ec172c2e3dfeb580cd5c2,2024-11-21T09:28:39.010000 CVE-2024-30010,0,0,3b57dded1365346a40ef9d907acf2a62b1045574e11d0dc8d1e83f92596365c8,2025-01-08T15:40:07.350000 -CVE-2024-30011,0,1,2e167912e25daad18471edc6d3b5feb0d4a625779592ab6c1c9365c3edb3b12e,2025-01-28T17:15:22.727000 +CVE-2024-30011,0,0,2e167912e25daad18471edc6d3b5feb0d4a625779592ab6c1c9365c3edb3b12e,2025-01-28T17:15:22.727000 CVE-2024-30012,0,0,3cfcd5e62f53a2fbf8d6797d2013b52f1fcef1f665bb139337dcf3b0adecd4c4,2025-01-08T15:40:37.453000 CVE-2024-30013,0,0,b465d3238612a54eaf750a7ed1e2690d066c175454197e462ef0402b89513b8f,2024-11-21T09:11:03.577000 CVE-2024-30014,0,0,29e6609974e54c3e1df07137e60b2d5eaf0f65e4f3ca96c74c8eb545ca718d6a,2025-01-08T15:44:31.357000 CVE-2024-30015,0,0,52aa651dde0ea6bf84bb00419c07634297d067ef9334197e11876d2d34a70478,2025-01-08T15:45:00.623000 CVE-2024-30016,0,0,5b295ec99e9b88a24423f588f50ea49d5754b5759903d2d073a3d6bf2cf7fa7a,2025-01-08T15:45:16.347000 CVE-2024-30017,0,0,b334193ef5ee49dc171003b282b5e1a193bc772e9a0cf65c48d1f03f390d06ee,2025-01-08T15:45:33.653000 -CVE-2024-30018,0,1,a51a6933ff3907eb9e353eb5f6b157ae34588f7b7b133f35989ba56c823597fc,2025-01-28T17:15:22.960000 +CVE-2024-30018,0,0,a51a6933ff3907eb9e353eb5f6b157ae34588f7b7b133f35989ba56c823597fc,2025-01-28T17:15:22.960000 CVE-2024-30019,0,0,36a9650e035ec5224df9a52bc463199a43fc6ab8696a43446828b4d871ac7a5b,2025-01-08T15:46:05.617000 CVE-2024-3002,0,0,43285269ba1ba668064835131e260faa1611d81ce919795b2f96499b7ec676f4,2024-11-21T09:28:39.160000 -CVE-2024-30020,0,1,cc9b5a56980ff02cdd8d69b02fd23b4e9fdcdf1e3409b0b9c91771ec77fe5067,2025-01-28T17:15:23.177000 +CVE-2024-30020,0,0,cc9b5a56980ff02cdd8d69b02fd23b4e9fdcdf1e3409b0b9c91771ec77fe5067,2025-01-28T17:15:23.177000 CVE-2024-30021,0,0,33a7963d197cba861f91b7e0591ffaa981a77ea97759ddaca998052f275beb5c,2025-01-08T15:46:36.790000 CVE-2024-30022,0,0,43667532f65ff0b53387b8234898ff9f433c199f1b2ce49500723329e760b918,2025-01-08T15:46:52.783000 CVE-2024-30023,0,0,9416945581295109283a17eb1d99f9b17ab126301030f8415afe630cb0fe0e89,2025-01-08T15:47:02.393000 CVE-2024-30024,0,0,dabb051c03f81b43d8416493a51a114476e0159a5ec351f1dc83f3d88de6ea34,2025-01-08T15:47:13.457000 -CVE-2024-30025,0,1,303fc78459ed6170677c9d126fc35793385535b455828440ce430d67f67d930f,2025-01-28T17:15:23.407000 +CVE-2024-30025,0,0,303fc78459ed6170677c9d126fc35793385535b455828440ce430d67f67d930f,2025-01-28T17:15:23.407000 CVE-2024-30027,0,0,0dcc09c8689612ef4e141810f5fdb2bb4bd3a45aca0efcca423a06cefdc6d0f7,2025-01-08T15:47:32.647000 CVE-2024-30028,0,0,5d659cfbdfcd545490a8507c0fb9434e9e963eec345df488a28a8271e4bad889,2025-01-08T15:47:42.203000 CVE-2024-30029,0,0,4c948f29fa3e08ffee7027eae47f62d14458a3bf8a568e7881d80c9f4095a848,2025-01-08T15:47:58.657000 CVE-2024-3003,0,0,78a766eb2a27d90e6c3a6602d7b541a446a959cc45dfa310f5acc6722fa85ca7,2024-11-21T09:28:39.300000 -CVE-2024-30030,0,1,37892ecdf6da58f97d739e70f80226ffd9b0d5a5e8c59bb8905ab9b418310045,2025-01-28T17:15:23.673000 +CVE-2024-30030,0,0,37892ecdf6da58f97d739e70f80226ffd9b0d5a5e8c59bb8905ab9b418310045,2025-01-28T17:15:23.673000 CVE-2024-30031,0,0,eaec24b86ec3c772bf18a29e2e1f2d8aee993b4ac5434ad355c9c7457557d8e4,2025-01-08T15:48:09.667000 CVE-2024-30032,0,0,8e2db32d8091883fa385b4dcb8e37f3ddfd7572d104510c784f8369ab9736831,2025-01-08T15:48:37.563000 CVE-2024-30033,0,0,c5e25a1167bf46fd0b5726bcb42591f65965c2b1391cac06ede50dd8a018ee9e,2025-01-08T15:49:01.177000 @@ -254574,9 +254574,9 @@ CVE-2024-30035,0,0,da8189a989c95cce8d5f08da706fcc687c021b05179b24bb1973f6a61805d CVE-2024-30036,0,0,c7113a79574222a795bbda176773c48ee1043e69142ebe5cda8a43517fcf8ccd,2025-01-08T15:49:50.370000 CVE-2024-30037,0,0,f73d6ad5114cbe6a80525e62afbba48e677b916d63cf3e605483de0567bba938,2025-01-08T15:50:32.630000 CVE-2024-30038,0,0,c55c6db9516d0a531d6cfe05df8ad554b214c5ce110172d785ac2f6b63962f5a,2025-01-16T19:13:10.340000 -CVE-2024-30039,0,1,0def5f1e2144e2231a3b5e5bec466af0ce13d57f731fd73c20a1e14a6ec795ad,2025-01-28T17:15:23.990000 +CVE-2024-30039,0,0,0def5f1e2144e2231a3b5e5bec466af0ce13d57f731fd73c20a1e14a6ec795ad,2025-01-28T17:15:23.990000 CVE-2024-3004,0,0,090e547619a006fd8749e79d0e05f6b17fb4b3abcde3d586f7d775d03c5b12a4,2024-11-21T09:28:39.437000 -CVE-2024-30040,0,1,d847c33c5b319e1b5c8dca98e0549ce16f1d8dd08b183efba0dda3052aa070a4,2025-01-28T17:15:24.213000 +CVE-2024-30040,0,0,d847c33c5b319e1b5c8dca98e0549ce16f1d8dd08b183efba0dda3052aa070a4,2025-01-28T17:15:24.213000 CVE-2024-30041,0,0,f6cb8df06dbdd5b3577bae4b6d27fc00b9774de77840fba8ad7bf05a429e4a96,2025-01-08T19:13:10.127000 CVE-2024-30042,0,0,2ddeae73b8180fcd7b495ee7af2110afd4caf7ffe153ba2c55cd9ba91b6ad034,2025-01-08T18:59:45.373000 CVE-2024-30043,0,0,4238deb754843aa8d72d31430a10f30c6667ebbbec7c44850b6d8f05dd2eceee,2025-01-08T18:56:55.587000 @@ -254701,7 +254701,7 @@ CVE-2024-30179,0,0,f8038176185d07e7f724f868e44725dee5d89f9e567d5a1272779cd6cb9c4 CVE-2024-3018,0,0,f65a264962ae2b96d7ccf9718d594d89d33b43e0d817bc446c0cdf042d66d063,2025-01-08T19:35:58.073000 CVE-2024-30180,0,0,9ad3efa7e683e4471ea88f07410b3c0c613e57d65ed8126b5bf9db13a8b4971b,2024-11-21T09:11:22.647000 CVE-2024-30181,0,0,4b63a15f923a825c1f6a8173bcb6b942101ded5f17f3fc266f511573c31cc6ed,2024-11-21T09:11:22.757000 -CVE-2024-30182,0,0,86c034dadc49962b0db49175fd17d91f3835dd1ae09cb6d8f9ae27a948b24b8c,2024-11-21T09:11:22.890000 +CVE-2024-30182,0,1,a81fe3e00d46c578a5fa49e4c9a985f129425c5b65c74e18be12daadef011fdc,2025-01-28T20:39:34.613000 CVE-2024-30183,0,0,3c466350958593d90ca423ea65b4cb5e481df5dfd1cc5ae5c5525bde0c6264fe,2024-11-21T09:11:23.023000 CVE-2024-30184,0,0,687d938a7f6ece9acd3b8185e8886757183e17afb63a5ca83ac7911758ed5b39,2024-11-21T09:11:23.150000 CVE-2024-30185,0,0,d9a11fa1493c3d39202258e7784ebd32e5e9ef6143e723e534df965b9d61d3e5,2024-11-21T09:11:23.273000 @@ -255974,7 +255974,7 @@ CVE-2024-31870,0,0,a22970b8b31c24a890ef795348787c61b651a2014a187c16beca7c8cd6d6b CVE-2024-31871,0,0,6726649180f3a1806bdaab7f76584a792c1a4c30a81ae42603563cb5aa329f15,2024-11-21T09:14:03.970000 CVE-2024-31872,0,0,29a178642ac0509a5f609aaa76fc288eb59034f98c76c7a491a288614172bdf2,2024-11-21T09:14:04.110000 CVE-2024-31873,0,0,7798c708b9c946bab1527fa4810663c59a7ee1ec5efc7ceb302050266cac5427,2024-11-21T09:14:04.250000 -CVE-2024-31874,0,1,08d97743873b504cf45e78bca1a14f05191c21552dceacefeba0a8daf5d6fcb2,2025-01-28T17:31:15.617000 +CVE-2024-31874,0,0,08d97743873b504cf45e78bca1a14f05191c21552dceacefeba0a8daf5d6fcb2,2025-01-28T17:31:15.617000 CVE-2024-31878,0,0,2cdf4c028654e8fbf3c35b620eb5619fea9f488afd53ab3b9767908578e7f92c,2024-11-21T09:14:04.550000 CVE-2024-31879,0,0,daa01d9448ebcd5d37ce13841b8ea893e99fc319219124230413ac967ea6f1d6,2024-11-21T09:14:04.690000 CVE-2024-3188,0,0,ac8ae1051d0e0cfce4d404660997982f3348c488980e380cfc52379ab0a6ddbe,2024-11-21T09:29:06.483000 @@ -256992,12 +256992,12 @@ CVE-2024-33066,0,0,323275c133034cf4224fb00037d116cf25466127dfeb2577a4ca56f8f20e5 CVE-2024-33067,0,0,638bc9109794811420c30f35ea11d5d4e8d641b82ad31ae2a8a04e02b6bda35c,2025-01-10T15:39:01.290000 CVE-2024-33068,0,0,1d4eb491ffd27751b128ddbcdd27665d885fb6c0654a60e64c8908848b5f2e57,2024-11-07T20:07:29.220000 CVE-2024-33069,0,0,4a5a5f18faff9786c7e7eff1069eadfad4725803a4dd186adcecf1b88d434afa,2024-10-16T19:48:32.207000 -CVE-2024-3307,0,0,65433a4e506351266e1eb2e8d4ff2e11f50355e4a212316c678fd3a554b4d3e8,2024-11-21T09:29:21.743000 +CVE-2024-3307,0,1,192c069e9bf434972ea7f5761eacb8a4023245d4288c2839efa1316d2a577a00,2025-01-28T19:25:45.740000 CVE-2024-33070,0,0,ab6221ecd33104a17e11c9938ba8ceaaa061b181be94c7202aa830fb34495274,2024-10-16T19:47:04.547000 CVE-2024-33071,0,0,e53a736ac9461278da91e39c670c56974ca6fab70efa5d500f79ba198c2fad5e,2024-10-16T19:41:46.737000 CVE-2024-33073,0,0,b5d4e58d81439b774e84f6a69dd2172492c1aa589c80a5b1d8e24f1117a3650e,2024-10-16T18:25:05.420000 CVE-2024-33078,0,0,123868d87f2c6966578811c80dde93d57aaf0a1755ff1ef0a3801a7fd096c3f8,2024-11-21T09:16:30.573000 -CVE-2024-3308,0,0,d8ceef29f97f6ff6e2a9bdc13e16c2d4ea72b48d12d74a8bcfae0e2f807e85ed,2024-11-21T09:29:21.867000 +CVE-2024-3308,0,1,4eadc0f787891a7ad3f284e6810e7b17c27d93f326fb16a29ca2ad907805a95c,2025-01-28T19:24:31.713000 CVE-2024-3309,0,0,2c84c7c9dab970b4398fd9c8317b4103338d80007aa6cfc05ae442f3fe447961,2024-11-21T09:29:22.003000 CVE-2024-33101,0,0,060d2f20cd090be3be4b153edf45165363fd6d1d8c8d6968335cdbba1b546382,2024-11-21T09:16:30.790000 CVE-2024-33102,0,0,4953918f2cf07b479b9dc9d307ae24825f1d3a4cdfd759416b7c167da4c7fd50,2024-11-21T09:16:31.010000 @@ -257116,13 +257116,13 @@ CVE-2024-33350,0,0,4629b764cc4eaf66ae772956de8a1c8abb216f34e956b2bbce13d36ae0d5a CVE-2024-33365,0,0,f9ec22e06c79b3095977478bbee8588c545c1f3b46abddf9b07a4f7a5b6bc35f,2024-11-21T09:16:50.347000 CVE-2024-33368,0,0,1aed4b18a1492d5e22723c399fa6202a83f88860ce0815b8c4855ef51f160f76,2024-09-30T12:45:57.823000 CVE-2024-33369,0,0,b9490b3f7ca43c4b15f380a2b2afddef109797ed9310d8e0bbcf8d7a479d2906,2024-09-30T12:45:57.823000 -CVE-2024-3337,0,1,93fac470c900f6f8b15137cc4a36deefb5092aa95ff5568e01f2ecb87b3abff1,2025-01-28T18:10:03.600000 +CVE-2024-3337,0,0,93fac470c900f6f8b15137cc4a36deefb5092aa95ff5568e01f2ecb87b3abff1,2025-01-28T18:10:03.600000 CVE-2024-33371,0,0,0bc3e4314d6fe4061f07a606f73e55fada964a0fac1ed74cbfd5c14979e4ef20,2024-11-21T09:16:50.900000 CVE-2024-33373,0,0,536b72f24473d7eeca6af08a6fc040abe5d09b8640cf9f459256634f749c7e6e,2024-11-21T09:16:51.123000 CVE-2024-33374,0,0,74f1d636f52a32c597b2978544934a629869471c51c9ae394bee1952eff3f9e7,2024-11-21T09:16:51.360000 CVE-2024-33375,0,0,c32e6f6700722cdc4bc149c40c7fa5c2dadcf3bafd432e1a7f82355963355767,2024-11-21T09:16:51.583000 CVE-2024-33377,0,0,29f8e110cc22f81df8e9a24261e5d2f615523e4c26bc63c0f239422553649e90,2024-11-21T09:16:51.800000 -CVE-2024-3338,0,1,aaca7ee1a3f34104491b6e4228027bd5fdc783b387ed9054553456cff4427f47,2025-01-28T18:09:40.723000 +CVE-2024-3338,0,0,aaca7ee1a3f34104491b6e4228027bd5fdc783b387ed9054553456cff4427f47,2025-01-28T18:09:40.723000 CVE-2024-33382,0,0,daa43b1d7ff2d2bfabed375f4f82f5c5ca8a8e9d78e43e5ea3af98dbf1232506,2024-11-21T09:16:52.027000 CVE-2024-33383,0,0,9e2463eece43dfbfa8aebdf8f9e3371f9f6b21092fdc0e5bdb17c240e8d27450,2024-11-21T09:16:52.190000 CVE-2024-33386,0,0,c23af1c70fc3fe9ca218109ad8c4c43c7494439d5db75fee98f7665b96d71dd5,2024-05-16T09:15:13.600000 @@ -257130,7 +257130,7 @@ CVE-2024-33393,0,0,872b4aa0a904714599d1fa07ba1eef93484c03f03e9e08026f73897def40d CVE-2024-33394,0,0,61756142034e3efb42d5ef8780d1a6eb461f0239646f6fc159f03ca20b17bcba,2024-11-21T09:16:52.647000 CVE-2024-33396,0,0,758482c561afb96e8cd21cad78bee3f71f1716de54e4d40e2bd67a69913405a3,2024-11-21T09:16:52.873000 CVE-2024-33398,0,0,f693756af9e888c9f97b3005d23bcebc5682d9c05380cb7652ef3a077acce816,2024-11-21T09:16:53.090000 -CVE-2024-3340,0,1,9f0f8d69cde360730b32e17259bc7eaa4b8205ac840f5d7c4068ee98e055652a,2025-01-28T18:07:32.970000 +CVE-2024-3340,0,0,9f0f8d69cde360730b32e17259bc7eaa4b8205ac840f5d7c4068ee98e055652a,2025-01-28T18:07:32.970000 CVE-2024-33401,0,0,a6f0cb9be5123a9bac095abf8533dbba22ea5f9eb6b28e09196dc9deb3fc2db4,2024-11-21T09:16:53.310000 CVE-2024-33402,0,0,9842d8c5f7d882881bc7a583854fbbd3bff2bf7eabec67dfff727c1d2961e459,2024-11-21T09:16:53.460000 CVE-2024-33403,0,0,74de20333c433c9c11c831787b5c163234cd1b70f29536ce37b3db03763d464d,2024-11-21T09:16:53.683000 @@ -258210,6 +258210,8 @@ CVE-2024-34729,0,0,a9c60c9154b250ad0ad8fb09f024d8d1b9a123940a86c93e901bc505dc2f9 CVE-2024-3473,0,0,635984728ea9670d6b9cfdf6ab19079fff83892dfbc983db637b3e272784b4e4,2024-11-21T09:29:40.730000 CVE-2024-34730,0,0,45d08741aee6202ff7c55a96f7bd28befafc59a755472c03986c43b146b721b7,2025-01-22T18:15:18.827000 CVE-2024-34731,0,0,dabcba1d59e1f025a63b5ba7e0e668c40ba804a6e53f3f2f1868cf15359d53cd,2024-12-17T18:12:43.217000 +CVE-2024-34732,1,1,d1bf3d82707d7749cafbd7359cb7994cb92c729cfe73f5b95ac27df0bacb1d33,2025-01-28T20:15:30.790000 +CVE-2024-34733,1,1,afbb1f7ec81f4142ddf66d81971acd53cffd71cce9fcfb26d2a9813d296c6b02,2025-01-28T20:15:30.893000 CVE-2024-34734,0,0,d30ceeebe447a9d3b85ba81bb31ffe8db8e1bfaa20f969b2a1722a59d0c81073,2024-12-17T18:49:54.800000 CVE-2024-34736,0,0,796d4e22dedbbf6a45bf78b4b61b6b991a6074c75d5a0d88ca4d35b7a87b1fd1,2024-12-17T18:49:00.327000 CVE-2024-34737,0,0,593f66ce741ff2e6b0ae794a6711b3f436177aea1f4a0a005ee528acb1b244a1,2024-12-17T18:41:50.840000 @@ -258221,6 +258223,7 @@ CVE-2024-34741,0,0,a200ff859f75cbb740f0c4700156237f5570a0c5a7e335eb045f98ab4ecf9 CVE-2024-34742,0,0,9fb58a874ed531eae6b8f87bbca2a07dd0fc59db4798ac22215d023539652d17,2024-11-25T18:15:11.980000 CVE-2024-34743,0,0,435ed3326ede6ddd67e461747dbe51de0c1ad4cc5af9b9a7445aee748ca92c8c,2024-12-17T17:47:48.797000 CVE-2024-34747,0,0,59f7ab211e0009fe0101ef2f22c321cd0b38ca2b0f6d0bc8b6a93b6fe1ddf0f0,2024-12-17T19:37:38.390000 +CVE-2024-34748,1,1,3746aeda8a7be03d2b424009bf89c682faf683a87af8668699a495ea057929dd,2025-01-28T20:15:30.993000 CVE-2024-34749,0,0,fa8c0597f222663ae582de190ba5fc78d5347907a5cc8941aa2a688c78cdaa19,2024-11-21T09:19:19.233000 CVE-2024-3475,0,0,2ee81b44f59f26f61cb7b02cc275bbb17da2abb64544c940f3eacda6485f50e8,2024-11-21T09:29:40.967000 CVE-2024-34750,0,0,9678d8d73fc1fd82b79fe1d162449e447db128b26495e0b4c62758c13f59d499,2024-11-21T09:19:19.377000 @@ -259890,15 +259893,15 @@ CVE-2024-36994,0,0,6ae6427754234d6ed256fc2331a8aa393d98984850d7174f5f368ebaf9716 CVE-2024-36995,0,0,73cd553f65536ac335f1c0746a6d405c1387e249d311b60b01b74411ff471384,2024-11-21T09:22:59.907000 CVE-2024-36996,0,0,59bb280a47ec504c1079da292d01df99037a869afd9838585b9a937a0dfbe247,2024-11-21T09:23:00.057000 CVE-2024-36997,0,0,d16bf8b387fe3b9d665adcd4b222a22e88b0512aa442c11d99217d1cc1ac56c9,2024-11-21T09:23:00.207000 -CVE-2024-36999,0,1,dbcc2944b5ab6f4aaca33f9c74f5736a9559dbdd8f905c860c9cc104cc41f2bd,2025-01-28T18:15:37.430000 +CVE-2024-36999,0,0,dbcc2944b5ab6f4aaca33f9c74f5736a9559dbdd8f905c860c9cc104cc41f2bd,2025-01-28T18:15:37.430000 CVE-2024-3700,0,0,d05b82826d9dc216b860cfbf1b80f09e4468bcf111716f15838ac5b3fb9e0e8d,2024-11-21T09:30:12.350000 CVE-2024-37000,0,0,f4c69baf3a5167528d99b97f298822f7b3831e8369b08557282b4a963e5e0dc2,2025-01-27T21:15:12.133000 CVE-2024-37001,0,0,2c84f978525013a7d418029b4b19c236ae1ff209fc73fb8632d645bf32626a99,2025-01-27T21:15:12.383000 -CVE-2024-37002,0,1,253519158675288f97dea563b529cfdead5a65fcd1c00c03aedc406742208c1f,2025-01-28T17:15:24.460000 +CVE-2024-37002,0,0,253519158675288f97dea563b529cfdead5a65fcd1c00c03aedc406742208c1f,2025-01-28T17:15:24.460000 CVE-2024-37003,0,0,a92d4468a09e278f819ce222b9234998501138b7ac1859d76b31f373d8d38030,2025-01-27T21:15:12.767000 CVE-2024-37004,0,0,77870d70de7e488a3423fa7176c2ca24f3c9d6636145c526155d5e133b9e804a,2025-01-27T21:15:12.973000 CVE-2024-37005,0,0,be2fba9211215a590daefa973e4b1599e2a8f6293ccd238df544621ba0784f7f,2025-01-27T21:15:13.217000 -CVE-2024-37006,0,1,ad6ef5e3eb9c66a09922918118a248bc70a7358b09ca483a4ff67cd3af5355f2,2025-01-28T17:15:24.670000 +CVE-2024-37006,0,0,ad6ef5e3eb9c66a09922918118a248bc70a7358b09ca483a4ff67cd3af5355f2,2025-01-28T17:15:24.670000 CVE-2024-37007,0,0,864ffcca07b778a8f93d3caf82450ede66896131fdd26b523d8b0d4d1b43a6cb,2024-11-21T09:23:01.823000 CVE-2024-37008,0,0,833b012e544d4550e0b54fe6115ca18d43b3ee222c8725c7bb3c9244627f8f83,2024-08-23T16:57:34.547000 CVE-2024-3701,0,0,50bdea4c9ec91830ef8037c5953a8006fcd1ecb6da9aeb7c0b83fa96cf91b9c7,2024-11-21T09:30:12.500000 @@ -261613,7 +261616,7 @@ CVE-2024-38993,0,0,172de65e7240c6a5f6bf645e694b0d2e344b70f8de661fa2be14422eb43b5 CVE-2024-38994,0,0,2a61e436904a48b4ded58b92d6bc8b107cabc4ea861dff38f3dcd8ff23c78c3a,2024-11-21T09:27:04.170000 CVE-2024-38996,0,0,8fd4a7ef6b42b1a63cd868322179bb9481740ea02fd238379ee386c0fbf6a026,2024-11-21T09:27:04.387000 CVE-2024-38997,0,0,29421658f8acbee523241d363ca96c6a4d61054e874bc93ac98fb62157248214,2024-11-21T09:27:04.613000 -CVE-2024-38998,0,0,a277b73428464e0f7951188aaae0334543e74dc8faee9872a3a4f167e9e630be,2024-11-21T09:27:04.827000 +CVE-2024-38998,0,1,1ddfa2c100a7af4725f52a46bac654024fff6a96a1ee34fbb54fd0ca70641bb2,2025-01-28T20:15:31.103000 CVE-2024-38999,0,0,7f217baaa25d7f40b740199108f4604ad2f09c6c0fdc981cabbaf727e9dace92,2024-11-21T09:27:05.063000 CVE-2024-3900,0,0,237e455ad1182954d947891d10732281c5e53fdf19636fc42d58fae27637f1c4,2024-11-21T09:30:39.610000 CVE-2024-39000,0,0,530f16d741de9db26cb1201234320349b7ea94293b8a7e4203a71d20e34e8516,2024-11-21T09:27:05.280000 @@ -262319,7 +262322,7 @@ CVE-2024-39895,0,0,6c9f43bf2d5b14f7c195d7f27e8da55d0fdfce3c789ba8e50bd50c39978ed CVE-2024-39896,0,0,94854292dd96847b416ee3a98f9f2538650654ead9d516ca3f42ab04a45acc43,2025-01-03T16:30:43.367000 CVE-2024-39897,0,0,2556606fbcf0e7ba0936e5da490b4aa4283af8c4bc064dbc26051be7c494f614,2024-11-21T09:28:31.350000 CVE-2024-39899,0,0,5a1391f0b0d9dee2f37bbd1f62e59efe6b2b51d0e7e95d4354ecbbe7b3b6e4e2,2024-11-21T09:28:31.470000 -CVE-2024-3990,0,0,63955c2c9c9e719bd6225aa2b3a2485a59cf64528022a7c9639ecbdd7b611cb1,2024-11-21T09:30:51.623000 +CVE-2024-3990,0,1,a3a5d60b620758cbf1c2a459c77513e82cdd6295ebb65b625ab2d99098447b48,2025-01-28T19:23:34.850000 CVE-2024-39900,0,0,a80cba3ff0874444694054f5b966edb196bd914599676a927a76749ba297830b,2024-11-21T09:28:31.610000 CVE-2024-39901,0,0,dfe56b10f6e323b587500698e0833597c95fdbbfc63c2621d91311d6c3045504,2024-11-21T09:28:31.763000 CVE-2024-39902,0,0,8a92fe2eb2d3c1d09c05c44d4dd4b076496180333be346b46d05c5ed84c2a7c1,2024-11-21T09:28:31.950000 @@ -262612,8 +262615,10 @@ CVE-2024-40644,0,0,a57ad1bfdf68296ce8a9539e505efa1809fefd866555c9c76d8987e02e0e4 CVE-2024-40645,0,0,a3f49b95b4c12b5444ede2f523391703502ab565df4a5cf2c506d73c2cde7df4,2024-09-05T17:09:16.947000 CVE-2024-40647,0,0,88935cfcec599678993a6403e316caa0b9a2d4c594531b02670b7f84c2cb6867,2024-11-21T09:31:25.587000 CVE-2024-40648,0,0,d1a60a844ec096d2fa051ae2f056504ecbdead31db11117a3172d5ff5e1a66d4,2024-11-21T09:31:25.720000 +CVE-2024-40649,1,1,e2075297b73a66443d22d04777dca6b0569f976c3a6ac2838592c7c61c27509e,2025-01-28T20:15:49.063000 CVE-2024-4065,0,0,8104e642d3086741414933f46b271721462b9ac994c8f65befa5dad67209802e,2025-01-21T19:05:04.657000 CVE-2024-40650,0,0,78138be7e0cafd2635985c4e24ab654bf9d1895811ba8f47491211caaf20f74f,2024-12-17T19:08:50.857000 +CVE-2024-40651,1,1,7a6556b431b790a2ed5fd47420fa1bbfb3954808117f61e5eb0e0967db515b54,2025-01-28T20:15:49.160000 CVE-2024-40652,0,0,3f440f86342c58e47996d56495558243ae5edd7e5b0d377daab8b5a46ab73bda,2024-12-17T19:09:03.173000 CVE-2024-40654,0,0,92b6520c587274abcdf8c0d347f6bea7ed6a9174c82ea6943ece9915b4ce4a3b,2024-12-17T19:09:27.327000 CVE-2024-40655,0,0,73cefba958d24ff7dc513473b2797d5e63d9a5a24312d4dd5a6749f216069379,2024-12-17T19:09:51.027000 @@ -262625,8 +262630,16 @@ CVE-2024-4066,0,0,3af5df6c145362d9851cd86a7d51e714cf54c4e6049b7ebef259e6d9cb06fb CVE-2024-40660,0,0,b7c78dc1f99c1908de45423562bff4e1020b202a8369eadb6ebe92a17540bbaa,2024-12-17T19:36:04.020000 CVE-2024-40661,0,0,e9311a0488c8beb4857508062f47da62f4761ca246a30ea7974cdfed1317449f,2024-12-17T19:32:42.070000 CVE-2024-40662,0,0,f930fc5956328b9ceaccc04df86a895546984aaffbdfff03287ccf231f34c2aa,2024-12-17T19:07:42.750000 +CVE-2024-40669,1,1,8de0696503bba6672fb5c3d652cb2ab4e8bfbf9ef39f21fbf4ba1a55f53c6021,2025-01-28T20:15:49.250000 CVE-2024-4067,0,0,06cf73941215eebfb58b3f7712c48b8f71a364f025c4b7e91b6494998e5c5a95,2024-11-21T09:42:07.587000 +CVE-2024-40670,1,1,37162e4a5212ce0665865224b8a27eb12afd6ea8694ac57c22da2f9559a1a358,2025-01-28T20:15:49.343000 CVE-2024-40671,0,0,4520d06fdb2a855ee77cf9a82325fd4ddc6fdfedc3ecf68cb89582eb0d5cc2c7,2024-12-17T19:30:29.457000 +CVE-2024-40672,1,1,ed6e4757ddaf73853f5c03009bcff47addf403633e8a6d704ee8c0d182d7086a,2025-01-28T20:15:49.433000 +CVE-2024-40673,1,1,26f66cf78ec7eb12173b1ec970f697249d4eb8d3a28275c500a8c4ea6622e6cc,2025-01-28T20:15:49.530000 +CVE-2024-40674,1,1,719de82aed37087b80dce23165237b3c2e682349281cd9079c29b0fb4ee14fcb,2025-01-28T20:15:49.620000 +CVE-2024-40675,1,1,8e755fbaef606f54a9ee8d0483846ffde91a70e1b31e5742cc034f19180aa3bf,2025-01-28T20:15:49.710000 +CVE-2024-40676,1,1,4d5b396aebd3e9cd9619990194f2bd1522cb27f6e4ee469df63ca1d4394e371c,2025-01-28T20:15:49.800000 +CVE-2024-40677,1,1,5609542847df0552b92ca3577cf66076222360a76a834a2522ce6d0d3effd62f,2025-01-28T20:15:49.890000 CVE-2024-40679,0,0,1a4f43e2caee22490662a400e96b2c2bc6cc2720e0ab97475d03ecb065f8ddc1,2025-01-08T01:15:06.953000 CVE-2024-4068,0,0,6064b7191c4bfe6385dfb9559ff0d900f6a3c128ca3c30b46fda682863dc73a3,2024-11-21T09:42:07.710000 CVE-2024-40680,0,0,bd67df4a239df055ff0046ce7193fc2f150970ac8a25905d079ed701abf99ef9,2024-10-31T17:15:12.990000 @@ -263094,7 +263107,7 @@ CVE-2024-41170,0,0,7c50c7e0ef992b5a3c278ba9993ae63d88ca15fcfd1b1982b492fe16db9c5 CVE-2024-41171,0,0,0dca69f1495b394ad73f5a01f9a137638e2f9b54f6b0f4440abd7941e198b487,2024-09-10T12:09:50.377000 CVE-2024-41172,0,0,218baac386736913d476b25367b32ab36c899e9cf2567ed4fabd03211855644c,2024-11-21T09:32:20.520000 CVE-2024-41173,0,0,f082f5e246c798064939a432f052b99b387e5344c6c78f0d0386f8aec2d5d387,2024-09-12T14:52:20.820000 -CVE-2024-41174,0,1,f2d2877aa6903da93d7d71d3affdf25ce6edaa0ee38ca417c6c9d427ec4d816d,2025-01-28T17:27:44.077000 +CVE-2024-41174,0,0,f2d2877aa6903da93d7d71d3affdf25ce6edaa0ee38ca417c6c9d427ec4d816d,2025-01-28T17:27:44.077000 CVE-2024-41175,0,0,cec624fc33fae63dfed68b2098651246601bbf8a8595860c2dcca95fde5d2c27,2024-09-12T14:25:10.307000 CVE-2024-41176,0,0,9b4d1e82a605208153c7022555dcb7a88c57b12d4f2d12d0d698afee036a6f47,2024-10-01T07:15:03.147000 CVE-2024-41178,0,0,1e82029023df09d4594c993b1cab982134dc10a098ebb6d026c202799d70ebc6,2024-11-21T09:32:21.140000 @@ -268245,12 +268258,12 @@ CVE-2024-4841,0,0,177b39cd4a0e83cfae37bbb1b481e330bd5314d74a4028705ec45704dd9da4 CVE-2024-48410,0,0,76acfbbba797fbded687285f1d6b7f4e69da30abbf2ce3a40c171e75e974afe7,2024-11-04T21:35:10.317000 CVE-2024-48411,0,0,8c635fbfe1f17c34a6d067e8b46ccb07648ab30edbd28d9ac158683932c5ce62,2024-10-16T19:35:11.290000 CVE-2024-48415,0,0,bb9e3b97ff90d39743d554ba54d4e6857ce95f8c7a439d575dc2c98763652ebd,2024-11-26T20:29:57.070000 -CVE-2024-48416,0,0,a73fc845d210ede59e41667cd7b2f82875a0c7427ffff3ffd61f77303dbb99ac,2025-01-27T17:15:15.770000 -CVE-2024-48417,0,0,f98fe09df889e27e57bbec71241cea5dc2ff33432186818e4fa4371963707f89,2025-01-27T17:15:15.867000 -CVE-2024-48418,0,0,8f680c4bd5196d794f60bf08c354d05804b8517f2eed1239eeae8bddf87f50da,2025-01-27T17:15:15.960000 -CVE-2024-48419,0,0,ad828a11925a49dab8277a93c2b085ccf07939c6197e9aac8d7e0e139341e27f,2025-01-27T17:15:16.053000 +CVE-2024-48416,0,1,29decd2545745852f0b3bd806430647ddf50e35438ebb0b0f6f40c1b2052b2fe,2025-01-28T20:15:49.987000 +CVE-2024-48417,0,1,59f2a0de5969ada51249d1f6ea52133c8e8d1e70cc1504c4105530677f3feb32,2025-01-28T20:15:50.143000 +CVE-2024-48418,0,1,3c74c8c1712fe4f6d91646ce47422397df724e29057ea45622e0cac4b0f0c2de,2025-01-28T20:15:50.283000 +CVE-2024-48419,0,1,5dbc3fc453936c2e63a6537fe01304e925021ce2dd4b3a295e9fd1ce60011e0b,2025-01-28T20:15:50.423000 CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d426,2024-05-30T20:15:09.703000 -CVE-2024-48420,0,0,bd10cdf7a10deff201ac1f62616680e1352a75cfce791a8b2b36c171153a4c72,2025-01-27T17:15:16.153000 +CVE-2024-48420,0,1,7ec9df5dde76d961d221a571bd3b8fb06a63d9c9c007d7fd46ebe0677ddb7896,2025-01-28T20:15:50.573000 CVE-2024-48423,0,0,905d7aa9f40bc2315b64415beaca8558efff30feb4eedc78c3f814354c0055b2,2024-11-21T09:40:45.127000 CVE-2024-48424,0,0,9375606a1385c09668a8d2d1f5401d048515fbfd22cd289e15fe454c4a078717,2024-10-28T18:35:03.257000 CVE-2024-48425,0,0,e76f599f374f33c20c74bfcd6e8302eb09e83f2739633f465d68d77fe419098b,2024-10-28T19:35:28.823000 @@ -268346,7 +268359,7 @@ CVE-2024-48656,0,0,356ac527d627a35ae4fb887d06c7ebf57fe1e9ea88032a7bf0d0e2b62a0c4 CVE-2024-48657,0,0,18cbce2a64471ea851cf63f59039293963cbba9258e0d2e6c68a3e04257848cb,2024-10-24T14:38:41.620000 CVE-2024-48659,0,0,a4994eec5cde2ff529af4c431e21090733a1ede66f6e8603b23cda70d71a876c,2024-10-23T15:12:34.673000 CVE-2024-4866,0,0,daa8bd59cfc9e1317ae914c4e0c8d7abc6dfad68ea3a67c32b9eb16148687390,2024-11-21T09:43:45.430000 -CVE-2024-48662,0,0,e930f83118512eac7ee61ec34cdf3a4b1ed2fca93d79402c4d11207bdbc09aee,2025-01-27T23:15:08.843000 +CVE-2024-48662,0,1,ce7829f966a704731a8de90e7a6af83e3acf0153fe3904776e8ec3ba3f1f522e,2025-01-28T20:15:50.727000 CVE-2024-4868,0,0,7fcac4c223abfc0b7449e6babe1af74ba6e012053b04591d0d82006400a0b852,2024-11-21T09:43:45.557000 CVE-2024-4869,0,0,a498392e92d4315a3c1a63f0751024c8b7def437eeab49123db178ff4b1bb7ed,2024-11-21T09:43:45.670000 CVE-2024-48694,0,0,faeae9ab327b97202e086aff921470e6b984670cc294f1289742129b482c0fbd,2024-11-21T17:15:20.110000 @@ -268372,7 +268385,7 @@ CVE-2024-48743,0,0,8a901d521bee4fb37fa6631ae86bffe209ffd6825102f3fe83b6c17d5586b CVE-2024-48744,0,0,2075f33fe8737914bba0330897293beec62cfc78359643f6fd0ded65a78587d3,2024-10-16T18:35:07.013000 CVE-2024-48746,0,0,70b1bf92976f7b515824754b06ef5e640b752fe34bb7804f1674438f52e03c18,2024-11-06T18:17:17.287000 CVE-2024-48747,0,0,f03e580691c37a981f499cf0b560468ec0253c9c99edec66cb15f26778f95804,2024-11-26T19:15:26.443000 -CVE-2024-4875,0,0,585969eac15f8bd11d5bcd2a60f588ebe625d371a1c47289a8ad760c0c537652,2024-11-21T09:43:46.460000 +CVE-2024-4875,0,1,ac1a4cd3c3015a7e51b909244836132983e845092f22afd31b06eebb6822f810,2025-01-28T19:20:29.297000 CVE-2024-48758,0,0,6d6595f4f9c5157363905a29de4e8aa05d9c595a5b50795bcb679a26374e8aff,2024-10-18T12:53:04.627000 CVE-2024-4876,0,0,65d8065cbe56070f462c8629050b655fbc478bb065b4ab8ba51acd1e3033dac7,2025-01-24T13:44:58.993000 CVE-2024-48760,0,0,2c515de9d3808545a7fdee77c025d0a4f76a44cfac1a6b1790d2a3a6eabc5e21,2025-01-23T17:15:13.713000 @@ -269992,7 +270005,7 @@ CVE-2024-50658,0,0,dc74515f499285ca9589c261009f1434e39f4df3c1feba74e29bae75532d2 CVE-2024-50659,0,0,070d9cee09db7fd442130a440bc492ee33550ec72e00250b2d953adb8bd85a17,2025-01-08T16:15:34.597000 CVE-2024-5066,0,0,0791653545be3944782f3bdc7c1ab3604d2c7f0fab82f79e00981952033549de,2024-11-21T09:46:53.670000 CVE-2024-50660,0,0,f71f8e7c2fcb36b53cf871d625509d1de985a324b433af36346565606f116252,2025-01-08T16:15:34.817000 -CVE-2024-50664,0,1,4a69f35acfc04172261c1cb64139aec3a9e97361857b4fdb3f358602706ccec2,2025-01-28T17:15:24.847000 +CVE-2024-50664,0,0,4a69f35acfc04172261c1cb64139aec3a9e97361857b4fdb3f358602706ccec2,2025-01-28T17:15:24.847000 CVE-2024-50665,0,0,e23cfc84806902554f96be5a4f6053908a31047113bc4150b656a3b0c69a6b9b,2025-01-28T16:15:38.797000 CVE-2024-50667,0,0,2acba17bb6b4eea051169d8d69b68e53449d255d2507f74a89d880a87e24dc78,2024-11-12T17:35:12.270000 CVE-2024-5067,0,0,1b5c70fd6aa8a713385c4f1e29f8c71eeaa98648b5736e6e39376f75e3abb922,2024-11-21T09:46:53.810000 @@ -270581,7 +270594,7 @@ CVE-2024-51723,0,0,405dcadcdbf00249437ac8a26372209fb3d01c194653eab79c47481a1ec06 CVE-2024-51727,0,0,8858c32e9c05ed142d6035368629a58d5f5511d07aca54fdd69ef146c2c5ebd8,2024-12-10T19:51:08.360000 CVE-2024-51728,0,0,3bbad1d60c33e7237d8b468e87256ba82f10b9e78f6e5515e077c2c0433acca1,2025-01-13T10:15:08.360000 CVE-2024-51729,0,0,0f55e9102ab1f809882a11b078feb4a5eddc3c61bea203a3afaf0721d78465a3,2025-01-11T13:15:24.650000 -CVE-2024-5173,0,0,503d05821818db181c2ae43ba4a1f75c47fab7b36f256545e7111cc4e5fe556f,2024-11-21T09:47:07.830000 +CVE-2024-5173,0,1,c89d4e627c90f45a45535ae5f227b77a7cf6eb9df9b98bb2f7d1bb81dae192a9,2025-01-28T19:18:40.393000 CVE-2024-51734,0,0,14929ea2cfd8244892589bf2c0ce5543b7359978b4b9a4825d85680dcc28a977,2025-01-22T20:15:30.610000 CVE-2024-51735,0,0,48473e5db4cd5ecc77914f0341bc3fe19cd3b449987f541b0b758a8a1a3f060f,2024-11-06T18:17:17.287000 CVE-2024-51736,0,0,29e0c9e964880fe165f986cd62daad2610accc1f9fe0e31c385a89c289e90f1f,2024-11-08T19:01:25.633000 @@ -270884,7 +270897,7 @@ CVE-2024-5211,0,0,7cd6e2e70261fb739ea7e3e47a4f6fba32a9363515da62c2688f8608cf4764 CVE-2024-5212,0,0,0f9b3d1e48853644476ae3ee9a1d012690d355070fce3d62201caa71c818cbf6,2024-09-03T20:45:20.603000 CVE-2024-5213,0,0,5c8c63d05576e1770ede47d4378a318d4160943c618f7de2f4e944b5684fb8f5,2024-11-21T09:47:11.893000 CVE-2024-5214,0,0,63d7572dfe3fc62d2b94f5bd6d323fcf441de42b521ffae91ecf8348de5e238f,2024-06-03T19:15:09.360000 -CVE-2024-5215,0,0,d95cf7fce9f56649b4afff78d88a04b593736b4a4effa8c86ad492fbc0bd83de,2024-11-21T09:47:12.033000 +CVE-2024-5215,0,1,bb0a336c4d67073895e309ebdb438f7b5ff1bc4c7549d2fd8103676a5f6ab3ae,2025-01-28T19:17:56.683000 CVE-2024-5216,0,0,a6cb0d78c97f1833668004bce4e1a3d8ad03ce71671240c1316442591a36a40c,2024-11-21T09:47:12.147000 CVE-2024-5217,0,0,bcb367f5e8f4934ec54457a6bf1d1b467936c7817252514fef2d7bb7ed19c2bf,2024-11-27T18:56:05.783000 CVE-2024-5218,0,0,4adcb0c34373dcdf3d317dd8a7e6d0439942258855805a791e5be6a5f3796ff5,2024-11-21T09:47:12.460000 @@ -272473,7 +272486,7 @@ CVE-2024-54457,0,0,da0353a7ec7d859fd477580e7c54e31a24aeea86ab2c2ac2e00b7a1eda59c CVE-2024-54460,0,0,46a2824e2a284b445162d596321895979fee49d319c455c9a3391c11ac25744d,2025-01-16T15:15:42.083000 CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000 CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000 -CVE-2024-54468,0,1,e41bb0e753c18c569ce9adb387f3c6092ceeb53f5e853e60e41a3a463eb4ebf0,2025-01-28T17:15:25.057000 +CVE-2024-54468,0,0,e41bb0e753c18c569ce9adb387f3c6092ceeb53f5e853e60e41a3a463eb4ebf0,2025-01-28T17:15:25.057000 CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000 CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000 CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000 @@ -272521,7 +272534,7 @@ CVE-2024-54517,0,0,93b0960a5cca6ca652546e4259a2a5ab8d449f09280201dc7b78cc63ff2d6 CVE-2024-54518,0,0,7a38e22038aeb7be612ecab9809efec16de7547dea2675297852eea4d4788df5,2025-01-28T15:15:11.900000 CVE-2024-54519,0,0,a2d7e4325c7cc6e4b1f41b5f5dbd8b804a1888ca49f38f1232adb57ece7ff9bb,2025-01-28T15:15:12.050000 CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000 -CVE-2024-54520,0,1,7a571c6e7b6161d850d15808835c6ab21b6506c1e35c9db1ff402865c5a3fe27,2025-01-28T17:15:25.187000 +CVE-2024-54520,0,0,7a571c6e7b6161d850d15808835c6ab21b6506c1e35c9db1ff402865c5a3fe27,2025-01-28T17:15:25.187000 CVE-2024-54522,0,0,254203780d93309fd4a94a766ceeefc3a15f47ac705858173a230c9721b02371,2025-01-27T22:15:13.560000 CVE-2024-54523,0,0,0155da17dd45eb46f59a34af33d3d9dca19539b7cc1d7ed919dc688ff4a61f33,2025-01-28T15:15:12.190000 CVE-2024-54524,0,0,f1841b79a984dc339395e420615a7246f02aaa993793861427c269ef59ff9324,2024-12-18T13:59:47.450000 @@ -272535,7 +272548,7 @@ CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851 CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000 CVE-2024-54535,0,0,93cfc2e3f7ef6acbc5dbb1cc184a51f7781d104271fc6b2624d565551722e790,2025-01-23T22:15:14.160000 CVE-2024-54536,0,0,1573e356a10b2569b40afaa0fca34596b260ce05149e5dfaa014069d5147d348,2025-01-27T22:15:13.853000 -CVE-2024-54537,0,1,ee1f5708e40934595c69391b0b41d5468c29b5157452f8d73d1392687c214d41,2025-01-28T17:15:25.320000 +CVE-2024-54537,0,0,ee1f5708e40934595c69391b0b41d5468c29b5157452f8d73d1392687c214d41,2025-01-28T17:15:25.320000 CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000 CVE-2024-54539,0,0,d443ac2c79222e082d02f106d93c7bfeec685245a030b828bd36881aee762e21,2025-01-28T15:15:12.340000 CVE-2024-54540,0,0,9f4df0a7b4384df86d380577ed349e05a61099c20d2e88a431caab43d2fcb14b,2025-01-16T15:15:13.697000 @@ -272578,7 +272591,7 @@ CVE-2024-5470,0,0,b70339f8a022f56de8d4eb030bd8f5d3563ba0fc9c1634fd55ea697aee92ed CVE-2024-5471,0,0,631b7a50303d6f9a193814092037f29379ca6ca2282e0b67207306f8abcc9ba4,2024-11-21T09:47:44.903000 CVE-2024-5472,0,0,5e12957cd076edb077638ab18db3a7202837e8fd64948bba00e3365a85b54117,2024-11-21T09:47:45.027000 CVE-2024-54724,0,0,ba745a806f7adf5ec3f012771244838e01c7aa8ab9a8bb0162dc83573ba19f7a,2025-01-21T16:15:13.583000 -CVE-2024-54728,0,0,95ccdb3e543d56fe9837761cd367a1eccf7a019ea6366e02cd1622cfb38e55c7,2025-01-27T23:15:09.353000 +CVE-2024-54728,0,1,42216ac564624e9e133e33caa2f322a39ce480465064ef1713dc9e7ecc39c198,2025-01-28T20:15:50.873000 CVE-2024-5473,0,0,fdd6160c6121db618882f16bfc9c17f8c3a2501715cb9519638ef5a1fcd2441d,2024-11-21T09:47:45.190000 CVE-2024-54730,0,0,1f5b2039ec78df882c8a067f1f2e14a50bc9fc3855df85b8baefb9b0165aa937,2025-01-16T16:15:31.407000 CVE-2024-54731,0,0,acd86fbebdd274bead6535bf83cf37467581b483235e177fd7e87a697a25d37c,2025-01-08T05:15:11.810000 @@ -272719,7 +272732,7 @@ CVE-2024-55224,0,0,4f8d131824b20fb869af69c38a084a00b535a965cb641c1dcc385c5e0ee6c CVE-2024-55225,0,0,65ed599876ed6d6a32d724946af47b3c7b45688e546c4270a7c0aa2b7e07dd80,2025-01-10T18:15:24.530000 CVE-2024-55226,0,0,33de94a32577e3a21e3bfd2bd3c203596c6338516324a9df6e2cd8fabe427868,2025-01-10T17:15:17.393000 CVE-2024-55227,0,0,e950112fa5df25206bee3f882fcc5fb384b448d0299283a73df0986a8631e81b,2025-01-27T17:15:16.523000 -CVE-2024-55228,0,0,296b5c52c85df3acd856fb294aa9e6d1a4a99c79140c1eba482acc7f379d2cdd,2025-01-27T17:15:16.633000 +CVE-2024-55228,0,1,ff675650c5ee6876dc62989bcceef2bde061894c1c46820a3a385da0d4aa1378,2025-01-28T20:15:51.017000 CVE-2024-5523,0,0,0b2c43ef384781b0113b9be6f2b000f9de2199a81d337c7e51164ef3b409e6ae,2024-11-21T09:47:51.940000 CVE-2024-55231,0,0,bc333f6409b44ab3c99000a12bad2fde8a29ce447ecd07b39a700d49ee237739,2024-12-26T20:15:22.363000 CVE-2024-55232,0,0,1864ac97778845b0c2006d5c17dbf59eb90aad80a835e2f552f3f64f26c6392b,2024-12-26T20:15:22.673000 @@ -273083,7 +273096,7 @@ CVE-2024-56170,0,0,32611264582c3e86fc6149b20f12d5acbffe58d1028228c5f9baa4ad2faec CVE-2024-56173,0,0,5336dffcdc7d9618ebdef949381efb90ee1b3998a2588e22f737fe5a77849f25,2024-12-18T16:15:15.600000 CVE-2024-56174,0,0,3281f470ed49ef5807bf603f02908731fff1047853105938ff5649e5ffd7e97c,2024-12-18T17:15:15.190000 CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f6144b,2024-12-18T15:15:13.723000 -CVE-2024-56178,0,0,1efdfef293ddbf7af42d944bba14ced8a0c39caae11cc8ddc8d7b6ed02d00e30,2025-01-27T23:15:09.480000 +CVE-2024-56178,0,1,5cc5bc09d299e47cd8de55ac25d0c0eac961f22577b1f610a8dab4a387640af1,2025-01-28T20:15:51.173000 CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 CVE-2024-56198,0,0,d9de207e762af79ae5486154cdbb63e6556ac0599a95c1cf37d7f9e9fe1adfd1,2024-12-31T16:15:27.247000 @@ -273204,7 +273217,7 @@ CVE-2024-56311,0,0,ae98370c926cf4035db6beab289ec95f535595d8cbeb5d5d170bb60f5e930 CVE-2024-56312,0,0,a105d2d2c496ae4a31974572451f1a2391cb63512239c561ea05256145cfc002,2025-01-14T17:15:19.057000 CVE-2024-56313,0,0,5f9fbb8f2eda640c1b051bfdc491a6a52b895e91ada0d44715e60ffa8a2b7b44,2025-01-14T17:15:19.187000 CVE-2024-56314,0,0,06b0777f9ad266c15efb615a2fa29ad1728f8b2f5f78756efb9474bdd057a57b,2025-01-14T17:15:19.280000 -CVE-2024-56316,0,0,06f5613598a85d6bf7f7412d2821358d807f462be8f8d6dd1a9da48cdc4a714f,2025-01-27T23:15:09.607000 +CVE-2024-56316,0,1,49f32ec22d0efbcfed1f30696d2d5fa857e6214e96e2e028ad8350a4040346ad,2025-01-28T20:15:51.320000 CVE-2024-56317,0,0,8d6cb761ec1de8db3f8894652188d82bc1e600feec839db7f7746cdf2c5b129d,2025-01-02T20:16:06.723000 CVE-2024-56318,0,0,4614542827deff1ff7fc917535aa016ec46ffc813ff98610f6d274ec4b4e2e50,2025-01-02T20:16:06.917000 CVE-2024-56319,0,0,28ca3f0845265026262f805138452dcd32240d1eb92a7bdb1a246f385a35fe7a,2024-12-31T20:16:08.380000 @@ -273629,31 +273642,31 @@ CVE-2024-56923,0,0,be73f26a48655a6c99b484271ed1e42d7600b948c1a837d43e3410b428c3f CVE-2024-56924,0,0,2dfd0f4cb2cee49ddeeea2a79bc2fa0288c3fc810897b51482d81940308871b9,2025-01-23T17:15:16.710000 CVE-2024-5693,0,0,21ec44ee8ed5f9de3ae93fab02d376513f10f0c9f8c82a8733146d6a99b0ff3a,2024-11-21T09:48:10.807000 CVE-2024-5694,0,0,96312914234d61d70e9f2b2f2db102c559d8f68a0c34e1673db920a9b13837b6,2024-11-21T09:48:10.990000 -CVE-2024-56947,0,0,9a9ff1c384355028517e35a9ac38a44304d235cd73d0f938d164a32e8baa7747,2025-01-27T19:15:16.187000 -CVE-2024-56948,0,0,25f87c7c2ba1caacad9e5234e28324bb5ca965da621473879a59063f0e808b7d,2025-01-27T19:15:16.290000 -CVE-2024-56949,0,0,e902849d182e03f6db1f736a6600a166fa344bcb17ae9a8d921e48a905c85333,2025-01-27T19:15:16.383000 +CVE-2024-56947,0,1,de2dbd42f02c6815b309904992c8d2e0ee10dbda0e015e0471bf9a8137017390,2025-01-28T20:15:51.500000 +CVE-2024-56948,0,1,8742881b72f361dc2543476e98570b9c75cf607bb78be3d886dcff581e6d1279,2025-01-28T20:15:51.650000 +CVE-2024-56949,0,1,9badb9d193ec802649c03676d00eb21db1a186f3dabe0299b597023b2e5f3799,2025-01-28T20:15:51.797000 CVE-2024-5695,0,0,561e6cb4d08160ed6fafa90e521f897721e64759a362dc9a8276e2a94b600bf4,2024-11-21T09:48:11.110000 -CVE-2024-56950,0,0,6c6aa617d71efdfb51ac5205f4aad1ada41aecd154005449fd8e6c951aaa91cd,2025-01-27T19:15:16.480000 -CVE-2024-56951,0,0,a85d7d32676dfdc2cfb57563c7e810724bda2c4ccba8578d4dba52fce4550ece,2025-01-27T19:15:16.583000 -CVE-2024-56952,0,0,97c9ab7f9aaf278bb8b04c4ddf3e50704c5f7a5aefc808907ffc6e14999bf56f,2025-01-27T19:15:16.697000 -CVE-2024-56953,0,0,bac427badaa7947c1021195eedb836d70c51b747ebb9429a211e0e8760f8f29b,2025-01-27T19:15:16.823000 -CVE-2024-56954,0,0,ead9f8d98f66eaea523aadc50f5b9e49c2b6547118d5299547d27bb19d631d73,2025-01-27T19:15:16.933000 -CVE-2024-56955,0,0,3987b051596397bcb7ce9cddff0a47fb800f24737c6a7920cb1530e926ccf5b5,2025-01-27T19:15:17.040000 -CVE-2024-56957,0,0,184931a0e01c78eab3fe1ca5e3f8e8cebcfaae6cb1a8facbc717718f59fa367f,2025-01-27T19:15:17.147000 -CVE-2024-56959,0,0,f1ada030fc2fa25ac17f8e142a51b257092cc5fdc049839245ead5a8521e378c,2025-01-27T19:15:17.247000 +CVE-2024-56950,0,1,f79787b2c1c3096bd677e9577da20322864a928b82f464e3719fee4b1d99e1ef,2025-01-28T20:15:51.960000 +CVE-2024-56951,0,1,ac5fa69e4b858d865d6df9839c487b01f40e4745b3135a04c928e581cb5c9365,2025-01-28T20:15:52.107000 +CVE-2024-56952,0,1,f0f7f55ac49aee470fd23da9b32506e1155a884940297661f20950a423e6b7e6,2025-01-28T20:15:52.250000 +CVE-2024-56953,0,1,d6af1d37996ec3677425338015d999c9d9d8619edba09f72270e5a3ae1468df3,2025-01-28T20:15:52.390000 +CVE-2024-56954,0,1,5d95940f4500e4c8ed1c79d18da6b28e89ae8e21b6ac5f6f5d9e7bf553492caa,2025-01-28T20:15:52.540000 +CVE-2024-56955,0,1,695572a5b43187fae26cfd564d6083408fea2627baf453a4637e921b7d077e8e,2025-01-28T20:15:52.693000 +CVE-2024-56957,0,1,a365f0dba6fa5a6a54d32b6e465b7e4720d23d8b2e7adbfd200091b6dfd36d15,2025-01-28T20:15:52.837000 +CVE-2024-56959,0,1,443e07d6aa8cbad9f593e7593ba2d839cf52eefdd0713fc78166f22ec2070f70,2025-01-28T20:15:52.987000 CVE-2024-5696,0,0,9ae6c44d348ef9d24ec8ca5439b37c50da2ca251572759d1d18bb2a62c7efe3a,2024-11-21T09:48:11.303000 -CVE-2024-56960,0,0,c9e2a9d34a57958a6fb9dd22eeb857e81128df1eea38f98d5c3edceb99de1f01,2025-01-27T19:15:17.347000 -CVE-2024-56962,0,0,9d349cda956d5179fa2d0d19e6464658b4e00d574677d357b46925df7762cefc,2025-01-27T19:15:17.447000 -CVE-2024-56963,0,0,bf283975452725de1438f7cc8349d5c7db3720ead5dca570042c3fe273c3a1ca,2025-01-27T19:15:17.547000 -CVE-2024-56964,0,0,85a6a617ae30235bbbd98b354ec3b2cb4d5beb499d4221a52725a58bbc18e55a,2025-01-27T19:15:17.647000 -CVE-2024-56965,0,0,d88540ea7ca3d689715552d646fffb98468513c038d62b7aac782c6df2bdd0eb,2025-01-27T19:15:17.747000 -CVE-2024-56966,0,0,c99c5de572a8b507ecbc008212175b7bb2b8499749c2ec0d7a61b913ae7d3920,2025-01-27T19:15:17.850000 -CVE-2024-56967,0,0,8f2f35a42d51fad82691bd518338ac421e21236b0f219221ac9b2ea900a57dcc,2025-01-27T19:15:17.947000 -CVE-2024-56968,0,0,5b61c8b8b0e709a5084c46fc6e1484bea976a8d0efc38e5d3e235d5018cc2cb3,2025-01-27T19:15:18.057000 -CVE-2024-56969,0,0,0324b8b21f1c3019d19b9b9c6bf0c6a821e8fc8d868487d3eb285d66d0019886,2025-01-27T19:15:18.157000 +CVE-2024-56960,0,1,37e2be0ec82bb034d2e2028e2ce56b2586f141a84e855af0badd56a1d71121a9,2025-01-28T20:15:53.127000 +CVE-2024-56962,0,1,f93bf8ccff4c99060a7ebb57d88104301c7ef42923a9fdd490b7de1971a9a550,2025-01-28T20:15:53.273000 +CVE-2024-56963,0,1,7bb629f288477f1368d70432b9845302d59f2abdab13ed7f914c7a59d4d42a20,2025-01-28T20:15:53.423000 +CVE-2024-56964,0,1,7007280c50e70a4a8746eaf47643c5f9a5673345aa14fd9de7ec948cfe6a9114,2025-01-28T20:15:53.577000 +CVE-2024-56965,0,1,19e3e4ec593f9ccbb1206dce2bd38aba0228642050827527d775dc01c6904460,2025-01-28T20:15:53.733000 +CVE-2024-56966,0,1,52b326a13a34171b9c227228b907567f7991a15d515ceb0bae287e608fc79468,2025-01-28T20:15:53.873000 +CVE-2024-56967,0,1,43e0a24b4c771bc99ba8ec0af3f57cdcff26761c26dfb1524def0e2633506be7,2025-01-28T20:15:54.010000 +CVE-2024-56968,0,1,38aa881fecaf4056d90c984cf8016063fe8becd3efea087ac658ba8bdb0cb613,2025-01-28T20:15:54.157000 +CVE-2024-56969,0,1,6ac568be18148d8fcdd8d68339e261c470b024f783d4b1afd4465c66e8f042ed,2025-01-28T20:15:54.297000 CVE-2024-5697,0,0,b7a4dc6c87306b1faedc3f85852add4556913bfcdad208dc9ec44ed1d967aaa8,2024-11-21T09:48:11.493000 -CVE-2024-56971,0,0,53538b1ba98bab8fe87e3a886c9c4c64d5f063e2d12d95d2360a76ebc3086b2e,2025-01-27T19:15:18.260000 -CVE-2024-56972,0,0,613b9f21a6c0306685399b60d5c41b029cc25348b539c06ff3248528139c90fc,2025-01-27T19:15:18.360000 +CVE-2024-56971,0,1,276a7a86ad106648443da06863e2300c9d96ea86918eba3d47a3ad54989777d6,2025-01-28T20:15:54.437000 +CVE-2024-56972,0,1,98acd6acd98c6f5290bb615c9d8f957523c0a42981f4e179e443761ee06a5635,2025-01-28T20:15:54.580000 CVE-2024-5698,0,0,f82f3ede8f3a0f37db39e7c1594784573d509729718d4233e67322de0394663b,2024-11-21T09:48:11.610000 CVE-2024-5699,0,0,1f6b745154d0c66e136c94c9cf6848fa0ef03de7ad43314ef7aabc398131e7bc,2024-11-21T09:48:11.727000 CVE-2024-56990,0,0,69df5a378059c143fb0394a632fffd1a0d17ff51d4e63a6bcfb36930a4a43f66,2025-01-21T16:15:13.947000 @@ -273687,7 +273700,7 @@ CVE-2024-57035,0,0,5b4d21f0e6f76521453f47b20f8d7e46bcfa11378320e2eaefaad51e3d6de CVE-2024-57036,0,0,53a08b77e64e14052538b358d3b699e5ff91badbb6cbef1e8c382e8b41ad333f,2025-01-21T16:15:14.143000 CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000 CVE-2024-57041,0,0,ddfb29be19bbf27e0e79d11117c70804483f6627ba362e993db3cc41d054c8a6,2025-01-24T20:15:33.353000 -CVE-2024-57052,0,0,fdf129118b8ce8b7b4b21604fe5d90622c94ae1ac55fb7147c1253dfb3162c04,2025-01-27T23:15:09.723000 +CVE-2024-57052,0,1,bc00b5d037064b7099093b076a5f146c014e4111e7d4ea6fcb302d9ad48a909f,2025-01-28T20:15:54.727000 CVE-2024-5708,0,0,f68252af81d3d9fd48c33f6db887b706921f7e4e9ec883679703f59930376646,2024-08-06T16:30:24.547000 CVE-2024-5709,0,0,9e7f02d16313ead7a68864ca2ed2dc29106d9085227941350b2847c3e4c2a85b,2024-08-06T16:30:24.547000 CVE-2024-57095,0,0,875cae30bc2fea90461df4c9f6d426bd980c17969b9a5f071ece2b68c57f9206,2025-01-24T20:15:33.473000 @@ -273726,7 +273739,7 @@ CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d CVE-2024-57252,0,0,1934cc1672f51074e73fec8f79c8c1a0c2b2ef217ce3d8eb4ed233f3d5050e7d,2025-01-17T22:15:28.817000 CVE-2024-5726,0,0,4ceeef37c455f852012651a7e920e126aeb659ebe7ba7b011f93539db03748f1,2024-11-21T09:48:14.060000 CVE-2024-5727,0,0,fcb5435c7826764738326be67041da3dad875d35da2f0e0301dde5c6609d328a,2024-11-21T09:48:14.180000 -CVE-2024-57272,0,0,240bfe76d3c570659e4a17f527b77483fe32456757501552139f271ff9f71e82,2025-01-27T17:15:16.730000 +CVE-2024-57272,0,1,dbc324cdb83c481b4de69dd5fc8cc4b86ee368b27cc30cc7365a1b8df8dc0a02,2025-01-28T20:15:54.870000 CVE-2024-57276,0,0,56f9d8dfeaea339eb4f7830f5e47071be6d43333a2aa1e4e9551dc0218c18991,2025-01-27T17:15:16.827000 CVE-2024-57277,0,0,cf3bfbd32910c82a101c705fc837da91aff2f392e35fb884cbc5ee32ed42427b,2025-01-24T20:15:33.587000 CVE-2024-5728,0,0,5c443df1ac8c53ac147f54c0053d74d00fcb14e9c202dddb628d942cdb86d4d7,2024-11-21T09:48:14.357000 @@ -273746,7 +273759,7 @@ CVE-2024-57369,0,0,ce35d8d439ec5b10e19b8254c4b2aaedfd6d2315486d0723f1d0dfc5c7549 CVE-2024-5737,0,0,fb7afad0bdcad96b29de7c5519f73ad0e5af614975f3cc39b56e0ff717aa63e5,2024-11-21T09:48:15.713000 CVE-2024-57370,0,0,dba61003ac0742f925ea5ff1cc95bfbaed4369615ca108aeba895cf60279fedb,2025-01-23T21:15:14.663000 CVE-2024-57372,0,0,359f6085d50456f0eac4043a58ce1cc9b440df64af0e5401b40a68976c846ffa,2025-01-17T22:15:28.957000 -CVE-2024-57373,0,0,5122473fd6b198922e9f65a646be49f191db96b0e48fe80cec5ee905b00c8e22,2025-01-27T23:15:09.830000 +CVE-2024-57373,0,1,74730975947491afdedfbebc28e66e12f3622db8206f792838168db38a80a123,2025-01-28T20:15:55.040000 CVE-2024-57386,0,0,581b3c2804a2401ceb5ccd2cee1eff29157b5f56941a4ae147cc84b888d64fff,2025-01-24T22:15:34.727000 CVE-2024-5739,0,0,0e4f510b66deb8d2a70ee4b32b2e47de655e3949e52e35934a40b7f5adddcb57,2024-11-21T09:48:15.850000 CVE-2024-5741,0,0,055094e9aabecf080e8eb2a3d882a04f3fba90f18ee04ead7d8cff271ac3f02a,2024-11-21T09:48:15.963000 @@ -273778,10 +273791,10 @@ CVE-2024-57542,0,0,9f4f21ed016285b89d83a6c564ff71907e5abf82e51bb01bf73b7d294ec7a CVE-2024-57543,0,0,898d6f8a88c778c4280c4ecff7f0698ccecae47925ad74f2985898b4ac306118,2025-01-22T21:15:10.837000 CVE-2024-57544,0,0,0d7692301f68e1a54af26539095dbcdd0b4efd46060b39551d96338252e7c0b8,2025-01-22T22:15:09.613000 CVE-2024-57545,0,0,920e5d8c212074216a1e84000536dbfa8a4a938f249df8348a02d6e14021f484,2025-01-22T22:15:09.790000 -CVE-2024-57546,0,0,5a9a9051b9f55d7d0ab4bca8b687dff6377207573c1b8ce67e6c0d9d346b9356,2025-01-27T23:15:09.947000 -CVE-2024-57547,0,0,19631399ab532faa38f1c5436e772c29cc513e54a92d38776aff31b99abc3766,2025-01-27T23:15:10.057000 -CVE-2024-57548,0,0,15521e04d4cf7a5d9d07f958835368701cee5d7ed0bf1c29691677e2b5b788e5,2025-01-27T23:15:10.180000 -CVE-2024-57549,0,0,2af4d8ee8575a47b546e2c38ddcc7bb2dfcc15ff25f943f43b283cec024ca3b6,2025-01-27T23:15:10.303000 +CVE-2024-57546,0,1,bad587a0ceeef9b89c8828f054c4bda84de49437c94ed18023e6d225f79a97b6,2025-01-28T20:15:55.203000 +CVE-2024-57547,0,1,0f4f2ee4c32bcc32e45071c962f8fc6a920b1dde381101e80a92042b066e6572,2025-01-28T20:15:55.367000 +CVE-2024-57548,0,1,1f93c0d12d8fe21bacce0b119a038c3d7fd2c3fed86744ec0bc35262e74ff670,2025-01-28T20:15:55.547000 +CVE-2024-57549,0,1,79f94dbd41b8017d0827021d04c9fd9e841f0b96e590a0bd61cafe206909e091,2025-01-28T20:15:55.810000 CVE-2024-5755,0,0,d9beb74b4cc757e5dafe2ce46b6f3c5c752c1749a1b4a2abdedbdd95bff1173d,2024-11-21T09:48:17.093000 CVE-2024-57556,0,0,bb0c8b6daab6a4685a3c223d5c61804de336ccacfb88de2d986d4a4a234b5bc3,2025-01-24T21:15:10.680000 CVE-2024-5756,0,0,f306d50c688e90f1ac281dc052b52f0a73fe2794efab7031898c419d58649207,2024-11-21T09:48:17.217000 @@ -273796,7 +273809,7 @@ CVE-2024-57581,0,0,d33766716cfcc1229c50a7310d1424328b4dc7c6b3c33c20370b98899cfad CVE-2024-57582,0,0,2a1d35e4fc860c65eb8a4315ed1ba4c31f49b01c911d5b356fd3e8b7f891a8b3,2025-01-17T17:15:12.797000 CVE-2024-57583,0,0,a02bfc66fca0e321afc33c8ed95edf293ab0d78b8736a62da8c5a6dc7f2892d3,2025-01-22T16:53:20.263000 CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000 -CVE-2024-57590,0,0,46c496c435b48512be9b0e1fd5d874cd6c907680662c52962d0f94c9a9940fe0,2025-01-27T15:15:11.463000 +CVE-2024-57590,0,1,468c69413bd6e8b154542bd7668e59449dcd31e5c13459bc4d0598be16b164ab,2025-01-28T20:15:55.973000 CVE-2024-57595,0,0,e945c5b3578d3dde99010919578995e95b82ad320cb57326cf2ce4ca0414d822,2025-01-27T16:15:31.613000 CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 @@ -276308,7 +276321,7 @@ CVE-2024-8392,0,0,caa35dfaa13ca6c8848228402eb1fa602b7508d122bb6d4c521b1783ee5cf9 CVE-2024-8394,0,0,bd28d67eb4dea8371cd2793d6c1a503530627256bd7a8708163225ff338a9aee,2024-09-11T16:25:44.833000 CVE-2024-8395,0,0,c6d79b3af9415d1dbc90de693b5ba9574b79fcfce662d414c8208b3c086aecd9,2024-09-19T17:53:45.753000 CVE-2024-8399,0,0,323655c2656edaaeca5213485beeb2450d3da37cf043a527a781efdb4374ab03,2024-09-12T19:45:07.347000 -CVE-2024-8401,1,1,fc569edcd9b9159839556e1cc582293b3a37937a12315d88812b79888847aab5,2025-01-28T17:15:25.467000 +CVE-2024-8401,0,0,fc569edcd9b9159839556e1cc582293b3a37937a12315d88812b79888847aab5,2025-01-28T17:15:25.467000 CVE-2024-8403,0,0,7a0838db01052159bde324a21dfa739e8509a6ed57e76a3b7db69f9276932c77,2024-11-20T01:15:04.303000 CVE-2024-8404,0,0,7e768957f5c9071fb544fa73ba53d6ddfae0a975cddc45d4b9247cccd202b4a8,2024-10-03T15:19:28.293000 CVE-2024-8405,0,0,a1c8fd8a55db2e234635fea767a3c3b652d58187ee7e107d14baec2c502a1b04,2024-10-03T00:51:18.313000 @@ -277514,8 +277527,8 @@ CVE-2024-9856,0,0,5aa1b6cdf29dd2393bc854c88d9f44d9ff2e324af6e80eee6fa5c0955e5cea CVE-2024-9858,0,0,ca2929ea85dd3f22cd09c051fa794843b77550ad22ad15b5fd1cd0c92da7b3db,2024-10-16T17:35:08.130000 CVE-2024-9859,0,0,86c60906d3d43086e90ad82fc5e0a66c148004233d82b3e814c2c2e043532e28,2025-01-02T16:01:16.520000 CVE-2024-9860,0,0,1ba47332044cf478e4ab9e34b5ce7d360a589302ba3fad0810d75ba6f8914101,2024-10-15T12:57:46.880000 -CVE-2024-9861,0,1,24523542e26f057b9247e42b8b6169259b0a45fecdcfd0af4e1f65374aa85c75,2025-01-28T18:56:36.567000 -CVE-2024-9862,0,1,32a893d03a10976acc2ce821e0dd18873401c81addccf4309e545b5a305aaf66,2025-01-28T18:57:49.143000 +CVE-2024-9861,0,0,24523542e26f057b9247e42b8b6169259b0a45fecdcfd0af4e1f65374aa85c75,2025-01-28T18:56:36.567000 +CVE-2024-9862,0,0,32a893d03a10976acc2ce821e0dd18873401c81addccf4309e545b5a305aaf66,2025-01-28T18:57:49.143000 CVE-2024-9863,0,0,6177d3dfde419a662cdfdb3805c47c7ca2f42ac849e1efadbda4ea00b9e257dc,2024-10-18T12:53:04.627000 CVE-2024-9864,0,0,37f5c57af255acec3da2c04b72172ba620795a28e8c909b9c2e0f3a83632f2e8,2025-01-15T18:27:26.133000 CVE-2024-9865,0,0,104ee46dcd943be7197e319db57c938f5de66330632289d90ffc0672b2178cac,2025-01-15T16:14:54.267000 @@ -277714,7 +277727,7 @@ CVE-2025-0244,0,0,a007094477ee1c52bbc6ad80ad1856461cbdef97dbf9502d29b149d107af9f CVE-2025-0245,0,0,d3f443614cf269edf96a7044d50adaa402232a03e23aa318a1f5e6bf4990a77e,2025-01-08T16:15:37.693000 CVE-2025-0246,0,0,c39f5bdf37092ddacf9510ed2d75cd9204291d6d9bc9dd6c5bd8168e56e08082,2025-01-08T16:15:37.880000 CVE-2025-0247,0,0,0125f498ef227ebc436135b5d9339a763bd05ec1f3a6e4d4fb60e8d0a9524607,2025-01-14T17:15:20.547000 -CVE-2025-0282,0,1,8f04f787bbd4bc1106bd61b71ca3eca0ae9568bebdac6faee4108abb0f611ddf,2025-01-28T17:15:25.620000 +CVE-2025-0282,0,0,8f04f787bbd4bc1106bd61b71ca3eca0ae9568bebdac6faee4108abb0f611ddf,2025-01-28T17:15:25.620000 CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000 CVE-2025-0290,0,0,8e4a29fdcfba8d41042d395158b999fb7f194f988dcf0757e86c52fe20b63f2e,2025-01-28T09:15:09.363000 CVE-2025-0291,0,0,219214cc15cb7ccb0bfb9ba364ae86cf52fd72660e30b5a762d818e944330916,2025-01-08T20:15:29.353000 @@ -277881,6 +277894,7 @@ CVE-2025-0615,0,0,ebbe675921592ae8cbe2172db6e2765a464d273fff841eec1146e0ddf51f2d CVE-2025-0619,0,0,76104b7b24094ee59b4cec6d4f4ee7db8e2e97a6bfdfd21603079adfc8fdb2bd,2025-01-23T11:15:10.700000 CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000 CVE-2025-0625,0,0,7f36541620787f4bb57811d2ab5017a08dd72bab5c190081458ac3e7009d06f3,2025-01-22T19:15:10.397000 +CVE-2025-0631,1,1,3196a9fbde6d9168d64fe97245fb465de3553c9c773b397433d0b7598697488d,2025-01-28T19:15:14.270000 CVE-2025-0635,0,0,48e9501b358d6daac6b23f86a2f36310ca1507ac697731ba1d1365d13a451552,2025-01-23T11:15:10.890000 CVE-2025-0637,0,0,527088f0979b18ce444b6ef69464399256b011e8d9eae0913ca1205a9c4503aa,2025-01-23T16:15:36.617000 CVE-2025-0638,0,0,a6e4b77b7413b2b4aa2934053a70dffa8b1ba9dca4ba939faec1f3b554888d0d,2025-01-22T16:15:29.977000 @@ -277920,7 +277934,9 @@ CVE-2025-0751,0,0,9f427bf6982d8d00073ea612bcd95872a42bd7d0903214c0ac2165ec846c06 CVE-2025-0752,0,0,1b42777fbab8f210bb46e72869b6d162494a92c3430459e509f1ea2dbae1520b,2025-01-28T10:15:09.493000 CVE-2025-0753,0,0,29a68c520c1ada30651b7f7625e23d6a168a36c3acded86be6c51a51e40dbdd7,2025-01-27T21:15:13.653000 CVE-2025-0754,0,0,21b0a16e61d630284d94dc77a57efde391026f0970f86dbbcd4b271b50d2d4d2,2025-01-28T10:15:09.697000 -CVE-2025-0781,1,1,214a818c7c2b2293ca3062156b160496a04ecec4361de80f5717a7c9f099ef63,2025-01-28T17:15:25.947000 +CVE-2025-0781,0,0,214a818c7c2b2293ca3062156b160496a04ecec4361de80f5717a7c9f099ef63,2025-01-28T17:15:25.947000 +CVE-2025-0783,1,1,3c77d3cfdf2201674ecbdede441dab5378dd73d2ccd0550d79b37d0ba4ece4d4,2025-01-28T19:15:14.410000 +CVE-2025-0784,1,1,a8c3e506115e968bf468e598a7692b89d7da0f46aee3c8c8a5b369bef734be1a,2025-01-28T20:15:56.230000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000 @@ -278289,6 +278305,7 @@ CVE-2025-22152,0,0,089f04aace28abfa88265f6c9c2782b5476de8a0e353916617123187c142e CVE-2025-22153,0,0,25942cbccd29909e1ea0be6d083f0e8cabc6b2b46ac2d218bce2acfdeffc85bf,2025-01-23T18:15:33.267000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 CVE-2025-22215,0,0,e26e39627ebf88fc4492196348e13c55563ef72a3b7150347ad788f5576b3be6,2025-01-08T15:15:21.927000 +CVE-2025-22217,1,1,feb391972c0b9cea12eac2644fa650dfd74fa775909a2be34ec05a7261c4fd8e,2025-01-28T19:15:14.640000 CVE-2025-22261,0,0,33a310cbc7efb685d95693f6e008875a8290fc5f9c6bce0cde03f1c0742bf7b7,2025-01-07T11:15:13.290000 CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000 CVE-2025-22264,0,0,79177f17455e861265910dfa8dd2caa5a78c248a179fa18c3179e839e36cde00,2025-01-23T16:15:37.257000 @@ -278635,11 +278652,11 @@ CVE-2025-23045,0,0,f178d85d6e2e1bc41349bb3607f9a44cd436178af8a68c7f7ca82142f5b04 CVE-2025-23047,0,0,6fdba3566238181d8ca3c91ca160e254b213eed36441cd5f9334903c854d1fd2,2025-01-22T18:15:21.893000 CVE-2025-23051,0,0,2aefe97c0e4795e43708ca4aacb91936a81f90520498dd80e4c2079564f0d911,2025-01-23T22:15:16 CVE-2025-23052,0,0,9a4a619a1e7b14d6f53e5a9e3dd4b37f5c5ae0529b77755b68f828f3fee5c530,2025-01-23T22:15:16.133000 -CVE-2025-23053,1,1,882d112096072137d022187d0a8848065e2ff7cad0f02be300c6bfc77f90bc2a,2025-01-28T18:15:38.987000 -CVE-2025-23054,1,1,17c52ff662efad2e8f4e554ee73b4b4a65ab922aa3898d7b4140a802ae9cfbf3,2025-01-28T18:15:39.147000 -CVE-2025-23055,1,1,4eb7a68035e41e167e236024d92122d1723ac218e83fa124561d669f5747975d,2025-01-28T18:15:39.317000 -CVE-2025-23056,1,1,5981344808e1aa6f654817f306a1e3ef6e8474a9b6d2fbe2ee70dce23d56ff9b,2025-01-28T18:15:39.500000 -CVE-2025-23057,1,1,edb1c2ab53a307fed6068c685009304c7a3cc10563d86c559eea1eaa88ff039d,2025-01-28T18:15:39.677000 +CVE-2025-23053,0,0,882d112096072137d022187d0a8848065e2ff7cad0f02be300c6bfc77f90bc2a,2025-01-28T18:15:38.987000 +CVE-2025-23054,0,0,17c52ff662efad2e8f4e554ee73b4b4a65ab922aa3898d7b4140a802ae9cfbf3,2025-01-28T18:15:39.147000 +CVE-2025-23055,0,0,4eb7a68035e41e167e236024d92122d1723ac218e83fa124561d669f5747975d,2025-01-28T18:15:39.317000 +CVE-2025-23056,0,0,5981344808e1aa6f654817f306a1e3ef6e8474a9b6d2fbe2ee70dce23d56ff9b,2025-01-28T18:15:39.500000 +CVE-2025-23057,0,0,edb1c2ab53a307fed6068c685009304c7a3cc10563d86c559eea1eaa88ff039d,2025-01-28T18:15:39.677000 CVE-2025-23061,0,0,b4f49d5cfe4a6ddd334224104c930dfc4f06696fe9671dfd7fb46829caa69bfb,2025-01-15T05:15:10.517000 CVE-2025-23072,0,0,f803acd8ba8ed1daeb7212104bb06cc237ee13347918da6bd6a4010b2c78db92,2025-01-14T19:15:45.007000 CVE-2025-23073,0,0,3f1ca33e1e6c2403ab6f9de7fc1811a7d128779940b346e0cb2840f9e69dc5f4,2025-01-15T16:15:42.933000 @@ -278681,8 +278698,8 @@ CVE-2025-23206,0,0,7dc609075e2d325da43818b49c297d2a05018960dae87cf88a1c771faf87f CVE-2025-23207,0,0,a61af6f2707ecd45627a7e7ca479f8fbbb333f7f551bc284878a54328b3225b8,2025-01-17T22:15:29.523000 CVE-2025-23208,0,0,bbf05788b0a0727b64438f71dac7780433656c51584efb22baeb9514bc090286,2025-01-17T23:15:13.107000 CVE-2025-23209,0,0,a2ae850acf3d242275b1a23f48b16552263d960a288c8911fdea38e62d87c1f8,2025-01-18T01:15:07.633000 -CVE-2025-23211,0,1,b01b3d1eaa389abc74d10a53464a452db8c48b8e46d369d0635594b6a3f9c7f0,2025-01-28T17:15:26.160000 -CVE-2025-23212,0,1,5d60c49ffd32521a5482891d50382e894e871b53bc8376be27f61b9b217ff0da,2025-01-28T17:15:26.273000 +CVE-2025-23211,0,0,b01b3d1eaa389abc74d10a53464a452db8c48b8e46d369d0635594b6a3f9c7f0,2025-01-28T17:15:26.160000 +CVE-2025-23212,0,0,5d60c49ffd32521a5482891d50382e894e871b53bc8376be27f61b9b217ff0da,2025-01-28T17:15:26.273000 CVE-2025-23213,0,0,7d98e0a72de95b4de425a92931a16b0e202255e768c13a8e6a1a984e46d039ec,2025-01-28T16:15:41.217000 CVE-2025-23214,0,0,c6114b08fe21248133ade50d2d6a2ac869f323455d1c9d1cedbe7eb7fbc50600,2025-01-20T18:15:14.127000 CVE-2025-23218,0,0,b3958878a7e50b75603e021f29b22e3f870c93039e9cd62b904ad60b93ab16c6,2025-01-21T15:15:15.053000 @@ -279080,8 +279097,8 @@ CVE-2025-24103,0,0,b855906b195c4dc587795824d73768dd8eb50f59e5ebd39c191f21e7d50f8 CVE-2025-24104,0,0,351dd0767ea1e0a62d16f31e3ae17dcdaea5e43456ae60a0663e0c3eddd31608,2025-01-27T22:15:15.983000 CVE-2025-24106,0,0,7c93b388567b51d6f143e70f744f5ae7544ea89bf54f3268ef6794b4a77e5c65,2025-01-28T15:15:13.450000 CVE-2025-24107,0,0,7ca3d7f81320182c649b00d895907fc6b5250f4fb4b53d6d1fb700021d5bcabb,2025-01-27T22:15:16.170000 -CVE-2025-24108,0,1,bb0a5bc48c4dd7d6d7190906e431796a1e5028444f7a13e38e07dbc67caf502c,2025-01-28T17:15:26.433000 -CVE-2025-24109,0,1,e18d20f0f5bde6ebc7b6d46d58e1c12c70a45bfdfde42833a6a2af9ef10a02f4,2025-01-28T17:15:26.610000 +CVE-2025-24108,0,0,bb0a5bc48c4dd7d6d7190906e431796a1e5028444f7a13e38e07dbc67caf502c,2025-01-28T17:15:26.433000 +CVE-2025-24109,0,0,e18d20f0f5bde6ebc7b6d46d58e1c12c70a45bfdfde42833a6a2af9ef10a02f4,2025-01-28T17:15:26.610000 CVE-2025-24112,0,0,1d2969d6d80d7a4b29f11c091a804966e89ceb608d695ab0187a156e13995338,2025-01-27T22:15:16.433000 CVE-2025-24113,0,0,e3165632c8b4ddab1258ba856efb494e13b0ebef36ddf947b35aaf4ec3db0771,2025-01-27T22:15:16.530000 CVE-2025-24114,0,0,41dfbc3389d2f3872b919168ecf2d8e3d41ab841e34b753245c022d9f84c5e21,2025-01-27T22:15:16.620000 @@ -279093,7 +279110,7 @@ CVE-2025-24120,0,0,0c85d32bdccf1fd825ec3f359d7dab1218c89687e6fb7a4f438397ca0e75a CVE-2025-24121,0,0,727d0b449e1735b73e6c0fd4e75eac265ea0d2ba3dd19ef8c37af20d3260a32c,2025-01-28T15:15:13.600000 CVE-2025-24122,0,0,6ed5b273993a7b3b4299bccb505e9bef2efda8af378ad8c8de2092e788d49a9a,2025-01-28T16:15:42.447000 CVE-2025-24123,0,0,e83298a045ddc8c277bf247a5ae4429adb4e3443f8590ed105db055f85a1fa12,2025-01-28T16:15:42.590000 -CVE-2025-24124,0,1,b35b4f4a6ad5026922ac33029fc25ada57ed2d60ab63b693c216ab6474dabd26,2025-01-28T17:15:26.753000 +CVE-2025-24124,0,0,b35b4f4a6ad5026922ac33029fc25ada57ed2d60ab63b693c216ab6474dabd26,2025-01-28T17:15:26.753000 CVE-2025-24126,0,0,c32206f3165722bc91a067de07475d8db8a95d2b871ddebbac4703ed5b0f16fb,2025-01-28T15:15:13.743000 CVE-2025-24127,0,0,2e78204f6778e94438e7603b1c02f2ad3cd90e7bc92de33e7103f746be3bb5f1,2025-01-27T22:15:17.703000 CVE-2025-24128,0,0,9892e31db1a83578f6a40523b367dee079507189438bf865d0722923a9d81a77,2025-01-27T22:15:17.793000 @@ -279103,7 +279120,7 @@ CVE-2025-24131,0,0,492b4d07fecf4242d99445d22ec2b604c4752abdb9655e15b1f5b48aa5d3c CVE-2025-24134,0,0,27238626902f107163f836767722de11324242b7de9766f8bb0b3cd4757025b5,2025-01-28T16:15:42.780000 CVE-2025-24135,0,0,37ac14929adcc1c58b3cc68046a7e240d0be8c2e4cf8312f9a3c0faefe0605bc,2025-01-28T16:15:42.930000 CVE-2025-24136,0,0,d26fe55217fd6ef5dc1f9572dae6512c03ac3218ad54517efe699f2e84ee27cc,2025-01-27T22:15:18.340000 -CVE-2025-24137,0,0,5b657031fc0d48278d9bcd3c281388e4962e50effbbb855d3f7f9bc7f3ab725c,2025-01-27T22:15:18.433000 +CVE-2025-24137,0,1,04c64c426bacf16b84ebfa21934b389a675da3a154e1b710c9e3a0886823032f,2025-01-28T20:15:56.410000 CVE-2025-24138,0,0,8ba7e2a460f500f479f243de8e5f463ca2f4161b2ff8b847e539449f56fe2683,2025-01-28T16:15:43.077000 CVE-2025-24139,0,0,d6c7fd3e2db2143c5e7584244c4444900037ff452b8e30271343396f1c3cbd36,2025-01-28T16:15:43.230000 CVE-2025-24140,0,0,64cd79c453bd015139aff243e9bda4d70b37899b275a2f0befe19b92cbbc635d,2025-01-27T22:15:18.710000 @@ -279160,6 +279177,9 @@ CVE-2025-24458,0,0,03e16f621e1b9e4e70e73985609e6df9be85cc317385d52b463a59fae87dd CVE-2025-24459,0,0,c083202f8944227211ab4ec18f1b1811e261bceb2079bbb92a48c6e7c058d3bc,2025-01-21T18:15:18.890000 CVE-2025-24460,0,0,91287787f4d848d8e28c04d17a6364c6b1da8dd244cdf6af640fa2b8371b6e01,2025-01-21T18:15:19.067000 CVE-2025-24461,0,0,ad0935e17c290ba8ab95f02ea53cd2528798caff1030b0f8ad947dd515e65dfd,2025-01-21T18:15:19.260000 +CVE-2025-24478,1,1,489807abc8b3ac20963ab9718a91a7aef5527f911d78441ab168e0bbd3662f38,2025-01-28T19:15:14.777000 +CVE-2025-24479,1,1,5b17b976259e83197a8085e93f801f9d4ec374bab1cdd4bfcdb02db805fe2920,2025-01-28T19:15:14.910000 +CVE-2025-24480,1,1,6175dc6a2dc51becbf31db587b185fc0cf5ca4083049b1eeaefe14ce192b439b,2025-01-28T19:15:15.033000 CVE-2025-24529,0,0,659084d0f901a45c8b21d541729e6cc04c83a80a3825fa751f6337219739cf86,2025-01-23T06:15:27.710000 CVE-2025-24530,0,0,4a56bb568b6bd32a8936d0fb868cc9221851e3049a709c6787a03d46cd9e8858,2025-01-23T06:15:27.893000 CVE-2025-24533,0,0,7b36821849ab798d81c60afcd620ba9ed617eb480eb18f61a881f0c2f7c8a39d,2025-01-27T14:15:28.653000