From d532926f650463b8383adc20867a5602dc4584a7 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 6 Feb 2025 19:03:49 +0000 Subject: [PATCH] Auto-Update: 2025-02-06T19:00:22.645610+00:00 --- CVE-2018/CVE-2018-175xx/CVE-2018-17537.json | 32 +- CVE-2018/CVE-2018-178xx/CVE-2018-17883.json | 32 +- CVE-2019/CVE-2019-149xx/CVE-2019-14942.json | 32 +- CVE-2019/CVE-2019-149xx/CVE-2019-14944.json | 32 +- CVE-2020/CVE-2020-150xx/CVE-2020-15069.json | 32 +- CVE-2020/CVE-2020-173xx/CVE-2020-17354.json | 32 +- CVE-2020/CVE-2020-275xx/CVE-2020-27545.json | 32 +- CVE-2020/CVE-2020-281xx/CVE-2020-28163.json | 32 +- CVE-2020/CVE-2020-290xx/CVE-2020-29007.json | 32 +- CVE-2020/CVE-2020-295xx/CVE-2020-29574.json | 32 +- CVE-2020/CVE-2020-351xx/CVE-2020-35165.json | 68 +- CVE-2021/CVE-2021-301xx/CVE-2021-30153.json | 32 +- CVE-2021/CVE-2021-337xx/CVE-2021-33797.json | 30 +- CVE-2021/CVE-2021-342xx/CVE-2021-34235.json | 9 +- CVE-2021/CVE-2021-343xx/CVE-2021-34337.json | 32 +- CVE-2021/CVE-2021-365xx/CVE-2021-36520.json | 32 +- CVE-2022/CVE-2022-237xx/CVE-2022-23748.json | 22 +- CVE-2022/CVE-2022-317xx/CVE-2022-31764.json | 29 +- CVE-2022/CVE-2022-373xx/CVE-2022-37306.json | 32 +- CVE-2022/CVE-2022-377xx/CVE-2022-37704.json | 32 +- CVE-2022/CVE-2022-388xx/CVE-2022-38840.json | 32 +- CVE-2022/CVE-2022-388xx/CVE-2022-38841.json | 32 +- CVE-2022/CVE-2022-404xx/CVE-2022-40490.json | 25 + CVE-2022/CVE-2022-409xx/CVE-2022-40916.json | 25 + CVE-2022/CVE-2022-409xx/CVE-2022-40946.json | 32 +- CVE-2022/CVE-2022-445xx/CVE-2022-44512.json | 165 ++++- CVE-2022/CVE-2022-445xx/CVE-2022-44513.json | 165 ++++- CVE-2022/CVE-2022-445xx/CVE-2022-44514.json | 165 ++++- CVE-2022/CVE-2022-445xx/CVE-2022-44518.json | 165 ++++- CVE-2022/CVE-2022-445xx/CVE-2022-44519.json | 165 ++++- CVE-2022/CVE-2022-445xx/CVE-2022-44520.json | 165 ++++- CVE-2022/CVE-2022-447xx/CVE-2022-44726.json | 32 +- CVE-2022/CVE-2022-483xx/CVE-2022-48312.json | 36 +- CVE-2022/CVE-2022-483xx/CVE-2022-48313.json | 32 +- CVE-2022/CVE-2022-483xx/CVE-2022-48314.json | 32 +- CVE-2023/CVE-2023-03xx/CVE-2023-0374.json | 34 +- CVE-2023/CVE-2023-07xx/CVE-2023-0764.json | 22 +- CVE-2023/CVE-2023-13xx/CVE-2023-1331.json | 22 +- CVE-2023/CVE-2023-13xx/CVE-2023-1373.json | 22 +- CVE-2023/CVE-2023-215xx/CVE-2023-21586.json | 124 +++- CVE-2023/CVE-2023-245xx/CVE-2023-24501.json | 12 +- CVE-2023/CVE-2023-279xx/CVE-2023-27906.json | 32 +- CVE-2023/CVE-2023-279xx/CVE-2023-27907.json | 32 +- CVE-2023/CVE-2023-279xx/CVE-2023-27909.json | 32 +- CVE-2023/CVE-2023-295xx/CVE-2023-29507.json | 9 +- CVE-2023/CVE-2023-295xx/CVE-2023-29508.json | 19 +- CVE-2023/CVE-2023-296xx/CVE-2023-29665.json | 32 +- CVE-2023/CVE-2023-37xx/CVE-2023-3758.json | 34 +- CVE-2023/CVE-2023-380xx/CVE-2023-38095.json | 64 +- CVE-2023/CVE-2023-380xx/CVE-2023-38096.json | 74 +- CVE-2023/CVE-2023-380xx/CVE-2023-38097.json | 74 +- CVE-2023/CVE-2023-380xx/CVE-2023-38098.json | 64 +- CVE-2023/CVE-2023-380xx/CVE-2023-38099.json | 64 +- CVE-2023/CVE-2023-381xx/CVE-2023-38100.json | 64 +- CVE-2023/CVE-2023-381xx/CVE-2023-38101.json | 74 +- CVE-2023/CVE-2023-381xx/CVE-2023-38102.json | 64 +- CVE-2023/CVE-2023-64xx/CVE-2023-6486.json | 96 ++- CVE-2023/CVE-2023-69xx/CVE-2023-6961.json | 74 +- CVE-2023/CVE-2023-69xx/CVE-2023-6962.json | 54 +- CVE-2023/CVE-2023-69xx/CVE-2023-6964.json | 74 +- CVE-2023/CVE-2023-72xx/CVE-2023-7272.json | 73 +- CVE-2024/CVE-2024-05xx/CVE-2024-0598.json | 84 ++- CVE-2024/CVE-2024-136xx/CVE-2024-13614.json | 56 ++ CVE-2024/CVE-2024-216xx/CVE-2024-21615.json | 778 +++++++++++++++++++- CVE-2024/CVE-2024-216xx/CVE-2024-21618.json | 516 ++++++++++++- CVE-2024/CVE-2024-22xx/CVE-2024-2212.json | 90 ++- CVE-2024/CVE-2024-22xx/CVE-2024-2214.json | 84 ++- CVE-2024/CVE-2024-24xx/CVE-2024-2452.json | 84 ++- CVE-2024/CVE-2024-24xx/CVE-2024-2455.json | 69 +- CVE-2024/CVE-2024-257xx/CVE-2024-25705.json | 14 +- CVE-2024/CVE-2024-26xx/CVE-2024-2667.json | 54 +- CVE-2024/CVE-2024-279xx/CVE-2024-27939.json | 52 +- CVE-2024/CVE-2024-279xx/CVE-2024-27940.json | 52 +- CVE-2024/CVE-2024-279xx/CVE-2024-27941.json | 52 +- CVE-2024/CVE-2024-279xx/CVE-2024-27942.json | 52 +- CVE-2024/CVE-2024-279xx/CVE-2024-27943.json | 62 +- CVE-2024/CVE-2024-279xx/CVE-2024-27944.json | 62 +- CVE-2024/CVE-2024-279xx/CVE-2024-27945.json | 62 +- CVE-2024/CVE-2024-279xx/CVE-2024-27946.json | 62 +- CVE-2024/CVE-2024-279xx/CVE-2024-27947.json | 62 +- CVE-2024/CVE-2024-27xx/CVE-2024-2771.json | 54 +- CVE-2024/CVE-2024-27xx/CVE-2024-2772.json | 74 +- CVE-2024/CVE-2024-27xx/CVE-2024-2782.json | 54 +- CVE-2024/CVE-2024-28xx/CVE-2024-2860.json | 67 +- CVE-2024/CVE-2024-303xx/CVE-2024-30394.json | 633 +++++++++++++++- CVE-2024/CVE-2024-303xx/CVE-2024-30395.json | 768 ++++++++++++++++++- CVE-2024/CVE-2024-304xx/CVE-2024-30409.json | 76 +- CVE-2024/CVE-2024-304xx/CVE-2024-30410.json | 354 ++++++++- CVE-2024/CVE-2024-30xx/CVE-2024-3046.json | 65 +- CVE-2024/CVE-2024-31xx/CVE-2024-3107.json | 64 +- CVE-2024/CVE-2024-33xx/CVE-2024-3371.json | 63 +- CVE-2024/CVE-2024-343xx/CVE-2024-34387.json | 52 +- CVE-2024/CVE-2024-365xx/CVE-2024-36553.json | 21 + CVE-2024/CVE-2024-365xx/CVE-2024-36554.json | 21 + CVE-2024/CVE-2024-365xx/CVE-2024-36555.json | 21 + CVE-2024/CVE-2024-365xx/CVE-2024-36556.json | 21 + CVE-2024/CVE-2024-365xx/CVE-2024-36557.json | 21 + CVE-2024/CVE-2024-365xx/CVE-2024-36558.json | 21 + CVE-2024/CVE-2024-390xx/CVE-2024-39033.json | 21 + CVE-2024/CVE-2024-392xx/CVE-2024-39272.json | 56 ++ CVE-2024/CVE-2024-41xx/CVE-2024-4157.json | 74 +- CVE-2024/CVE-2024-41xx/CVE-2024-4159.json | 62 +- CVE-2024/CVE-2024-41xx/CVE-2024-4161.json | 62 +- CVE-2024/CVE-2024-41xx/CVE-2024-4173.json | 62 +- CVE-2024/CVE-2024-437xx/CVE-2024-43779.json | 56 ++ CVE-2024/CVE-2024-45xx/CVE-2024-4536.json | 97 ++- CVE-2024/CVE-2024-47xx/CVE-2024-4709.json | 104 ++- CVE-2024/CVE-2024-495xx/CVE-2024-49532.json | 77 +- CVE-2024/CVE-2024-495xx/CVE-2024-49533.json | 77 +- CVE-2024/CVE-2024-495xx/CVE-2024-49534.json | 77 +- CVE-2024/CVE-2024-506xx/CVE-2024-50692.json | 45 +- CVE-2024/CVE-2024-520xx/CVE-2024-52012.json | 31 +- CVE-2024/CVE-2024-570xx/CVE-2024-57069.json | 47 +- CVE-2024/CVE-2024-570xx/CVE-2024-57071.json | 47 +- CVE-2024/CVE-2024-570xx/CVE-2024-57080.json | 47 +- CVE-2024/CVE-2024-570xx/CVE-2024-57086.json | 47 +- CVE-2024/CVE-2024-573xx/CVE-2024-57373.json | 8 +- CVE-2024/CVE-2024-574xx/CVE-2024-57427.json | 64 ++ CVE-2024/CVE-2024-574xx/CVE-2024-57428.json | 25 + CVE-2024/CVE-2024-574xx/CVE-2024-57429.json | 25 + CVE-2024/CVE-2024-574xx/CVE-2024-57430.json | 25 + CVE-2024/CVE-2024-575xx/CVE-2024-57599.json | 25 + CVE-2024/CVE-2024-576xx/CVE-2024-57610.json | 29 + CVE-2024/CVE-2024-579xx/CVE-2024-57968.json | 12 +- CVE-2024/CVE-2024-66xx/CVE-2024-6627.json | 92 ++- CVE-2024/CVE-2024-71xx/CVE-2024-7100.json | 92 ++- CVE-2024/CVE-2024-75xx/CVE-2024-7595.json | 75 +- CVE-2024/CVE-2024-75xx/CVE-2024-7596.json | 70 +- CVE-2024/CVE-2024-95xx/CVE-2024-9528.json | 64 +- CVE-2025/CVE-2025-09xx/CVE-2025-0994.json | 10 +- CVE-2025/CVE-2025-10xx/CVE-2025-1078.json | 141 ++++ CVE-2025/CVE-2025-228xx/CVE-2025-22866.json | 33 + CVE-2025/CVE-2025-228xx/CVE-2025-22867.json | 33 + CVE-2025/CVE-2025-232xx/CVE-2025-23217.json | 90 +++ CVE-2025/CVE-2025-249xx/CVE-2025-24981.json | 64 ++ CVE-2025/CVE-2025-251xx/CVE-2025-25181.json | 6 +- README.md | 87 ++- _state.csv | 471 ++++++------ 138 files changed, 9987 insertions(+), 685 deletions(-) create mode 100644 CVE-2022/CVE-2022-404xx/CVE-2022-40490.json create mode 100644 CVE-2022/CVE-2022-409xx/CVE-2022-40916.json create mode 100644 CVE-2024/CVE-2024-136xx/CVE-2024-13614.json create mode 100644 CVE-2024/CVE-2024-365xx/CVE-2024-36553.json create mode 100644 CVE-2024/CVE-2024-365xx/CVE-2024-36554.json create mode 100644 CVE-2024/CVE-2024-365xx/CVE-2024-36555.json create mode 100644 CVE-2024/CVE-2024-365xx/CVE-2024-36556.json create mode 100644 CVE-2024/CVE-2024-365xx/CVE-2024-36557.json create mode 100644 CVE-2024/CVE-2024-365xx/CVE-2024-36558.json create mode 100644 CVE-2024/CVE-2024-390xx/CVE-2024-39033.json create mode 100644 CVE-2024/CVE-2024-392xx/CVE-2024-39272.json create mode 100644 CVE-2024/CVE-2024-437xx/CVE-2024-43779.json create mode 100644 CVE-2024/CVE-2024-574xx/CVE-2024-57427.json create mode 100644 CVE-2024/CVE-2024-574xx/CVE-2024-57428.json create mode 100644 CVE-2024/CVE-2024-574xx/CVE-2024-57429.json create mode 100644 CVE-2024/CVE-2024-574xx/CVE-2024-57430.json create mode 100644 CVE-2024/CVE-2024-575xx/CVE-2024-57599.json create mode 100644 CVE-2024/CVE-2024-576xx/CVE-2024-57610.json create mode 100644 CVE-2025/CVE-2025-10xx/CVE-2025-1078.json create mode 100644 CVE-2025/CVE-2025-228xx/CVE-2025-22866.json create mode 100644 CVE-2025/CVE-2025-228xx/CVE-2025-22867.json create mode 100644 CVE-2025/CVE-2025-232xx/CVE-2025-23217.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24981.json diff --git a/CVE-2018/CVE-2018-175xx/CVE-2018-17537.json b/CVE-2018/CVE-2018-175xx/CVE-2018-17537.json index 66bc02ea308..88092835142 100644 --- a/CVE-2018/CVE-2018-175xx/CVE-2018-17537.json +++ b/CVE-2018/CVE-2018-175xx/CVE-2018-17537.json @@ -2,7 +2,7 @@ "id": "CVE-2018-17537", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T00:15:07.103", - "lastModified": "2024-11-21T03:54:34.323", + "lastModified": "2025-02-06T17:15:09.467", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-178xx/CVE-2018-17883.json b/CVE-2018/CVE-2018-178xx/CVE-2018-17883.json index 0924ce757a1..eb11ecc268a 100644 --- a/CVE-2018/CVE-2018-178xx/CVE-2018-17883.json +++ b/CVE-2018/CVE-2018-178xx/CVE-2018-17883.json @@ -2,7 +2,7 @@ "id": "CVE-2018-17883", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T00:15:07.147", - "lastModified": "2024-11-21T03:55:08.207", + "lastModified": "2025-02-06T17:15:10.617", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-149xx/CVE-2019-14942.json b/CVE-2019/CVE-2019-149xx/CVE-2019-14942.json index da3a50eec95..138d55dea4d 100644 --- a/CVE-2019/CVE-2019-149xx/CVE-2019-14942.json +++ b/CVE-2019/CVE-2019-149xx/CVE-2019-14942.json @@ -2,7 +2,7 @@ "id": "CVE-2019-14942", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T00:15:07.190", - "lastModified": "2024-11-21T04:27:44.070", + "lastModified": "2025-02-06T17:15:10.857", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-319" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-149xx/CVE-2019-14944.json b/CVE-2019/CVE-2019-149xx/CVE-2019-14944.json index 302462f9405..fc63d0346b5 100644 --- a/CVE-2019/CVE-2019-149xx/CVE-2019-14944.json +++ b/CVE-2019/CVE-2019-149xx/CVE-2019-14944.json @@ -2,7 +2,7 @@ "id": "CVE-2019-14944", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T00:15:07.227", - "lastModified": "2024-11-21T04:27:44.367", + "lastModified": "2025-02-06T17:15:11.077", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-150xx/CVE-2020-15069.json b/CVE-2020/CVE-2020-150xx/CVE-2020-15069.json index 2f55e7c40e4..d1405ab2117 100644 --- a/CVE-2020/CVE-2020-150xx/CVE-2020-15069.json +++ b/CVE-2020/CVE-2020-150xx/CVE-2020-15069.json @@ -2,7 +2,7 @@ "id": "CVE-2020-15069", "sourceIdentifier": "cve@mitre.org", "published": "2020-06-29T18:15:12.313", - "lastModified": "2024-11-21T05:04:44.630", + "lastModified": "2025-02-06T18:15:26.113", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-173xx/CVE-2020-17354.json b/CVE-2020/CVE-2020-173xx/CVE-2020-17354.json index dcbe1d319f1..bf4709e71d2 100644 --- a/CVE-2020/CVE-2020-173xx/CVE-2020-17354.json +++ b/CVE-2020/CVE-2020-173xx/CVE-2020-17354.json @@ -2,7 +2,7 @@ "id": "CVE-2020-17354", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-15T22:15:06.913", - "lastModified": "2024-11-21T05:07:56.180", + "lastModified": "2025-02-06T17:15:11.330", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-275xx/CVE-2020-27545.json b/CVE-2020/CVE-2020-275xx/CVE-2020-27545.json index 69afcc8d018..f8dc9101dc9 100644 --- a/CVE-2020/CVE-2020-275xx/CVE-2020-27545.json +++ b/CVE-2020/CVE-2020-275xx/CVE-2020-27545.json @@ -2,7 +2,7 @@ "id": "CVE-2020-27545", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T00:15:07.273", - "lastModified": "2024-11-21T05:21:21.893", + "lastModified": "2025-02-06T17:15:11.610", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-763" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-763" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-281xx/CVE-2020-28163.json b/CVE-2020/CVE-2020-281xx/CVE-2020-28163.json index 61efb08941f..fa646278dbc 100644 --- a/CVE-2020/CVE-2020-281xx/CVE-2020-28163.json +++ b/CVE-2020/CVE-2020-281xx/CVE-2020-28163.json @@ -2,7 +2,7 @@ "id": "CVE-2020-28163", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T00:15:07.313", - "lastModified": "2024-11-21T05:22:25.297", + "lastModified": "2025-02-06T17:15:11.807", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-290xx/CVE-2020-29007.json b/CVE-2020/CVE-2020-290xx/CVE-2020-29007.json index ee1d3674b9b..3bd784c60be 100644 --- a/CVE-2020/CVE-2020-290xx/CVE-2020-29007.json +++ b/CVE-2020/CVE-2020-290xx/CVE-2020-29007.json @@ -2,7 +2,7 @@ "id": "CVE-2020-29007", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-15T22:15:06.977", - "lastModified": "2024-11-21T05:23:29.260", + "lastModified": "2025-02-06T17:15:12.007", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-295xx/CVE-2020-29574.json b/CVE-2020/CVE-2020-295xx/CVE-2020-29574.json index 44a4d15fe60..8c0e4189415 100644 --- a/CVE-2020/CVE-2020-295xx/CVE-2020-29574.json +++ b/CVE-2020/CVE-2020-295xx/CVE-2020-29574.json @@ -2,7 +2,7 @@ "id": "CVE-2020-29574", "sourceIdentifier": "cve@mitre.org", "published": "2020-12-11T17:15:13.480", - "lastModified": "2024-11-21T05:24:14.273", + "lastModified": "2025-02-06T18:15:27.600", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-351xx/CVE-2020-35165.json b/CVE-2020/CVE-2020-351xx/CVE-2020-35165.json index 41f239f6583..02ecc679ad5 100644 --- a/CVE-2020/CVE-2020-351xx/CVE-2020-35165.json +++ b/CVE-2020/CVE-2020-351xx/CVE-2020-35165.json @@ -2,8 +2,8 @@ "id": "CVE-2020-35165", "sourceIdentifier": "security_alert@emc.com", "published": "2024-05-22T06:15:09.317", - "lastModified": "2024-11-21T05:26:53.077", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:59:06.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.4, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 } ] }, @@ -49,16 +69,56 @@ "value": "CWE-208" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:bsafe_crypto-c-micro-edition:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.1.5", + "matchCriteriaId": "6C3D1B15-8F35-4976-8BA0-35816ECE6A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:bsafe_micro-edition-suite:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.6", + "matchCriteriaId": "4AA9AC46-4B4A-4776-A15D-42A0AF64D64E" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000181115/dsa-2020-286-dell-bsafe-crypto-c-micro-edition-4-1-5-and-dell-bsafe-micro-edition-suite-4-6-multiple-security-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dell.com/support/kbdoc/en-us/000181115/dsa-2020-286-dell-bsafe-crypto-c-micro-edition-4-1-5-and-dell-bsafe-micro-edition-suite-4-6-multiple-security-vulnerabilities", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-301xx/CVE-2021-30153.json b/CVE-2021/CVE-2021-301xx/CVE-2021-30153.json index cb870b97b3c..bf105aadb93 100644 --- a/CVE-2021/CVE-2021-301xx/CVE-2021-30153.json +++ b/CVE-2021/CVE-2021-301xx/CVE-2021-30153.json @@ -2,7 +2,7 @@ "id": "CVE-2021-30153", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-15T20:16:00.570", - "lastModified": "2024-11-21T06:03:24.473", + "lastModified": "2025-02-06T17:15:12.217", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-668" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-668" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-337xx/CVE-2021-33797.json b/CVE-2021/CVE-2021-337xx/CVE-2021-33797.json index 00508c8ed76..167e24d1752 100644 --- a/CVE-2021/CVE-2021-337xx/CVE-2021-33797.json +++ b/CVE-2021/CVE-2021-337xx/CVE-2021-33797.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33797", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-04-17T22:15:07.677", - "lastModified": "2024-11-21T06:09:36.293", + "lastModified": "2025-02-06T17:15:12.420", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -106,6 +126,14 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://github.com/ccxvii/mujs/issues/148", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-342xx/CVE-2021-34235.json b/CVE-2021/CVE-2021-342xx/CVE-2021-34235.json index d7b1a23eea5..551b62be568 100644 --- a/CVE-2021/CVE-2021-342xx/CVE-2021-34235.json +++ b/CVE-2021/CVE-2021-342xx/CVE-2021-34235.json @@ -2,8 +2,8 @@ "id": "CVE-2021-34235", "sourceIdentifier": "cve@mitre.org", "published": "2022-02-11T18:15:09.760", - "lastModified": "2024-11-21T06:10:02.700", - "vulnStatus": "Modified", + "lastModified": "2025-02-06T17:42:48.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -87,6 +87,11 @@ "vulnerable": true, "criteria": "cpe:2.3:a:tsg-solutions:tokheim_profleet_dialog:11.005.02:*:*:*:*:*:*:*", "matchCriteriaId": "8766B942-F398-4C17-AED9-6002B106EB00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tsg-solutions:tokheim_profleet_dialog:16.001.05:*:*:*:*:*:*:*", + "matchCriteriaId": "8C8919E5-6759-4A2E-9B11-FD8AF728711E" } ] } diff --git a/CVE-2021/CVE-2021-343xx/CVE-2021-34337.json b/CVE-2021/CVE-2021-343xx/CVE-2021-34337.json index 0d3fd37603b..29f90c50a47 100644 --- a/CVE-2021/CVE-2021-343xx/CVE-2021-34337.json +++ b/CVE-2021/CVE-2021-343xx/CVE-2021-34337.json @@ -2,7 +2,7 @@ "id": "CVE-2021-34337", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-15T20:16:00.623", - "lastModified": "2024-11-21T06:10:11.600", + "lastModified": "2025-02-06T17:15:12.627", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-208" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-365xx/CVE-2021-36520.json b/CVE-2021/CVE-2021-365xx/CVE-2021-36520.json index ad664bdde80..aaeef9aaba6 100644 --- a/CVE-2021/CVE-2021-365xx/CVE-2021-36520.json +++ b/CVE-2021/CVE-2021-365xx/CVE-2021-36520.json @@ -2,7 +2,7 @@ "id": "CVE-2021-36520", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T04:15:08.013", - "lastModified": "2024-11-21T06:13:47.103", + "lastModified": "2025-02-06T17:15:12.820", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-237xx/CVE-2022-23748.json b/CVE-2022/CVE-2022-237xx/CVE-2022-23748.json index 4d7aa18f034..084453fb6fb 100644 --- a/CVE-2022/CVE-2022-237xx/CVE-2022-23748.json +++ b/CVE-2022/CVE-2022-237xx/CVE-2022-23748.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23748", "sourceIdentifier": "cve@checkpoint.com", "published": "2022-11-17T23:15:14.383", - "lastModified": "2024-11-21T06:49:13.987", + "lastModified": "2025-02-06T18:15:27.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-317xx/CVE-2022-31764.json b/CVE-2022/CVE-2022-317xx/CVE-2022-31764.json index 721b66a9f25..b7cb7ff6c94 100644 --- a/CVE-2022/CVE-2022-317xx/CVE-2022-31764.json +++ b/CVE-2022/CVE-2022-317xx/CVE-2022-31764.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31764", "sourceIdentifier": "security@apache.org", "published": "2025-02-06T15:15:10.610", - "lastModified": "2025-02-06T15:15:10.610", + "lastModified": "2025-02-06T17:15:13.030", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,11 +11,34 @@ "value": "The Lite UI of Apache ShardingSphere ElasticJob-UI allows an attacker to perform RCE by constructing a special JDBC URL of H2 database. This issue affects Apache ShardingSphere ElasticJob-UI version 3.0.1 and prior versions. This vulnerability has been fixed in ElasticJob-UI 3.0.2.\nThe premise of this attack is that the attacker has obtained the account and password. Otherwise, the attacker cannot perform this attack." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37306.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37306.json index dda1673b106..521ea3c515c 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37306.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37306.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37306", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T02:15:08.077", - "lastModified": "2024-11-21T07:14:43.250", + "lastModified": "2025-02-06T18:15:29.597", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-377xx/CVE-2022-37704.json b/CVE-2022/CVE-2022-377xx/CVE-2022-37704.json index a93b79bdd63..7991da6db85 100644 --- a/CVE-2022/CVE-2022-377xx/CVE-2022-37704.json +++ b/CVE-2022/CVE-2022-377xx/CVE-2022-37704.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37704", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T01:15:06.823", - "lastModified": "2024-11-21T07:15:05.153", + "lastModified": "2025-02-06T18:15:29.863", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-388xx/CVE-2022-38840.json b/CVE-2022/CVE-2022-388xx/CVE-2022-38840.json index b068132a37b..54bafaae91e 100644 --- a/CVE-2022/CVE-2022-388xx/CVE-2022-38840.json +++ b/CVE-2022/CVE-2022-388xx/CVE-2022-38840.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38840", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T02:15:08.123", - "lastModified": "2024-11-21T07:17:09.397", + "lastModified": "2025-02-06T17:15:13.210", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-388xx/CVE-2022-38841.json b/CVE-2022/CVE-2022-388xx/CVE-2022-38841.json index 7b89c43d59a..ab3250ec135 100644 --- a/CVE-2022/CVE-2022-388xx/CVE-2022-38841.json +++ b/CVE-2022/CVE-2022-388xx/CVE-2022-38841.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38841", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T02:15:08.170", - "lastModified": "2024-11-21T07:17:09.550", + "lastModified": "2025-02-06T17:15:13.410", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-404xx/CVE-2022-40490.json b/CVE-2022/CVE-2022-404xx/CVE-2022-40490.json new file mode 100644 index 00000000000..db8fc6dda9a --- /dev/null +++ b/CVE-2022/CVE-2022-404xx/CVE-2022-40490.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2022-40490", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T17:15:13.640", + "lastModified": "2025-02-06T17:15:13.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tiny File Manager v2.4.7 and below was discovered to contain a Cross Site Scripting (XSS) vulnerability. This vulnerability allows attackers to execute arbitrary code via a crafted payload injected into the name of an uploaded or already existing file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/prasathmani/tinyfilemanager", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/whitej3rry/CVE-2022-40490/blob/main/PoC.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-409xx/CVE-2022-40916.json b/CVE-2022/CVE-2022-409xx/CVE-2022-40916.json new file mode 100644 index 00000000000..8575d045208 --- /dev/null +++ b/CVE-2022/CVE-2022-409xx/CVE-2022-40916.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2022-40916", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T17:15:13.757", + "lastModified": "2025-02-06T17:15:13.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tiny File Manager v2.4.7 and below is vulnerable to session fixation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/prasathmani/tinyfilemanager", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/whitej3rry/CVE-2022-40916/blob/main/PoC.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-409xx/CVE-2022-40946.json b/CVE-2022/CVE-2022-409xx/CVE-2022-40946.json index cc91a7d38b8..65fc1981181 100644 --- a/CVE-2022/CVE-2022-409xx/CVE-2022-40946.json +++ b/CVE-2022/CVE-2022-409xx/CVE-2022-40946.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40946", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T02:15:08.207", - "lastModified": "2024-11-21T07:22:17.510", + "lastModified": "2025-02-06T17:15:13.863", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44512.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44512.json index a81e576f83a..78c416b8bef 100644 --- a/CVE-2022/CVE-2022-445xx/CVE-2022-44512.json +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44512.json @@ -2,8 +2,8 @@ "id": "CVE-2022-44512", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-19T00:15:05.067", - "lastModified": "2024-12-19T00:15:05.067", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:19:26.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,169 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndIncluding": "22.001.20085", + "matchCriteriaId": "F8AD24FF-438C-4D7A-A178-2DD7BFB52686" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndIncluding": "22.001.20085", + "matchCriteriaId": "9AACABBA-BBF3-45F1-A755-051A94A57F1F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30059", + "versionEndIncluding": "17.012.30205", + "matchCriteriaId": "9486F709-5BA8-4E22-82C5-3296FCC59455" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30059", + "versionEndIncluding": "17.012.30205", + "matchCriteriaId": "68E6033F-31DC-4BB1-921C-2A3101A8DB71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30314", + "matchCriteriaId": "84E7F875-008E-40E1-AC62-C15CFBBBA256" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30314", + "matchCriteriaId": "24308BC2-3475-4E39-BE3C-5E45E1D0A1E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30311", + "matchCriteriaId": "86229227-747D-4AC8-9599-2F17A0551722" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30311", + "matchCriteriaId": "C7AC703D-02AA-4A14-BFC9-7958CAD0D8E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44513.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44513.json index 07ada479c07..e0437e82a87 100644 --- a/CVE-2022/CVE-2022-445xx/CVE-2022-44513.json +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44513.json @@ -2,8 +2,8 @@ "id": "CVE-2022-44513", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-19T00:15:05.237", - "lastModified": "2024-12-19T00:15:05.237", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:19:01.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,169 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndIncluding": "22.001.20085", + "matchCriteriaId": "F8AD24FF-438C-4D7A-A178-2DD7BFB52686" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndIncluding": "22.001.20085", + "matchCriteriaId": "9AACABBA-BBF3-45F1-A755-051A94A57F1F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30059", + "versionEndIncluding": "17.012.30205", + "matchCriteriaId": "9486F709-5BA8-4E22-82C5-3296FCC59455" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30059", + "versionEndIncluding": "17.012.30205", + "matchCriteriaId": "68E6033F-31DC-4BB1-921C-2A3101A8DB71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30314", + "matchCriteriaId": "84E7F875-008E-40E1-AC62-C15CFBBBA256" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30314", + "matchCriteriaId": "24308BC2-3475-4E39-BE3C-5E45E1D0A1E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30311", + "matchCriteriaId": "86229227-747D-4AC8-9599-2F17A0551722" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30311", + "matchCriteriaId": "C7AC703D-02AA-4A14-BFC9-7958CAD0D8E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44514.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44514.json index 95cf771c948..e783fc3df1b 100644 --- a/CVE-2022/CVE-2022-445xx/CVE-2022-44514.json +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44514.json @@ -2,8 +2,8 @@ "id": "CVE-2022-44514", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-19T00:15:05.400", - "lastModified": "2024-12-19T00:15:05.400", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:18:56.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,169 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndIncluding": "22.001.20085", + "matchCriteriaId": "F8AD24FF-438C-4D7A-A178-2DD7BFB52686" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndIncluding": "22.001.20085", + "matchCriteriaId": "9AACABBA-BBF3-45F1-A755-051A94A57F1F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30059", + "versionEndIncluding": "17.012.30205", + "matchCriteriaId": "9486F709-5BA8-4E22-82C5-3296FCC59455" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30059", + "versionEndIncluding": "17.012.30205", + "matchCriteriaId": "68E6033F-31DC-4BB1-921C-2A3101A8DB71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30314", + "matchCriteriaId": "84E7F875-008E-40E1-AC62-C15CFBBBA256" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30314", + "matchCriteriaId": "24308BC2-3475-4E39-BE3C-5E45E1D0A1E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30311", + "matchCriteriaId": "86229227-747D-4AC8-9599-2F17A0551722" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30311", + "matchCriteriaId": "C7AC703D-02AA-4A14-BFC9-7958CAD0D8E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44518.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44518.json index c750741a01b..84ad10136e1 100644 --- a/CVE-2022/CVE-2022-445xx/CVE-2022-44518.json +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44518.json @@ -2,8 +2,8 @@ "id": "CVE-2022-44518", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-19T00:15:06.037", - "lastModified": "2024-12-19T00:15:06.037", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:18:48.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,169 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndIncluding": "22.001.20085", + "matchCriteriaId": "F8AD24FF-438C-4D7A-A178-2DD7BFB52686" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndIncluding": "22.001.20085", + "matchCriteriaId": "9AACABBA-BBF3-45F1-A755-051A94A57F1F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30059", + "versionEndIncluding": "17.012.30205", + "matchCriteriaId": "9486F709-5BA8-4E22-82C5-3296FCC59455" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30059", + "versionEndIncluding": "17.012.30205", + "matchCriteriaId": "68E6033F-31DC-4BB1-921C-2A3101A8DB71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30314", + "matchCriteriaId": "84E7F875-008E-40E1-AC62-C15CFBBBA256" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30314", + "matchCriteriaId": "24308BC2-3475-4E39-BE3C-5E45E1D0A1E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30311", + "matchCriteriaId": "86229227-747D-4AC8-9599-2F17A0551722" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30311", + "matchCriteriaId": "C7AC703D-02AA-4A14-BFC9-7958CAD0D8E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44519.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44519.json index 9c288414bb1..5e4205afeec 100644 --- a/CVE-2022/CVE-2022-445xx/CVE-2022-44519.json +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44519.json @@ -2,8 +2,8 @@ "id": "CVE-2022-44519", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-19T00:15:06.200", - "lastModified": "2024-12-19T00:15:06.200", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:18:40.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,169 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndIncluding": "22.001.20085", + "matchCriteriaId": "F8AD24FF-438C-4D7A-A178-2DD7BFB52686" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndIncluding": "22.001.20085", + "matchCriteriaId": "9AACABBA-BBF3-45F1-A755-051A94A57F1F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30059", + "versionEndIncluding": "17.012.30205", + "matchCriteriaId": "9486F709-5BA8-4E22-82C5-3296FCC59455" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30059", + "versionEndIncluding": "17.012.30205", + "matchCriteriaId": "68E6033F-31DC-4BB1-921C-2A3101A8DB71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30314", + "matchCriteriaId": "84E7F875-008E-40E1-AC62-C15CFBBBA256" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30314", + "matchCriteriaId": "24308BC2-3475-4E39-BE3C-5E45E1D0A1E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30311", + "matchCriteriaId": "86229227-747D-4AC8-9599-2F17A0551722" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30311", + "matchCriteriaId": "C7AC703D-02AA-4A14-BFC9-7958CAD0D8E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44520.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44520.json index 68fca943115..9d5f5614760 100644 --- a/CVE-2022/CVE-2022-445xx/CVE-2022-44520.json +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44520.json @@ -2,8 +2,8 @@ "id": "CVE-2022-44520", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-19T00:15:06.360", - "lastModified": "2024-12-19T00:15:06.360", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:18:29.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,169 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndIncluding": "22.001.20085", + "matchCriteriaId": "F8AD24FF-438C-4D7A-A178-2DD7BFB52686" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndIncluding": "22.001.20085", + "matchCriteriaId": "9AACABBA-BBF3-45F1-A755-051A94A57F1F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30059", + "versionEndIncluding": "17.012.30205", + "matchCriteriaId": "9486F709-5BA8-4E22-82C5-3296FCC59455" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "17.011.30059", + "versionEndIncluding": "17.012.30205", + "matchCriteriaId": "68E6033F-31DC-4BB1-921C-2A3101A8DB71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30314", + "matchCriteriaId": "84E7F875-008E-40E1-AC62-C15CFBBBA256" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30314", + "matchCriteriaId": "24308BC2-3475-4E39-BE3C-5E45E1D0A1E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30311", + "matchCriteriaId": "86229227-747D-4AC8-9599-2F17A0551722" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30311", + "matchCriteriaId": "C7AC703D-02AA-4A14-BFC9-7958CAD0D8E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb22-16.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44726.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44726.json index afc0f1f3edf..918f6c3d323 100644 --- a/CVE-2022/CVE-2022-447xx/CVE-2022-44726.json +++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44726.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44726", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-17T13:15:37.670", - "lastModified": "2024-11-21T07:28:22.557", + "lastModified": "2025-02-06T17:15:14.047", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48312.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48312.json index b646ab82686..c4ea97c5b02 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48312.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48312.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48312", "sourceIdentifier": "psirt@huawei.com", "published": "2023-04-16T07:15:52.243", - "lastModified": "2024-11-21T07:33:08.587", + "lastModified": "2025-02-06T17:15:14.253", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -49,6 +69,20 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48313.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48313.json index b4612eab9a0..d64768723ed 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48313.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48313.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48313", "sourceIdentifier": "psirt@huawei.com", "published": "2023-04-16T08:15:07.277", - "lastModified": "2024-11-21T07:33:08.707", + "lastModified": "2025-02-06T17:15:14.450", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48314.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48314.json index 264e4822d9e..0084fd846b9 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48314.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48314.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48314", "sourceIdentifier": "psirt@huawei.com", "published": "2023-04-16T08:15:07.387", - "lastModified": "2024-11-21T07:33:08.820", + "lastModified": "2025-02-06T17:15:14.643", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0374.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0374.json index d35b9e7cf6f..73444930195 100644 --- a/CVE-2023/CVE-2023-03xx/CVE-2023-0374.json +++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0374.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0374", "sourceIdentifier": "contact@wpscan.com", "published": "2023-04-17T13:15:37.847", - "lastModified": "2024-11-21T07:37:04.293", + "lastModified": "2025-02-06T17:15:14.833", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,9 +32,41 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0764.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0764.json index 8abc0961054..5ca94233ecb 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0764.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0764.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0764", "sourceIdentifier": "contact@wpscan.com", "published": "2023-04-17T13:15:37.897", - "lastModified": "2024-11-21T07:37:46.557", + "lastModified": "2025-02-06T17:15:14.993", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1331.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1331.json index d56b8073da9..326e9da54c7 100644 --- a/CVE-2023/CVE-2023-13xx/CVE-2023-1331.json +++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1331.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1331", "sourceIdentifier": "contact@wpscan.com", "published": "2023-04-17T13:15:38.240", - "lastModified": "2024-11-21T07:38:58.457", + "lastModified": "2025-02-06T17:15:15.157", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1373.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1373.json index 86182829cc0..559f59a231d 100644 --- a/CVE-2023/CVE-2023-13xx/CVE-2023-1373.json +++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1373.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1373", "sourceIdentifier": "contact@wpscan.com", "published": "2023-04-17T13:15:38.337", - "lastModified": "2024-11-21T07:39:03.440", + "lastModified": "2025-02-06T17:15:15.317", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21586.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21586.json index da04974b592..88cb7d3911e 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21586.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21586.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21586", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-19T00:15:06.530", - "lastModified": "2024-12-19T00:15:06.530", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:16:08.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,128 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndIncluding": "22.003.20282", + "matchCriteriaId": "14754E74-395C-4EF7-B0F0-F377AFE9889E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndIncluding": "22.003.20282", + "matchCriteriaId": "CB7101F6-21E8-4B8D-84AE-733503EDA65E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndIncluding": "22.003.20281", + "matchCriteriaId": "AF3A489A-5635-482A-A61F-5734417F8518" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndIncluding": "22.003.20281", + "matchCriteriaId": "A5B5460B-C186-4A90-B28E-EEAC8A154E7A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30418", + "matchCriteriaId": "0EA7F4CB-565E-4CAA-BDB7-9B04141D5D72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30005", + "versionEndIncluding": "20.005.30418", + "matchCriteriaId": "392735BD-1019-4F4F-B477-64CF254A64AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb23-01.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24501.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24501.json index cce42797a1c..45ed33528ac 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24501.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24501.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24501", "sourceIdentifier": "cna@cyber.gov.il", "published": "2023-04-17T22:15:08.137", - "lastModified": "2024-11-21T07:47:59.993", + "lastModified": "2025-02-06T17:15:15.583", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27906.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27906.json index 5677cca01c4..1ebc841d603 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27906.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27906.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27906", "sourceIdentifier": "psirt@autodesk.com", "published": "2023-04-17T21:15:07.687", - "lastModified": "2024-11-21T07:53:40.457", + "lastModified": "2025-02-06T17:15:15.723", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27907.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27907.json index 875f34431b0..621b1f02e4e 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27907.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27907.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27907", "sourceIdentifier": "psirt@autodesk.com", "published": "2023-04-17T21:15:07.737", - "lastModified": "2024-11-21T07:53:40.570", + "lastModified": "2025-02-06T17:15:15.877", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27909.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27909.json index 0ee5fd22e09..e4b8f703148 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27909.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27909.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27909", "sourceIdentifier": "psirt@autodesk.com", "published": "2023-04-17T21:15:07.777", - "lastModified": "2024-11-21T07:53:40.793", + "lastModified": "2025-02-06T17:15:16.037", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29507.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29507.json index b18d7d33068..dda44285ee8 100644 --- a/CVE-2023/CVE-2023-295xx/CVE-2023-29507.json +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29507.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29507", "sourceIdentifier": "security-advisories@github.com", "published": "2023-04-16T07:15:53.187", - "lastModified": "2024-11-21T07:57:11.830", + "lastModified": "2025-02-06T17:15:16.757", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -143,6 +143,13 @@ "tags": [ "Issue Tracking" ] + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-20380", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29508.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29508.json index 9ec8385c447..4dee60cf46e 100644 --- a/CVE-2023/CVE-2023-295xx/CVE-2023-29508.json +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29508.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29508", "sourceIdentifier": "security-advisories@github.com", "published": "2023-04-16T08:15:07.513", - "lastModified": "2024-11-21T07:57:11.953", + "lastModified": "2025-02-06T17:15:16.897", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -58,7 +58,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -131,6 +131,21 @@ "Issue Tracking", "Vendor Advisory" ] + }, + { + "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hmm7-6ph9-8jf2", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-20312", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-296xx/CVE-2023-29665.json b/CVE-2023/CVE-2023-296xx/CVE-2023-29665.json index 143fbc72a32..b2b575b0743 100644 --- a/CVE-2023/CVE-2023-296xx/CVE-2023-29665.json +++ b/CVE-2023/CVE-2023-296xx/CVE-2023-29665.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29665", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-17T16:15:09.643", - "lastModified": "2024-11-21T07:57:22.933", + "lastModified": "2025-02-06T17:15:17.080", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3758.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3758.json index c5563dd7704..73067c3ae91 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3758.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3758.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3758", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-18T19:15:08.597", - "lastModified": "2024-11-24T16:15:03.767", + "lastModified": "2025-02-06T17:15:17.657", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,13 +36,43 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38095.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38095.json index 232af81fb5d..ab75da4da78 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38095.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38095.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38095", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:51.897", - "lastModified": "2024-11-21T08:12:50.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:01:51.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,22 +73,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netgear:prosafe_network_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.7.0.20", + "matchCriteriaId": "576FE1E0-1CDF-44E3-BB14-489F9DE371CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-921/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-921/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38096.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38096.json index d601ba1c8f2..a2de786e739 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38096.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38096.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38096", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:52.070", - "lastModified": "2024-11-21T08:12:51.073", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:01:32.923", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,64 @@ "value": "CWE-287" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netgear:prosafe_network_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.7.0.20", + "matchCriteriaId": "576FE1E0-1CDF-44E3-BB14-489F9DE371CE" + } + ] + } + ] } ], "references": [ { "url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-920/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-920/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38097.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38097.json index 0f8e0815e08..e5cef16c4b1 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38097.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38097.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38097", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:52.270", - "lastModified": "2024-11-21T08:12:51.193", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:01:59.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,64 @@ "value": "CWE-749" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netgear:prosafe_network_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.7.0.20", + "matchCriteriaId": "576FE1E0-1CDF-44E3-BB14-489F9DE371CE" + } + ] + } + ] } ], "references": [ { "url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-919/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-919/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38098.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38098.json index 9b161ad9ce1..13188b125e9 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38098.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38098.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38098", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:52.453", - "lastModified": "2024-11-21T08:12:51.317", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:01:42.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,22 +73,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netgear:prosafe_network_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.7.0.20", + "matchCriteriaId": "576FE1E0-1CDF-44E3-BB14-489F9DE371CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-918/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-918/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-380xx/CVE-2023-38099.json b/CVE-2023/CVE-2023-380xx/CVE-2023-38099.json index 601fd16816b..0804fd0440f 100644 --- a/CVE-2023/CVE-2023-380xx/CVE-2023-38099.json +++ b/CVE-2023/CVE-2023-380xx/CVE-2023-38099.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38099", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:52.627", - "lastModified": "2024-11-21T08:12:51.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:01:12.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,22 +73,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netgear:prosafe_network_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.7.0.20", + "matchCriteriaId": "576FE1E0-1CDF-44E3-BB14-489F9DE371CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-917/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-917/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38100.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38100.json index 09b1c729416..eb5f8e4e6cf 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38100.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38100.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38100", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:52.800", - "lastModified": "2024-11-21T08:12:51.570", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:01:21.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,22 +73,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netgear:prosafe_network_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.7.0.20", + "matchCriteriaId": "576FE1E0-1CDF-44E3-BB14-489F9DE371CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-916/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-916/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38101.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38101.json index 734b7c4f0ce..87bd2bd1858 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38101.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38101.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38101", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:52.977", - "lastModified": "2024-11-21T08:12:51.690", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:01:03.677", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,64 @@ "value": "CWE-749" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netgear:prosafe_network_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.7.0.20", + "matchCriteriaId": "576FE1E0-1CDF-44E3-BB14-489F9DE371CE" + } + ] + } + ] } ], "references": [ { "url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-915/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-915/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38102.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38102.json index e95f2005f8e..2be07a30cc5 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38102.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38102.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38102", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:53.147", - "lastModified": "2024-11-21T08:12:51.820", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:00:50.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,22 +73,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netgear:prosafe_network_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.7.0.20", + "matchCriteriaId": "576FE1E0-1CDF-44E3-BB14-489F9DE371CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-914/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://kb.netgear.com/000065707/Security-Advisory-for-Multiple-Vulnerabilities-on-the-ProSAFE-Network-Management-System-PSV-2023-0024-PSV-2023-0025", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-914/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6486.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6486.json index a4410783a27..46cee617789 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6486.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6486.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6486", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:12.203", - "lastModified": "2024-11-21T08:43:56.887", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:58:52.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,41 +36,117 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brainstormforce:spectra:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.10.4", + "matchCriteriaId": "A5712BB9-C969-4AAF-98E2-96A6267BAD9D" + } + ] + } + ] + } + ], "references": [ { "url": "https://advisory.abay.sh/cve-2023-6486", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3042670%40ultimate-addons-for-gutenberg%2Ftrunk&old=3037142%40ultimate-addons-for-gutenberg%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4933a30-974f-487d-9444-b0ea1283a09c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://youtu.be/t5K745dBsT0", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit" + ] }, { "url": "https://advisory.abay.sh/cve-2023-6486", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3042670%40ultimate-addons-for-gutenberg%2Ftrunk&old=3037142%40ultimate-addons-for-gutenberg%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4933a30-974f-487d-9444-b0ea1283a09c?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://youtu.be/t5K745dBsT0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6961.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6961.json index 0a1a797db56..e07519cc490 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6961.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6961.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6961", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:08.327", - "lastModified": "2024-11-21T08:44:55.757", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:40:11.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:joomunited:wp_meta_seo:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.5.13", + "matchCriteriaId": "7CBA3140-5D68-4A51-B4B2-3FAC8B356F9B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3071453%40wp-meta-seo%2Ftrunk&old=3068145%40wp-meta-seo%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca91e41d-b728-4eb0-86d5-043813d8c2c1?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3071453%40wp-meta-seo%2Ftrunk&old=3068145%40wp-meta-seo%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca91e41d-b728-4eb0-86d5-043813d8c2c1?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6962.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6962.json index a48bf7848b6..479df91fedd 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6962.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6962.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6962", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:08.500", - "lastModified": "2024-11-21T08:44:55.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:39:37.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:joomunited:wp_meta_seo:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.5.13", + "matchCriteriaId": "7CBA3140-5D68-4A51-B4B2-3FAC8B356F9B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3071453%40wp-meta-seo%2Ftrunk&old=3068145%40wp-meta-seo%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0323b54b-c15b-4d2d-9e8f-3df87c84dd49?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3071453%40wp-meta-seo%2Ftrunk&old=3068145%40wp-meta-seo%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0323b54b-c15b-4d2d-9e8f-3df87c84dd49?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6964.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6964.json index 5f6d52314d2..00ef99d13dd 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6964.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6964.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6964", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:13.090", - "lastModified": "2024-11-21T08:44:56.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:53:58.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kadencewp:gutenberg_blocks_with_ai:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.12", + "matchCriteriaId": "A4BB7971-AC87-48DF-84D1-BC781D612307" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3019592%40kadence-blocks&old=2996625%40kadence-blocks&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b01ad77f-2349-48bb-b4e9-f7cbce435de9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3019592%40kadence-blocks&old=2996625%40kadence-blocks&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b01ad77f-2349-48bb-b4e9-f7cbce435de9?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7272.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7272.json index f764e8cc9dd..93b6de16bba 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7272.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7272.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7272", "sourceIdentifier": "emo@eclipse.org", "published": "2024-07-17T15:15:10.457", - "lastModified": "2024-11-21T08:45:38.900", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:07:45.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,61 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eclipse:parsson:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.4", + "matchCriteriaId": "60E3654D-D790-47C4-8422-35DA7C26CC78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eclipse:parsson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.1.0", + "versionEndExcluding": "1.1.3", + "matchCriteriaId": "B6E85442-5345-483A-B2D9-CF0851B306DB" + } + ] + } + ] } ], "references": [ { "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/12", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/12", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0598.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0598.json index 5ab5e5b16a5..66ae7b1ef7e 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0598.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0598.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0598", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:14.537", - "lastModified": "2024-11-21T08:46:58.420", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:51:23.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 1.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kadencewp:gutenberg_blocks_with_ai:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.18", + "matchCriteriaId": "D4434EE6-6CB4-4C2F-BF23-C90FFFB52BC2" + } + ] + } + ] + } + ], "references": [ { "url": "https://advisory.abay.sh/cve-2024-0598", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3023068%40kadence-blocks&new=3023068%40kadence-blocks&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/989bd778-c7b2-41c5-ac4a-2f1a4e594f0d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://advisory.abay.sh/cve-2024-0598", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3023068%40kadence-blocks&new=3023068%40kadence-blocks&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/989bd778-c7b2-41c5-ac4a-2f1a4e594f0d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13614.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13614.json new file mode 100644 index 00000000000..2fcea6ba702 --- /dev/null +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13614.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-13614", + "sourceIdentifier": "vulnerability@kaspersky.com", + "published": "2025-02-06T17:15:18.080", + "lastModified": "2025-02-06T17:15:18.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Kaspersky has fixed a security issue in Kaspersky Anti-Virus SDK for Windows, Kaspersky Security for Virtualization Light Agent, Kaspersky Endpoint Security for Windows, Kaspersky Small Office Security, Kaspersky for Windows (Standard, Plus, Premium), Kaspersky Free, Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Security Cloud, Kaspersky Safe Kids, Kaspersky Anti-Ransomware Tool that could allow an authenticated attacker to write data to a limited area outside the allocated kernel memory buffer. The fix was installed automatically for all Kaspersky Endpoint products." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "vulnerability@kaspersky.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "vulnerability@kaspersky.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://support.kaspersky.com/vulnerability/list-of-advisories/12430#060225", + "source": "vulnerability@kaspersky.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21615.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21615.json index 7c481a07af8..0d54da6c85d 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21615.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21615.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21615", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T15:15:24.153", - "lastModified": "2024-11-21T08:54:43.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:39:32.977", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,24 +93,790 @@ "value": "CWE-276" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.2", + "matchCriteriaId": "331C0F12-D9B9-483B-9EF0-28E48ED8346D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "DE69E9E3-00FC-41BF-9109-617668CF9A0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "8BCDE58C-80CC-4C5A-9667-8A4468D8D76C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "EBB967BF-3495-476D-839A-9DBFCBE69F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "1A78CC80-E8B1-4CDA-BB35-A61833657FA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.2", + "matchCriteriaId": "9C14B5A6-597A-4181-8C42-392A2E4605BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "E88AC378-461C-4EFA-A04B-5786FF21FE03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "3B0AFB30-81DC-465C-9F63-D1B15EA4809A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "2035F0AC-29E7-478A-A9D0-BAA3A88B3413" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C34ABD4B-B045-4046-9641-66E3B2082A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "6D5DC04F-18DE-403B-BE93-2251F3332C1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "4EC38173-44AB-43D5-8C27-CB43AD5E0B2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "5A4DD04A-DE52-46BE-8C34-8DB47F7500F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "FEE0E145-8E1C-446E-90ED-237E3B9CAF47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "0F26369D-21B2-4C6A-98C1-492692A61283" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "24003819-1A6B-4BDF-B3DF-34751C137788" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "BF8D332E-9133-45B9-BB07-B33C790F737A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "3E2A4377-D044-4E43-B6CC-B753D7F6ABD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "8DAEC4F4-5748-4D36-A72B-4C62A0A30E38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "C76DA7A5-9320-4E21-96A2-ACE70803A1CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "703C73EB-2D63-4D4F-8129-239AE1E96B2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "8F67CE3C-3A06-487C-90DE-D5B3B1EC08A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "C9D664AB-0FA7-49C7-B6E1-69C77652FBEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "C16434C0-21A7-4CE5-92E1-7D60A35EF5D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "1475A58F-1515-4492-B5A3-BE40C30E5B14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "4C9C133A-6114-495F-872C-BD1200953131" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "A3CA3365-F9AF-40DF-8700-30AD4BC58E27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "C7FEFD0A-A969-4F53-8668-1231FD675D6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "9370C46D-3AA1-4562-B67F-DF6EA10F209B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1FD8C240-A7FE-4FD5-ADCC-289C1BC461BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "BE2EF84D-55A9-41DC-A324-69E1DC426D0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4546776C-A657-42E3-9A36-47F9F59A88AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "156DD8ED-CE6E-48C0-9E67-16B04767D62E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "10F9C2B1-BD81-4EDC-ADF5-4B0F39001C7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "0A33C425-921F-4795-B834-608C8F1597E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "04CE952D-E3C1-4B34-9E65-EC52BFE887AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "8AE9D1A7-4721-4E1D-B965-FDC38126B1DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "A8643AA3-29EF-48A7-B033-CB60988E214B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "6DEAA7FD-385F-4221-907E-65ABC16BE4BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "DDEC008A-3137-48D1-8ABC-6DB0EFC40E50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "558D234D-BC50-415F-86D6-8E19D6C3ACE0" + } + ] + } + ] } ], "references": [ { "url": "https://supportportal.juniper.net/JSA75756", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://supportportal.juniper.net/JSA75756", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21618.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21618.json index ec5cf3fa0a1..adbdf2a9996 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21618.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21618.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21618", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T15:15:24.350", - "lastModified": "2024-11-21T08:54:44.067", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:39:21.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,24 +93,528 @@ "value": "CWE-788" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "EBB967BF-3495-476D-839A-9DBFCBE69F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "1A78CC80-E8B1-4CDA-BB35-A61833657FA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "B227E831-30FF-4BE1-B8B2-31829A5610A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "C9D664AB-0FA7-49C7-B6E1-69C77652FBEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "C16434C0-21A7-4CE5-92E1-7D60A35EF5D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "1475A58F-1515-4492-B5A3-BE40C30E5B14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "A3CA3365-F9AF-40DF-8700-30AD4BC58E27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "C7FEFD0A-A969-4F53-8668-1231FD675D6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "9370C46D-3AA1-4562-B67F-DF6EA10F209B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "BE2EF84D-55A9-41DC-A324-69E1DC426D0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "0A33C425-921F-4795-B834-608C8F1597E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "04CE952D-E3C1-4B34-9E65-EC52BFE887AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "8AE9D1A7-4721-4E1D-B965-FDC38126B1DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "A8643AA3-29EF-48A7-B033-CB60988E214B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "6DEAA7FD-385F-4221-907E-65ABC16BE4BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "DDEC008A-3137-48D1-8ABC-6DB0EFC40E50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "558D234D-BC50-415F-86D6-8E19D6C3ACE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "33F4EEEE-77E9-4973-A770-99E7BA2F05F5" + } + ] + } + ] } ], "references": [ { "url": "https://supportportal.juniper.net/JSA75759", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://supportportal.juniper.net/JSA75759", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2212.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2212.json index e8f456b2a54..93e6c1d7571 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2212.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2212.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2212", "sourceIdentifier": "emo@eclipse.org", "published": "2024-03-26T16:15:13.233", - "lastModified": "2024-11-21T09:09:16.010", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:04:46.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -53,32 +73,86 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eclipse:threadx:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.4.0", + "matchCriteriaId": "F2A0F47C-E265-4718-A894-4E5C2495B587" + } + ] + } + ] } ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/35", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/28/1", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://github.com/eclipse-threadx/threadx/security/advisories/GHSA-v9jj-7qjg-h6g6", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/May/35", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/28/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://github.com/eclipse-threadx/threadx/security/advisories/GHSA-v9jj-7qjg-h6g6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2214.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2214.json index d71fce11e12..b7b4ca97850 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2214.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2214.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2214", "sourceIdentifier": "emo@eclipse.org", "published": "2024-03-26T16:15:13.430", - "lastModified": "2024-11-21T09:09:16.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:05:18.013", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,32 +69,80 @@ "value": "CWE-129" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eclipse:threadx:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.4.0", + "matchCriteriaId": "F2A0F47C-E265-4718-A894-4E5C2495B587" + } + ] + } + ] } ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/35", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/28/1", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://github.com/eclipse-threadx/threadx/security/advisories/GHSA-vmp6-qhp9-r66x", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/May/35", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/28/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://github.com/eclipse-threadx/threadx/security/advisories/GHSA-vmp6-qhp9-r66x", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2452.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2452.json index 4918ab82e79..6d22eb838d5 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2452.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2452.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2452", "sourceIdentifier": "emo@eclipse.org", "published": "2024-03-26T16:15:13.623", - "lastModified": "2024-11-21T09:09:47.030", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:05:49.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -53,32 +73,80 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.4.0", + "matchCriteriaId": "4CE8AC54-F2D2-45D2-8ACF-62E2553AC219" + } + ] + } + ] } ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/35", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/28/1", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-h963-7vhw-8rpx", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/May/35", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/28/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-h963-7vhw-8rpx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2455.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2455.json index 7a9822478bd..24b39865863 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2455.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2455.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2455", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-01T13:15:10.493", - "lastModified": "2024-08-01T14:04:01.833", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T17:46:37.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,20 +69,57 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:pro:wordpress:*:*", + "versionEndIncluding": "7.9.0", + "matchCriteriaId": "A838D936-C4A3-4D6A-A91B-BBAD0CD3AAB3" + } + ] + } + ] } ], "references": [ { "url": "https://feedback.elementpack.pro/announcements", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://feedback.elementpack.pro/announcements#:~:text=Version%207.9.1%20Released", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1903527e-d7d9-48a0-b59d-65ec5e14def2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25705.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25705.json index 2e4fc585f5c..7bacef5f85b 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25705.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25705.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25705", "sourceIdentifier": "psirt@esri.com", "published": "2024-04-04T18:15:12.603", - "lastModified": "2025-01-30T16:21:48.907", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-06T18:15:30.930", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "psirt@esri.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -108,12 +108,8 @@ ], "references": [ { - "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/", - "source": "psirt@esri.com", - "tags": [ - "Broken Link", - "Not Applicable" - ] + "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/the-portal-for-arcgis-security-2024-update-2-is-available-install-these-patches-at-your-earliest-opportunity-to-address-these-vulnerabilities/", + "source": "psirt@esri.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2667.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2667.json index 2df61feabe5..13fb15e96f3 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2667.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2667.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2667", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:18.443", - "lastModified": "2024-11-21T09:10:14.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:05:25.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:instawp:instawp_connect:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "0.1.0.23", + "matchCriteriaId": "F4F69A34-C28C-486D-B889-443B2DFB1E0F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3061039%40instawp-connect&new=3061039%40instawp-connect&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f6aead8d-c136-4952-ad03-86fe0f144dea?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3061039%40instawp-connect&new=3061039%40instawp-connect&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f6aead8d-c136-4952-ad03-86fe0f144dea?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27939.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27939.json index 8f9e4f95864..cae9860c087 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27939.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27939.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27939", "sourceIdentifier": "productcert@siemens.com", "published": "2024-05-14T16:16:23.443", - "lastModified": "2024-11-21T09:05:27.690", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:16:36.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:ruggedcom_crossbow:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.5", + "matchCriteriaId": "5984B129-3702-4DA7-AEA9-4B538CFE5E40" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27940.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27940.json index f7d5432b48c..b9b39153527 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27940.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27940.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27940", "sourceIdentifier": "productcert@siemens.com", "published": "2024-05-14T16:16:24.733", - "lastModified": "2024-11-21T09:05:27.807", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:16:23.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:ruggedcom_crossbow:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.5", + "matchCriteriaId": "5984B129-3702-4DA7-AEA9-4B538CFE5E40" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27941.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27941.json index 57e7f74cb35..5ad217d9793 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27941.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27941.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27941", "sourceIdentifier": "productcert@siemens.com", "published": "2024-05-14T16:16:26.040", - "lastModified": "2024-11-21T09:05:27.947", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:16:12.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:ruggedcom_crossbow:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.5", + "matchCriteriaId": "5984B129-3702-4DA7-AEA9-4B538CFE5E40" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27942.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27942.json index 1e245506621..e4ba4aacb3b 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27942.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27942.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27942", "sourceIdentifier": "productcert@siemens.com", "published": "2024-05-14T16:16:27.237", - "lastModified": "2024-11-21T09:05:28.090", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:15:39.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:ruggedcom_crossbow:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.5", + "matchCriteriaId": "5984B129-3702-4DA7-AEA9-4B538CFE5E40" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27943.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27943.json index 2b2c2b430c2..3c874ab4d7d 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27943.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27943.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27943", "sourceIdentifier": "productcert@siemens.com", "published": "2024-05-14T16:16:28.537", - "lastModified": "2024-11-21T09:05:28.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:15:25.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-73" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:ruggedcom_crossbow:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.5", + "matchCriteriaId": "5984B129-3702-4DA7-AEA9-4B538CFE5E40" + } + ] + } + ] } ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27944.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27944.json index 3a807953903..0b3eff88f80 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27944.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27944.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27944", "sourceIdentifier": "productcert@siemens.com", "published": "2024-05-14T16:16:31.260", - "lastModified": "2024-11-21T09:05:28.360", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:15:10.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-73" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:ruggedcom_crossbow:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.5", + "matchCriteriaId": "5984B129-3702-4DA7-AEA9-4B538CFE5E40" + } + ] + } + ] } ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27945.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27945.json index 4851b4d637c..7e90ac13803 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27945.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27945.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27945", "sourceIdentifier": "productcert@siemens.com", "published": "2024-05-14T16:16:32.503", - "lastModified": "2024-11-21T09:05:28.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:14:57.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-73" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:ruggedcom_crossbow:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.5", + "matchCriteriaId": "5984B129-3702-4DA7-AEA9-4B538CFE5E40" + } + ] + } + ] } ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27946.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27946.json index 2d39d1f420b..1ec555fc517 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27946.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27946.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27946", "sourceIdentifier": "productcert@siemens.com", "published": "2024-05-14T16:16:33.783", - "lastModified": "2024-11-21T09:05:28.653", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:14:26.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:ruggedcom_crossbow:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.5", + "matchCriteriaId": "5984B129-3702-4DA7-AEA9-4B538CFE5E40" + } + ] + } + ] } ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27947.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27947.json index e61fa1b4593..844034e9933 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27947.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27947.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27947", "sourceIdentifier": "productcert@siemens.com", "published": "2024-05-14T16:16:35.010", - "lastModified": "2024-11-21T09:05:28.797", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:13:55.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:ruggedcom_crossbow:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.5", + "matchCriteriaId": "5984B129-3702-4DA7-AEA9-4B538CFE5E40" + } + ] + } + ] } ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-916916.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2771.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2771.json index f7281279afe..911433e9b15 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2771.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2771.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2771", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-18T08:15:06.413", - "lastModified": "2024-11-21T09:10:28.887", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:33:57.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fluentforms:contact_form:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.1.17", + "matchCriteriaId": "286DEA72-95CC-4DD3-8387-C1E6973C1C89" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3088078/fluentform/trunk/app/Http/Policies/RoleManagerPolicy.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/071195d6-3452-4241-a8d3-92efc84e4850?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3088078/fluentform/trunk/app/Http/Policies/RoleManagerPolicy.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/071195d6-3452-4241-a8d3-92efc84e4850?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2772.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2772.json index f6295d3576b..a58b8435767 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2772.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2772.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2772", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-18T08:15:07.393", - "lastModified": "2024-11-21T09:10:29.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:38:03.913", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fluentforms:contact_form:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.1.14", + "matchCriteriaId": "39F0EC33-8A3E-40E8-B06E-654D1B0D56F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3073857", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2ccba77c-fb90-4906-b0fe-77607ec5df1f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3073857", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2ccba77c-fb90-4906-b0fe-77607ec5df1f?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2782.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2782.json index 5621f7bd720..0a0b9a6b8eb 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2782.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2782.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2782", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-18T08:15:07.727", - "lastModified": "2024-11-21T09:10:30.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:37:34.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fluentforms:contact_form:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.1.17", + "matchCriteriaId": "286DEA72-95CC-4DD3-8387-C1E6973C1C89" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3088078/fluentform/trunk/app/Http/Policies/GlobalSettingsPolicy.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0814e7b3-404a-4db5-b564-46c9086ec048?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3088078/fluentform/trunk/app/Http/Policies/GlobalSettingsPolicy.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0814e7b3-404a-4db5-b564-46c9086ec048?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2860.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2860.json index 9fface467d7..cfe3c0ded5b 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2860.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2860.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2860", "sourceIdentifier": "sirt@brocade.com", "published": "2024-05-08T02:15:09.873", - "lastModified": "2024-11-21T09:10:42.120", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T17:54:45.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,55 @@ "value": "CWE-306" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:2.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4578C225-0362-4DD2-9640-BA42C07ACC96" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24260", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24260", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30394.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30394.json index 70a85ba7453..66af9d59795 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30394.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30394.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30394", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T15:15:24.730", - "lastModified": "2024-11-21T09:11:50.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:39:12.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,24 +93,645 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.2", + "matchCriteriaId": "331C0F12-D9B9-483B-9EF0-28E48ED8346D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "EBB967BF-3495-476D-839A-9DBFCBE69F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "1A78CC80-E8B1-4CDA-BB35-A61833657FA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "B227E831-30FF-4BE1-B8B2-31829A5610A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.4", + "matchCriteriaId": "A51696D6-8503-4CBD-AD19-861E5BE94ED4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "C9D664AB-0FA7-49C7-B6E1-69C77652FBEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "C16434C0-21A7-4CE5-92E1-7D60A35EF5D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "1475A58F-1515-4492-B5A3-BE40C30E5B14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "A3CA3365-F9AF-40DF-8700-30AD4BC58E27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "C7FEFD0A-A969-4F53-8668-1231FD675D6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "9370C46D-3AA1-4562-B67F-DF6EA10F209B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "BE2EF84D-55A9-41DC-A324-69E1DC426D0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4546776C-A657-42E3-9A36-47F9F59A88AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "156DD8ED-CE6E-48C0-9E67-16B04767D62E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "0A33C425-921F-4795-B834-608C8F1597E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "04CE952D-E3C1-4B34-9E65-EC52BFE887AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "8AE9D1A7-4721-4E1D-B965-FDC38126B1DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "A8643AA3-29EF-48A7-B033-CB60988E214B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "6DEAA7FD-385F-4221-907E-65ABC16BE4BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "DDEC008A-3137-48D1-8ABC-6DB0EFC40E50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "558D234D-BC50-415F-86D6-8E19D6C3ACE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "33F4EEEE-77E9-4973-A770-99E7BA2F05F5" + } + ] + } + ] } ], "references": [ { "url": "https://supportportal.juniper.net/JSA79094", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://supportportal.juniper.net/JSA79094", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30395.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30395.json index 2e059763e0a..a1f855f8164 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30395.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30395.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30395", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T15:15:24.930", - "lastModified": "2024-11-21T09:11:50.303", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:39:02.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,24 +93,780 @@ "value": "CWE-1287" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.2", + "matchCriteriaId": "331C0F12-D9B9-483B-9EF0-28E48ED8346D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "DE69E9E3-00FC-41BF-9109-617668CF9A0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "EBB967BF-3495-476D-839A-9DBFCBE69F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "1A78CC80-E8B1-4CDA-BB35-A61833657FA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.2", + "matchCriteriaId": "9C14B5A6-597A-4181-8C42-392A2E4605BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "E88AC378-461C-4EFA-A04B-5786FF21FE03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "3B0AFB30-81DC-465C-9F63-D1B15EA4809A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "2035F0AC-29E7-478A-A9D0-BAA3A88B3413" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C34ABD4B-B045-4046-9641-66E3B2082A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "6D5DC04F-18DE-403B-BE93-2251F3332C1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "4EC38173-44AB-43D5-8C27-CB43AD5E0B2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "5A4DD04A-DE52-46BE-8C34-8DB47F7500F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "FEE0E145-8E1C-446E-90ED-237E3B9CAF47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "0F26369D-21B2-4C6A-98C1-492692A61283" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "24003819-1A6B-4BDF-B3DF-34751C137788" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "BF8D332E-9133-45B9-BB07-B33C790F737A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "3E2A4377-D044-4E43-B6CC-B753D7F6ABD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "8DAEC4F4-5748-4D36-A72B-4C62A0A30E38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "C76DA7A5-9320-4E21-96A2-ACE70803A1CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "703C73EB-2D63-4D4F-8129-239AE1E96B2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "8F67CE3C-3A06-487C-90DE-D5B3B1EC08A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "C9D664AB-0FA7-49C7-B6E1-69C77652FBEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "A3CA3365-F9AF-40DF-8700-30AD4BC58E27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "C7FEFD0A-A969-4F53-8668-1231FD675D6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "9370C46D-3AA1-4562-B67F-DF6EA10F209B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1FD8C240-A7FE-4FD5-ADCC-289C1BC461BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "BE2EF84D-55A9-41DC-A324-69E1DC426D0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4546776C-A657-42E3-9A36-47F9F59A88AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "156DD8ED-CE6E-48C0-9E67-16B04767D62E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "10F9C2B1-BD81-4EDC-ADF5-4B0F39001C7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "0A33C425-921F-4795-B834-608C8F1597E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "04CE952D-E3C1-4B34-9E65-EC52BFE887AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "8AE9D1A7-4721-4E1D-B965-FDC38126B1DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "A8643AA3-29EF-48A7-B033-CB60988E214B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "6DEAA7FD-385F-4221-907E-65ABC16BE4BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "DDEC008A-3137-48D1-8ABC-6DB0EFC40E50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "558D234D-BC50-415F-86D6-8E19D6C3ACE0" + } + ] + } + ] } ], "references": [ { "url": "https://supportportal.juniper.net/JSA79095", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://supportportal.juniper.net/JSA79095", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30409.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30409.json index 44df4794fa9..420d588c485 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30409.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30409.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30409", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T15:15:25.740", - "lastModified": "2024-11-21T09:11:51.607", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:32:50.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,24 +93,88 @@ "value": "CWE-754" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "C16434C0-21A7-4CE5-92E1-7D60A35EF5D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000" + } + ] + } + ] } ], "references": [ { "url": "https://supportportal.juniper.net/JSA79099", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://supportportal.juniper.net/JSA79099", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30410.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30410.json index 8e24d31313a..39dbc2cf3cd 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30410.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30410.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30410", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T15:15:25.940", - "lastModified": "2024-11-21T09:11:51.757", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:21:04.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,24 +93,366 @@ "value": "CWE-696" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "20.4", + "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", + "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*", + "matchCriteriaId": "C445622E-8E57-4990-A71A-E1993BFCB91A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s9:*:*:*:*:*:*", + "matchCriteriaId": "0CED6FFE-1854-4BB0-8DB5-D2D756E68CAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C470FB4E-A927-4AF3-ACB0-AD1E264218B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E594D6DC-87F6-40D2-8268-ED6021462168" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BEA4BC3-093F-4DE6-BED1-2C7D2FC2C8A5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "592377CC-4044-4FDD-A3DF-CBF25754EE4D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D12E8275-EF6B-44F9-A7D8-A769CDB5EED5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3E63215-246E-49F3-A537-8A90D512DAB0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD1A5E69-928A-41A0-8B9B-91F307D99854" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B71953D-016D-4E72-B598-55667A507681" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CABBC37B-EB93-424D-A1E7-4686039C0955" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "24526B69-E3E3-4249-80A4-A886BED5C07E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2209605-65B6-44B3-9700-9EC543BF2408" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3C348CF-65C1-4A53-8F4F-99B5A4113679" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60CB5F91-DC40-4D09-BB93-4539B8581877" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADE8EB69-95DD-44E9-80A6-F2B5E34BBD5B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEEDB14F-E74A-4C48-A969-1D22D7F7C7C8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBE3866E-109E-479F-9FFE-3F6E81C0DE7C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A17D793-5F01-4818-956D-D6BC5A6C4CEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF4C3E8E-C8B4-42A5-8DB6-7E8114FCC030" + } + ] + } + ] } ], "references": [ { "url": "https://supportportal.juniper.net/JSA79100", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://supportportal.juniper.net/JSA79100", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3046.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3046.json index 8604007a027..60d2fe89f7c 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3046.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3046.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3046", "sourceIdentifier": "emo@eclipse.org", "published": "2024-04-09T10:15:08.600", - "lastModified": "2024-11-21T09:28:45.457", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:07:07.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,53 @@ "value": "CWE-303" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eclipse:kura:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndIncluding": "5.4.1", + "matchCriteriaId": "687C40DD-6448-49CB-9D11-00B564BD4C31" + } + ] + } + ] } ], "references": [ { "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/188", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/188", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3107.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3107.json index 5f4c4213dc2..6cab3611c06 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3107.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3107.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3107", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-02T17:15:22.673", - "lastModified": "2024-11-21T09:28:54.857", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:05:03.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brainstormforce:spectra:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.12.7", + "matchCriteriaId": "96368125-DFCD-4E53-B5FD-8D0A510E9BDB" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-gutenberg/trunk/classes/class-uagb-block-module.php#L189", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3062684/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/110e5e67-b318-4ab2-9b4d-59aabcf7db7c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-gutenberg/trunk/classes/class-uagb-block-module.php#L189", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3062684/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/110e5e67-b318-4ab2-9b4d-59aabcf7db7c?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3371.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3371.json index 131b836eb6c..2be4e00d847 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3371.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3371.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3371", "sourceIdentifier": "cna@mongodb.com", "published": "2024-04-24T17:15:47.230", - "lastModified": "2024-11-21T09:29:28.960", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T17:58:01.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-360" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mongodb:compass:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.35.0", + "versionEndExcluding": "1.42.1", + "matchCriteriaId": "F6E151AA-FB8D-43A3-8F2A-6B822FE540DC" + } + ] + } + ] } ], "references": [ { "url": "https://jira.mongodb.org/browse/COMPASS-7260", - "source": "cna@mongodb.com" + "source": "cna@mongodb.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.mongodb.org/browse/COMPASS-7260", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34387.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34387.json index f30875ba1fe..fd9dc9e8f4f 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34387.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34387.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34387", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-06T19:15:10.273", - "lastModified": "2024-11-21T09:18:33.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:00:25.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:afthemes:wp_post_author:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.6.5", + "matchCriteriaId": "07D9AD3F-D625-4A53-944F-37FA069DB3B6" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-post-author/wordpress-wp-post-author-plugin-3-6-4-rating-value-manipulation-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wp-post-author/wordpress-wp-post-author-plugin-3-6-4-rating-value-manipulation-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36553.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36553.json new file mode 100644 index 00000000000..797825ccb15 --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36553.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-36553", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T18:15:31.100", + "lastModified": "2025-02-06T18:15:31.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Forever KidsWatch Call Me KW-50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h is vulnerable to MITM attack." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.diva-portal.org/smash/record.jsf?aq2=%5B%5B%5D%5D&c=1&af=%5B%5D&searchType=SIMPLE&sortOrder2=title_sort_asc&query=Exploiting+Vulnerabilities+to+Remotely+Hijack+Children%E2%80%99s+Smartwatches&language=en&pid=diva2%3A1933447&aq=%5B%5B%5D%5D&sf=undergraduate&aqe=%5B%5D&sortOrder=author_sort_asc&onlyFullText=false&noOfRows=50&dswid=-8296", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36554.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36554.json new file mode 100644 index 00000000000..2b2c0201977 --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36554.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-36554", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T18:15:31.273", + "lastModified": "2025-02-06T18:15:31.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Forever KidsWatch Call Me KW-50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h and Forever KidsWatch Call Me KW-60 R36CW_YDE_S4_A29_2_V1.0_2023.05.24_22.49.44_cob_b allow a malicious user to gain information about the device by sending an SMS to the device which returns sensitive information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.diva-portal.org/smash/record.jsf?aq2=%5B%5B%5D%5D&c=1&af=%5B%5D&searchType=SIMPLE&sortOrder2=title_sort_asc&query=Exploiting+Vulnerabilities+to+Remotely+Hijack+Children%E2%80%99s+Smartwatches&language=en&pid=diva2%3A1933447&aq=%5B%5B%5D%5D&sf=undergraduate&aqe=%5B%5D&sortOrder=author_sort_asc&onlyFullText=false&noOfRows=50&dswid=-8296", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36555.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36555.json new file mode 100644 index 00000000000..b32630a0934 --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36555.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-36555", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T18:15:31.423", + "lastModified": "2025-02-06T18:15:31.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Built-in SMS-configuration command in Forever KidsWatch Call Me KW50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h and Forever KidsWatch Call Me 2 KW-60 R36CW_YDE_S4_A29_2_V1.0_2023.05.24_22.49.44_cob_b allows malicious users to change the device IMEI-number which allows for forging the identity of the device." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.diva-portal.org/smash/record.jsf?aq2=%5B%5B%5D%5D&c=1&af=%5B%5D&searchType=SIMPLE&sortOrder2=title_sort_asc&query=Exploiting+Vulnerabilities+to+Remotely+Hijack+Children%E2%80%99s+Smartwatches&language=en&pid=diva2%3A1933447&aq=%5B%5B%5D%5D&sf=undergraduate&aqe=%5B%5D&sortOrder=author_sort_asc&onlyFullText=false&noOfRows=50&dswid=-8296", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36556.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36556.json new file mode 100644 index 00000000000..dd06c0a801c --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36556.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-36556", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T18:15:31.580", + "lastModified": "2025-02-06T18:15:31.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Forever KidsWatch Call Me KW50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h, and Forever KidsWatch Call Me 2 KW60 R36CW_YDE_S4_A29_2_V1.0_2023.05.24_22.49.44_cob_b have a Hardcoded password vulnerability." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.diva-portal.org/smash/record.jsf?aq2=%5B%5B%5D%5D&c=1&af=%5B%5D&searchType=SIMPLE&sortOrder2=title_sort_asc&query=Exploiting+Vulnerabilities+to+Remotely+Hijack+Children%E2%80%99s+Smartwatches&language=en&pid=diva2%3A1933447&aq=%5B%5B%5D%5D&sf=undergraduate&aqe=%5B%5D&sortOrder=author_sort_asc&onlyFullText=false&noOfRows=50&dswid=-8296", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36557.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36557.json new file mode 100644 index 00000000000..0770cdd4a17 --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36557.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-36557", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T18:15:31.750", + "lastModified": "2025-02-06T18:15:31.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The device ID is based on IMEI in Forever KidsWatch Call Me KW50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h and Forever KidsWatch Call Me 2 KW60 R36CW_YDE_S4_A29_2_V1.0_2023.05.24_22.49.44_cob_b. If a malicious user changes the IMEI to the IMEI of a unit they registered in the mobile app, it is possible to hijack the device and control it from the app." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.diva-portal.org/smash/record.jsf?aq2=%5B%5B%5D%5D&c=1&af=%5B%5D&searchType=SIMPLE&sortOrder2=title_sort_asc&query=Exploiting+Vulnerabilities+to+Remotely+Hijack+Children%E2%80%99s+Smartwatches&language=en&pid=diva2%3A1933447&aq=%5B%5B%5D%5D&sf=undergraduate&aqe=%5B%5D&sortOrder=author_sort_asc&onlyFullText=false&noOfRows=50&dswid=-8296", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36558.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36558.json new file mode 100644 index 00000000000..5a5d25c00ec --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36558.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-36558", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T18:15:31.903", + "lastModified": "2025-02-06T18:15:31.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Forever KidsWatch Call Me KW-50 R36_YDR_A3PW_GM7S_V1.0_2019_07_15_16.19.24_cob_h suffers from Cleartext Transmission of Sensitive Information due to lack of encryption in device-server communication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.diva-portal.org/smash/record.jsf?aq2=%5B%5B%5D%5D&c=1&af=%5B%5D&searchType=SIMPLE&sortOrder2=title_sort_asc&query=Exploiting+Vulnerabilities+to+Remotely+Hijack+Children%E2%80%99s+Smartwatches&language=en&pid=diva2%3A1933447&aq=%5B%5B%5D%5D&sf=undergraduate&aqe=%5B%5D&sortOrder=author_sort_asc&onlyFullText=false&noOfRows=50&dswid=-8296", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39033.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39033.json new file mode 100644 index 00000000000..dbc3f5c55b0 --- /dev/null +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39033.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-39033", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T17:15:18.553", + "lastModified": "2025-02-06T17:15:18.553", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Newgensoft OmniDocs 11.0_SP1_03_006, Insecure Direct Object Reference (IDOR) in the getuserproperty function allows user's configuration and PII to be stolen." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://pastebin.com/SHExsfh6", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39272.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39272.json new file mode 100644 index 00000000000..b3e0cb6ff3d --- /dev/null +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39272.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39272", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2025-02-06T17:15:18.647", + "lastModified": "2025-02-06T17:15:18.647", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (xss) vulnerability exists in the dataset upload functionality of ClearML Enterprise Server 3.22.5-1533. A specially crafted HTTP request can lead to an arbitrary html code. An attacker can send a series of HTTP requests to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2110", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4157.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4157.json index 590274df2c3..7b43218adf1 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4157.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4157.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4157", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-22T08:15:10.557", - "lastModified": "2024-11-21T09:42:17.900", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:36:20.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fluentforms:contact_form:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.1.16", + "matchCriteriaId": "53746BB2-BA24-49C1-9DE6-3BB45E833241" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3081740/fluentform", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8def156a-f2f2-4640-a1c9-c21c74e1f308?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3081740/fluentform", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8def156a-f2f2-4640-a1c9-c21c74e1f308?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4159.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4159.json index acbe28b6750..833616aeb3e 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4159.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4159.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4159", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-25T06:16:00.560", - "lastModified": "2024-11-21T09:42:18.133", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T17:49:55.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0a", + "matchCriteriaId": "303EE152-4CED-4655-B035-CB3B91E5E288" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23282", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23282", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4161.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4161.json index b8d6ff5d9fd..8b84f40a5a5 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4161.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4161.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4161", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-25T06:16:01.427", - "lastModified": "2024-11-21T09:42:18.370", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T17:50:45.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-319" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.0", + "matchCriteriaId": "1D4FED58-4527-4735-87F8-80B5664B7B4F" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23284", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23284", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4173.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4173.json index 1bd456f8aeb..22f28dcd16b 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4173.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4173.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4173", "sourceIdentifier": "sirt@brocade.com", "published": "2024-04-25T08:15:07.977", - "lastModified": "2024-11-21T09:42:19.913", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T17:53:25.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "82F550F3-E967-4C24-9EE0-D3E8EA920D1B" + } + ] + } + ] } ], "references": [ { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23285", - "source": "sirt@brocade.com" + "source": "sirt@brocade.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23285", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43779.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43779.json new file mode 100644 index 00000000000..38ab139789e --- /dev/null +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43779.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43779", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2025-02-06T17:15:19.160", + "lastModified": "2025-02-06T17:15:19.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An information disclosure vulnerability exists in the Vault API functionality of ClearML Enterprise Server 3.22.5-1533. A specially crafted HTTP request can lead to reading vaults that have been previously disabled, possibly leaking sensitive credentials. An attacker can send a series of HTTP requests to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2112", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4536.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4536.json index 2a2d625aba9..c3317d25271 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4536.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4536.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4536", "sourceIdentifier": "emo@eclipse.org", "published": "2024-05-07T13:15:48.513", - "lastModified": "2024-11-21T09:43:03.563", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T17:32:48.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.3 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.5, + "impactScore": 4.7 } ] }, @@ -53,40 +73,97 @@ "value": "CWE-522" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eclipse:edc_connector:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.2.1", + "versionEndExcluding": "0.6.3", + "matchCriteriaId": "08F7DB6D-051E-4FC3-9213-D77CA98120E6" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/eclipse-edc/Connector/commit/a4e6018d2c0457fba6f672fafa6c590513c45d1b", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/eclipse-edc/Connector/releases/tag/v0.6.3", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/22", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/198", - "source": "emo@eclipse.org" + "source": "emo@eclipse.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/eclipse-edc/Connector/commit/a4e6018d2c0457fba6f672fafa6c590513c45d1b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/eclipse-edc/Connector/releases/tag/v0.6.3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/22", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/198", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4709.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4709.json index 0bc09a52481..fc6aac44296 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4709.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4709.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4709", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-18T08:15:08.410", - "lastModified": "2024-11-21T09:43:25.490", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:37:12.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,49 +36,129 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fluentforms:contact_form:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.1.17", + "matchCriteriaId": "286DEA72-95CC-4DD3-8387-C1E6973C1C89" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/fluentform/trunk/app/Services/FormBuilder/Notifications/EmailNotification.php#L106", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/fluentform/trunk/app/Services/FormBuilder/Notifications/EmailNotification.php#L164", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/fluentform/trunk/app/Services/FormBuilder/Notifications/EmailNotification.php#L194", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3088078/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5fe317a6-a391-441a-aac8-c8fa57e73169?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/fluentform/trunk/app/Services/FormBuilder/Notifications/EmailNotification.php#L106", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/fluentform/trunk/app/Services/FormBuilder/Notifications/EmailNotification.php#L164", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/fluentform/trunk/app/Services/FormBuilder/Notifications/EmailNotification.php#L194", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3088078/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5fe317a6-a391-441a-aac8-c8fa57e73169?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49532.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49532.json index e6f520dfe3f..3cbb0d36eae 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49532.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49532.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49532", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T20:15:18.417", - "lastModified": "2024-12-11T12:15:20.753", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:28:13.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -51,14 +71,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionEndExcluding": "20.005.30748", + "matchCriteriaId": "B5C727DB-A0CF-4675-AF9E-08F8800CF707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.0", + "versionEndExcluding": "24.001.30225", + "matchCriteriaId": "2125775C-5BB3-4950-99AA-4D9199CC4D7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionEndExcluding": "24.005.20320", + "matchCriteriaId": "8064F314-801F-4BEC-9EE2-120733E8B206" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionEndExcluding": "20.005.30748", + "matchCriteriaId": "6225F21A-568E-45F8-B82D-0568C6768CA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionEndExcluding": "24.005.20320", + "matchCriteriaId": "BBF2907B-0265-4E40-BB1B-772CCF3E67FA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-92.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2064", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49533.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49533.json index 09c4c3cfb63..71aac292d71 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49533.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49533.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49533", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T20:15:18.563", - "lastModified": "2024-12-11T12:48:18.580", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:28:01.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -51,14 +71,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionEndExcluding": "20.005.30748", + "matchCriteriaId": "B5C727DB-A0CF-4675-AF9E-08F8800CF707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.0", + "versionEndExcluding": "24.001.30225", + "matchCriteriaId": "2125775C-5BB3-4950-99AA-4D9199CC4D7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionEndExcluding": "24.005.20320", + "matchCriteriaId": "8064F314-801F-4BEC-9EE2-120733E8B206" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionEndExcluding": "20.005.30748", + "matchCriteriaId": "6225F21A-568E-45F8-B82D-0568C6768CA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionEndExcluding": "24.005.20320", + "matchCriteriaId": "BBF2907B-0265-4E40-BB1B-772CCF3E67FA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-92.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2070", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49534.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49534.json index 25f1884b1e4..2c68753e72b 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49534.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49534.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49534", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T20:15:18.743", - "lastModified": "2024-12-11T12:48:19.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:27:41.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -51,14 +71,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionEndExcluding": "20.005.30748", + "matchCriteriaId": "B5C727DB-A0CF-4675-AF9E-08F8800CF707" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.0", + "versionEndExcluding": "24.001.30225", + "matchCriteriaId": "2125775C-5BB3-4950-99AA-4D9199CC4D7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionEndExcluding": "24.005.20320", + "matchCriteriaId": "8064F314-801F-4BEC-9EE2-120733E8B206" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionEndExcluding": "20.005.30748", + "matchCriteriaId": "6225F21A-568E-45F8-B82D-0568C6768CA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionEndExcluding": "24.005.20320", + "matchCriteriaId": "BBF2907B-0265-4E40-BB1B-772CCF3E67FA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-92.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2076", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50692.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50692.json index 2b5682d95c7..e6a9755bbbc 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50692.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50692.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50692", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-24T23:15:08.893", - "lastModified": "2025-01-24T23:15:08.893", - "vulnStatus": "Received", + "lastModified": "2025-02-06T17:15:19.313", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,11 +15,50 @@ "value": "SunGrow WiNet-SV200.001.00.P027 y versiones anteriores contienen credenciales MQTT codificadas que permiten a un atacante enviar comandos arbitrarios a un inversor arbitrario. Tambi\u00e9n es posible hacerse pasar por el br\u00f3ker, ya que no se utiliza TLS para identificar al br\u00f3ker MQTT real. Esto significa que las comunicaciones MQTT son vulnerables a ataques MitM a nivel TCP/IP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], "references": [ { "url": "https://en.sungrowpower.com/security-notice-detail-2/5961", "source": "cve@mitre.org" + }, + { + "url": "https://mqtt-pwn.readthedocs.io/en/latest/intro.html", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52012.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52012.json index 0391daed6be..828916236b7 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52012.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52012.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52012", "sourceIdentifier": "security@apache.org", "published": "2025-01-27T09:15:14.693", - "lastModified": "2025-01-27T09:15:14.693", - "vulnStatus": "Received", + "lastModified": "2025-02-06T17:15:19.480", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,11 +15,34 @@ "value": "Vulnerabilidad de Relative Path Traversal en Apache Solr. Las instancias de Solr que se ejecutan en Windows son vulnerables al acceso de escritura a rutas de archivo arbitrarias, debido a la falta de desinfecci\u00f3n de entrada en la API de \"carga de conjuntos de configuraci\u00f3n\". Los archivos ZIP creados de forma malintencionada, conocidos com\u00fanmente como \"zipslip\", pueden usar rutas de archivo relativas para escribir datos en partes no previstas del sistema de archivos. Este problema afecta a Apache Solr: desde la versi\u00f3n 6.6 hasta la 9.7.0. Se recomienda a los usuarios que actualicen a la versi\u00f3n 9.8.0, que soluciona el problema. Los usuarios que no puedan actualizar tambi\u00e9n pueden evitar el problema de forma segura utilizando el \"complemento de autenticaci\u00f3n basada en reglas\" de Solr para restringir el acceso a la API de carga de conjuntos de configuraci\u00f3n, de modo que solo pueda acceder a ella un conjunto confiable de administradores/usuarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57069.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57069.json index 8278c8b7e7a..85187f735bd 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57069.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57069.json @@ -2,20 +2,63 @@ "id": "CVE-2024-57069", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:31.353", - "lastModified": "2025-02-05T22:15:31.353", + "lastModified": "2025-02-06T17:15:19.647", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A prototype pollution in the lib function of expand-object v0.4.2 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + }, + { + "lang": "es", + "value": "Un prototipo de contaminaci\u00f3n en la funci\u00f3n lib de expand-object v0.4.2 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante el suministro de un payload manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/tariqhawis/68e06b00e3258d0d427257c6906bd300", "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/tariqhawis/68e06b00e3258d0d427257c6906bd300", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57071.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57071.json index 160a8e9a505..6504d86838f 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57071.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57071.json @@ -2,20 +2,63 @@ "id": "CVE-2024-57071", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:31.477", - "lastModified": "2025-02-05T22:15:31.477", + "lastModified": "2025-02-06T17:15:19.793", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A prototype pollution in the lib.combine function of php-parser v3.2.1 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + }, + { + "lang": "es", + "value": "Un prototipo de contaminaci\u00f3n en la funci\u00f3n lib.combine de php-parser v3.2.1 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante el suministro de un payload manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/tariqhawis/b56500d3a8866467ee769df7453eedaa", "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/tariqhawis/b56500d3a8866467ee769df7453eedaa", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57080.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57080.json index 9a56957cdd1..80fcd64689c 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57080.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57080.json @@ -2,20 +2,63 @@ "id": "CVE-2024-57080", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:32.300", - "lastModified": "2025-02-05T22:15:32.300", + "lastModified": "2025-02-06T17:15:19.933", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A prototype pollution in the lib.install function of vxe-table v4.8.10 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + }, + { + "lang": "es", + "value": "Un prototipo de contaminaci\u00f3n en la funci\u00f3n lib.install de vxe-table v4.8.10 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante el suministro de un payload manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/tariqhawis/c0b5fa2d7e4edd3f000e73fb7a10ccbc", "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/tariqhawis/c0b5fa2d7e4edd3f000e73fb7a10ccbc", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57086.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57086.json index 684160cb0b6..4b73db6ad8a 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57086.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57086.json @@ -2,20 +2,63 @@ "id": "CVE-2024-57086", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-05T22:15:32.810", - "lastModified": "2025-02-05T22:15:32.810", + "lastModified": "2025-02-06T17:15:20.073", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A prototype pollution in the function fieldsToJson of node-opcua-alarm-condition v2.134.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload." + }, + { + "lang": "es", + "value": "Un prototipo de contaminaci\u00f3n en la funci\u00f3n fieldsToJson de node-opcua-alarm-condition v2.134.0 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante el suministro de un payload manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/tariqhawis/30acc3632cf595ca5825b7ec2b2f795a", "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/tariqhawis/30acc3632cf595ca5825b7ec2b2f795a", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-573xx/CVE-2024-57373.json b/CVE-2024/CVE-2024-573xx/CVE-2024-57373.json index 99fa171d373..8c46b505835 100644 --- a/CVE-2024/CVE-2024-573xx/CVE-2024-57373.json +++ b/CVE-2024/CVE-2024-573xx/CVE-2024-57373.json @@ -2,13 +2,13 @@ "id": "CVE-2024-57373", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T23:15:09.830", - "lastModified": "2025-01-28T20:15:55.040", + "lastModified": "2025-02-06T17:15:20.213", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Cross Site Request Forgery vulnerability in LifestyleStore v.1.0 allows a remote attacker to execute arbitrary cod and obtain sensitive information." + "value": "Cross Site Request Forgery (CSRF) vulnerability in LifestyleStore v1.0 allows a remote attacker to execute unauthorized actions on behalf of an authenticated user, potentially leading to account modifications or data compromise." }, { "lang": "es", @@ -55,6 +55,10 @@ { "url": "https://github.com/cypherdavy/CVE-2024-57373", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/sajalagrawal/LifestyleStore", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57427.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57427.json new file mode 100644 index 00000000000..ad6635af0c8 --- /dev/null +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57427.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-57427", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T17:15:20.357", + "lastModified": "2025-02-06T17:15:20.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Cinema Booking System v2.0 is vulnerable to reflected cross-site scripting (XSS). Multiple endpoints improperly handle user input, allowing malicious scripts to execute in a victim\u2019s browser. Attackers can craft malicious links to steal session cookies or conduct phishing attacks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ahrixia/CVE-2024-57427", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/cinema-booking-system/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ahrixia/CVE-2024-57427", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57428.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57428.json new file mode 100644 index 00000000000..664ba110cd2 --- /dev/null +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57428.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57428", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T17:15:20.527", + "lastModified": "2025-02-06T17:15:20.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A stored cross-site scripting (XSS) vulnerability in PHPJabbers Cinema Booking System v2.0 exists due to unsanitized input in file upload fields (event_img, seat_maps) and seat number configurations (number[new_X] in pjActionCreate). Attackers can inject persistent JavaScript, leading to phishing, malware injection, and session hijacking." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ahrixia/CVE-2024-57428", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/cinema-booking-system/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57429.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57429.json new file mode 100644 index 00000000000..f0c2f6fa894 --- /dev/null +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57429.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57429", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T17:15:20.627", + "lastModified": "2025-02-06T17:15:20.627", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site request forgery (CSRF) vulnerability in the pjActionUpdate function of PHPJabbers Cinema Booking System v2.0 allows remote attackers to escalate privileges by tricking an authenticated admin into submitting an unauthorized request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ahrixia/CVE-2024-57429", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/cinema-booking-system/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57430.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57430.json new file mode 100644 index 00000000000..5f81d27766a --- /dev/null +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57430.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57430", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T17:15:20.717", + "lastModified": "2025-02-06T17:15:20.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An SQL injection vulnerability in the pjActionGetUser function of PHPJabbers Cinema Booking System v2.0 allows attackers to manipulate database queries via the column parameter. Exploiting this flaw can lead to unauthorized information disclosure, privilege escalation, or database manipulation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ahrixia/CVE-2024-57430", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/cinema-booking-system/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57599.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57599.json new file mode 100644 index 00000000000..051e08b7df7 --- /dev/null +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57599.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57599", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T17:15:20.820", + "lastModified": "2025-02-06T17:15:20.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in DouPHP v.1.8 Release 20231203 allows attackers to execute arbitrary code via a crafted payload injected into the description parameter in /admin/article.php" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Arykon/cve/blob/main/douphp.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://www.douphp.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57610.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57610.json new file mode 100644 index 00000000000..4442deaca8b --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57610.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-57610", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T18:15:32.133", + "lastModified": "2025-02-06T18:15:32.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A rate limiting issue in Sylius v2.0.2 allows a remote attacker to perform unrestricted brute-force attacks on user accounts, significantly increasing the risk of account compromise and denial of service for legitimate users." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Sylius/Sylius", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/nca785/CVE-2024-57610", + "source": "cve@mitre.org" + }, + { + "url": "https://sylius.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57968.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57968.json index c6b85ddd155..4e0a9b73007 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57968.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57968.json @@ -2,13 +2,17 @@ "id": "CVE-2024-57968", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:36.550", - "lastModified": "2025-02-03T20:15:36.550", - "vulnStatus": "Received", + "lastModified": "2025-02-06T18:15:32.287", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Advantive VeraCore before 2024.4.2.1 allows remote authenticated users to upload files to unintended folders (e.g., ones that are accessible during web browsing by other users). upload.aspx can be used for this." + }, + { + "lang": "es", + "value": "Las versiones anteriores a 2024.4.2.1 de Advantive VeraCore permiten que usuarios autenticados de forma remota carguen archivos en carpetas no deseadas (por ejemplo, aquellas a las que otros usuarios pueden acceder durante la navegaci\u00f3n web). Se puede usar upload.aspx para esto." } ], "metrics": { @@ -55,6 +59,10 @@ { "url": "https://intezer.com/blog/research/xe-group-exploiting-zero-days/", "source": "cve@mitre.org" + }, + { + "url": "https://www.solissecurity.com/en-us/insights/xe-group-from-credit-card-skimming-to-exploiting-zero-days/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6627.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6627.json index 7ac9d1a39e5..913eafc95bd 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6627.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6627.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6627", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-27T12:15:11.477", - "lastModified": "2024-11-21T09:50:01.757", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T17:40:50.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,40 +69,92 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.11.2", + "matchCriteriaId": "DA745168-7779-422C-A41D-73DFF540BC41" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/trunk/widgets/pdf-view/widget.php#L587", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3124446/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://wordpress.org/plugins/happy-elementor-addons/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5bfe0a05-6bf9-4acc-bf9d-05079c3b3664?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/trunk/widgets/pdf-view/widget.php#L587", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3124446/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://wordpress.org/plugins/happy-elementor-addons/#developers", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5bfe0a05-6bf9-4acc-bf9d-05079c3b3664?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7100.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7100.json index 934e5a3c2b1..ed618161a2b 100644 --- a/CVE-2024/CVE-2024-71xx/CVE-2024-7100.json +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7100.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7100", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-30T07:15:02.020", - "lastModified": "2024-11-21T09:50:52.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T17:45:05.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,40 +69,92 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.0.3", + "matchCriteriaId": "5C8343BB-4536-45B1-B4C3-58D7A88385BE" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/bold-page-builder/trunk/content_elements/bt_bb_button/bt_bb_button.php#L155", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3127440/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/bold-page-builder/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4999bbf3-3dbd-4c9a-b648-744192c9586c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/bold-page-builder/trunk/content_elements/bt_bb_button/bt_bb_button.php#L155", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3127440/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/bold-page-builder/#developers", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4999bbf3-3dbd-4c9a-b648-744192c9586c?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7595.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7595.json index fcbaf9660c1..bba400c2909 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7595.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7595.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7595", "sourceIdentifier": "cret@cert.org", "published": "2025-02-05T18:15:29.360", - "lastModified": "2025-02-06T15:56:46.093", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:14:41.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,80 @@ "value": "Los protocolos GRE y GRE6 (RFC2784) no validan ni verifican el origen de un paquete de red, lo que permite que un atacante falsifique y enrute tr\u00e1fico arbitrario a trav\u00e9s de una interfaz de red expuesta, lo que puede provocar suplantaci\u00f3n de identidad, omisi\u00f3n del control de acceso y otros comportamientos de red inesperados. Esto puede considerarse similar a CVE-2020-10136." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ietf:generic_routing_encapsulation:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B962BEC9-66A8-4A0B-AE6D-9A1A7E34686E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ietf:generic_routing_encapsulation6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4726FA71-5F65-4746-B9F9-6205569B019F" + } + ] + } + ] + } + ], "references": [ { "url": "https://datatracker.ietf.org/doc/html/rfc2784", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Technical Description", + "Related" + ] }, { "url": "https://www.rfc-editor.org/rfc/rfc6169.html", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Technical Description", + "Related" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7596.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7596.json index b4dad079ed0..f49f513f014 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7596.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7596.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7596", "sourceIdentifier": "cret@cert.org", "published": "2025-02-05T18:15:29.470", - "lastModified": "2025-02-06T15:56:49.947", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T18:14:55.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "Proposed Generic UDP Encapsulation (GUE) (IETF Draft) no valida ni verifica el origen de un paquete de red, lo que permite que un atacante falsifique y enrute tr\u00e1fico arbitrario a trav\u00e9s de una interfaz de red expuesta, lo que puede provocar suplantaci\u00f3n de identidad, omisi\u00f3n del control de acceso y otros comportamientos de red inesperados. Esto puede considerarse similar a CVE-2020-10136." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ietf:generic_udp_encapsulation:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F21F2CB-F6FF-47F1-ABEF-0AA0D883B8C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://datatracker.ietf.org/doc/draft-ietf-intarea-gue/", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Related", + "Technical Description" + ] }, { "url": "https://www.rfc-editor.org/rfc/rfc6169.html", - "source": "cret@cert.org" + "source": "cret@cert.org", + "tags": [ + "Related", + "Technical Description" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9528.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9528.json index e43daf6c3ad..7564c5063f5 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9528.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9528.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9528", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-05T03:15:02.447", - "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T18:35:28.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -51,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fluentforms:contact_form:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.1.20", + "matchCriteriaId": "A558738E-B31A-48D6-9B22-3BD4EBC79607" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/fluentform/tags/5.1.17/app/Services/FormBuilder/Components/BaseComponent.php#L191", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/fluentform/tags/5.1.17/boot/globals.php#L342", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3125227/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4ed4dfee-5f14-47ce-abed-cd226c110665?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0994.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0994.json index 60c509f251b..18597a3d2c3 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0994.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0994.json @@ -2,13 +2,13 @@ "id": "CVE-2025-0994", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-02-06T16:15:41.493", - "lastModified": "2025-02-06T16:15:41.493", + "lastModified": "2025-02-06T17:15:20.917", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Trimble Cityworks versions prior to 23.10 are vulnerable to a deserialization vulnerability. This could allow an authenticated user to perform a remote code execution attack against a customer\u2019s Microsoft Internet Information Services (IIS) web server." + "value": "Trimble Cityworks versions prior to 15.8.9 and Cityworks with office companion versions prior to 23.10 are vulnerable to a deserialization vulnerability. This could allow an authenticated user to perform a remote code execution attack against a customer\u2019s Microsoft Internet Information Services (IIS) web server." } ], "metrics": { @@ -60,7 +60,7 @@ "weaknesses": [ { "source": "ics-cert@hq.dhs.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -70,6 +70,10 @@ } ], "references": [ + { + "url": "https://learn.assetlifecycle.trimble.com/i/1532182-cityworks-customer-communication-2025-02-05-docx/0?", + "source": "ics-cert@hq.dhs.gov" + }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-037-04", "source": "ics-cert@hq.dhs.gov" diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1078.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1078.json new file mode 100644 index 00000000000..af51be53d92 --- /dev/null +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1078.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-1078", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-02-06T17:15:21.040", + "lastModified": "2025-02-06T17:15:21.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in AppHouseKitchen AlDente Charge Limiter up to 1.29 on macOS and classified as critical. This vulnerability affects the function shouldAcceptNewConnection of the file com.apphousekitchen.aldente-pro.helper of the component XPC Service. The manipulation leads to improper authorization. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.30 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early about this disclosure and acted very professional." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 4.3, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.294844", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.294844", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.492529", + "source": "cna@vuldb.com" + }, + { + "url": "https://winslow1984.com/books/cve-collection/page/aldente-charge-limiter-130-unauthorized-privileged-hardware-operations", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22866.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22866.json new file mode 100644 index 00000000000..1b4c8cbcd80 --- /dev/null +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22866.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-22866", + "sourceIdentifier": "security@golang.org", + "published": "2025-02-06T17:15:21.410", + "lastModified": "2025-02-06T17:15:21.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://go.dev/cl/643735", + "source": "security@golang.org" + }, + { + "url": "https://go.dev/issue/71383", + "source": "security@golang.org" + }, + { + "url": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k", + "source": "security@golang.org" + }, + { + "url": "https://pkg.go.dev/vuln/GO-2025-3447", + "source": "security@golang.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22867.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22867.json new file mode 100644 index 00000000000..26f50e9b010 --- /dev/null +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22867.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-22867", + "sourceIdentifier": "security@golang.org", + "published": "2025-02-06T18:15:32.543", + "lastModified": "2025-02-06T18:15:32.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the @executable_path, @loader_path, or @rpath special values in a \"#cgo LDFLAGS\" directive. This issue only affected go1.24rc2." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://go.dev/cl/646996", + "source": "security@golang.org" + }, + { + "url": "https://go.dev/issue/71476", + "source": "security@golang.org" + }, + { + "url": "https://groups.google.com/g/golang-dev/c/TYzikTgHK6Y", + "source": "security@golang.org" + }, + { + "url": "https://pkg.go.dev/vuln/GO-2025-3428", + "source": "security@golang.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23217.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23217.json new file mode 100644 index 00000000000..f97baeddb77 --- /dev/null +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23217.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-23217", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-06T18:15:32.667", + "lastModified": "2025-02-06T18:15:32.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "mitmproxy is a interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers and mitmweb is a web-based interface for mitmproxy. In mitmweb 11.1.1 and below, a malicious client can use mitmweb's proxy server (bound to `*:8080` by default) to access mitmweb's internal API (bound to `127.0.0.1:8081` by default). In other words, while the cannot access the API directly, they can access the API through the proxy. An attacker may be able to escalate this SSRF-style access to remote code execution. The mitmproxy and mitmdump tools are unaffected. Only mitmweb is affected. This vulnerability has been fixed in mitmproxy 11.1.2 and above. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + }, + { + "lang": "en", + "value": "CWE-441" + } + ] + } + ], + "references": [ + { + "url": "https://en.wikipedia.org/wiki/Server-side_request_forgery", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/mitmproxy/mitmproxy/blob/main/CHANGELOG.md#06-february-2025-mitmproxy-1112", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/mitmproxy/mitmproxy/security/advisories/GHSA-wg33-5h85-7q5p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24981.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24981.json new file mode 100644 index 00000000000..9447844b04b --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24981.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-24981", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-06T18:15:32.847", + "lastModified": "2025-02-06T18:15:32.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "MDC is a tool to take regular Markdown and write documents interacting deeply with a Vue component. In affected versions unsafe parsing logic of the URL from markdown can lead to arbitrary JavaScript code due to a bypass to the existing guards around the `javascript:` protocol scheme in the URL. The parsing logic implement in `props.ts` maintains a deny-list approach to filtering potential malicious payload. It does so by matching protocol schemes like `javascript:` and others. These security guards can be bypassed by an adversarial that provides JavaScript URLs with HTML entities encoded via hex string. Users who consume this library and perform markdown parsing from unvalidated sources could result in rendering vulnerable XSS anchor links. This vulnerability has been addressed in version 0.13.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/nuxt-modules/mdc/blob/main/src/runtime/parser/utils/props.ts#L16", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nuxt-modules/mdc/commit/99097738b5561639e9bf247c55d8103236618bf3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nuxt-modules/mdc/security/advisories/GHSA-j82m-pc2v-2484", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25181.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25181.json index a60be8629ed..40c6bd68594 100644 --- a/CVE-2025/CVE-2025-251xx/CVE-2025-25181.json +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25181.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25181", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:37.477", - "lastModified": "2025-02-04T16:15:43.990", + "lastModified": "2025-02-06T18:15:33.030", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -89,6 +89,10 @@ { "url": "https://intezer.com/blog/research/xe-group-exploiting-zero-days/", "source": "cve@mitre.org" + }, + { + "url": "https://www.solissecurity.com/en-us/insights/xe-group-from-credit-card-skimming-to-exploiting-zero-days/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 0f6e51fac99..784d0da4c36 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-06T17:00:21.790962+00:00 +2025-02-06T19:00:22.645610+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-06T16:58:10.283000+00:00 +2025-02-06T18:59:06.710000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,67 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -280248 +280271 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `23` -- [CVE-2022-31764](CVE-2022/CVE-2022-317xx/CVE-2022-31764.json) (`2025-02-06T15:15:10.610`) -- [CVE-2023-5878](CVE-2023/CVE-2023-58xx/CVE-2023-5878.json) (`2025-02-06T15:15:12.440`) -- [CVE-2024-43811](CVE-2024/CVE-2024-438xx/CVE-2024-43811.json) (`2025-02-06T16:15:37.600`) -- [CVE-2025-0994](CVE-2025/CVE-2025-09xx/CVE-2025-0994.json) (`2025-02-06T16:15:41.493`) +- [CVE-2022-40490](CVE-2022/CVE-2022-404xx/CVE-2022-40490.json) (`2025-02-06T17:15:13.640`) +- [CVE-2022-40916](CVE-2022/CVE-2022-409xx/CVE-2022-40916.json) (`2025-02-06T17:15:13.757`) +- [CVE-2024-13614](CVE-2024/CVE-2024-136xx/CVE-2024-13614.json) (`2025-02-06T17:15:18.080`) +- [CVE-2024-36553](CVE-2024/CVE-2024-365xx/CVE-2024-36553.json) (`2025-02-06T18:15:31.100`) +- [CVE-2024-36554](CVE-2024/CVE-2024-365xx/CVE-2024-36554.json) (`2025-02-06T18:15:31.273`) +- [CVE-2024-36555](CVE-2024/CVE-2024-365xx/CVE-2024-36555.json) (`2025-02-06T18:15:31.423`) +- [CVE-2024-36556](CVE-2024/CVE-2024-365xx/CVE-2024-36556.json) (`2025-02-06T18:15:31.580`) +- [CVE-2024-36557](CVE-2024/CVE-2024-365xx/CVE-2024-36557.json) (`2025-02-06T18:15:31.750`) +- [CVE-2024-36558](CVE-2024/CVE-2024-365xx/CVE-2024-36558.json) (`2025-02-06T18:15:31.903`) +- [CVE-2024-39033](CVE-2024/CVE-2024-390xx/CVE-2024-39033.json) (`2025-02-06T17:15:18.553`) +- [CVE-2024-39272](CVE-2024/CVE-2024-392xx/CVE-2024-39272.json) (`2025-02-06T17:15:18.647`) +- [CVE-2024-43779](CVE-2024/CVE-2024-437xx/CVE-2024-43779.json) (`2025-02-06T17:15:19.160`) +- [CVE-2024-57427](CVE-2024/CVE-2024-574xx/CVE-2024-57427.json) (`2025-02-06T17:15:20.357`) +- [CVE-2024-57428](CVE-2024/CVE-2024-574xx/CVE-2024-57428.json) (`2025-02-06T17:15:20.527`) +- [CVE-2024-57429](CVE-2024/CVE-2024-574xx/CVE-2024-57429.json) (`2025-02-06T17:15:20.627`) +- [CVE-2024-57430](CVE-2024/CVE-2024-574xx/CVE-2024-57430.json) (`2025-02-06T17:15:20.717`) +- [CVE-2024-57599](CVE-2024/CVE-2024-575xx/CVE-2024-57599.json) (`2025-02-06T17:15:20.820`) +- [CVE-2024-57610](CVE-2024/CVE-2024-576xx/CVE-2024-57610.json) (`2025-02-06T18:15:32.133`) +- [CVE-2025-1078](CVE-2025/CVE-2025-10xx/CVE-2025-1078.json) (`2025-02-06T17:15:21.040`) +- [CVE-2025-22866](CVE-2025/CVE-2025-228xx/CVE-2025-22866.json) (`2025-02-06T17:15:21.410`) +- [CVE-2025-22867](CVE-2025/CVE-2025-228xx/CVE-2025-22867.json) (`2025-02-06T18:15:32.543`) +- [CVE-2025-23217](CVE-2025/CVE-2025-232xx/CVE-2025-23217.json) (`2025-02-06T18:15:32.667`) +- [CVE-2025-24981](CVE-2025/CVE-2025-249xx/CVE-2025-24981.json) (`2025-02-06T18:15:32.847`) ### CVEs modified in the last Commit -Recently modified CVEs: `111` +Recently modified CVEs: `113` -- [CVE-2024-57066](CVE-2024/CVE-2024-570xx/CVE-2024-57066.json) (`2025-02-06T16:15:39.803`) -- [CVE-2024-57067](CVE-2024/CVE-2024-570xx/CVE-2024-57067.json) (`2025-02-06T16:15:39.980`) -- [CVE-2024-57068](CVE-2024/CVE-2024-570xx/CVE-2024-57068.json) (`2025-02-06T16:15:40.150`) -- [CVE-2024-57072](CVE-2024/CVE-2024-570xx/CVE-2024-57072.json) (`2025-02-06T16:15:40.310`) -- [CVE-2024-57074](CVE-2024/CVE-2024-570xx/CVE-2024-57074.json) (`2025-02-06T15:15:15.347`) -- [CVE-2024-57075](CVE-2024/CVE-2024-570xx/CVE-2024-57075.json) (`2025-02-06T15:15:15.500`) -- [CVE-2024-57076](CVE-2024/CVE-2024-570xx/CVE-2024-57076.json) (`2025-02-06T15:15:15.643`) -- [CVE-2024-57077](CVE-2024/CVE-2024-570xx/CVE-2024-57077.json) (`2025-02-06T15:15:15.797`) -- [CVE-2024-57078](CVE-2024/CVE-2024-570xx/CVE-2024-57078.json) (`2025-02-06T16:15:40.497`) -- [CVE-2024-57079](CVE-2024/CVE-2024-570xx/CVE-2024-57079.json) (`2025-02-06T15:15:15.950`) -- [CVE-2024-57081](CVE-2024/CVE-2024-570xx/CVE-2024-57081.json) (`2025-02-06T15:15:16.100`) -- [CVE-2024-57082](CVE-2024/CVE-2024-570xx/CVE-2024-57082.json) (`2025-02-06T15:15:16.247`) -- [CVE-2024-57085](CVE-2024/CVE-2024-570xx/CVE-2024-57085.json) (`2025-02-06T15:15:16.390`) -- [CVE-2024-57438](CVE-2024/CVE-2024-574xx/CVE-2024-57438.json) (`2025-02-06T16:15:40.660`) -- [CVE-2024-57520](CVE-2024/CVE-2024-575xx/CVE-2024-57520.json) (`2025-02-06T16:15:40.833`) -- [CVE-2024-57598](CVE-2024/CVE-2024-575xx/CVE-2024-57598.json) (`2025-02-06T16:15:41.000`) -- [CVE-2024-57699](CVE-2024/CVE-2024-576xx/CVE-2024-57699.json) (`2025-02-06T16:15:41.170`) -- [CVE-2024-7595](CVE-2024/CVE-2024-75xx/CVE-2024-7595.json) (`2025-02-06T15:56:46.093`) -- [CVE-2024-7596](CVE-2024/CVE-2024-75xx/CVE-2024-7596.json) (`2025-02-06T15:56:49.947`) -- [CVE-2024-7881](CVE-2024/CVE-2024-78xx/CVE-2024-7881.json) (`2025-02-06T16:15:41.340`) -- [CVE-2025-0167](CVE-2025/CVE-2025-01xx/CVE-2025-0167.json) (`2025-02-06T15:15:16.967`) -- [CVE-2025-0522](CVE-2025/CVE-2025-05xx/CVE-2025-0522.json) (`2025-02-06T15:15:17.127`) -- [CVE-2025-1066](CVE-2025/CVE-2025-10xx/CVE-2025-1066.json) (`2025-02-06T15:15:17.330`) -- [CVE-2025-23083](CVE-2025/CVE-2025-230xx/CVE-2025-23083.json) (`2025-02-06T15:15:17.597`) -- [CVE-2025-24814](CVE-2025/CVE-2025-248xx/CVE-2025-24814.json) (`2025-02-06T16:15:41.653`) +- [CVE-2024-34387](CVE-2024/CVE-2024-343xx/CVE-2024-34387.json) (`2025-02-06T18:00:25.190`) +- [CVE-2024-4157](CVE-2024/CVE-2024-41xx/CVE-2024-4157.json) (`2025-02-06T18:36:20.893`) +- [CVE-2024-4159](CVE-2024/CVE-2024-41xx/CVE-2024-4159.json) (`2025-02-06T17:49:55.727`) +- [CVE-2024-4161](CVE-2024/CVE-2024-41xx/CVE-2024-4161.json) (`2025-02-06T17:50:45.147`) +- [CVE-2024-4173](CVE-2024/CVE-2024-41xx/CVE-2024-4173.json) (`2025-02-06T17:53:25.287`) +- [CVE-2024-4536](CVE-2024/CVE-2024-45xx/CVE-2024-4536.json) (`2025-02-06T17:32:48.777`) +- [CVE-2024-4709](CVE-2024/CVE-2024-47xx/CVE-2024-4709.json) (`2025-02-06T18:37:12.683`) +- [CVE-2024-49532](CVE-2024/CVE-2024-495xx/CVE-2024-49532.json) (`2025-02-06T18:28:13.123`) +- [CVE-2024-49533](CVE-2024/CVE-2024-495xx/CVE-2024-49533.json) (`2025-02-06T18:28:01.443`) +- [CVE-2024-49534](CVE-2024/CVE-2024-495xx/CVE-2024-49534.json) (`2025-02-06T18:27:41.457`) +- [CVE-2024-50692](CVE-2024/CVE-2024-506xx/CVE-2024-50692.json) (`2025-02-06T17:15:19.313`) +- [CVE-2024-52012](CVE-2024/CVE-2024-520xx/CVE-2024-52012.json) (`2025-02-06T17:15:19.480`) +- [CVE-2024-57069](CVE-2024/CVE-2024-570xx/CVE-2024-57069.json) (`2025-02-06T17:15:19.647`) +- [CVE-2024-57071](CVE-2024/CVE-2024-570xx/CVE-2024-57071.json) (`2025-02-06T17:15:19.793`) +- [CVE-2024-57080](CVE-2024/CVE-2024-570xx/CVE-2024-57080.json) (`2025-02-06T17:15:19.933`) +- [CVE-2024-57086](CVE-2024/CVE-2024-570xx/CVE-2024-57086.json) (`2025-02-06T17:15:20.073`) +- [CVE-2024-57373](CVE-2024/CVE-2024-573xx/CVE-2024-57373.json) (`2025-02-06T17:15:20.213`) +- [CVE-2024-57968](CVE-2024/CVE-2024-579xx/CVE-2024-57968.json) (`2025-02-06T18:15:32.287`) +- [CVE-2024-6627](CVE-2024/CVE-2024-66xx/CVE-2024-6627.json) (`2025-02-06T17:40:50.280`) +- [CVE-2024-7100](CVE-2024/CVE-2024-71xx/CVE-2024-7100.json) (`2025-02-06T17:45:05.493`) +- [CVE-2024-7595](CVE-2024/CVE-2024-75xx/CVE-2024-7595.json) (`2025-02-06T18:14:41.017`) +- [CVE-2024-7596](CVE-2024/CVE-2024-75xx/CVE-2024-7596.json) (`2025-02-06T18:14:55.137`) +- [CVE-2024-9528](CVE-2024/CVE-2024-95xx/CVE-2024-9528.json) (`2025-02-06T18:35:28.637`) +- [CVE-2025-0994](CVE-2025/CVE-2025-09xx/CVE-2025-0994.json) (`2025-02-06T17:15:20.917`) +- [CVE-2025-25181](CVE-2025/CVE-2025-251xx/CVE-2025-25181.json) (`2025-02-06T18:15:33.030`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 878de48ec5b..7555e20d2ef 100644 --- a/_state.csv +++ b/_state.csv @@ -100870,7 +100870,7 @@ CVE-2017-17558,0,0,1a9cd8a1861a68e852e86efb4e866a01df29f37c67383a6fad001ed837f0f CVE-2017-1756,0,0,40bc0e91b28864ec680b7805953f08e33e6a4f80654e28e47707960b1ba41d86,2024-11-21T03:22:19.220000 CVE-2017-17560,0,0,4f4c6068540706a2d98fb80c5f6890a1b43aab27943084b28c68f4a72ab4dfe4,2024-11-21T03:18:10 CVE-2017-17561,0,0,ee3c871f1c1cc7d941f5a9ca718e5010a3db4dda59d3997026a95559f14b1648,2024-11-21T03:18:10.147000 -CVE-2017-17562,0,1,9ad91ff85b00d71f9b96836714f2a2b0fb59693899010df8ffc27ed93a90e641,2025-02-06T15:40:46.107000 +CVE-2017-17562,0,0,9ad91ff85b00d71f9b96836714f2a2b0fb59693899010df8ffc27ed93a90e641,2025-02-06T15:40:46.107000 CVE-2017-17563,0,0,445c915ebde270ffdd60d461284019f951f4a875c1aac3c68e3e637ac5ce95e6,2024-11-21T03:18:10.457000 CVE-2017-17564,0,0,75b2ae54c5fc366c45b00af912b568d3980c95fce5abb77ef4046e2aa7bc14c4,2024-11-21T03:18:10.617000 CVE-2017-17565,0,0,6bc8b8bc4899adb999d734b90bd8d59eeb0a9a879fe5da48cd99f0e960d4484d,2024-11-21T03:18:10.780000 @@ -101641,7 +101641,7 @@ CVE-2017-18359,0,0,f1d98b33bac96cf695fa950bdbcdd7a311c83e19f455170e58bc35381794a CVE-2017-1836,0,0,2eadb33b5673dd5153f647e0246479cb85188c2410423a24916ad1a27ff3db3a,2023-11-07T02:42:30.607000 CVE-2017-18360,0,0,76eaad1aa0b699626d370599721ca0a5764d621d0e44ae79c780f485a9a7accd,2024-11-21T03:19:55.710000 CVE-2017-18361,0,0,79097ec256618e70926053b6c2d55cb9b1b6109fd6a460fe2fbb1506a6804683,2024-11-21T03:19:55.883000 -CVE-2017-18362,0,1,7ceb99b715eb733250d33475cde9d2be2a8d1b5ecad67f7beaba0d03c9ace9e9,2025-02-06T15:43:03.840000 +CVE-2017-18362,0,0,7ceb99b715eb733250d33475cde9d2be2a8d1b5ecad67f7beaba0d03c9ace9e9,2025-02-06T15:43:03.840000 CVE-2017-18364,0,0,bc7317e9185590e388714b1189da33d9f710f239fda1f524daf8e0926e20bd5f,2024-11-21T03:19:56.200000 CVE-2017-18365,0,0,eeac2cdbfe6b611eb4299f3914fc765966c6087303288e334f759b75d56bdc70,2024-11-21T03:19:56.347000 CVE-2017-18366,0,0,8b404b41129dc55dda93db71ee9497117f78539da5cb1b61cb1396483881a2e1,2024-11-21T03:19:56.493000 @@ -112840,7 +112840,7 @@ CVE-2018-11806,0,0,a5f588cdaab4f8a649f1634b02c5612f682b105e02b9bd2ed0104e54771aa CVE-2018-11808,0,0,10b7765be18c21f04d1e776317b54947b44b9b1c54f158e09e2289e2752da927,2024-11-21T03:44:04.587000 CVE-2018-1181,0,0,3e98bd65bca0888ca0d91ce1a2a6e808c0266ef9d976889b9d4a13cedd1849bd,2023-11-07T02:55:51.020000 CVE-2018-11813,0,0,52ff473fb49b01041c020db7f233a431925d03ed15a13967a97be7afe7b68fa1,2024-11-21T03:44:04.737000 -CVE-2018-11816,0,1,c5eb229f24e14fda3c7042844735ed36fcc0d45e9c1f4c8a25969bcc2f5ca351,2025-02-06T16:41:05.897000 +CVE-2018-11816,0,0,c5eb229f24e14fda3c7042844735ed36fcc0d45e9c1f4c8a25969bcc2f5ca351,2025-02-06T16:41:05.897000 CVE-2018-11818,0,0,693b6ab2c5aee4ee49aaf9f37b0ae42c92c06c0aafbfa813b992ddff5638bf66,2024-11-21T03:44:04.897000 CVE-2018-11819,0,0,cef0b72398808eee38e7df58643b4a9402c82af3de6296102911ef205880de5a,2024-11-21T03:44:05.023000 CVE-2018-1182,0,0,962d98a6da0abb362e2bbe3665699b85c9af69946bbbaeddeda30f1f271be6c2,2024-11-21T03:59:21.017000 @@ -115590,7 +115590,7 @@ CVE-2018-14928,0,0,61b77f745a4e6dd616dabcb2c06451a47c830ba72cb3deb3c87bf2ede1e9a CVE-2018-14929,0,0,4824c0243639e6f8c90f4709a45411099a2655b382788dc82ceb8fd1b8631c36,2024-11-21T03:50:06.327000 CVE-2018-14930,0,0,4d5cd074875b933a3c692bc1a69e04128c826ce9bc012b0015b7410c031a1fe6,2024-11-21T03:50:06.487000 CVE-2018-14931,0,0,107b578fd111e4508fd67c9caca9e45301bdfd00121447a8272ee24967982ca4,2024-11-21T03:50:06.640000 -CVE-2018-14933,0,1,41f856514439f893d23a09dd6b6c6f11deec7d0b898d6ff6f51256d4639a7c1a,2025-02-06T15:30:19.173000 +CVE-2018-14933,0,0,41f856514439f893d23a09dd6b6c6f11deec7d0b898d6ff6f51256d4639a7c1a,2025-02-06T15:30:19.173000 CVE-2018-14934,0,0,e172bc6c5524e0f83eadd8f654b725a00d996e241ea4e9ad3fc5bb22b4c8062c,2024-11-21T03:50:06.960000 CVE-2018-14935,0,0,82d80a5512c52745b4c735a32ca1d1946cd2948504053efd25a326cc13d2cd58,2024-11-21T03:50:07.120000 CVE-2018-14936,0,0,62c891c2360ebc42fbc2de8eb83420e59085c83b5b2ce1c7f1cbbcb9467c88e2,2024-11-21T03:50:07.277000 @@ -117725,7 +117725,7 @@ CVE-2018-17532,0,0,c9afb14dd1c6d8af962a4d23b419b4686c42cb5e0f0035864c196f5e7c6e8 CVE-2018-17533,0,0,0c940fe821b040c752aaa2211c41c4ecfd8dbfe03a8fcb8db544dee9a58c16ca,2024-11-21T03:54:33.783000 CVE-2018-17534,0,0,3e3fdf7a6e200d4c8f4a722529530c4e463c91cc6443907523bf28e3ffb70783,2024-11-21T03:54:33.980000 CVE-2018-17536,0,0,f92b29073e099fec39cd1716172a5e06450952d3437f87a81d2842fa4b3efa65,2024-11-21T03:54:34.167000 -CVE-2018-17537,0,0,01ff876b4dea92233d97507b52f1f829c0c76992785dabb35851cee6537cbffb,2024-11-21T03:54:34.323000 +CVE-2018-17537,0,1,338fdd039744640b9461887e44ee2e7057a821056f3c49151982b33c321f8f5e,2025-02-06T17:15:09.467000 CVE-2018-17538,0,0,a27f6dc8f83a2af5c5ecf3db8eeb87b0378390cffc97938e0510cf48a37ae2f7,2024-11-21T03:54:34.473000 CVE-2018-17539,0,0,0717e37bc886f6f3d9fe5d39d7443a56d73a3c3a737c65451bff53ff50130991,2024-11-21T03:54:34.660000 CVE-2018-17540,0,0,bd8d27ce369b1f95b2b5156db14c7514041dc80ced075144e162bf9ebf046037,2024-11-21T03:54:34.850000 @@ -117982,7 +117982,7 @@ CVE-2018-1788,0,0,c6d129a6d99d0c1d784da2b0250dbdf4eb2da862fd7ee1346fc0af8997d1b3 CVE-2018-17880,0,0,ac3bfc5bcaa8267f0cf5d77a8e1ab048e82354ecbde444fb4381450add2cf26f,2024-11-21T03:55:07.747000 CVE-2018-17881,0,0,e21c84d38103f08e61d62f90551302258b922bb01e1348b3a28fbfacfccbafd1,2024-11-21T03:55:07.907000 CVE-2018-17882,0,0,21f4106d6cf4a13cc8c9c4ce911c05e8a055edd1935ed4f2029ed9e3e4eb99e0,2024-11-21T03:55:08.053000 -CVE-2018-17883,0,0,230ad1597e56f0fa54349598d00c9dd5b4c3f1a82763bc23b7b14a340a2ebf05,2024-11-21T03:55:08.207000 +CVE-2018-17883,0,1,ac93cfae6d86920381594ffb14956b49accea3a5569dabff0f56980422ba0ca2,2025-02-06T17:15:10.617000 CVE-2018-17884,0,0,f3d48fb69177bbba0d55cb968ba4458cd67158dd2e66d75ddfa6f11e33319a88,2024-11-21T03:55:08.347000 CVE-2018-17886,0,0,5ddc7701cc54999549efbc6d30393a328d9b2f6655a7064302bc0db9f667de4c,2024-11-21T03:55:08.493000 CVE-2018-17888,0,0,c38c31ca469a218004e53ce699e5642deba237516cb41c3d3276f731063827ab,2024-11-21T03:55:08.650000 @@ -132962,9 +132962,9 @@ CVE-2019-14939,0,0,5a27052306daf9bb909b1870c72084ba0175f9542fd5f4cb3ad6bd8b8dc04 CVE-2019-1494,0,0,dc120233e3383c4c5f05e973cb1dec2213dc6943c95f3326f6c6baf587df434d,2023-11-07T03:08:12.050000 CVE-2019-14940,0,0,f266f4c3f4875b54520877e27ed27e074228ba5c9ec69b2089b8807b7ecb4183,2024-11-21T04:27:43.750000 CVE-2019-14941,0,0,6d5859b8bd61f2d5404db50ca245662b67a280f3e700436a738416d8a143bc3a,2024-11-21T04:27:43.893000 -CVE-2019-14942,0,0,e951fb24ea95c2177c09e82c6a7395693ce438529647d917965224ebbc3b5238,2024-11-21T04:27:44.070000 +CVE-2019-14942,0,1,24093187d7253ca27c111788f311b937ff04c69a1723fa5d8b2a68ee6c1878e4,2025-02-06T17:15:10.857000 CVE-2019-14943,0,0,a8551755be9bca519735a5a32205ca0870f2d43807bccb20ae6df20ad92c3f4b,2024-11-21T04:27:44.217000 -CVE-2019-14944,0,0,aedef1e7cebbabe0e20d37b8fb47f70ff0b66e675c06b4c6c1d3eca4fabdb38e,2024-11-21T04:27:44.367000 +CVE-2019-14944,0,1,4db4a92f8f3f5fb81b92ce5428e0158da24817bc6956b9d8c15898e13ba85244,2025-02-06T17:15:11.077000 CVE-2019-14945,0,0,10e1ac1435236cce0779f51c23042f93fe22eaad36f5173e3ecd4436f0156db6,2024-11-21T04:27:44.520000 CVE-2019-14946,0,0,c51950404c51dbfbcce080e4eae5689ce933641e4b1a8b1b5607cee385f00aad,2024-11-21T04:27:44.663000 CVE-2019-14947,0,0,4251f217a5c23a961ebab9acece0190bc74a6c7a56ee02fe5aa13ef84bcef6c9,2024-11-21T04:27:44.800000 @@ -134388,7 +134388,7 @@ CVE-2019-16524,0,0,86062eaa5d3a56389c6161887c5b3292dfff8795b8e06edaaee798ac8f419 CVE-2019-16525,0,0,d700e936a66636f4a7e0e4e04bcf75ea45d18da03b86df61bcfb22ae8c879579,2024-11-21T04:30:45.920000 CVE-2019-16528,0,0,1a759b2aef5e7e418517cdc01d9ec910edde97377e1e432a3ff7b07984ca7b25,2024-11-21T04:30:46.060000 CVE-2019-16529,0,0,5b55cbc6dfeb27ca2e8bd70dbc52262a449eb54eef77bf175df8b43758533e1a,2024-11-21T04:30:46.203000 -CVE-2019-1653,0,1,ba5d0e245fdd52819ec710084f8bb6c7a48e62c5c8169c1d15ed3b8216dc58cd,2025-02-06T16:09:13.310000 +CVE-2019-1653,0,0,ba5d0e245fdd52819ec710084f8bb6c7a48e62c5c8169c1d15ed3b8216dc58cd,2025-02-06T16:09:13.310000 CVE-2019-16530,0,0,01387f56ffcd7a26a3e9fe11c152a42d7abd377d00d94f1c8174fab8d063a4af,2024-11-21T04:30:46.343000 CVE-2019-16531,0,0,172383ab40b6099e9d1216efe38c87beb985f309229e66e7019d6a9d5664b68c,2024-11-21T04:30:46.480000 CVE-2019-16532,0,0,00c12348ad90d933237a6bedbdad7630b1f2315d42edcbaa9f858b32d02701e3,2024-11-21T04:30:46.607000 @@ -139137,7 +139137,7 @@ CVE-2019-3564,0,0,58f3c542ab40160954ae20e0328fd1e309ba94d809430d0045d8ae783ab6fc CVE-2019-3565,0,0,16dc77d9db4cfab1ecf8af08c9cd4a069928ab51f184a86ed96213a342164cd5,2024-11-21T04:42:10.590000 CVE-2019-3566,0,0,58c3aa8a7b8b485c929a282459eb813d31dc78ff6faac44824c37af82a82273a,2024-11-21T04:42:10.717000 CVE-2019-3567,0,0,7a5625f81cdc53b15b874942ab2c278bf007925a0da3506d9eeaf2ef21ae7e45,2024-11-21T04:42:10.827000 -CVE-2019-3568,0,1,74e617c55e00ddf83d16e0d5f82d69d3ff55ef8df731d3cc9e1e0c83bc9251a4,2025-02-06T16:07:46.867000 +CVE-2019-3568,0,0,74e617c55e00ddf83d16e0d5f82d69d3ff55ef8df731d3cc9e1e0c83bc9251a4,2025-02-06T16:07:46.867000 CVE-2019-3569,0,0,b2815b567d4f145aa2e9c240cc8d93198ed30c5389dd5c7c37392964fc01d4f4,2024-11-21T04:42:11.060000 CVE-2019-3570,0,0,1e6bc21c5cf9cf1f72e77647be6fc1805ab1e3b58a10a28632c9b49fa96eb01c,2024-11-21T04:42:11.180000 CVE-2019-3571,0,0,519bdf26de5ed083239a444679c2d2aef5f8cb8ed0e28d98d8d92f08e297da51,2024-11-21T04:42:11.300000 @@ -140783,7 +140783,7 @@ CVE-2019-5587,0,0,05e59dcbc75e448492ed54986b8ddf8bff1ec46d3d62ab4098808242db90f5 CVE-2019-5588,0,0,d8e13954df05a5c400862deec3d09324b268f072ef1abce9e8e9d46de6f17cbf,2024-11-21T04:45:11.100000 CVE-2019-5589,0,0,25ed9356ff0d68e85faf3de6a64ba8e031c929998eb5e9491f813993a8584262,2024-11-21T04:45:11.217000 CVE-2019-5590,0,0,da14fe72a211edf30a8e3abfee9858018f9cdfc2351d3cac5f664fbf3a1dde9e,2024-11-21T04:45:11.340000 -CVE-2019-5591,0,1,2c75f198f6697496361242a7b00e8165c4aa9268dee090971541227c0c492c84,2025-02-06T16:07:11.657000 +CVE-2019-5591,0,0,2c75f198f6697496361242a7b00e8165c4aa9268dee090971541227c0c492c84,2025-02-06T16:07:11.657000 CVE-2019-5592,0,0,e98a9da063e83c428f774f642c4dfb6c5e5e3df576491d87739781b1871fd18a,2024-11-21T04:45:11.663000 CVE-2019-5593,0,0,12e0019932b5467049d4a25a26e8c330c90eb8f15a7ab3c273e313f22ab36d2a,2024-11-21T04:45:11.783000 CVE-2019-5594,0,0,8935e7b74d5896342c8c4381f0a3a609ce5940d3194cc5b4b6abe5ab7668f54a,2024-11-21T04:45:11.907000 @@ -142029,7 +142029,7 @@ CVE-2019-7252,0,0,077d9a2eeb4271bf4005828d44408e3f5dda2f6fc8326c4bec954ee1c32165 CVE-2019-7253,0,0,8473876c27d80fe7753b4dc5f443b7897774849e61e20ec195c927e3e6f26edd,2024-11-21T04:47:50.850000 CVE-2019-7254,0,0,19d6e60e585c3f298c1295e3a59c97ca7778e188e3a463d9f1356bac5ff17f40,2024-11-21T04:47:50.993000 CVE-2019-7255,0,0,d267b2cfbdbece06d6209d8b7f5a3b1b59444a6aaea6841787106ddb91695b37,2024-11-21T04:47:51.143000 -CVE-2019-7256,0,1,23365ab24aed49151eab203c7c07912a1ba1eaed37529e49f213eeeca09fa55b,2025-02-06T15:31:48.547000 +CVE-2019-7256,0,0,23365ab24aed49151eab203c7c07912a1ba1eaed37529e49f213eeeca09fa55b,2025-02-06T15:31:48.547000 CVE-2019-7257,0,0,3371625ee6960ff53a0eeec741c9f4309be8af0a2109feb327faecb1fcc47208,2024-11-21T04:47:51.530000 CVE-2019-7258,0,0,d7965c2a30d03fade8ed8b6e5d4461ba1a996906da394860269ff75022517d5e,2024-11-21T04:47:51.687000 CVE-2019-7259,0,0,0bff163f3fd955ab67b7fd09023956e82ca5deb676f424d193f1bb99ea5ab1f8,2024-11-21T04:47:51.833000 @@ -149997,7 +149997,7 @@ CVE-2020-15062,0,0,5c385a3a44ca8de1e0c143fbf2ce766a19f90cfb656c168c0911033bc404b CVE-2020-15063,0,0,913b1ad8986f8df05401174586311b4c46ed40f9b1a93ba7d26df80e4f8e9d83,2024-11-21T05:04:44.050000 CVE-2020-15064,0,0,095a122450ff437689be0455fc081c68e1627ab8c9ad772fc071c1068e42123b,2024-11-21T05:04:44.223000 CVE-2020-15065,0,0,03ccc5c2abf6f175273b6f26b3cc9eb3ff15b50236bcc7af4580b8a975468dce,2024-11-21T05:04:44.480000 -CVE-2020-15069,0,0,10336bb2a3beb7675cec7dd198328e0cc8dca026b6ae7350a8a5ba59f0994b26,2024-11-21T05:04:44.630000 +CVE-2020-15069,0,1,aaf77ad6e3295dca763f52bc077891035c82478f7b4b5ad5296ecd1d6f4a7425,2025-02-06T18:15:26.113000 CVE-2020-1507,0,0,624d8c4553151f742df71a2aeaed021c1f7711b5765f097d27b46cbc5c21055d,2024-11-21T05:10:42.710000 CVE-2020-15070,0,0,a5565daa92dd1679a782780372c72b84dfd98cb47c5ed8664b0c9571da753873,2024-11-21T05:04:44.783000 CVE-2020-15071,0,0,5a88416ab79b833cf5490582541da675ff8853e89dd24d31521059cede24b771,2024-11-21T05:04:44.923000 @@ -151790,7 +151790,7 @@ CVE-2020-1734,0,0,7a237cef54a71a0bebabc1fe39721f3a72fea699a49486fde35d94972732f3 CVE-2020-1735,0,0,fc752cb285088498878cc188aeeeac7458e4ff3dc66a51ca8b91da2816ce67a3,2024-11-21T05:11:16.333000 CVE-2020-17352,0,0,39f44ec183d67eaa27ae0f3daadfd9628eb8a6ee59c08b74d58b2d4a154a4175,2024-11-21T05:07:55.860000 CVE-2020-17353,0,0,86d7004f438bd6446fab6228dd4f5aca8a966fa066b24f90c072a9c6d9168814,2024-11-21T05:07:56.013000 -CVE-2020-17354,0,0,6097a986a09cdb57507dd44fe9758b527862b2f3f323fb7d8ddd696c232247c9,2024-11-21T05:07:56.180000 +CVE-2020-17354,0,1,250572b11a3ad55e698eaa0ced004f4c0f98c18e2a1cb6e39743292f60e99fe1,2025-02-06T17:15:11.330000 CVE-2020-17355,0,0,075aa21146fb621812835e1e3cc9937972d9232fc9384e07218cfa876540e541,2024-11-21T05:07:56.367000 CVE-2020-1736,0,0,524185cb0882c4cc22da018cb08ec75ad5a4c674f04d6906a243aa70ff299018,2024-11-21T05:11:16.493000 CVE-2020-17360,0,0,57cfab606c9e8b7442d0d2085033991490a0c9bf7a73454f7aae5e7426e72322,2024-11-21T05:07:56.510000 @@ -156401,7 +156401,7 @@ CVE-2020-27541,0,0,75ff7408c2d3584d5610fe38436f4cbb116b8bb9d5efafd6f52ee6f910f88 CVE-2020-27542,0,0,a4ec15ce548ff6c6ee20842c971c0d78693553bc342fb84e31f2ca8be1c6946a,2024-11-21T05:21:20.550000 CVE-2020-27543,0,0,8e7b2747bc99bbc8e16c891d21b7dbe56bd38f94eef5937591b67db70ef4a5a0,2024-11-21T05:21:21.457000 CVE-2020-27544,0,0,cefda2dd31ec5cd0bc96934aa32722403d797d75102a0fd0d1229c2eb4dc7cd2,2024-11-21T05:21:21.697000 -CVE-2020-27545,0,0,64820b3739403db8652db95754b45d0172c72dac5840093e68652b685fcbc73d,2024-11-21T05:21:21.893000 +CVE-2020-27545,0,1,cd168afa1cffb868413593f37faa14eab514f614d73fd13fb768c1801fe26719,2025-02-06T17:15:11.610000 CVE-2020-2755,0,0,1221accd094bdd18cf480cdda4ed188fae7125acf2d78df4c06ca83b7111762c,2024-11-21T05:26:10.627000 CVE-2020-27553,0,0,486a3800e74a70aa2807f7be144b1646df74eb7bfbce71ba445b20f59b30f107,2024-11-21T05:21:22.150000 CVE-2020-27554,0,0,3860a639e76c15e2cba587d262fd034e637f296dd1ab67690f6943d668a0dfa8,2024-11-21T05:21:22.333000 @@ -156887,7 +156887,7 @@ CVE-2020-28149,0,0,d309eaf6a64e3cf3ced67fe5f936af59079a91b7ce4d68cca41c25c1576c8 CVE-2020-2815,0,0,3bd849821a49ca5c43928253d38441d349f4ec4dcd3f4d9c7466d9f779433787,2024-11-21T05:26:21.047000 CVE-2020-28150,0,0,5402778a6b777d1d1a0cbe49f0402236c0c9a98c2e270a06ae5ee906693f6d70,2024-11-21T05:22:25.160000 CVE-2020-2816,0,0,ccbc1e2cd6bf2a14a46755436c9aab154417b1227f8cb4f86229ee1669b5c88c,2024-11-21T05:26:21.210000 -CVE-2020-28163,0,0,27ec7c795906ef4c2d05cd4dc7314392ee3719c2e8dfa4b08cb218021abeec2c,2024-11-21T05:22:25.297000 +CVE-2020-28163,0,1,00a008aaab32aeae5c326dfa10660e3b656d909c6ed3c9ca6e70c09eac6a26ba,2025-02-06T17:15:11.807000 CVE-2020-28165,0,0,f2b9bb8858e25355c174608c510772ba8bcc4caf6f4662926cc00acbd223bc62,2024-11-21T05:22:25.437000 CVE-2020-28168,0,0,403199973f8a41c9434eda6c4c31ff460a34bed7104442863839bbd880c353df,2024-11-21T05:22:25.573000 CVE-2020-28169,0,0,192f2f504fb4337d30df9f5f29a9afe27c65a1fd4936d971afde1d4bebead6c3,2024-11-21T05:22:25.723000 @@ -157377,7 +157377,7 @@ CVE-2020-28945,0,0,33ad7ac250d1dc7ca2d7ac581dbc2489461e170a6c156cdf9b27ff5203a22 CVE-2020-28946,0,0,95782fa6bba3d8352ea0e94ebd441642f09243c29fd34bb5c4bc46638ae15cd8,2024-11-21T05:23:21.203000 CVE-2020-28947,0,0,fb46595ba4e86fed206b1aab246d96408851ad0fbc627ef0fde91da68cfd8f85,2024-11-21T05:23:21.360000 CVE-2020-28948,0,0,6eabbd61c1edc07fb210d35219ec3d8e34246392fe08dc08d8e87f067f51e57d,2024-11-21T05:23:21.513000 -CVE-2020-28949,0,1,0f5507539e9215528ac422d9c5a71e7c30d608d5da0460277b294f788d34093e,2025-02-06T15:06:53.710000 +CVE-2020-28949,0,0,0f5507539e9215528ac422d9c5a71e7c30d608d5da0460277b294f788d34093e,2025-02-06T15:06:53.710000 CVE-2020-2895,0,0,5a939382a5a4301f168df4cdfc206b8e25a4e366a0e8f2f39c42f120fd4be8fd,2024-11-21T05:26:34.160000 CVE-2020-28950,0,0,c934fa406c512b1631796b34f4eb6a4be6877836f08ecff72660434307fd1b66,2024-11-21T05:23:21.910000 CVE-2020-28951,0,0,fd3ced095acc54e4b26ac87ce84035e8c23f89b92fa8afb4c301d26a09e5ce30,2024-11-21T05:23:22.047000 @@ -157421,7 +157421,7 @@ CVE-2020-29003,0,0,fe6b7c2746e25af8b5ee1e0880df7c25228fbdeb183cfa6685eb8cbe7a0ff CVE-2020-29004,0,0,fdc3b9d149d56931282f83c27a94953928b32b88ac2a8e9d14f2848094e50606,2024-11-21T05:23:28.663000 CVE-2020-29005,0,0,4384c3631214d269aacf79a3e86f6c8377581bda5e016af03d5c4d000db518f5,2024-11-21T05:23:28.833000 CVE-2020-29006,0,0,a1eada1af14088aa47b18cfd0cd32accb4e1430290b5d6124463e288eefbdce2,2024-11-21T05:23:29.027000 -CVE-2020-29007,0,0,8af8f47bda23f41cf3c302d8c0804757d13ce940439f0ef462214f804907b062,2024-11-21T05:23:29.260000 +CVE-2020-29007,0,1,38423e2017ec37ff5dc84a3d59d7edd5ef57069d01e93c88df502c0c5e4142a4,2025-02-06T17:15:12.007000 CVE-2020-2901,0,0,0ae88d0e1bd825c44287334593753f0c8904a32f5681a5bf25d6dfeb866922df,2024-11-21T05:26:35.197000 CVE-2020-29011,0,0,93dfcca0e4592d4b53a9c1101459de2f73391ad05b892ac375c05ff854fc117e,2024-11-21T05:23:29.530000 CVE-2020-29012,0,0,6a75f1e03c3cce4f34c7b0bc85a1f81368af8e34915196ecaa70ac419304e38e,2024-11-21T05:23:29.747000 @@ -157718,7 +157718,7 @@ CVE-2020-29552,0,0,7d1740b628614dd5aaf087506982700c38e3ee8bb2c4a5b5849c5df425a93 CVE-2020-29553,0,0,34de55a173e6df42f3f5164995636f70951da3b0f212a78d186500b2b29e255f,2024-11-21T05:24:11.450000 CVE-2020-29555,0,0,beeac8b4887a34bf7f774d50b922fd94c6cac705e079913e0d86b8647c2a9194,2024-11-21T05:24:11.610000 CVE-2020-29556,0,0,dd85c94a1123be97aa2ca7e0e2bafe70f80b983727f9fdd20dfd05da8c60048c,2024-11-21T05:24:11.770000 -CVE-2020-29557,0,1,2565177fab7566355f9db98b5fb0362f04c55c07829edf04441a4c5dd31d6656,2025-02-06T15:20:20.810000 +CVE-2020-29557,0,0,2565177fab7566355f9db98b5fb0362f04c55c07829edf04441a4c5dd31d6656,2025-02-06T15:20:20.810000 CVE-2020-2956,0,0,502aab4ab6864429bfcd2bd8dccd9e75b69740958ae4e20c551f9377c1ed110d,2024-11-21T05:26:43.740000 CVE-2020-29561,0,0,d4823bf0edeffb6111a8b8c5df4321292590e25945d35eeb960ba5434976be14,2024-11-21T05:24:12.123000 CVE-2020-29562,0,0,bc62df65898ba952030779fb0a091fcf54aa484992703e814639b3fa9c22ef22,2024-11-21T05:24:12.283000 @@ -157733,7 +157733,7 @@ CVE-2020-29570,0,0,9f83e19bc998b3d2d7973d177eeae85bb3a3bf03c16e2dc329176ae767cd3 CVE-2020-29571,0,0,c17945383d2b3f3cd9a0a225cda10dda22876bb9f0c239f07558ba7f18ed7eb3,2024-11-21T05:24:13.790000 CVE-2020-29572,0,0,bbaa3cf10ab5f531b866a830631dc1df48bdcd325c60720a6733bb90830c024c,2024-11-21T05:24:13.957000 CVE-2020-29573,0,0,d24f0d59b817cb2d53a10b995433be4274c40c09d2f10ca57aa901857f1dc527,2024-11-21T05:24:14.110000 -CVE-2020-29574,0,0,c9b3ae3fc2526f72ea3991046b341c1086e3c6308f1a22cda7b1a75a7176ae2a,2024-11-21T05:24:14.273000 +CVE-2020-29574,0,1,c172334155513181c2c16e18a11087c8c8ef45c76b4463959f615fe71032171c,2025-02-06T18:15:27.600000 CVE-2020-29575,0,0,849fe2d3c9ed4e8870c1e9cf1ad705da07fd53a0c6a8ca65ab77a3eef78ebb1b,2024-11-21T05:24:14.430000 CVE-2020-29576,0,0,9c888d6e7a845bb6f95fad0e6ec4e891a47d26871edde5dec6bcfb12ebddb9d3,2024-11-21T05:24:14.587000 CVE-2020-29577,0,0,63fed6641591fe1aa7c3a6f8354217e32b5b9c582ff04af6b9a411b01f25a338,2024-11-21T05:24:14.733000 @@ -158255,7 +158255,7 @@ CVE-2020-35161,0,0,6504e0bd9bd5d152581f6189adb48c709dd7e64a367272ef78d28faee17f9 CVE-2020-35162,0,0,8f14cb97d78ee221f1db3fd364291b1bdd84b8ac5d3ca9f06b3a70a609a37f64,2024-06-21T00:15:09.957000 CVE-2020-35163,0,0,7fe79604c5856d0bf9168c5018263df9d11d9da689f9a79d85f3e63040cf98fd,2024-11-21T05:26:52.773000 CVE-2020-35164,0,0,300a513627fc296f390ba1367cd588e3609e0b71d0bad2b53b9ea0a5ea4deb88,2024-11-21T05:26:52.947000 -CVE-2020-35165,0,0,752c89393211d4ceef9683c09add1928786869b7147627a669a9975e0bf75500,2024-11-21T05:26:53.077000 +CVE-2020-35165,0,1,1f29c1fd75a3ac3ab692844c0344ff3f710217c92e3ea8c9d9644f0ea888c994,2025-02-06T18:59:06.710000 CVE-2020-35166,0,0,bd9a621628f2c379ef3f4f1cc298df92e2b845e0de10649318652cc6be6ab614,2024-11-21T05:26:53.217000 CVE-2020-35167,0,0,97e5364ca49f12826b359a6c08db7e6f616f5fc57f4e1ef604cd1c42f098afbc,2024-11-21T05:26:53.370000 CVE-2020-35168,0,0,b9b29d41f74df6f64f0822f2becb8264f25d40d6e5aa235b4cec29885eae6b28,2024-11-21T05:26:53.520000 @@ -158951,7 +158951,7 @@ CVE-2020-36074,0,0,88dff016ec877e6d3f7a83cfb5fa17ab15d453d5ba227447d7e349ed57059 CVE-2020-36077,0,0,bb319e2884ff7716108fb63b33b10385bec03b4870ffec9e65c17731177b1f7b,2024-11-21T05:28:44.360000 CVE-2020-36079,0,0,230b6994faf4d070027f0fa1f6a4a9c852d30612849d7686d59f6cb4641b67dc,2024-11-21T05:28:44.537000 CVE-2020-36082,0,0,6ec0c94eb23b0553d02910ab3688c529fc1c8e8fabff9d4e2868532cbe311ae3,2024-11-21T05:28:44.733000 -CVE-2020-36084,0,1,bbb5fb1b641a03bae0a01b445a9c084ae4812633cffc67513679ede67a5bf67e,2025-02-06T16:15:28.517000 +CVE-2020-36084,0,0,bbb5fb1b641a03bae0a01b445a9c084ae4812633cffc67513679ede67a5bf67e,2025-02-06T16:15:28.517000 CVE-2020-3610,0,0,ee5dfdcfcfaf71d88a4bb1c76edaeb2f060b0ee7ff05683376ffd717f387fbf5,2024-11-21T05:31:24.063000 CVE-2020-36109,0,0,fd39d1054cec06e54269dad5b8e29ecd01f66ef99f14f15bfb57cf86fee8e633,2024-11-21T05:28:44.903000 CVE-2020-3611,0,0,1a1d59975c34575392e5cc382b98d30e6d5d38b7bc7e7d2657a48760362b6e02,2024-11-21T05:31:24.227000 @@ -174635,7 +174635,7 @@ CVE-2021-30149,0,0,b4e1bbeb7c9e742ea8c54fe14acfe37444ffd44516325d1f413f07c0b0e85 CVE-2021-30150,0,0,5241ce228aca0bbecdd0b444b8bd4ca25e3179d54af6c2ff86aab3f5def1bb1e,2024-11-21T06:03:24.017000 CVE-2021-30151,0,0,0604809d6175e7a578b21935e01533dd11872ca56170ae76ce4a4fc4b811444c,2024-11-21T06:03:24.160000 CVE-2021-30152,0,0,d567c22a92e5f8121af0e3a919488904ac76cfe3551e8df071e34189b2750dc0,2024-11-21T06:03:24.310000 -CVE-2021-30153,0,0,04588e8f680d510f0d535bb9b095b44dc83d9c3975d9e20e7a7814a5668b9769,2024-11-21T06:03:24.473000 +CVE-2021-30153,0,1,32e8728205b7135bc9e864ccbe3f4c451ce50c37e301a64b1b33b7ae84bdc5eb,2025-02-06T17:15:12.217000 CVE-2021-30154,0,0,521a388cb5fe74e8f6992120d2fedd6a65bc3796fab84a34d8b82e4464cd68cd,2024-11-21T06:03:24.630000 CVE-2021-30155,0,0,45813e1088f1453f559b199d3c245ae9b8cf920cea8df186cb779f069ed22de4,2024-11-21T06:03:24.783000 CVE-2021-30156,0,0,f174c2a4ac09a9233db943c567201b9958b087282b6aa086cdf491c6e6794b09,2024-11-21T06:03:24.980000 @@ -177569,7 +177569,7 @@ CVE-2021-33793,0,0,994fdf7b2356bebe45191e4849c4d06e34fc0e6b66728568039538099b1d4 CVE-2021-33794,0,0,3050e8c94e9a8f3c22c71cf6772be515aabd7192271fd66cd6aadc694a2e792e,2024-11-21T06:09:35.793000 CVE-2021-33795,0,0,6a83f42121b2ada57b67166ce5fcca84d69f3536ddab69e28d5f7d7d28dcb5ec,2024-11-21T06:09:35.963000 CVE-2021-33796,0,0,ae7f3ce4604b56eb8fdfa252aa2155510acaab5b98ca2d662c8e54061bedc21f,2024-11-21T06:09:36.133000 -CVE-2021-33797,0,0,4bc1321896f9d5d17d4cb44c199d3b7d355c971806a0d1066685c248de6f9009,2024-11-21T06:09:36.293000 +CVE-2021-33797,0,1,411f98ca83ffd34914673e5b7981c3590071f54d9a5186e6de1aacc180fb7d4d,2025-02-06T17:15:12.420000 CVE-2021-33798,0,0,f10bed80d348f0f0aa726942c8cd701eee31993186e56964707baf818a30a8b3,2024-11-21T06:09:36.463000 CVE-2021-3380,0,0,9ba2d16271608bb6619fd4db535ea4e28f4fd5a40eae8fe95528d32f02bae8a0,2024-11-21T06:21:23.367000 CVE-2021-33800,0,0,de7832d86e538c082359b1bf11783aa88dec56341e1b4941bf11dbb6a176f138,2024-11-21T06:09:36.600000 @@ -177757,7 +177757,7 @@ CVE-2021-34220,0,0,28b88977b14c466695ca6d360b7adc45375c75e8d4cf91987e0ce61f61533 CVE-2021-34223,0,0,70c40bacb76381740c1f87a616f624f4195aa3fdb6b6d3362857bd528a7bc057,2024-11-21T06:10:01.820000 CVE-2021-34228,0,0,ea4d3041b3fcbf94c580e5a0925c4b00b78290aef84a54a658f051c9adb49b81,2024-11-21T06:10:01.997000 CVE-2021-3423,0,0,87fdcf08b62eb8fd3e7a6d568b3147c2e81811e8eed586e32b5651db4c861103,2024-11-21T06:21:28.207000 -CVE-2021-34235,0,0,d544c1dfde1b3c089dd0ca92cb9805a0d95a6f6689c6a30c5e46b6a552202ce9,2024-11-21T06:10:02.700000 +CVE-2021-34235,0,1,e40f2cb6e61b9ee85d9e4eb0236177b56956f4de75edd057dc6c4a3ff6d6d831,2025-02-06T17:42:48.187000 CVE-2021-34236,0,0,f7bdd8ef92563ca52b5296a2062d91875a877eb936612f3b259d943c4aa71c47,2024-11-21T06:10:02.870000 CVE-2021-3424,0,0,954a8aa5fc6a2fbb1251d32bf08869cbe985f5d51cf8ab7fa91ce63a7f1cb784,2024-11-21T06:21:28.360000 CVE-2021-34243,0,0,f527c3b67db0ce9f8cc04405a55d73f59a4663bc1db1a269086545b1931e3ee7,2024-11-21T06:10:03.083000 @@ -177831,7 +177831,7 @@ CVE-2021-34332,0,0,ace45b937ee626a51de9410c8b59d5742a8ef25d37731d710a17d61a5e34c CVE-2021-34333,0,0,b474a423e46b7082dc07ea9bb1e1664c29715154e4f4412dbe76eb449dbd16eb,2024-11-21T06:10:11.217000 CVE-2021-34334,0,0,a7ee5b1f7ef4cd9fa880c39bd25fa8f0d03bd7aa19850961a9b848f27b7e5a52,2024-11-21T06:10:11.343000 CVE-2021-34335,0,0,8d560771a91730d5852bc1a079abbc514b59a128056a4c6043b1945c37ff447b,2024-11-21T06:10:11.470000 -CVE-2021-34337,0,0,73acc77925864e02ff5d4b39c92b227b6a791728324482ebd5d6961acd82cf92,2024-11-21T06:10:11.600000 +CVE-2021-34337,0,1,d0c9a70473f5165500cdae21058ae8d672fbc577e1a3a9f85e632ea4093f35f6,2025-02-06T17:15:12.627000 CVE-2021-34338,0,0,6e37d5fe9c1d5f2766ae128e8591088da26594c0fd061724163fd2283f73863e,2024-11-21T06:10:11.753000 CVE-2021-34339,0,0,b8391df5a59b6325adb10c01995b6110cc917b19717777aed1867a6f524d17ca,2024-11-21T06:10:11.877000 CVE-2021-3434,0,0,de12396fe0ff57d5174388b0b95ea3fdd47a95a09814bea1f98de6074c2bd73e,2024-11-21T06:21:30.013000 @@ -179461,7 +179461,7 @@ CVE-2021-3651,0,0,6636dfcd922e7cb1ef39bd90e7eade8747704a55870f78c2eecf0e14713ddd CVE-2021-36512,0,0,a45e34ee05cafbd879fa81b5bdb9012879ce1c3f301f4875f6c524bf39affa9e,2024-11-21T06:13:46.790000 CVE-2021-36513,0,0,9a82b10a0816874f8c1f2b77eebf4db16e7ec4c5f66caea9ee278740a466b33e,2024-11-21T06:13:46.943000 CVE-2021-3652,0,0,f345f1c788f6d42ecea80c57714f1ff61b594918e44b49548ef8dd25043f5fa8,2024-11-21T06:22:04.567000 -CVE-2021-36520,0,0,cd98ab13ed76c3d1d64431739d54b64f5c7807a31093a7eeac8ef52ee23c8e43,2024-11-21T06:13:47.103000 +CVE-2021-36520,0,1,ebdced31ef133273707abe156dfae048d35c484de7af4f991237911afdf5155d,2025-02-06T17:15:12.820000 CVE-2021-3653,0,0,42aabca48538a9437956e13309a56649d87b03129c787bb7bd4934a2d4f4fe33,2024-11-21T06:22:04.710000 CVE-2021-36530,0,0,6e876beae5b0da7572b5f4b012afc6ef11c0367a2f93ad15a311c968bf3a86c6,2024-11-21T06:13:47.260000 CVE-2021-36531,0,0,5ad84c54f1d7fb7957fc207837d24fcffc1a753924d3e464eee94843c5f8e76a,2024-11-21T06:13:47.457000 @@ -181640,7 +181640,7 @@ CVE-2021-3929,0,0,386aee1fa2c13bafa06a50919c8811ee196fa3eb57a7f758af68733a2d80bd CVE-2021-39290,0,0,4faf5271e88619fa8d7ac328a2e3cb3d6fd0f70f73052bb9ecd9122500b24399,2024-11-21T06:19:07.793000 CVE-2021-39291,0,0,cdeac33e28dbcd5736066d6640e454e84e5a3f646d2543c33f601534582dc436,2024-11-21T06:19:07.980000 CVE-2021-39293,0,0,7f06b7eb1a854fa9547bea97c0e43e43aaed1d5a57ac0f47b2f178f3861e1679,2024-11-21T06:19:08.180000 -CVE-2021-39295,0,1,f5af852984414d6c4d1e11ed6f3edf8417b764bc65a34e5a26005b458bbbad49,2025-02-06T16:15:29.437000 +CVE-2021-39295,0,0,f5af852984414d6c4d1e11ed6f3edf8417b764bc65a34e5a26005b458bbbad49,2025-02-06T16:15:29.437000 CVE-2021-39296,0,0,30e93da271775419e8bcc762a0dc46f46aebea2596d44b13da41892dc2fe899d,2024-11-21T06:19:08.620000 CVE-2021-39297,0,0,f9a7fd88d58d4f875c6d06c4716146ebee1368b3fe6d7e4125eb7fe494b8437a,2024-11-21T06:19:08.810000 CVE-2021-39298,0,0,2e80d6a6f2bdb81a9ab1fa8b3936def7fc3ae095525430b97ca8df8b82da684f,2024-11-21T06:19:09.240000 @@ -182636,8 +182636,8 @@ CVE-2021-40501,0,0,aea131529567d40ceb5fcda5b11a542132ec0c9430392e3c3764c55a6bb6d CVE-2021-40502,0,0,b919ac74b1480c0523e66724dd42155c076ad32d43b1a578216e29de39be1194,2024-11-21T06:24:16.560000 CVE-2021-40503,0,0,53f8b2cecf2d6fe27d59e513ab9a1bbdaca751e543e09635e8c1abc8345f115c,2024-11-21T06:24:16.697000 CVE-2021-40504,0,0,6e9594b53ac6cad66e9d48d5c9fa4c41e01a622ab56b933772b8b39b6344fb4e,2024-11-21T06:24:16.830000 -CVE-2021-40506,0,1,1886afbaa761b9fe5581ae75972768695ae8979da897aa4d289ec57bb6137298,2025-02-06T16:15:29.680000 -CVE-2021-40507,0,1,8a1f224a8813c1bd55ffc75129bd23ba084e8991050fd5d27021ec37af87aef0,2025-02-06T16:15:29.867000 +CVE-2021-40506,0,0,1886afbaa761b9fe5581ae75972768695ae8979da897aa4d289ec57bb6137298,2025-02-06T16:15:29.680000 +CVE-2021-40507,0,0,8a1f224a8813c1bd55ffc75129bd23ba084e8991050fd5d27021ec37af87aef0,2025-02-06T16:15:29.867000 CVE-2021-40509,0,0,36cbcc26fc05447233e12416c8dd99751b9f80756c715fe18ea5c9ea8089c391,2024-11-21T06:24:17.347000 CVE-2021-40510,0,0,db0ad4c12f424ccec452eda53dd4565e05a5c4224ca26038c77c9db0ade51159,2024-11-21T06:24:17.517000 CVE-2021-40511,0,0,bb12377fbae176df04e4f8fb260f9afc89656e5a5d25d4c7d88154157c2f5900,2024-11-21T06:24:17.693000 @@ -183537,9 +183537,9 @@ CVE-2021-41609,0,0,83278bb1bfb181cadbc406817aea7b9ca2abbffd3faa80884299aa00b7e13 CVE-2021-4161,0,0,330cce1d183695fbd38111b6ca9460022c51ce4f359aa65bd579fd4365c44bbc,2024-11-21T06:37:02.533000 CVE-2021-41610,0,0,4383295040357b63b77992dd7785cc62b9b95f8d58dd93cdf697d7c53800b4d5,2023-11-07T03:38:59.180000 CVE-2021-41611,0,0,20e788a9978d5b42bdfb0e861d8a64ecb13ed6a78d656dfa0583ed713b47f4c8,2024-11-21T06:26:31.043000 -CVE-2021-41612,0,1,ec4512d7e1eb070ebbb7c50ac4104db7c77bf599d5ee26d0cce1e928eee5bff5,2025-02-06T15:15:08.910000 +CVE-2021-41612,0,0,ec4512d7e1eb070ebbb7c50ac4104db7c77bf599d5ee26d0cce1e928eee5bff5,2025-02-06T15:15:08.910000 CVE-2021-41613,0,0,329e05f88883ce5f1070b19d60f9b86e6353c32b42526be07c5c943b50cba168,2024-11-21T06:26:31.397000 -CVE-2021-41614,0,1,c10e24c6ecf57f28c0f86386ef18cf31fe6fa33cdc6e2d53899997cac45a7f83,2025-02-06T15:15:10.313000 +CVE-2021-41614,0,0,c10e24c6ecf57f28c0f86386ef18cf31fe6fa33cdc6e2d53899997cac45a7f83,2025-02-06T15:15:10.313000 CVE-2021-41615,0,0,7c87671866aa995cddeac7c3e59b2984fedac1b9c57107390543115e22bed63f,2024-11-21T06:26:31.737000 CVE-2021-41616,0,0,dd054e38761d9b6ac5dcb4c40cda981ba61676d60f3780bef226a2571a607a44,2024-11-21T06:26:31.947000 CVE-2021-41617,0,0,fc7ddacedb3424113c674856ba2378cc67ea6f8093c7a2ef4607ec9176c7c00e,2024-11-21T06:26:32.077000 @@ -184910,7 +184910,7 @@ CVE-2021-43609,0,0,3b839f5f82ab07a9c85bf2a89410b7ed0a0b83599601accdd1d54f63a308d CVE-2021-4361,0,0,5bb47dc23c027f92f4f86598f8636d7ec69c0319f5e876bf381acdd0e521431d,2024-11-21T06:37:30.383000 CVE-2021-43610,0,0,56d0bc774733f74d051018f914e23da89771ca42b5e517ecc04fcfb4308e208d,2024-11-21T06:29:30.567000 CVE-2021-43611,0,0,59b3fe38312779590950d02c884a52ae2e1513d066af23eb79b2ed5cd82d8597,2024-11-21T06:29:30.727000 -CVE-2021-43612,0,1,2fb38bda2c0c96eda9c462bbb57378fc72d72288f4fd7816905f87ec21d7bc87,2025-02-06T16:15:30.073000 +CVE-2021-43612,0,0,2fb38bda2c0c96eda9c462bbb57378fc72d72288f4fd7816905f87ec21d7bc87,2025-02-06T16:15:30.073000 CVE-2021-43615,0,0,98c34536408b22bf3d01d8b01fc89e23392fb1ce199fc40e59fbf30209921839,2024-11-21T06:29:31.067000 CVE-2021-43616,0,0,d4bf5ba58c4a24c8b83f4107fe0487c31789a1baf5c8281ab2e6d325d23b77ca,2024-11-21T06:29:31.227000 CVE-2021-43617,0,0,6a5d778ce7edb9217a380b04fd41b641b380d340d9e38cdf71cbb8fdce343185,2024-11-21T06:29:31.413000 @@ -186091,7 +186091,7 @@ CVE-2021-45460,0,0,e6101a49f6adff2d4c138fb5e601a82329162764e45fb52f460a0f6efbe8a CVE-2021-45461,0,0,415865d5ac93183b411eea7659ab724b94a6c0ac0faada3b9c1fab6a224bd90d,2024-11-21T06:32:15.343000 CVE-2021-45462,0,0,21ed3bb44a7015887829bd8e73bb3679757494b8a76ae7b20ed9de23133510cd,2024-11-21T06:32:15.493000 CVE-2021-45463,0,0,8c3a102024f12e1909a6e784f0a5877051dab0e511f67a9870c9ce3d352e9f46,2024-11-21T06:32:15.640000 -CVE-2021-45464,0,1,e4a85c370f201a7acf7535c7d79947897dfd28f4c403a49f13bec6bdf4445532,2025-02-06T16:15:30.290000 +CVE-2021-45464,0,0,e4a85c370f201a7acf7535c7d79947897dfd28f4c403a49f13bec6bdf4445532,2025-02-06T16:15:30.290000 CVE-2021-45465,0,0,718c75837789da82b4a97b305c606fdd50b97fa839b06ef0b555d5b0f5dd0980,2024-11-21T06:32:15.943000 CVE-2021-45466,0,0,b44fc3786fd175957ffd41394409f06196f97e0ba042a3455357fa06a901a54d,2024-11-21T06:32:16.050000 CVE-2021-45467,0,0,dd4cbdef9a4a732adaa390c4738d7001484b8410838a320eaafe48bc5d8bdccc,2024-11-21T06:32:16.193000 @@ -193315,7 +193315,7 @@ CVE-2022-23744,0,0,a2ebd65c39528abca9283ad46d8bfd6d49ae5c18a6bf025a4f562f424489d CVE-2022-23745,0,0,453ea33812425fe4b8f24565e26d1911a52b7d4f61e5e4da7cd895e3d55225e1,2024-11-21T06:49:13.593000 CVE-2022-23746,0,0,9eeee461b71877b53dcf609958a8cd6693503b71bf2647c3cd27aeced1d79c82,2024-11-21T06:49:13.710000 CVE-2022-23747,0,0,a0881c90aac8272e7d82e497d0d70466fe33c6cea5dcab3d5fb6d0f61cf3e774,2024-11-21T06:49:13.857000 -CVE-2022-23748,0,0,42481f644b1cad9b1c1ff2801ec2ccb4f446c7fc1d993dbc047613cc36d44692,2024-11-21T06:49:13.987000 +CVE-2022-23748,0,1,bad2be436893f57aa88e0b2cba1852add794a5eb04413e2ff12e7646005131f6,2025-02-06T18:15:27.907000 CVE-2022-2375,0,0,b665472ccd967b72e1975f37ea8ece177bf82a1796072289556fd815fa9e1b0d,2024-11-21T07:00:51.963000 CVE-2022-2376,0,0,ece3c8817f2a82834b32413cc7752c817d9b7275acbbea68d1a7ef331ddcb993,2024-11-21T07:00:52.090000 CVE-2022-23763,0,0,45d17b1c5381e6566f7a096605ebc994ef6630964c0d3db8b34cf1369e76219e,2024-11-21T06:49:14.107000 @@ -194634,7 +194634,7 @@ CVE-2022-25246,0,0,f1a4a1c4d518273c22d805a4a3e12a2bc30163c91dbd1b922a223d37f8506 CVE-2022-25247,0,0,7f00f9b34c669c90f2b2edd61b8cd52d796b0fbd3a4423c32da5be25ec3b51d9,2024-11-21T06:51:52.500000 CVE-2022-25248,0,0,fc7cefb66b2fcc4322b5c433b3f5576c05b15e6f370ec3a66b4719dbaed3a0dd,2024-11-21T06:51:52.620000 CVE-2022-25249,0,0,0090213b83fa1812563ceb7bc86b1cc21465cc9338c22f8e002718c87d0896d7,2024-11-21T06:51:52.740000 -CVE-2022-2525,0,1,422356a3c2c7bed5e8752aded830428afe83482b9f4c059db1432142417bc8f6,2025-02-06T16:15:30.503000 +CVE-2022-2525,0,0,422356a3c2c7bed5e8752aded830428afe83482b9f4c059db1432142417bc8f6,2025-02-06T16:15:30.503000 CVE-2022-25250,0,0,ab91357b9d21f9399123794d5151182c9eada9a33ca99b353ff63e9c295cf822,2024-11-21T06:51:52.850000 CVE-2022-25251,0,0,bcbf23a0929972c38ef5ddf17709579c727904109d3c3bc952f3f83458268a9b,2024-11-21T06:51:52.963000 CVE-2022-25252,0,0,e81c0a676cf727f3eae7177955b32f09f99d2cf69aff3a7177a8e087d5159762,2024-11-21T06:51:53.083000 @@ -199996,7 +199996,7 @@ CVE-2022-31760,0,0,5c4a45123a4b9c8de5f1065df7d5ca3224e6479c10f99f0df19090440949e CVE-2022-31761,0,0,95e0181cfe82712600a912100baef04f4706de88030235b976f6fa84ce1100f0,2024-11-21T07:05:15.337000 CVE-2022-31762,0,0,bb6b22df7ef4fc53f49e054a15ce44c4fbc0012358e73c25e15dd603edf6e274,2024-11-21T07:05:15.463000 CVE-2022-31763,0,0,b43c22e16cee7f4d119cb5b8d655d9db9798a7b49f2bef758258ceb1c42c43c2,2024-11-21T07:05:15.613000 -CVE-2022-31764,1,1,09c2f5e1424e7a0766da51e1919d668865ac2744a609ca515dfba9dbd59aa2d1,2025-02-06T15:15:10.610000 +CVE-2022-31764,0,1,d44e93399fe621098440ed2ae98f29a646725cbb61505d45e5aff35bd0b0d59b,2025-02-06T17:15:13.030000 CVE-2022-31765,0,0,586417082fbde887bf1c9b1db7e79c13de1278309904ca5f31a0432f3684915a,2024-11-21T07:05:15.753000 CVE-2022-31766,0,0,cde50064d777ad363e132410e35440d6774e62e73df22e736e147e3629cd7229,2024-11-21T07:05:16.210000 CVE-2022-31767,0,0,b7ea3f47b3ba866b5369e56abd48c9381c68e37bfa533cc503ceda935346da2c,2024-11-21T07:05:16.410000 @@ -204454,7 +204454,7 @@ CVE-2022-37302,0,0,128628f6964167dc4fc058b493e30b72263b3e308582b0cadd6bc2d4888f1 CVE-2022-37303,0,0,394a1138eb8cd4597e63c32292d5a91afd61907453ed5f5373f376f45db8cf22,2023-11-07T03:49:45.503000 CVE-2022-37304,0,0,1aeb7ab2f32a8cce00783bda87e1cbc232d17f8628242843c3274f43439c8ad8,2023-11-07T03:49:45.793000 CVE-2022-37305,0,0,9cfa40f430b959845ff73051089acaa256b6769898037a9d2a19661e2e8bed82,2024-11-21T07:14:43.080000 -CVE-2022-37306,0,0,20c20d177692fc74e44600f4217ac1470f2eb3d4a21d8f5456c656f9bd6e5212,2024-11-21T07:14:43.250000 +CVE-2022-37306,0,1,5893daaad7baca32dc7bd81e97fcd602dd52f0d1a8ea7bfc765d6c47902f95ee,2025-02-06T18:15:29.597000 CVE-2022-37307,0,0,65c4f06a1b68ef83151bd639dd168391bf3ff662764488664598d4773f19924d,2024-11-21T07:14:43.430000 CVE-2022-37308,0,0,52c5cfd626263d8055234a1e156afe0004db2e9456196a323c018912ee84e101,2024-11-21T07:14:43.603000 CVE-2022-37309,0,0,66cbbc842075d57bb070bd4670fdebc39bbe16faf87280b30e4e934a6e4bdff5,2024-11-21T07:14:43.780000 @@ -204649,7 +204649,7 @@ CVE-2022-3769,0,0,c4bf34e87f9ae2f42ed28397fd098e05c35c9f6843e9690bca79f799658840 CVE-2022-3770,0,0,056267d0dbc6d7110f2e71c1310d09e5ea740c482729425241ad1b06c3d3f156,2024-11-21T07:20:12.817000 CVE-2022-37700,0,0,f7b01506e331ff7bf29f91a017c4d6fb8e7444b7a067afb9e3bedcd9b55e6819,2024-11-21T07:15:04.807000 CVE-2022-37703,0,0,0bb1464f62e9d2b8293baf8a4f430c80898e274bb42ad3de2913a88b18041405,2024-11-21T07:15:04.973000 -CVE-2022-37704,0,0,04ebf8f09f1cf7308831a0d976c50b828b59959239fc53ef79263fb699ac30b1,2024-11-21T07:15:05.153000 +CVE-2022-37704,0,1,689df3140e86238bf4f6ce643be66f5fc522da4b2ed6dc5314b9fabfddd2c427,2025-02-06T18:15:29.863000 CVE-2022-37705,0,0,acd16612787f02d3f718d6d198087d88cd907ba03869599bcfc17e8b377ea3e0,2024-11-21T07:15:05.343000 CVE-2022-37706,0,0,fc078f45bb273fd3707bb7ddee90095b1068d19a6102858911d8dd8ad25410dc,2024-11-21T07:15:05.530000 CVE-2022-37708,0,0,8666c4b20e83578726c025b6fad489dc2c7e927d0fa6b0e109a75e90ff1e9cb6,2023-11-07T03:49:53.170000 @@ -205558,8 +205558,8 @@ CVE-2022-38831,0,0,59cee82c4f11ec45fb3cb4b5703165866b5ec6afbfcbae1d6e6b31e591987 CVE-2022-38832,0,0,84a2ed039ade8a00b6e1d04c8a1044a2ceec615671f1c5c09fe034fc24cf6dd8,2024-11-21T07:17:09.090000 CVE-2022-38833,0,0,7061cebc50e54b5fe48ef32e80692d61caeb6fae8a2210f366f4c3612264b296,2024-11-21T07:17:09.247000 CVE-2022-3884,0,0,279904a643aacef394203a88373c8c58b5d5c828f08daf4927949f83c701072f,2024-11-21T07:20:26.113000 -CVE-2022-38840,0,0,92fe2c655d1a6ebad76b6f061f1e89d0b72242c94415e4c7538f5b08ed1afa00,2024-11-21T07:17:09.397000 -CVE-2022-38841,0,0,0f5725ffc6b63afd74289bef742a52a2e280b8c1901fd76e7f681c0a68730aa9,2024-11-21T07:17:09.550000 +CVE-2022-38840,0,1,10a74b1480e693fcd2a0c7fe2335e6d74894b4e003b098a88cb48ffa7320f58c,2025-02-06T17:15:13.210000 +CVE-2022-38841,0,1,0b47108f0d719e63f22c98c774738d95a58c73ffb91c56c60cbf5dfc75ee51a8,2025-02-06T17:15:13.410000 CVE-2022-38843,0,0,917e3ed33f4c4f1225f3a3036951f64e18b9081054a14281bdb9f2d5335e202c,2024-11-21T07:17:09.703000 CVE-2022-38844,0,0,54a32aca4b899436d96e2012002b94ef53dd9c233a0228d7e7f6f962ae2b491d,2024-11-21T07:17:09.857000 CVE-2022-38845,0,0,403e4ad2f256cfe30388293eec202458d32e8871557ff7eb065a5a8ec5c24396,2024-11-21T07:17:10 @@ -206677,6 +206677,7 @@ CVE-2022-40487,0,0,3e3d775e7a40491c3fd4d116c3ae8f05738f2c0d5feb06cb1e31e35f3f01d CVE-2022-40488,0,0,3a8a60e130cf17ecdc391d08fa8819ea901ca1525bde3b2f0bba2c689d09f151,2024-11-21T07:21:27.667000 CVE-2022-40489,0,0,e743d656669d32e037781e2d73364c483b588e68b764611e48cdeec3098fcd14,2024-11-21T07:21:27.823000 CVE-2022-4049,0,0,f0a411220edc73602e7bcd0290ef45b973b7200946950e80279abfcb153b81f2,2024-11-21T07:34:30.693000 +CVE-2022-40490,1,1,1248f71647fa59a3a895fd4dc8fb8c7cd8650ddb56da537b3df8a64f7090500a,2025-02-06T17:15:13.640000 CVE-2022-40494,0,0,bc574e1a4388e8f99a5ee1ca01ffcadbe85a17cbcf626930aed7366ddb80107e,2024-11-21T07:21:27.980000 CVE-2022-40497,0,0,718b25a3e9ff61f82c28c3226d1972f3ae3dd1d71111e6da5c3dcfb3038a8996,2024-11-21T07:21:28.137000 CVE-2022-4050,0,0,8bef661e08e4a418d1cdaf389dc8b12f38ea24cd284f0e02a2d862de17600bc9,2024-11-21T07:34:30.787000 @@ -207041,6 +207042,7 @@ CVE-2022-4090,0,0,6635dd16c911029122ada3aff58c2fdd886219dfb991b1c32f2b95fbe86b07 CVE-2022-40903,0,0,5a716fd283dc9ccc412b02ef5152b5affed451b884f2914c51ac6763bac5d7d4,2024-11-21T07:22:14.360000 CVE-2022-4091,0,0,810b813da55e40407b6a58ab6089f3d2217d2e74b11372cc5db7ba4f20adfd85,2024-11-21T07:34:34.003000 CVE-2022-40912,0,0,a3b9d253bf559fe5033adde53eb07b854e38f5ca4ca171bd0d4dff541694c281,2024-11-21T07:22:14.523000 +CVE-2022-40916,1,1,51c6ced3ed0f18e0d749d62b6dafd34aa3ffd0f9c31699d25b25c0b2f96fb11b,2025-02-06T17:15:13.757000 CVE-2022-40918,0,0,ada396d447a951b504689c3c6990d1b9529706bbbe7276067fca761169edd11b,2024-11-21T07:22:14.673000 CVE-2022-4092,0,0,1e9eb5c32102b73261130bb8f9fa4983c35ade5e48c301fa2e08178f4fbe1a4a,2024-11-21T07:34:34.127000 CVE-2022-40921,0,0,003a2c3520d6e4ef9557b2d019724c852b0133986327c1cb15e665a48ddf47a9,2024-11-21T07:22:14.830000 @@ -207062,7 +207064,7 @@ CVE-2022-40939,0,0,dba2f259d9a84251c72c01ff475b02b366f73cb4715aae9f4c47641771ba5 CVE-2022-40942,0,0,7b291ca016d3664acfaa687583c918329696f86856aba25a1c0c44b07bb6143a,2024-11-21T07:22:17.040000 CVE-2022-40943,0,0,97f304c0b30a77cbebe24818cabdb898cd4053d8b64255315a8291fb44898fb5,2024-11-21T07:22:17.197000 CVE-2022-40944,0,0,58a4ad43d0d10f01629a367e8a03c70dbdb401591c7e0a5c53db0edc4871deed,2024-11-21T07:22:17.360000 -CVE-2022-40946,0,0,cf7c327b683a5e891390d54e7ada39e93032f311fbd08d320df0b979ae4e55de,2024-11-21T07:22:17.510000 +CVE-2022-40946,0,1,657514247a23d4019514c4be4ea49ed31df545798b64fe3a2569aa4f52653132,2025-02-06T17:15:13.863000 CVE-2022-4095,0,0,1455725e301b8433d4c12c68479ad797be2ad7e06d6cfe40aa08e47e9988947c,2024-11-21T07:34:34.383000 CVE-2022-40954,0,0,764a46138bb7f275703fa4d6701c38674d7256fcaa4284658649cb33f7d75f1e,2024-11-21T07:22:17.677000 CVE-2022-40955,0,0,7e3d3dd62b661fdec6fbf4e3e206895fa44954a434a7406ceade69536df380fb,2024-11-21T07:22:17.800000 @@ -209318,7 +209320,7 @@ CVE-2022-43692,0,0,1a1c8b3939595f5c4d6b33ad14cb150e721d94cbdde1f60dc017eb270c323 CVE-2022-43693,0,0,073cee6eb36a5da549b6a6c378a43855189166233e5f4a93ea84dbcddaf8f62b,2024-11-21T07:27:03.677000 CVE-2022-43694,0,0,6f8fdc2bf1194d6aba7892a5175315c9303d4dfd9ac079545cb8c15aff7cc5c8,2024-11-21T07:27:03.840000 CVE-2022-43695,0,0,293d53e20c59cab27ffb6472a0f3193409c1efc1243a6e9d93a007235f6427a4,2024-11-21T07:27:04.013000 -CVE-2022-43696,0,1,1c9318af86f3e9f799b8c0dc1d01215131459e618231a94eb59c856045ac23eb,2025-02-06T16:15:30.750000 +CVE-2022-43696,0,0,1c9318af86f3e9f799b8c0dc1d01215131459e618231a94eb59c856045ac23eb,2025-02-06T16:15:30.750000 CVE-2022-43697,0,0,eb3e8d9e228f06040151fea161a239c61c3a25c095ae4e5a2d2cec36008483c3,2024-11-21T07:27:04.417000 CVE-2022-43698,0,0,79ef976c373d7153c2390503b60ec1c4fc94088a00ed9bb1974b983fbe4e4b76,2024-11-21T07:27:04.587000 CVE-2022-43699,0,0,2d7b9988e3415299a1d4c25b2157ca96a15a1d017060e5fa42981ef12151c24d,2024-11-21T07:27:04.750000 @@ -209855,16 +209857,16 @@ CVE-2022-44500,0,0,b21789a06c67e872d5d73daab04f115073f5faa5e6ec649e0d7f940af0d83 CVE-2022-44502,0,0,b5562c7b8267cf67bf0ad6ca70179251fa1596a66e437cdd39ac0d59e88570fa,2024-11-21T07:28:05.083000 CVE-2022-4451,0,0,71bd0c76cc1206fc647acf97e23ac3111e5623c6dfa8588b7cd098d39f11a0f8,2024-11-21T07:35:17.343000 CVE-2022-44510,0,0,25c4d0e9515b57632bcb3ae200f1085ef683d9e98b07dbc882d3305076a893b5,2024-11-21T07:28:05.197000 -CVE-2022-44512,0,0,e2ce1520557fdf05177dab6764300b401da32fd201a60483f03567edd383ac5c,2024-12-19T00:15:05.067000 -CVE-2022-44513,0,0,61f821a11526d85662e3fad332d611b01b9c67adb1bc0ffd1ea732a3988e1567,2024-12-19T00:15:05.237000 -CVE-2022-44514,0,0,6cdcf40f3e70e347677baa6b5343f62ce718c4ea18c68ce0cea72bfde4bc2900,2024-12-19T00:15:05.400000 +CVE-2022-44512,0,1,43f4e241cc8b703ceac411c19cd4d7c842322086847b0281c360ef59d25eb6a8,2025-02-06T18:19:26.530000 +CVE-2022-44513,0,1,e3e2f49bfcd0b9b1436ecc66c933735e22e67eb9a4aa92e897c2b432b665c954,2025-02-06T18:19:01.817000 +CVE-2022-44514,0,1,a658d2d09616fd939578b51c7368336af3e7b0a30d7e0448683bc8bb60b51c43,2025-02-06T18:18:56.893000 CVE-2022-44515,0,0,004c68ba228620c9bfa946f96d77bfedf1b633104b1152d1ad38820b1d6acee9,2025-01-10T21:45:05.453000 CVE-2022-44516,0,0,10cf8c6b3af1312eb7f3f4434d8e5f425aba720b7d2420da955195b77b8d3d44,2025-01-10T21:45:25.627000 CVE-2022-44517,0,0,ccc15602d38bddebac18cb5a9d44df501defa8447eae66a93833787eacaf8b98,2025-01-10T21:45:27.867000 -CVE-2022-44518,0,0,e16c391ad832f467273177272089355713fb9256b6e3e48fe183d1773571c121,2024-12-19T00:15:06.037000 -CVE-2022-44519,0,0,96661ab10fbb6a04869a1735b3e8eb9c6821ee0a620109e819b98eb0a55f4458,2024-12-19T00:15:06.200000 +CVE-2022-44518,0,1,3c54c3361891defef02b1aa0736a87e2c252156a704df15c4d4aeb4185b3ba4e,2025-02-06T18:18:48.313000 +CVE-2022-44519,0,1,cc1ada6c39375fd2802c31d59270818d4447227a79131ab7cee4a29dd5843a61,2025-02-06T18:18:40.520000 CVE-2022-4452,0,0,e23ff09cf254521b138d2873c6b347ecad79392d4de44954995ce14268d350c9,2024-11-21T07:35:17.463000 -CVE-2022-44520,0,0,2e415de16a32dea9539db380ba928a1380a1ff0a8c84779037c033363e40e107,2024-12-19T00:15:06.360000 +CVE-2022-44520,0,1,1e4ac3c72f3a3996de3162f75f660d0d6e9cf3bcef69a451dd4906eebe3b68f6,2025-02-06T18:18:29.747000 CVE-2022-4453,0,0,9b00e366e9d0c0ef9c324b7b982b02b3dcac63ebb143aa7afbf887a477161fb4,2024-11-21T07:35:17.583000 CVE-2022-44532,0,0,4207f3e98f5233bb1738bdd6c69782a0cd2348956681f5d35417e00bb16bafe5,2024-11-21T07:28:05.340000 CVE-2022-44533,0,0,35103e589f79c98255b730dc3b424c6479616183eb90f9be40ddec7fdd1d6e6e,2024-11-21T07:28:05.460000 @@ -210027,7 +210029,7 @@ CVE-2022-44720,0,0,2978ccbe30cfbda91896f60a736487ad01b21b513e713e778a2a081311bef CVE-2022-44721,0,0,2e97be297496e44c127508c29458d8f33303250a874d5f326d4cccfed3156c62,2023-11-07T03:54:25.470000 CVE-2022-44724,0,0,a0eaf24c5c29bd813efd4d612a631475cbc4b4deda27fceea2d2c9a15aa2b006,2024-11-21T07:28:22.253000 CVE-2022-44725,0,0,9ea9382380fc7c89b2bf93af5ae18e31451294b8328bfabdb889ffbce68f671b,2024-11-21T07:28:22.413000 -CVE-2022-44726,0,0,30101829f0a5b5f7bf583398763fedcb44a1bed64d80c99bdac2515150364a2f,2024-11-21T07:28:22.557000 +CVE-2022-44726,0,1,5e01558008a2afd6ce8600ada999fc51b78d198aff1100f35245c2514e06c44c,2025-02-06T17:15:14.047000 CVE-2022-44727,0,0,27b3bdc679176b56bc03aafc66aa522c681973495a21c0ece94a079dfb136a34,2024-11-21T07:28:22.710000 CVE-2022-44729,0,0,4719780fbbb3574036caed59238ad5e6115b457fd98b6bdf8991e092b37166c3,2024-11-21T07:28:22.877000 CVE-2022-4473,0,0,58e73416f5237009fea1380d431588d86e1d62533f0239df70f20398613a0bec,2024-11-21T07:35:20.013000 @@ -210171,7 +210173,7 @@ CVE-2022-45026,0,0,9e6ec22705c1f25a17deac599e7c88381c1dbb50e4719e953601f50a0814d CVE-2022-45027,0,0,e40041f5eaf9900425b2e3d12a554b94b5064cd76f9d94bcfae53533d98252fc,2024-11-21T07:28:38.400000 CVE-2022-45028,0,0,a27219d599bba6029f8a5997c2ce56c8f569b9369ecdea45837eba02b309a954,2024-11-21T07:28:38.553000 CVE-2022-4503,0,0,a1d4f0b44c03b0f88ef9ef27b9999b83018fd405199eb7f07b094fc94c2e266b,2024-11-21T07:35:23.577000 -CVE-2022-45030,0,1,3ced0aca532ea345080d9de2a404334c178b6c669d4225d75b21820be03fea6a,2025-02-06T16:15:30.977000 +CVE-2022-45030,0,0,3ced0aca532ea345080d9de2a404334c178b6c669d4225d75b21820be03fea6a,2025-02-06T16:15:30.977000 CVE-2022-45033,0,0,4ace79caded8845ef80e7609c681eab571885f27ef65d193119e945d904fee07,2024-11-21T07:28:38.847000 CVE-2022-45036,0,0,d24f0f27531cae0d2da3d7f80ce20f3e16974338fb22786849098e122b098be0,2024-11-21T07:28:38.987000 CVE-2022-45037,0,0,5477fde00c0a51cc40ae20986209734a288b4573cbd8383ee814f026de3c724e,2024-11-21T07:28:39.130000 @@ -211313,7 +211315,7 @@ CVE-2022-46634,0,0,5c2acfaf5a8880b32060d0f2f28707c8bc80c4e55d6188d0cb7f6bbcdefc3 CVE-2022-46637,0,0,1191764d65684d41fbd9735baa51205bcf79a9d846cd14b9d9f2daf9da979b06,2024-11-21T07:30:50.047000 CVE-2022-46639,0,0,457c58c530c5dfba2774fe3f2588a820c7750c73b8e317320ce36958ccf55a0a,2024-11-21T07:30:50.203000 CVE-2022-4664,0,0,4414b89c6d45eea6b84a7dc938caa670df8723edf42f5c7d388d90c2c712c7e0,2024-11-21T07:35:41.637000 -CVE-2022-46640,0,1,9fc649af2a15fa3f108583090042644006b0cfc1b8d170b884cf415c9bfb5c24,2025-02-06T16:15:31.250000 +CVE-2022-46640,0,0,9fc649af2a15fa3f108583090042644006b0cfc1b8d170b884cf415c9bfb5c24,2025-02-06T16:15:31.250000 CVE-2022-46641,0,0,0acd6ec10c2ba90b5bfef0d0ab335609499f7b39eb8d33f4fdd9e46e723fa9e1,2024-11-21T07:30:50.497000 CVE-2022-46642,0,0,3b944a4c29bf1132e63cc0dd2a0f4efdbee162e6d278263673bacac56e45b55e,2024-11-21T07:30:50.660000 CVE-2022-46645,0,0,40eb5ed6eb67d6522b9cb67a75203c7fd066df7bd4cea40ec9727605e235e9c8,2024-11-21T07:30:50.810000 @@ -211971,7 +211973,7 @@ CVE-2022-47519,0,0,2be1ee56c2c8ca69a0a8b9a97a3f8996f99cca2b43ad8eb8cae72051d5481 CVE-2022-4752,0,0,739378aad2e7b7ed2cd96244c384cef5aa0ba84cc9d69f4717b6faf6ba33927d,2024-11-21T07:35:52.383000 CVE-2022-47520,0,0,a2907eb9ae611539028ea4990ff7a11d5a13fabc0dc3da3f3e38a198ddf2049d,2024-11-21T07:32:08.103000 CVE-2022-47521,0,0,aaf843fad8bdb5c8958ac3f72b5eedeb608ba4f59d22de3066a02680cd0b7c6c,2024-11-21T07:32:08.273000 -CVE-2022-47522,0,1,71017cfd7ed3366e0acbf531e7033d07ae3d23f62d5fc2e414ec0bf513fa8220,2025-02-06T16:15:31.443000 +CVE-2022-47522,0,0,71017cfd7ed3366e0acbf531e7033d07ae3d23f62d5fc2e414ec0bf513fa8220,2025-02-06T16:15:31.443000 CVE-2022-47523,0,0,7ac5edda3bc54db7a3017fa0d8083aa61e73ecc65634f76f5172bd443bbad5c8,2024-11-21T07:32:08.650000 CVE-2022-47524,0,0,b8614559e4a1592166acf963cdd83f391b7b09a2d062221f034d86c8aa5c3d35,2024-11-21T07:32:08.803000 CVE-2022-47525,0,0,1347ad00de62fbd8b20114fce363daee5b5e0a5392255552d1dc8f88a2afa871,2025-01-14T17:15:09.140000 @@ -212278,8 +212280,8 @@ CVE-2022-4817,0,0,f0e15d2c836cdd546ed9d1a4f8bb5eeb7e4b0d94aae1960867b2c42008118c CVE-2022-48174,0,0,ed24bcae7077a6041e46ca4fbfc8590c099d4c58251200e5ceb4edc4cffdc7e0,2025-02-05T18:02:49.267000 CVE-2022-48175,0,0,6fece746388787891a725bedf1d79c50ba2ce6b9971433a3fe9ebe52c7c3defb,2024-11-21T07:32:55.190000 CVE-2022-48176,0,0,f9b97f333ed2e0a9d0a9b017dd2531ea920ca2a943855468d38a69dfb2365385,2024-11-21T07:32:55.340000 -CVE-2022-48177,0,1,95e25759dd088d12027543b96c1c8080df3faec420cf8d676e57941d7d53a75b,2025-02-06T16:15:31.687000 -CVE-2022-48178,0,1,f9c4811078153e3368b6488fb606ed2fcd036e09047751e39faa3fd19db6fb3b,2025-02-06T16:15:31.890000 +CVE-2022-48177,0,0,95e25759dd088d12027543b96c1c8080df3faec420cf8d676e57941d7d53a75b,2025-02-06T16:15:31.687000 +CVE-2022-48178,0,0,f9c4811078153e3368b6488fb606ed2fcd036e09047751e39faa3fd19db6fb3b,2025-02-06T16:15:31.890000 CVE-2022-4818,0,0,8b3c45cd7dbdd501a83bb59b533552d52a9be0650b418b2ad86410c769ef864a,2024-11-21T07:36:00.327000 CVE-2022-48181,0,0,f70e55148fd4de8dc27206db433e82fbca6bacf2648bcff1bd3db6a8345e41d4,2024-11-21T07:32:55.820000 CVE-2022-48182,0,0,7e4702a6bb9408ecf54cc582d3f7dadd0d4bce1d07351993ff9166ad23cb0a80,2024-11-21T07:32:56.147000 @@ -212387,9 +212389,9 @@ CVE-2022-48309,0,0,fa4e4dee6510653e70a2f6a4d8bfba631a754134015722275c8ac9c50fb65 CVE-2022-4831,0,0,f3a096c06597b8e18b75ac644035ee7a465b6ea70b28d2895528d5c3f7fcfd7c,2024-11-21T07:36:01.990000 CVE-2022-48310,0,0,c41b5ca698aa90c6a2c33f8bbebd566bc9f19e0a3c7a93e99d7cfb508fb03e8e,2024-11-21T07:33:08.327000 CVE-2022-48311,0,0,99eb94960d1d92fd799b3d32286c60d09595170e9d761d77ec69c490c43f1c77,2024-11-21T07:33:08.447000 -CVE-2022-48312,0,0,296d1727c9d7c2171489bbdc738923aaebf3ae98cc36f27b3a3bbf9c8f234d1b,2024-11-21T07:33:08.587000 -CVE-2022-48313,0,0,f54f8aeaa905b083411fbde8cc46813ecfaefaa545983469de0222bc07f13c93,2024-11-21T07:33:08.707000 -CVE-2022-48314,0,0,341e68d467c698407e7ae997181f8cf712f2efb61a6b150fab8d563f8f77c3a0,2024-11-21T07:33:08.820000 +CVE-2022-48312,0,1,bec59e47dfb2e4094906ec17562aba4cdf6be4c4ce63944a8d9e3c8d7d7a58d8,2025-02-06T17:15:14.253000 +CVE-2022-48313,0,1,fe9586966c1ecaaeb40ddf7a3e5514f39dc3f74450e5264891e068a90268852f,2025-02-06T17:15:14.450000 +CVE-2022-48314,0,1,1b1df12682c8b2f13fcf1ebcbf7e95e664b833fc8341f50a69c9e95111e5ee19,2025-02-06T17:15:14.643000 CVE-2022-48317,0,0,6cc5d9ed01dd202ead21a0ca5b4046abc8fc403b434aa48870ba404628ada8ce,2024-11-21T07:33:08.940000 CVE-2022-48318,0,0,1ca6e7ea96cbcef96fe0b6a09ab5b59a1b8e7dcb477c03ca7a934646d77b6af3,2024-11-21T07:33:09.080000 CVE-2022-48319,0,0,8fd0acc25ca20d5b783035c6d4267f7fd4d68bee427f5f6719eb8712157fccfd,2024-11-21T07:33:09.233000 @@ -213435,7 +213437,7 @@ CVE-2023-0273,0,0,553ef5fecb4d12fa8908e7c59734b6003c708dafeededc42fea002576f9be6 CVE-2023-0274,0,0,d60ba37cae3df4ead875e1bd4881c3c3e5cab916bb42514b120c67c76ba923b1,2024-11-21T07:36:52.540000 CVE-2023-0275,0,0,26528228f0128eb8424180f73455bee0ef2b1d74dc8f6cc9e2ae6480e47d86ee,2024-11-21T07:36:52.650000 CVE-2023-0276,0,0,c7487a428bcb8bea2b1c668b589a64212adff21c21ab0a4c676cd54cc33a9831,2025-02-04T19:15:26.810000 -CVE-2023-0277,0,1,335310adc962a79f1b2c125aa5618dd097c178e21940b816151475451aa2db5a,2025-02-06T16:15:32.083000 +CVE-2023-0277,0,0,335310adc962a79f1b2c125aa5618dd097c178e21940b816151475451aa2db5a,2025-02-06T16:15:32.083000 CVE-2023-0278,0,0,3a4b2bda32dda84a6dc747ab184d2c67d895ef254cbed08fe2c7b9e223c853e6,2024-11-21T07:36:52.977000 CVE-2023-0279,0,0,551024725818964cc44503fe7f4c9317ea6df7b6af03ca92ead87091a210218e,2024-11-21T07:36:53.070000 CVE-2023-0280,0,0,692d930de0e5724c61f1163dd938405f66a86900dcfdf0110c3ccf4a10473b8e,2025-02-04T21:15:22.160000 @@ -213531,7 +213533,7 @@ CVE-2023-0370,0,0,95ce5a3a45532cb2269c1ad171161c1d386ae478c6effc8d9e6ec0104b9c68 CVE-2023-0371,0,0,399b61b5d12d6fa2fd6237ec1963a8bb821231352b64e295416361b2545aedb3,2024-11-21T07:37:03.980000 CVE-2023-0372,0,0,9605cf8257987f4bfdb63a268f482adb7b387992e0c488953292d1b8f311bcf5,2024-11-21T07:37:04.087000 CVE-2023-0373,0,0,5a5a92f8255847fd3865041d0a10b38ad28f1c8dff9cb08ad63248a7a3d7dcb1,2024-11-21T07:37:04.190000 -CVE-2023-0374,0,0,72a4597387badaa015e4141a750f84f420f54de8ffad9830ca3336d6d5a58960,2024-11-21T07:37:04.293000 +CVE-2023-0374,0,1,633a9a294e814491e1a7ea13315bb20a5e78ff21f82e67f8bbeeaf697f886eca,2025-02-06T17:15:14.833000 CVE-2023-0375,0,0,195d65f9fad90ae6a808974c6d5b12b1f0946ca8a2fc977b0fe46b1dba05b4ce,2024-11-21T07:37:04.400000 CVE-2023-0376,0,0,11e2e11d167ff3062ed2f2d79ae85117d0bc4108e9327c9b271722ebad76c116,2024-11-21T07:37:04.500000 CVE-2023-0377,0,0,9985f7addb4b6395ecb8f44f70b75d5f0a14376de7e9bfa2d4adc8dd24e4447a,2024-11-21T07:37:04.600000 @@ -213902,7 +213904,7 @@ CVE-2023-0760,0,0,67663c19a3664a892a40ec577e2b05f3f1c6cec24969bb50e47e11ea51cf6f CVE-2023-0761,0,0,1c12e966a31ab5fa981f27f6779c348b172a92660c02ef6161d5e68d0643b7a6,2025-01-24T22:15:32.350000 CVE-2023-0762,0,0,b352c77f507f218efecdfba3d0204deb48d60e35cf3d46c52cf2dd283cb2f84e,2025-01-24T21:15:09.020000 CVE-2023-0763,0,0,66b09a9c98c73290507e7116bff86b7079976cc6357472573cf9f15e006e8dde,2025-01-24T21:15:09.187000 -CVE-2023-0764,0,0,f05a654e5a6a1acd678548dc2b3284237ef5ebec9ba59af16b3be9891b30256c,2024-11-21T07:37:46.557000 +CVE-2023-0764,0,1,6e4c895cf7ad68ea0d1265c0e4b02d254b4471ca4792e14cb7c2361669d75843,2025-02-06T17:15:14.993000 CVE-2023-0765,0,0,f61c06c3f34d1e7d896bc0eee0c48f4f1a4d8c814a5af0365f04fa235d17dc70,2024-11-21T07:37:46.657000 CVE-2023-0766,0,0,1092b03cd783a767d141adca44f8d9dacfc07a7a63563c8f7e23edbf7c3d5f50,2025-01-10T21:15:10.640000 CVE-2023-0767,0,0,4cba498c85229bf7a7445bec9379f226db1951ca0ca3224d3dc334d208756617,2024-11-21T07:37:46.880000 @@ -214021,7 +214023,7 @@ CVE-2023-0885,0,0,401306786b1d05e61bd297bdb7fabd8971b4a823db8199164c40b15dc26289 CVE-2023-0886,0,0,28ec2ef8832683c2757bf89732162194df65dc7829054c98eef191d2e9a17e2a,2023-11-07T04:01:47.103000 CVE-2023-0887,0,0,40c09943859ef31f07f94beb9b0e9b6bac8adb3704c20c6a9f4f9c5bcd04b9c6,2024-11-21T07:38:02.077000 CVE-2023-0888,0,0,fafedab3b7be190ad7f74ea49b70d79d3a9003a17b228ca95227190b23915271,2024-11-21T07:38:02.240000 -CVE-2023-0889,0,1,d57e87a5129e6d1c5e033dbada4951fb145b5e3f6e524457003b4fd85a8b3ab3,2025-02-06T16:15:32.280000 +CVE-2023-0889,0,0,d57e87a5129e6d1c5e033dbada4951fb145b5e3f6e524457003b4fd85a8b3ab3,2025-02-06T16:15:32.280000 CVE-2023-0890,0,0,4d73273c012484aaeff7fc81fc8e1772c749a2f9ec3c4dda1bb8002d2ae75174,2024-11-21T07:38:02.493000 CVE-2023-0891,0,0,2517a3cfaf1145900137bff4043c10495e615381f559a2c66ebbcf3cf0de2e7e,2025-01-30T15:15:11.563000 CVE-2023-0892,0,0,7f2a62f61960cc567a0195dae725c6e118c7f51907c4c1e9a55492716231c885,2025-01-24T21:15:09.507000 @@ -214395,7 +214397,7 @@ CVE-2023-1277,0,0,7985e0ce5b99e48ea85b0315b204c2041f9ce2089457063f6006aa228651f2 CVE-2023-1278,0,0,48e34e2af84091278df9f3a104b975f0efecd5a97e95ecc54a2d57ae6d7cb69e,2024-11-21T07:38:48.897000 CVE-2023-1279,0,0,25dc3d912f840bbb4fa42d071ac40279f7ee5b24a12d8d02a5831c90934d1777,2024-11-21T07:38:49.037000 CVE-2023-1281,0,0,4e3011d6650a15e9e4e72749a4483ab4b3e5ea2869a6407232838c8099fdf8cd,2024-11-21T07:38:49.170000 -CVE-2023-1282,0,1,ba0c9b4909d40b9bc2ab2a53a939be36d5f61b9cea537bcb4ea1177b3156ca78,2025-02-06T16:15:32.460000 +CVE-2023-1282,0,0,ba0c9b4909d40b9bc2ab2a53a939be36d5f61b9cea537bcb4ea1177b3156ca78,2025-02-06T16:15:32.460000 CVE-2023-1283,0,0,f6bf186353bd6f5e01552b9c5218952f68f342bcdab687c5b1e59c2965c7fc99,2024-11-21T07:38:49.450000 CVE-2023-1285,0,0,e109ab6576639b89abb44b07500a7c089f9e939b177eadf00e768ff1966cbf0d,2024-11-21T07:38:49.580000 CVE-2023-1286,0,0,354fe8f4523a58bf9e514e8c68a22cd1d72eb8f534d9c330364f2193b7930a67,2024-11-21T07:38:49.723000 @@ -214443,7 +214445,7 @@ CVE-2023-1327,0,0,8888004c214b15dcf53152f63b0da4d4942d8792b6258df09b6421cd30b67d CVE-2023-1328,0,0,6257f4ab3cba69262261c728a4d409d137b249b6455eadfa7867e07928cd0322,2024-11-21T07:38:55.987000 CVE-2023-1329,0,0,b2e4f3215159542e7296a14fbcf5e79cb24a4fa75367f2e3939929920f0d53cb,2024-12-31T20:15:24.907000 CVE-2023-1330,0,0,fb998c6d385739d0cc045d945db5b6cca250d4f0081b84310e4edeed4d48c72a,2024-11-21T07:38:58.333000 -CVE-2023-1331,0,0,78e03712a92eb85e714acdd23c3b5a8b1f4966844b1e53dd85ecedb5cbd7f90e,2024-11-21T07:38:58.457000 +CVE-2023-1331,0,1,36b5c87712eaba3344dc889bc56b8b5bc41125024364b7bd747ba9f6fc579fa0,2025-02-06T17:15:15.157000 CVE-2023-1333,0,0,d4bafa576022a40fef05d50099c0360fe7172c3408ea7356a3dd933190cf0139,2024-11-21T07:38:58.590000 CVE-2023-1334,0,0,0a23b2e499766fa6ce028552a491e4f8fabba83e78938389658beff7b6f52b68,2024-11-21T07:38:58.720000 CVE-2023-1335,0,0,23ae28dc0a08d388432a6e0801498aec8f549d6330a715757df520febe19e687,2024-11-21T07:38:58.827000 @@ -214481,9 +214483,9 @@ CVE-2023-1367,0,0,b1f7854a9017f12979c0ae977f98a52d6d767cb49bbbe065faddc2f005ef66 CVE-2023-1368,0,0,7e273268083c4b30fc9eca246ab68fce50a7a8304cce5e370e13ed64ee739435,2024-11-21T07:39:02.767000 CVE-2023-1369,0,0,d1ce8c77b9888e5df47d2dcad807b6c0260dd2b850245edad6480f9d0bf7ab96,2024-11-21T07:39:02.900000 CVE-2023-1370,0,0,a4713961541b9887cd277d3cbe7363c957356b840218abe29a3dd5eace59bad5,2024-11-21T07:39:03.060000 -CVE-2023-1371,0,1,80383f30be94eb561635e8e0d3517dd3e07d53b3ed8784e59dfa50a9f5a8df22,2025-02-06T16:15:32.667000 +CVE-2023-1371,0,0,80383f30be94eb561635e8e0d3517dd3e07d53b3ed8784e59dfa50a9f5a8df22,2025-02-06T16:15:32.667000 CVE-2023-1372,0,0,9b596b67bceaa91e79c19cb55381c725afe28199038f335e0b651e4df1d405f8,2024-11-21T07:39:03.317000 -CVE-2023-1373,0,0,958bf3f86321dfd103ae090e4163645ab78f61e1177fad69b4ae8e3cca0b817f,2024-11-21T07:39:03.440000 +CVE-2023-1373,0,1,d977687b4a8e6474b0707b5d3c9f009533fa5c5abeb367db969f74d26a34fdee,2025-02-06T17:15:15.317000 CVE-2023-1374,0,0,e3793b7eef1e59c9a912d3bb73f8a774a14306cca3bb0ebffcea6d11009ab1e1,2024-11-21T07:39:03.550000 CVE-2023-1375,0,0,87d7e1e17d29f9114860bb7bb1c0750b49458d2482107cebd84fab96bd545242,2024-11-21T07:39:03.710000 CVE-2023-1377,0,0,82b36f32ab09f66addf6f9c0f88467da7ae411b2abfbb23f1572923beb1be960,2024-11-21T07:39:03.840000 @@ -214533,7 +214535,7 @@ CVE-2023-1421,0,0,6fdfeffdfb9d07c731faeae7bc98a5498d22bf5dbe52a625d47e5bc4b1da6b CVE-2023-1424,0,0,a71e302d45ea4b4076c352c6c771e590799dc51d197774dd6269cd413640fbe3,2024-11-21T07:39:09.593000 CVE-2023-1425,0,0,0be9f89261cffc67c042428504d2c5dc11a818c4acdcb5e11253551a214b2167,2024-11-21T07:39:09.797000 CVE-2023-1426,0,0,3ff08977f8f465a25e41548005e89a5d29ffc1943b9dd47d42bbaad0082460c4,2024-11-21T07:39:09.920000 -CVE-2023-1427,0,1,c6cfc1c93aaae6fed3dd352a23e6636d9dd90010ae2a71eae52456e839459a08,2025-02-06T16:15:32.867000 +CVE-2023-1427,0,0,c6cfc1c93aaae6fed3dd352a23e6636d9dd90010ae2a71eae52456e839459a08,2025-02-06T16:15:32.867000 CVE-2023-1428,0,0,c11cd4e847d62700c0c0eccbf72e1cc399746f98e0cb6088e6bde7f58f1c6100,2024-11-21T07:39:10.133000 CVE-2023-1429,0,0,d0f8f92e4beaa9fd754e929005e2df8acf011bde4b5b5e6e2a3d216b6f109f37,2024-11-21T07:39:10.273000 CVE-2023-1430,0,0,104755db4275942383c66b0ec9fe08157a8c3ac5a8dfd0f691a56fb2824e0659,2024-11-21T07:39:10.400000 @@ -214577,7 +214579,7 @@ CVE-2023-1469,0,0,604afc5800d1993cece033e099e7241d470f50e51c1ca1b4b9e8667abf7a96 CVE-2023-1470,0,0,bb5e3928524fc6c0d0c8b17ac556ba874e3a351ed01ab34a5e200c10c184859a,2024-11-21T07:39:15.343000 CVE-2023-1471,0,0,7a41366c7888b39badfdbf227ce7a19c32b6b2ec96f7983bbc5d3137ff4059cc,2024-11-21T07:39:15.463000 CVE-2023-1472,0,0,858755a6ba578de73191cf70013ba7298c5fc6e0cd08b75a96d4401ef4c0024b,2024-11-21T07:39:15.570000 -CVE-2023-1473,0,1,0611acf8bf684b83fb190d84d1cff1ffe9d06edd201f56033332ba0429d59e2c,2025-02-06T16:15:33.033000 +CVE-2023-1473,0,0,0611acf8bf684b83fb190d84d1cff1ffe9d06edd201f56033332ba0429d59e2c,2025-02-06T16:15:33.033000 CVE-2023-1474,0,0,be88ae59ca786c41ea216a68d703ad1bd74cfc0536065bfc6654e0832730196c,2024-11-21T07:39:15.783000 CVE-2023-1475,0,0,881d09c938585a8f27c3d35edbea9db76ccf3ed100bacdb91ddd352a5bcbcd64,2024-11-21T07:39:15.903000 CVE-2023-1476,0,0,905cf5c31752a6483dc1075939e2d550bc65cae2b4b31e1b32370025d80b1a29,2024-11-21T07:39:16.030000 @@ -214989,7 +214991,7 @@ CVE-2023-1903,0,0,efc0da96e9efec639f57af0da1386824a9dd54cff194afba825592fcb11607 CVE-2023-1904,0,0,ffbb7dc031b91f22a73be42c7f56c7040dc466cc7cc9e04b2035e3635dd9de4c,2024-11-21T07:40:06.983000 CVE-2023-1905,0,0,23f2bcdee982874bbc6c47762707a68d9ec27e1fa3c212948aea5b42173b7325,2025-01-29T16:15:32.253000 CVE-2023-1906,0,0,2474c3121c418f8f1b9c7898365edb5f0f5ff817f30d9fbbb045c48845873f42,2024-11-21T07:40:07.200000 -CVE-2023-1907,0,1,59bd4f603358bb6534870ee383cea7156f98d3eea419f95af85cb32d88b597fb,2025-02-06T16:15:33.273000 +CVE-2023-1907,0,0,59bd4f603358bb6534870ee383cea7156f98d3eea419f95af85cb32d88b597fb,2025-02-06T16:15:33.273000 CVE-2023-1908,0,0,a7f3750c6e61e1597fb00574a671512440b074bfd7d382966345f4da285e0184,2024-11-21T07:40:07.320000 CVE-2023-1909,0,0,e49817fc9d0a21e868f8dcf99cb6ba1f1e8637a8a1ac71c8aea4dcba2d56a97b,2024-11-21T07:40:07.440000 CVE-2023-1910,0,0,37c041e704ac5ae2514337a89fa66ad555ee848903b68628fbb411ed56a08fa9,2024-11-25T16:47:33.943000 @@ -215795,7 +215797,7 @@ CVE-2023-20936,0,0,2037bd6592bb5858dba1d1ca05097dd7929f33df21c10e6fa9e1ceab0434e CVE-2023-20937,0,0,2b81949f4444dac96cde0de93b893d0dadccda3a7b3fd6accc661076e77ed97e,2024-11-21T07:41:51.240000 CVE-2023-20938,0,0,0c060ab4497f983758eb135dbec1e893650aa9447bbef6295395a4df2b2e25e7,2024-11-21T07:41:51.350000 CVE-2023-20939,0,0,3076338841d298f689d325c9a6099a8d4b5c1cb8dc8e006a0bff518a3467cef0,2024-11-21T07:41:51.537000 -CVE-2023-2094,0,1,ec7b09758b069a42259fc60cb8a1f753771441a156f1a26d3259fe8a3881af95,2025-02-06T16:15:35.797000 +CVE-2023-2094,0,0,ec7b09758b069a42259fc60cb8a1f753771441a156f1a26d3259fe8a3881af95,2025-02-06T16:15:35.797000 CVE-2023-20940,0,0,5046dae41420beeab9b321cecb8a9e01e767efbe46228ec3f77af0bca63b21e6,2024-11-21T07:41:51.640000 CVE-2023-20941,0,0,bab5d6aed87423774a95f34d1f03c54254353edf473cbd35b625caaf035c84e3,2025-02-05T19:15:11.813000 CVE-2023-20942,0,0,ec35b0995b2bba7a2a3f009a0549215e917ce993687c5266b3147d1fdd809fbf,2024-11-21T07:41:51.863000 @@ -215881,7 +215883,7 @@ CVE-2023-21016,0,0,458548724cc71cfad5285ef3922c28e822361bef89d73e7163793c200bb4a CVE-2023-21017,0,0,76b475727b02d7f06ae44a793e4f20c233e0866f4995965de228dd2867dcdeb8,2024-11-21T07:42:00.543000 CVE-2023-21018,0,0,896cce17934660c28fa90e7f4e5fde23337320157d5aae42031e9ce7f12778c6,2024-11-21T07:42:00.647000 CVE-2023-21019,0,0,723e07444d01b356418ce9c33f37700b504bc432003c95b3f75015926ddf8ca2,2024-11-21T07:42:00.757000 -CVE-2023-2102,0,1,1f30776bd7546109d3fea589110ed243a709b5e1f7f74a918b4d566f83ca9c4d,2025-02-06T16:15:36.037000 +CVE-2023-2102,0,0,1f30776bd7546109d3fea589110ed243a709b5e1f7f74a918b4d566f83ca9c4d,2025-02-06T16:15:36.037000 CVE-2023-21020,0,0,c23bc0d961e86c839ca649153d3f28b0026be750b4c14bb48c189d94bbd42c71,2024-11-21T07:42:00.867000 CVE-2023-21021,0,0,d55dab5bb1ffd1ff4d3fe3d1856e21c43ecda1745938d739327dc3ccc73c46ac,2024-11-21T07:42:00.983000 CVE-2023-21022,0,0,b2c4db6e8f7e7007a62213bbe182c6f5082d5aed93d43b9c0a7e30c698b58e1a,2024-11-21T07:42:01.107000 @@ -215891,7 +215893,7 @@ CVE-2023-21026,0,0,a921a4cf972c5f39c453f72a2dca5c6adfcbb90e53ca9099847dfd8d95ad4 CVE-2023-21027,0,0,8e06f01b70cd008ccb44db4595bd019903b739bbf2c2c9c495acb8e7fe041a39,2024-11-21T07:42:01.593000 CVE-2023-21028,0,0,c46d7b607b0f42a0f9729b3d098979ced5f8220168b205ed5f1ec66f233850e9,2024-11-21T07:42:01.710000 CVE-2023-21029,0,0,2d8edfc76d656d75d990b07465754b760b6f3f77ed2ccb507227656b11bb59e4,2024-11-21T07:42:01.830000 -CVE-2023-2103,0,1,5189d60c18361c2e29170e6531cded54fbd619a072ede97f7096612034b8d32f,2025-02-06T16:15:36.240000 +CVE-2023-2103,0,0,5189d60c18361c2e29170e6531cded54fbd619a072ede97f7096612034b8d32f,2025-02-06T16:15:36.240000 CVE-2023-21030,0,0,86e24573edc30fe60431c68abbb4e2884146762695fcc68c3f1647b77e9de8a1,2024-11-21T07:42:01.950000 CVE-2023-21031,0,0,2fce8cbe442969116d4da7a5e9c47b70ede5acb6f63d7b57dabf548c1bc4c954,2024-11-21T07:42:02.060000 CVE-2023-21032,0,0,4e80f7f9715865602476e09be1f6ab28e10cbedaf3504e6bc8d5c064ac8ed35f,2024-11-21T07:42:02.163000 @@ -215901,7 +215903,7 @@ CVE-2023-21035,0,0,b8f842a49c4edb250cd2333a62427bd1d6c991d301ca7b5042151e8932340 CVE-2023-21036,0,0,efde2b177ad711c19c800041835e0ab96880be9d141d21e8bef2effc7548da17,2024-11-21T07:42:02.600000 CVE-2023-21038,0,0,7e3cf42a8edf41b2b65238e6fd20503c0ce9f47765551e47733f3dc93e46b822,2024-11-21T07:42:02.717000 CVE-2023-21039,0,0,1185ca4076368669e65c3efaf3cedb3010383303ea0e6c0f60a4831e18482bd2,2024-11-21T07:42:02.840000 -CVE-2023-2104,0,1,71ee214903651f12d0d4ab0c8f6fef0fec91965d67af19318c07c2f1f0bd5987,2025-02-06T16:15:36.440000 +CVE-2023-2104,0,0,71ee214903651f12d0d4ab0c8f6fef0fec91965d67af19318c07c2f1f0bd5987,2025-02-06T16:15:36.440000 CVE-2023-21040,0,0,c774c5983f36a821f7c5e24674b2f104bfce612ef836674ee849ac3705d7a4ab,2024-11-21T07:42:02.957000 CVE-2023-21041,0,0,6a99a6b0541876b22115214a822814538877e83cbef9875bd54521daf0d2d9cb,2024-11-21T07:42:03.070000 CVE-2023-21042,0,0,a1d16f9bb55d0a0822ecb18a281dbb1c954073d80d3cf1b8d0e65ef954dae5ea,2024-11-21T07:42:03.193000 @@ -215912,7 +215914,7 @@ CVE-2023-21046,0,0,157a9520e5ae8a81ac1e742275b614c5004e15922aec14a449810537f3053 CVE-2023-21047,0,0,0d53e1c7ea17634b7f5bf62aa1faeea80360d32f663c513e9bbb9ff9e722ec18,2024-11-21T07:42:03.770000 CVE-2023-21048,0,0,6eeae311c884bda35e7413de1723b0378d2d91f4bb8846497781364b6654419b,2024-11-21T07:42:03.887000 CVE-2023-21049,0,0,e821897a8ac28c61574c777dee77aee88855b43f471aa71e90c2c8c9bb707867,2024-11-21T07:42:03.993000 -CVE-2023-2105,0,1,2848f7b619a121a5ab92af5f52396afe377fb724ffc0f538c3a9b15300394fc5,2025-02-06T16:15:36.640000 +CVE-2023-2105,0,0,2848f7b619a121a5ab92af5f52396afe377fb724ffc0f538c3a9b15300394fc5,2025-02-06T16:15:36.640000 CVE-2023-21050,0,0,578345af2d20efc5901d4fc830bcf4f1945c560e6917ab3a7137908c5af56171,2024-11-21T07:42:04.103000 CVE-2023-21051,0,0,71657b64f2fe83073a3ac791e0bae23fd51ae1def956bd1d172e81f37688c054,2024-11-21T07:42:04.220000 CVE-2023-21052,0,0,fefb9e85ccee9c7594458dfcbf682ac1c6fdf13e9b0a5ee433c9e10d07db3248,2024-11-21T07:42:04.343000 @@ -215923,7 +215925,7 @@ CVE-2023-21056,0,0,f42d68269631f0c92ee9327d7a0bbc00f39af3c5a5566ae4489c92a1b3f9d CVE-2023-21057,0,0,43e0f701300c86ecae7bff73c6e02bd1d5ec684e47aceef9ca69b5f54597fa88,2024-11-21T07:42:04.917000 CVE-2023-21058,0,0,64330bb9c4249333ce6f10ddaa280396ef4bb32482959b6db5e7e9f6f3b63b84,2024-11-21T07:42:05.027000 CVE-2023-21059,0,0,70972c21ff5031e5a8812f2b89330f3bb3733e080c457204297376dcabb2f5e1,2024-11-21T07:42:05.127000 -CVE-2023-2106,0,1,54915b7d25a40346ce2e235b5fe9b0fa20a7ab6d3baae2189ffdb54ce7556511,2025-02-06T16:15:36.850000 +CVE-2023-2106,0,0,54915b7d25a40346ce2e235b5fe9b0fa20a7ab6d3baae2189ffdb54ce7556511,2025-02-06T16:15:36.850000 CVE-2023-21060,0,0,ed6a1ed343bc5908d4275aafe515b039b63037861daff961d4fd11deac6d0845,2024-11-21T07:42:05.240000 CVE-2023-21061,0,0,e0606e33da15ce1130782a6e53259d5a1f547ffea17378748f6734fc784e307d,2024-11-21T07:42:05.357000 CVE-2023-21062,0,0,5e5b5d7600fd0d3dd7a9942040f4966711abc6b36e9bb29aa93767415087a9fc,2024-11-21T07:42:05.473000 @@ -216460,7 +216462,7 @@ CVE-2023-21582,0,0,4f5bb933cd17a5c1613aa364a41ce8982934e8b8f3eae19a30c441e8cd6b7 CVE-2023-21583,0,0,da3e056f56ad63f7eae14f2e8d9ffa08b78397274979a093ffb37a9e5e3ee287,2024-11-21T07:43:07.860000 CVE-2023-21584,0,0,9b4764fbfdd2b085572e653159d7e41bc33dae3d1026fdf2ef7488386e1ab612,2024-11-21T07:43:07.970000 CVE-2023-21585,0,0,cff3f3c1e359f7c3a70fbba0253fdce9609b428d2fe451cc230c57a04c06c5d6,2024-11-21T07:43:08.090000 -CVE-2023-21586,0,0,fb072646023820e1b4a998f7c244a5fc75e7f227158fc2eb3f7c7d9ee5d02395,2024-12-19T00:15:06.530000 +CVE-2023-21586,0,1,8591935372eb9510e7b478c6bd5aec97c918c26fdfa462ce4db40e192b8a4640,2025-02-06T18:16:08.080000 CVE-2023-21587,0,0,529caf054840ca5e36185792609bc9be0ffc5215314f723e5c9028d34abee64c,2024-11-21T07:43:08.223000 CVE-2023-21588,0,0,baff138c9f76bdbd381c2c168eebd52f4b047936191139a0418408fd3b806d62,2024-11-21T07:43:08.360000 CVE-2023-21589,0,0,4b9a8c28267032bdbbeeb191175e5f1bfdffcc52264c17cc8c8f9227af3eddc6,2024-11-21T07:43:08.470000 @@ -218890,10 +218892,10 @@ CVE-2023-24497,0,0,180759a420bd41aa2b76b952f5d77cca91060437840879f45dfb99bbf7431 CVE-2023-24498,0,0,e14661a95b82ba61b2d6ebf51f43c3ea526f2c51dd10e773ff4939b7ccf19059,2024-11-21T07:47:59.617000 CVE-2023-24499,0,0,1ed655353b031a4dcfd6ed04ebef4d3c27e9fb33f6ec380a16eaa7b7e55059a8,2024-11-21T07:47:59.750000 CVE-2023-2450,0,0,99d87a24c6fcfa0ff70c88d30fcda82a024f99560a070914c8bb4299886f96ad,2024-11-21T07:58:38.407000 -CVE-2023-24500,0,1,bc76a78e267d0eff6f57d320a2d6df1744d10d392a9214999e2568817c5caf04,2025-02-06T16:15:33.447000 -CVE-2023-24501,0,0,1c569c19a4e8749c6c656aa5f98c38f548c6a4f104d0de32012d2271d457adfb,2024-11-21T07:47:59.993000 -CVE-2023-24502,0,1,e29f0158af755948beae7c393e50b64a663e255720dec489749995598637b1c0,2025-02-06T16:15:33.627000 -CVE-2023-24503,0,1,c003e275f1a3f434623e01ca1a3795dd2cd49bba26041332f7b5107d75894619,2025-02-06T16:15:33.780000 +CVE-2023-24500,0,0,bc76a78e267d0eff6f57d320a2d6df1744d10d392a9214999e2568817c5caf04,2025-02-06T16:15:33.447000 +CVE-2023-24501,0,1,2a631b087835bd60e93f28f35df6aa1a0e09298487c41bfa6c1c3dcfa240a8d2,2025-02-06T17:15:15.583000 +CVE-2023-24502,0,0,e29f0158af755948beae7c393e50b64a663e255720dec489749995598637b1c0,2025-02-06T16:15:33.627000 +CVE-2023-24503,0,0,c003e275f1a3f434623e01ca1a3795dd2cd49bba26041332f7b5107d75894619,2025-02-06T16:15:33.780000 CVE-2023-24504,0,0,8e96012d0421c27284c620915c823b17452b1699071bc5b9ae1532ee0e801c2c,2024-11-21T07:48:00.363000 CVE-2023-24505,0,0,76651c3fb14b0e6bd9f31113a3a5ec27dd8eaea12e378261ab5609faea7d9945,2025-01-29T16:15:38.430000 CVE-2023-24506,0,0,215d2d821dfac4a469d6e1e82e567cdfa13c1b66a7eb50950aef73f8104447b8,2025-01-29T16:15:38.683000 @@ -219303,7 +219305,7 @@ CVE-2023-25007,0,0,22e5e0ddf5d72f0ac6a83616236efd19f5942400446e93ab195f7deea283c CVE-2023-25008,0,0,350f0b19f640b9a36076dd4bd0035f87b878718f7e4ff571ff5c2fe7e18bb900,2025-01-24T20:15:28.890000 CVE-2023-25009,0,0,aa83be1f25b4fe7ad392f362dbe2275f77d3b1fb2cab182a0e912f7f5704bc96,2025-01-24T20:15:29.030000 CVE-2023-2501,0,0,bcf94db4736413975ae16393e7bf5502060569e2c0b8dae4e7633363bec1c1b1,2023-11-07T04:12:46.920000 -CVE-2023-25010,0,1,400f62477924763939165b3bf8a61671339afd88b39b27d29985640640fd6eff,2025-02-06T16:15:33.990000 +CVE-2023-25010,0,0,400f62477924763939165b3bf8a61671339afd88b39b27d29985640640fd6eff,2025-02-06T16:15:33.990000 CVE-2023-25011,0,0,a01ad7712d2d74f9a1c8e248a3027079450a37b7d549ce047ec4d0f3f1cdfc0c,2024-11-21T07:48:55.610000 CVE-2023-25012,0,0,d24b0031fce070c2772a04118693f9dcb5cd13a1473b4e097fd2a51447c1871e,2024-11-21T07:48:55.713000 CVE-2023-25013,0,0,132556a9084e80ee9143e21d594563633d5dab4ed62f09d04b829b8a60ddce13,2024-11-21T07:48:55.870000 @@ -220938,7 +220940,7 @@ CVE-2023-27089,0,0,a75d6ec4a19b11f39de9acb9868bc2c6fab6e5c8f3eed5d4b5445d496a998 CVE-2023-2709,0,0,52c09fa0e8c7a11d32ae85c41382d6eb6a3bdb8b8ddc5db44b7b01be1d6a910a,2024-11-21T07:59:08 CVE-2023-27090,0,0,1a3f0320c4001f0d005218a016e3cd8f3d06fdcf83168c8eb42da3e6a3a64e35,2025-02-05T15:15:17.530000 CVE-2023-27091,0,0,d4ba304ffb75eea3be25d80217867e80c75976fcd193953ba519ec18469bb160,2024-11-21T07:52:18.373000 -CVE-2023-27092,0,1,cf3f3f0aaada06ef1105abffb2ded8a829e5905a1e5298bb29b9a9ff84578a52,2025-02-06T16:15:34.183000 +CVE-2023-27092,0,0,cf3f3f0aaada06ef1105abffb2ded8a829e5905a1e5298bb29b9a9ff84578a52,2025-02-06T16:15:34.183000 CVE-2023-27093,0,0,75ab2d12a6e9a95bb315b505a78454ddc548197730f843a655ef303062aa9b5e,2024-11-21T07:52:18.680000 CVE-2023-27094,0,0,efe71e92652676c9e8d5adcd8c0958e6d181e1ab904060580293934e81cb5b9f,2024-11-21T07:52:18.833000 CVE-2023-27095,0,0,45f61d04f5041ae51c68a2456b891821b07495a6882f83d75c0613cf57e169c1,2024-11-21T07:52:18.987000 @@ -221446,7 +221448,7 @@ CVE-2023-27700,0,0,94f958ad964217c8763ce0d81258f719e6b9d3c1497b10aef9c833bf77295 CVE-2023-27701,0,0,0b01355e511d21c351b003386cd72d702cc93b0bee63e7e210be3c915ccbbc34,2024-11-21T07:53:21.727000 CVE-2023-27703,0,0,b0bfa75785c637576253800b50a4147b6b090aaebf25f355b89780067efe4934,2024-11-21T07:53:21.877000 CVE-2023-27704,0,0,ffb87257b76ed5d960e64cc507c296f5e240a087180d9b55c58fdabb1dde1482,2024-11-21T07:53:22.023000 -CVE-2023-27705,0,1,17650587927223b035bb33f5a523e70c2098cdd6e3876b1568b464ffbd5d5c1f,2025-02-06T16:15:34.390000 +CVE-2023-27705,0,0,17650587927223b035bb33f5a523e70c2098cdd6e3876b1568b464ffbd5d5c1f,2025-02-06T16:15:34.390000 CVE-2023-27706,0,0,f34f30cc30e77318666f1aa67d89ecef723093bff2ff5aa598dbabfa04e0e0fa,2025-01-06T18:15:11.927000 CVE-2023-27707,0,0,21cd82df4851fa4f0f6d309f3ec86941726816aa2ced93be07a567c85cef2609,2024-11-21T07:53:22.480000 CVE-2023-27709,0,0,42937c1255912344539a95a78b631e75e4147ce3df4dbc74c0d1da2eafc4239c,2024-11-21T07:53:22.613000 @@ -221462,7 +221464,7 @@ CVE-2023-27728,0,0,2dafe9f33ac3277b471f02d66432af0a1454fbedb0bb30928e856bc21cff8 CVE-2023-27729,0,0,abaa96238948665d743574b8ba5f15b2c7300f09389609bbade3b84769d3d276,2024-11-21T07:53:23.817000 CVE-2023-2773,0,0,7873dd9f74ed847c32c6f25a2b1ebc492d8ca86ced180ebe78f8b36faa6bda9b,2024-11-21T07:59:15.893000 CVE-2023-27730,0,0,20039d4f13c8b0994044249fdb10ee1de645810a3b4bc9274321e37887b16423,2024-11-21T07:53:23.977000 -CVE-2023-27733,0,1,384025e35fc12373e2b3d4230ff964fe5ec331e83aaaff69635a84e8c28228a4,2025-02-06T16:15:34.587000 +CVE-2023-27733,0,0,384025e35fc12373e2b3d4230ff964fe5ec331e83aaaff69635a84e8c28228a4,2025-02-06T16:15:34.587000 CVE-2023-27734,0,0,01154d8f72fba72ec3cf035fcc1ec3110c93353017e97e9a346b3ac49683ca1e,2024-11-21T07:53:24.310000 CVE-2023-27739,0,0,4fc8206e922185a194198a67cfda3f0948f74d71cd7be3a4e7cb7cbd8a0dbd45,2024-11-21T07:53:24.487000 CVE-2023-2774,0,0,4242333111818d6e1455249017304bc7c955142266fc9f7abc16cde77a827466,2024-11-21T07:59:16.013000 @@ -221476,7 +221478,7 @@ CVE-2023-2775,0,0,cbea37db2293647b042a599336dcab0ec5e76980f5a80d26479ecf6ed1a578 CVE-2023-27751,0,0,b598eb2b96a230fd69cac86dde93885c9a5654e17637716e22c22e3f9baba0d5,2023-11-07T04:10:02.983000 CVE-2023-27752,0,0,6adf0a84e3fe66f88124773064d313db8b29054b4f97804e56c422189369d0be,2023-11-07T04:10:03.027000 CVE-2023-27754,0,0,5c9c1de0660f6854dbe180fc8816d6fb3e3001aab2ebf71bb2533728b259f95c,2024-11-21T07:53:25.660000 -CVE-2023-27755,0,1,030e4e29a08e32cec80a06cfd9ceed9e6a484ac94095525885308529b6a5215a,2025-02-06T16:15:34.790000 +CVE-2023-27755,0,0,030e4e29a08e32cec80a06cfd9ceed9e6a484ac94095525885308529b6a5215a,2025-02-06T16:15:34.790000 CVE-2023-27757,0,0,2b1c31a8bd90f1ac9fd058810f197194db7cc21789aa13aeb9c645b2425f2f86,2024-11-21T07:53:25.947000 CVE-2023-27759,0,0,a5a7499505e5eb10085796c47747c10374553b53ecdd40ee382826bcf99fd9ef,2024-11-21T07:53:26.090000 CVE-2023-2776,0,0,c43d162098572ad524d5e0e996e016c6aa5164a6c37cb6f3692cd2e35bfd14fd,2024-11-21T07:59:16.263000 @@ -221535,7 +221537,7 @@ CVE-2023-27837,0,0,09ca7af765c2ff6927776c1eecc7d27a9e98a3793e382e704f3567fa1aeeb CVE-2023-2784,0,0,3beb45ba8d37afa28c5b710c953916c9a0cc09ed1f3ea22bda898c6b758d70ca,2024-11-21T07:59:17.050000 CVE-2023-27842,0,0,ff4319ffbaa6389afa0396471ae6b5a71fce4f1fe6e68640710e37a063b03c1c,2024-11-21T07:53:33.280000 CVE-2023-27843,0,0,e581568ce25fbecaed7391f9196e990bee2c3d9614523ec2b5f36b1ed39fc6f3,2025-02-03T20:15:30.890000 -CVE-2023-27844,0,1,6a467843d4ddc20cb4a689e95c3d3c21e1663d935d53d05c04d846b778ca9e1d,2025-02-06T16:15:34.993000 +CVE-2023-27844,0,0,6a467843d4ddc20cb4a689e95c3d3c21e1663d935d53d05c04d846b778ca9e1d,2025-02-06T16:15:34.993000 CVE-2023-27845,0,0,e777b579d76cec52bb5b019a8f229f789ae039687ebb3010325b3e376a4defbc,2024-11-21T07:53:33.737000 CVE-2023-27846,0,0,941104c667d49321aacb210fa29956f621f847ee2c27e41941b4c3ab6b70892f,2024-11-21T07:53:33.877000 CVE-2023-27847,0,0,62844f23ee37935036e80ce5acf5576fe72d6fb6cdc26d04ce4f7c19760cae59,2024-11-21T07:53:34.020000 @@ -221595,13 +221597,13 @@ CVE-2023-27902,0,0,5a7afa3bd09cb30d11e99cd3a7fc28e0609fc9be329ddd95f34a4a77cfee3 CVE-2023-27903,0,0,e46e5f40543432cc18c3b6e9bf1c927ce04a641d4fa05d71e34520ad1a9a2e72,2024-11-21T07:53:40.133000 CVE-2023-27904,0,0,6241dd57d127cc2d03349dfb0f3a19dace4df51e8dd9b7affe039a9ed5d7e8ee,2024-11-21T07:53:40.247000 CVE-2023-27905,0,0,74532d28f54c06cfde21f7f83bdd9076b93ab08f5f555eff743588e0ef9c0dde,2024-11-21T07:53:40.353000 -CVE-2023-27906,0,0,5822fe062f7b299383f2c053107575f7bf75e5eff79e0ea65095b48089b44e8b,2024-11-21T07:53:40.457000 -CVE-2023-27907,0,0,7487d7cd1e65e4562c4fb69a7911e29eb650ef716dde321d34134bb2704b7336,2024-11-21T07:53:40.570000 +CVE-2023-27906,0,1,f84678a5c14a673f495d39cce279b3cafcb33503667872993215ce720672ccc3,2025-02-06T17:15:15.723000 +CVE-2023-27907,0,1,529fe9f7de350e05957a30f54fc992aa1ae328976234ed8cc58cc625af878bcb,2025-02-06T17:15:15.877000 CVE-2023-27908,0,0,e5b5aa6cccf644aed2de2858000e2e481e5a1e753a191644f6fd5a2875689fb6,2024-11-21T07:53:40.683000 -CVE-2023-27909,0,0,4daa10631c0242db5a3cede9edf160532225353b1b4f29b1952a71f25889754a,2024-11-21T07:53:40.793000 +CVE-2023-27909,0,1,4519d182699505b4e8df24ac41a58d566fd3da2b711222d9a7009f6b09929789,2025-02-06T17:15:16.037000 CVE-2023-2791,0,0,c8ee51012392a88bd0879257640228475c635b0a71baa8e9fedfb8efce3b3135,2024-11-21T07:59:17.860000 -CVE-2023-27910,0,1,5aa749f03e40b4091b1f1b3bf063292b84c8d80b371e8f82e3972b90ca1eeef3,2025-02-06T16:15:35.197000 -CVE-2023-27911,0,1,37981897da4c7e23867bde8da742bd9ae416de2486e4912ba5c0ffca1b9bd695,2025-02-06T16:15:35.373000 +CVE-2023-27910,0,0,5aa749f03e40b4091b1f1b3bf063292b84c8d80b371e8f82e3972b90ca1eeef3,2025-02-06T16:15:35.197000 +CVE-2023-27911,0,0,37981897da4c7e23867bde8da742bd9ae416de2486e4912ba5c0ffca1b9bd695,2025-02-06T16:15:35.373000 CVE-2023-27912,0,0,a858f11d2bd2ccd64e8293106db18966183608ea1da72d51903fa373cc443fb4,2024-11-21T07:53:41.130000 CVE-2023-27913,0,0,db7e67f20194b0dc4f09edc2d11df9f78dc201f6520770b2c9b298c3731338fe,2024-11-21T07:53:41.253000 CVE-2023-27914,0,0,d1c3237f28c2aa03a316b9215c5adcde401a0dce25020c22312124ef54a9d3f5,2024-11-21T07:53:41.360000 @@ -223117,8 +223119,8 @@ CVE-2023-29503,0,0,6dadcb52cd64ab626bd2670a8ebb2bee2174174d745dfdb443523714a9eef CVE-2023-29504,0,0,3d53305a826d491cf08ebfe127410f07d3c8c0bc27d6f6e7e4e6f100a3146620,2024-11-21T07:57:11.420000 CVE-2023-29505,0,0,c5be9f26b1d09f6357b3f5fc00ed863fd7a07de779b95abeb03033ab7169f9cc,2024-11-21T07:57:11.540000 CVE-2023-29506,0,0,6d765693b8931e3de9eccb1df1cfc8db5e5e8da3e5c6663113c9684f4f6cc8be,2024-11-21T07:57:11.703000 -CVE-2023-29507,0,0,1cee2b1fb21afd520147914a5d44292c8901a2bc11be26dd9824835d3c8087a9,2024-11-21T07:57:11.830000 -CVE-2023-29508,0,0,13c82e090e8d71ed75af18afddc67562b93d88492dde5a1da583c9fa60ef0c10,2024-11-21T07:57:11.953000 +CVE-2023-29507,0,1,82be1bb718bc7351da0f1bbd46a4dda5e4b8cbcf27ab4560fef3376bbc2f292a,2025-02-06T17:15:16.757000 +CVE-2023-29508,0,1,83dc0f1c1640e09ae93f27ebe5151f9e0b2e781c1cd992df8984ca8e6b6c7110,2025-02-06T17:15:16.897000 CVE-2023-29509,0,0,59b9b25cb3313fd8f99bd3e50f7daf5a98dbfc8562af146ad03b42cb6d6c195e,2024-11-21T07:57:12.070000 CVE-2023-2951,0,0,754a5d9109a3f14930a634f818acf4807eb4a569014a410c897f211625a7d1f8,2024-11-21T07:59:38.030000 CVE-2023-29510,0,0,db75fd1d0a673bf309ce3df67ed5e91157eb8ef8f1105acfc4ca5266b7775bf7,2024-11-21T07:57:12.180000 @@ -223216,7 +223218,7 @@ CVE-2023-29643,0,0,8cab4df3005126ac1023ad61113e5caf336627d9fc525087584bb7391abbf CVE-2023-29656,0,0,a190f968c9b1e7640b2ec05941bfad4eda34e6985b30539e83a1f8e9649a3b3b,2024-11-21T07:57:22.500000 CVE-2023-29657,0,0,aa8f581305ab53803794f1539ce0a704fb05194c2ac57e21afcf877a051f25e0,2025-01-24T20:15:29.760000 CVE-2023-29659,0,0,132ae2d10add93c7773c8520ebaa4453b39811fd3670fff631ea0b0365f174c7,2025-01-29T20:15:31.107000 -CVE-2023-29665,0,0,dc5bcda9680e3e806a58c210d638989728a9beeb191b9384e06e9fdf34c58cb4,2024-11-21T07:57:22.933000 +CVE-2023-29665,0,1,67ffe746206b592be7422c2be60636b018b0d11ea9be1e6cd7bbf9d7b509d837,2025-02-06T17:15:17.080000 CVE-2023-2967,0,0,68b3934288b12b39ac75de572ea12e8a00d7bce5b33663c2007fc9474a10f59f,2024-11-21T07:59:39.733000 CVE-2023-2968,0,0,a3845e13a87af48a0e68b2259b826b32bb5677da3feff4e6d7abb46b7f02345a,2024-11-21T07:59:39.843000 CVE-2023-29680,0,0,2d798067b093f5651bf6d94d903f17f76bb8195866a4e67223d7d18f32cc04c7,2025-01-30T19:15:12.690000 @@ -223279,7 +223281,7 @@ CVE-2023-29767,0,0,b68faaf3b45ffb0d2cbc64ebbea41b6a0ffb61e7f1e4d4fda9dfa4cba199d CVE-2023-2977,0,0,20bdfa4fe830195862d29d75a36a569d8db13c8694be1f4fd35b646a0f9f4378,2025-01-09T18:15:25.850000 CVE-2023-29770,0,0,2194bec03536589ba63983ee5a9fc8756c676ff1e07518ca2875ebc40fa29460,2024-11-21T07:57:30.110000 CVE-2023-29772,0,0,36b3bf540d4e9e1935e9b1aa0b28d1da8622ffc895537fb9149bb82d948a14d2,2025-01-30T17:15:14.800000 -CVE-2023-29774,0,1,c3937a6d3c9b00d526cc2fd51ee04ec47aa100fe4222260653d7e97eb009abe1,2025-02-06T16:15:35.603000 +CVE-2023-29774,0,0,c3937a6d3c9b00d526cc2fd51ee04ec47aa100fe4222260653d7e97eb009abe1,2025-02-06T16:15:35.603000 CVE-2023-29778,0,0,bac41993447f4f8f473bbb4ace80d4e38004b190944231e6e12d3988f7767db1,2025-01-30T17:15:14.973000 CVE-2023-29779,0,0,c519c6d3705a6d3e262d55462c27ed87866460c801b95dbec9e4fba837675c43,2025-02-03T18:15:30.063000 CVE-2023-2978,0,0,ee44bdff3bc9077dbbc663fe0140364d678849011078f4d2033355d188a2eed8,2024-11-21T07:59:41.117000 @@ -223321,7 +223323,7 @@ CVE-2023-29849,0,0,339b30d1ae57b156acc51777afdadacc5c4e21fa6ccea3ad619cd3cbe7995 CVE-2023-2985,0,0,472b3e2cbc4ab1c4d383ed0d9aeffe34e7119a96832fa5b024a76bb75303c206,2024-11-21T07:59:42.080000 CVE-2023-29850,0,0,a81b8c5567d5da4adb295ee9f08035dfb076cc3f42a4b9f0bd2c2c3c6079f983,2024-11-21T07:57:34.940000 CVE-2023-29854,0,0,fc98dbefb3f0918404342d0de6358664a9df189b2710368d978c55821fd941df,2024-11-21T07:57:35.073000 -CVE-2023-29855,0,1,d323bb21d88b51243639bf4e65087391cd56259cdfe10db9098175a76bd19a53,2025-02-06T15:15:12.047000 +CVE-2023-29855,0,0,d323bb21d88b51243639bf4e65087391cd56259cdfe10db9098175a76bd19a53,2025-02-06T15:15:12.047000 CVE-2023-29856,0,0,b07bbd6f3df18d3f0c08e71dffe9eeaab7b72b9f25dad866594c7cca7b9f8a6d,2024-11-21T07:57:35.347000 CVE-2023-29857,0,0,0760939b20d3d88a77d487b55a7da2f82fabbe0bc7d6bfc81ea34e8a82edb139,2025-01-22T17:15:10.550000 CVE-2023-2986,0,0,fd575d0d1fc5fd4e594291bb8d594452294ed760175b3a8b0c59fd6d69ed1f44,2024-11-21T07:59:42.210000 @@ -223333,7 +223335,7 @@ CVE-2023-29867,0,0,2a5613eedac41f11d6efab9f9b852655822a2323c5c2ff8d059408b198a77 CVE-2023-29868,0,0,19e06f3228cbf2775abd0e899b79b175c8ee56fd661c20df6032adbd6426af67,2025-01-30T17:15:15.297000 CVE-2023-2987,0,0,bffe3b4cac45ece38eb9c2f45bbce993afc7c21c9308f43d7128b111aad6b465,2024-11-21T07:59:42.340000 CVE-2023-29881,0,0,743552443730fdd36f18e4ebad1dc0e6a7f1128edebcc69bad2b1c3ef8e16217,2024-11-21T07:57:36.520000 -CVE-2023-29887,0,1,d23a6d9b5b01f91d6ad59459f50b197af581b4a8de64d7b800b3b817e5de97d2,2025-02-06T15:15:12.230000 +CVE-2023-29887,0,0,d23a6d9b5b01f91d6ad59459f50b197af581b4a8de64d7b800b3b817e5de97d2,2025-02-06T15:15:12.230000 CVE-2023-2989,0,0,3fc9cb6a14480daf23deeb01445decb3425c3d5e8c70d06b62a5de9fc4adf222,2024-11-21T07:59:42.480000 CVE-2023-2990,0,0,e9e2b2b5b5314d54af984abd061f93305ad382cfe787559622696405ee308d32,2024-11-21T07:59:42.607000 CVE-2023-29905,0,0,2da9190f179b662d94b78c4786c051859268ab87a2446da169598d8fe1791d2a,2025-02-05T16:15:37.143000 @@ -229134,7 +229136,7 @@ CVE-2023-37576,0,0,fcd07926f2163c1d31f546297f0ea50216bf25b3a984eff0c6da2e31a22ad CVE-2023-37577,0,0,b0fd59cabf196c2dce306a3dfd18b0e7769f587e98763971c0f69d8f471204a6,2024-11-21T08:11:59.383000 CVE-2023-37578,0,0,db1d011239168d2f0753523137a605241d87dd361fa246b7536264b2cfd1972e,2024-11-21T08:11:59.510000 CVE-2023-37579,0,0,4619aa08d1ce28c3366bb44966075d308cc27715f020dfd6296b225d60c0dab2,2024-11-21T08:11:59.647000 -CVE-2023-3758,0,0,f4fa867af72bffdef9c54aabd6acada956a42693d6b3cc9f1676334a04831f11,2024-11-24T16:15:03.767000 +CVE-2023-3758,0,1,66dfa7da71c29fdd2b245f8df2204f07ac231a0eae8609ba676c08eb8a95ccab,2025-02-06T17:15:17.657000 CVE-2023-37580,0,0,8d275160b93ac9ce8ee9bc0d58aec68c130469746723ee6767d328399913bc21,2025-01-27T21:55:19.183000 CVE-2023-37581,0,0,093be304138d0cca6e8decef8cb1e83d94e4f8751f573ee26489914f63ec252d,2024-11-21T08:11:59.950000 CVE-2023-37582,0,0,83f623ea677c4e03b8b7f4d8be4b6877901642b17d5bbd39e639c2f5c032e28f,2024-11-21T08:12:00.090000 @@ -229533,15 +229535,15 @@ CVE-2023-38091,0,0,bb51561f633dfa9891e93d0d8bcd8000995761cdc22f32bc9f98c37884bd0 CVE-2023-38092,0,0,eeb5a6c329e6c65e8abacec96db2e4fb84dcff4c0070fc07665e62604432a908,2024-11-21T08:12:50.570000 CVE-2023-38093,0,0,743035d11b5fa9e12e03505e0c6dd6217b546b8b67ef47737ecd6c13d936b658,2024-11-21T08:12:50.690000 CVE-2023-38094,0,0,b8b2708825f84b31ace9f1b788457d4e79340f3b36fc654efcc5db04dbb30b33,2024-11-21T08:12:50.813000 -CVE-2023-38095,0,0,ab6cee31ac49106cc2b3c2edd0b8a735113dc0861708030f2d650cd3efba67f1,2024-11-21T08:12:50.943000 -CVE-2023-38096,0,0,3b97929d1c012cbd9245a925485c6969549615edb00d98ba10d4be90d389c612,2024-11-21T08:12:51.073000 -CVE-2023-38097,0,0,b851f50b73a94a9d23257929a3bfe7fc1eaa37e2237437dc9fd14869d6396f6a,2024-11-21T08:12:51.193000 -CVE-2023-38098,0,0,45a7cf0c66cfa656424212b928240ba7366406f8e25cb482afddc82cc1d47722,2024-11-21T08:12:51.317000 -CVE-2023-38099,0,0,ee8245a6cfe938a3d935cdabb11b1e5245c7a99b7e16d6b6b9f0535dfc2511c5,2024-11-21T08:12:51.443000 +CVE-2023-38095,0,1,537650068edd2fb43c6a6dc8f901f100fea80ba698ba75ebe6a920ed25916af5,2025-02-06T18:01:51.207000 +CVE-2023-38096,0,1,0641bfcb8616c92ce18e8dcb3c8057968bda6b9263496d01d65a8eced4d1d2ba,2025-02-06T18:01:32.923000 +CVE-2023-38097,0,1,4bb9369d26b4740cc0197f3971b79c32437bbd02d1d8a76e09fa9e29d8ce85ea,2025-02-06T18:01:59.430000 +CVE-2023-38098,0,1,9faf784ed6b23beb68229ec7f296cd859a715f2125402bf570bd83d48381cb35,2025-02-06T18:01:42.617000 +CVE-2023-38099,0,1,76dfe14bbcb2ccd9f177d1a2c79ba6a5fa8ce71b8d9f346026dc3ee5fca450ab,2025-02-06T18:01:12.890000 CVE-2023-3810,0,0,e2f5a70a9f5a08c44ce434ae49a185c38246e73f8c3412f8643bf0b4516a06a2,2024-11-21T08:18:07.190000 -CVE-2023-38100,0,0,1b0d123bd214e95bf831ace392a4e736b98caaa644b8e3c9777c6d8eeece3326,2024-11-21T08:12:51.570000 -CVE-2023-38101,0,0,15b9e6b206e26eaa263a12751b77d23eeaf5ed82c4b5974e35434977bff238d9,2024-11-21T08:12:51.690000 -CVE-2023-38102,0,0,56bd638f0711e6a3682f6d2e63e3fa05d4ccb77c8449975b5c8df9c2cbe66400,2024-11-21T08:12:51.820000 +CVE-2023-38100,0,1,431581815a8d4dbd651fd2fd093dd033b53fbbe0d944595eb3729937070da158,2025-02-06T18:01:21.237000 +CVE-2023-38101,0,1,b889ad0bb101b843b7bf65647841d4f04ec8742d29368fe6164027dcd66fe1fc,2025-02-06T18:01:03.677000 +CVE-2023-38102,0,1,35ed89124ca412237b18b7c4207a7a53ad5af5e292b72e0864b6fb73d1b814eb,2025-02-06T18:00:50.560000 CVE-2023-38103,0,0,3cdce54e162150da464da399c9b9e1c4388b7ac2145c716d720abb464f083fed,2024-12-17T15:42:00.237000 CVE-2023-38104,0,0,5528faae49391c960e915d48b6773e68e3e1a04370f96c6152370adf1281351b,2024-12-17T15:42:12.487000 CVE-2023-38105,0,0,0f928ec871a53c3c8baa75735f9a5f1c2658b9f931e1560b3d891d20c65e5b10,2024-11-21T08:12:52.193000 @@ -235211,7 +235213,7 @@ CVE-2023-45722,0,0,dd55f822b6dd59b54b4470940c4d94618ab4b0b0e9b50e18c2a4b985f0f4f CVE-2023-45723,0,0,79b1a5a3943b613f022799dd777cd849441476730640fec148b6a4bf15f81e2b,2024-11-21T08:27:15.800000 CVE-2023-45724,0,0,9e806cc0fc5d3cf7c5034db719efcff91840bb366b3937b0b5805ed02057bedc,2024-11-21T08:27:15.927000 CVE-2023-45725,0,0,4153b4d0c93c7af18977077a76a7f4f679b27ab179fc8cde17eac28e3f333df7,2024-11-21T08:27:16.050000 -CVE-2023-45727,0,1,1c5ee353ce812555d6bfbe7bb2a1761703a66e357106ee5a8ad2ea0b0e5f02c8,2025-02-06T16:09:26.590000 +CVE-2023-45727,0,0,1c5ee353ce812555d6bfbe7bb2a1761703a66e357106ee5a8ad2ea0b0e5f02c8,2025-02-06T16:09:26.590000 CVE-2023-4573,0,0,bb3da5e36b057052e10ee1f2a3e09f15376d80d311c5ddadd1348e1cacf1c128,2024-11-21T08:35:27.493000 CVE-2023-45733,0,0,c1ae174b01cb84e42618fad5695175ca17b3acc3d090370593b0ba333cdb34ed,2024-11-21T08:27:16.317000 CVE-2023-45734,0,0,370a4af15568cccf3cc331754e8ecddc6d3b8868f2dc1e6fdf27f11f60517905,2024-11-21T08:27:16.440000 @@ -236889,7 +236891,7 @@ CVE-2023-47862,0,0,f818188ea00d50335f6d90830f8e6650f03c9140c294f0ad74743d6645e52 CVE-2023-47865,0,0,28e6e2851097a4de3f0ee9821aa94ed6a37712982a7c457635100bca83763406,2024-11-21T08:30:56.033000 CVE-2023-47867,0,0,bfb4c3f0ccdad44261e77263335dde8fe3e19dbccb33aa596cf01d683977932e,2024-11-21T08:30:56.180000 CVE-2023-47868,0,0,a459236cc428840e916cf1e35235f873ba5b2f17c83a5da10f1472d5029e5d19,2024-11-21T08:30:56.323000 -CVE-2023-47869,0,1,b35b27c08772a831526de253648208dd2ef611c6306e6e622fe171b93bd4b43b,2025-02-06T15:50:36.737000 +CVE-2023-47869,0,0,b35b27c08772a831526de253648208dd2ef611c6306e6e622fe171b93bd4b43b,2025-02-06T15:50:36.737000 CVE-2023-47870,0,0,90674fc91b00935ca55935ec9e84b5dee66e5d5688f9bbe6b4de4aadd6227527,2024-11-21T08:30:56.450000 CVE-2023-47871,0,0,cfdfec4a2737d45b346eac498c6969c85dd01b0c9f8e21357df31b1205cc6225,2024-12-09T13:15:32.767000 CVE-2023-47872,0,0,a6f12169ef04d4b51dfcd627c18e60f534b596ef65ec72eced96dd248e771f87,2024-11-21T08:30:56.573000 @@ -237506,12 +237508,12 @@ CVE-2023-48671,0,0,2f437585f3a00482df05947e0c48edd8a2c5aebf95af07e2736401eec5b7b CVE-2023-48674,0,0,82020d6da78155232d0b3445b54af9580e2fb526b7d77a20761864eecc73b0b4,2025-01-31T15:53:27.380000 CVE-2023-48676,0,0,9c5d3a9ffc5aaeea1307334c05fa3be3a7f2bf98a32a0f0fb54e55e33367bfb5,2024-11-21T08:32:14.397000 CVE-2023-48677,0,0,8c94b6fd1378f6ef9e0d14ce5838a0b9850dc4fa408cb8d9b5b871944590c0d8,2025-01-31T13:15:26.723000 -CVE-2023-48678,0,1,a39c98aa9a1124f320db384c370788e4e0d841421e76815aa9290b9b529456d7,2025-02-06T16:32:10.827000 -CVE-2023-48679,0,1,4b98b2a4c3595ce768d76e41c0d7cd7d67cb11ba357014c848362e48ce0ee0f1,2025-02-06T16:30:48.253000 +CVE-2023-48678,0,0,a39c98aa9a1124f320db384c370788e4e0d841421e76815aa9290b9b529456d7,2025-02-06T16:32:10.827000 +CVE-2023-48679,0,0,4b98b2a4c3595ce768d76e41c0d7cd7d67cb11ba357014c848362e48ce0ee0f1,2025-02-06T16:30:48.253000 CVE-2023-4868,0,0,c2acac2bf88db4693840f7ab4da28a4cd2078c2be67ff810e629e855f632a880,2024-11-21T08:36:09.060000 -CVE-2023-48680,0,1,80703a424a9e1dec5c7e2e3e861ffd08b31d6ae12bea1bb5ede124c6150061d9,2025-02-06T16:29:47.807000 -CVE-2023-48681,0,1,8bafa02c04e6f92aaa7216f570f45db3db52461776f599d33c21b852860d4e2d,2025-02-06T16:18:20.597000 -CVE-2023-48682,0,1,f54047934da8281d6d8e0bf85ea561d48f2d151ffae7d3bb146ec98149a38bbd,2025-02-06T16:16:31.447000 +CVE-2023-48680,0,0,80703a424a9e1dec5c7e2e3e861ffd08b31d6ae12bea1bb5ede124c6150061d9,2025-02-06T16:29:47.807000 +CVE-2023-48681,0,0,8bafa02c04e6f92aaa7216f570f45db3db52461776f599d33c21b852860d4e2d,2025-02-06T16:18:20.597000 +CVE-2023-48682,0,0,f54047934da8281d6d8e0bf85ea561d48f2d151ffae7d3bb146ec98149a38bbd,2025-02-06T16:16:31.447000 CVE-2023-48683,0,0,3ba772b5bc3b13dbde6e160d4bc468e80dc8f98b7a5b456d1a14078ca25726ff,2025-01-02T16:15:07.563000 CVE-2023-48684,0,0,f70ccc472fad1dc07e645a18a88ba2f6d8bbb6c960f88a192bacf5f1d77cf683,2024-11-21T08:32:15.393000 CVE-2023-48685,0,0,2c3bb1ef3b5e8161505a7cab409ad027cb20b805eae8d149077fc3a8003c34b0,2024-11-21T08:32:15.507000 @@ -240633,7 +240635,7 @@ CVE-2023-52921,0,0,db860eb263bc8c980e12e17429a087c45572e4c4d54038923230b290b9052 CVE-2023-52922,0,0,0257647582c181cfc3c3426a0282aca59fe8801f0370a44aec6ca0f680b7f26b,2024-12-11T15:15:07.500000 CVE-2023-52923,0,0,d09409de037f5df89cd9d952de36693819046c41079eff92af40562f1bb761b3,2025-01-20T11:15:07.670000 CVE-2023-52924,0,0,598a68c7ee3cdbd042554acadba98c1054cbf4f65bca00fd3f0e7c948bd0c5ee,2025-02-05T10:15:21.073000 -CVE-2023-52925,0,1,2124d377c2a4eef9bc2cabba224b6b2bbeffcadc8578c939e127a056358a9596,2025-02-06T16:15:37.110000 +CVE-2023-52925,0,0,2124d377c2a4eef9bc2cabba224b6b2bbeffcadc8578c939e127a056358a9596,2025-02-06T16:15:37.110000 CVE-2023-5293,0,0,9b2cea486d7a7f42acc94669701d574bcf5844db44201d8d4650d958cfdded9f,2024-11-21T08:41:28.027000 CVE-2023-5294,0,0,3f7d530e6cf9dcdc204d5438393ed0130f08c33ee485c7c9370aa028c9815d14,2024-11-21T08:41:28.180000 CVE-2023-52943,0,0,f6ed6bafa02a627fd8483d5444c81747a611e4e8a768a1c76804639f41008cc5,2024-12-04T07:15:04.033000 @@ -241194,7 +241196,7 @@ CVE-2023-5874,0,0,dd61cd67fed13703f808971419d344cc716cf5ad7d139407d0801a023b6cc7 CVE-2023-5875,0,0,f1f7faebc6ba4cb15f28cb7ae4bdc4c183d92d4775c3240c6986c2275f2b5151,2024-11-21T08:42:41.340000 CVE-2023-5876,0,0,7092fe874093e7c748a8690b4f8d200e8010fc692198617a50fa4e0b81b9ccd1,2024-11-21T08:42:41.470000 CVE-2023-5877,0,0,73ceb7d5aaf8d15835a0884caddb22352416a5e9bce586b5a36f1744f12e9b5c,2024-11-21T08:42:41.620000 -CVE-2023-5878,1,1,120690b789ced53aa5f2d04745e0398f621d15cd35eb016df4bf676bcc904fdc,2025-02-06T15:15:12.440000 +CVE-2023-5878,0,0,120690b789ced53aa5f2d04745e0398f621d15cd35eb016df4bf676bcc904fdc,2025-02-06T15:15:12.440000 CVE-2023-5879,0,0,fcf4b86da110819690859211077713888e893add9d5e42a19026356852c20925,2024-11-21T08:42:41.747000 CVE-2023-5880,0,0,89b89a6d3786a30714c59d15910e2f7c5af54e211b13f29d200705d6dae8f949,2024-11-21T08:42:41.887000 CVE-2023-5881,0,0,07e2dca3f591fa21ea548af86571d7889d8d5dd21d80026655ea29eb004bae6f,2024-11-21T08:42:42.083000 @@ -241741,7 +241743,7 @@ CVE-2023-6482,0,0,035a6183f64074fe13ae2084da25aada25c7bbff1a52562c11d5d24d35f51e CVE-2023-6483,0,0,a0482d2f8e9f9e813ad8c17906e75f915de5a8deb85131259a90099f4bf7e864,2024-11-21T08:43:56.447000 CVE-2023-6484,0,0,5e8cf06e66713409144e592c149ffbb6939c3d5aad0efc52d631f7bbbc7ae41a,2024-11-21T08:43:56.590000 CVE-2023-6485,0,0,88189a74e618a8780b3b3fb22c708fc0ffaa04a9d99cb8e28f399c48705d4981,2024-11-21T08:43:56.757000 -CVE-2023-6486,0,0,3fb73e477ab2287dc3682414ba96858420b34c65203555550881fae7301da544,2024-11-21T08:43:56.887000 +CVE-2023-6486,0,1,c50efa12e83621ea3172a164531db807b812c7bc5823dcea1a0fc162f737d31d,2025-02-06T18:58:52.357000 CVE-2023-6487,0,0,23ae3b05d51ce51f76fa3e9d4fb6f7c2f380e6bbbcb03c51f14db68ee81a1ae4,2024-11-21T08:43:57.017000 CVE-2023-6488,0,0,d98f3cfb2d0e78a494791101f8ea0fff358cf4b57a1ea2cf08e8bf6dfb2dee4d,2024-11-21T08:43:57.150000 CVE-2023-6489,0,0,a9e4d7a039c991299a330f31e1936aa9d07858cc5c43626bc1bfc6ea780b752e,2024-12-11T19:06:06.800000 @@ -242161,10 +242163,10 @@ CVE-2023-6957,0,0,ae6e32578d5d74ff3fcf0c3bd27b964f39c4fb55015f001a374a6328ffc642 CVE-2023-6958,0,0,8eff2e5006ddc42d34f29662a93cea1b72db9351fc15f0bfc55007f882f03985,2024-11-21T08:44:55.267000 CVE-2023-6959,0,0,8ec838b66e35b19352010350b88da588492a0c4f4f1036ef3700c0fbdd552184,2024-11-25T16:47:33.943000 CVE-2023-6960,0,0,b6026c981573a00251f1c36bc13ef75af794522e5812fd8eff4aa7e26dc6a2ca,2024-11-21T08:44:55.563000 -CVE-2023-6961,0,0,d0ee25ffa8bdb76f77c8ea3e3a486e8e065ab8917741a035a963350aba667698,2024-11-21T08:44:55.757000 -CVE-2023-6962,0,0,4cadfa868aaf20f5de107a0c09d8fd16163bd9c10cf19a5360f8e7a410c0501a,2024-11-21T08:44:55.890000 +CVE-2023-6961,0,1,89cb45433f8e26b14f3306b32b46bbf8e80e67eb64de5e5403e5343a8f274c7e,2025-02-06T18:40:11.367000 +CVE-2023-6962,0,1,66f618900fdfaaa22e9c739afd3f162cdb00b1772d51df0f7631afccc4d25161,2025-02-06T18:39:37.717000 CVE-2023-6963,0,0,01c79ae6ebdcef8bfb9c31ad967ef0972931fd93edc1bd88ea5a1b8e1c328f53,2024-11-25T16:47:33.943000 -CVE-2023-6964,0,0,59149016838fd9e15f69c8e3ebf3a72ceec9d74b315e0e55e9bf9363bd1710b6,2024-11-21T08:44:56.170000 +CVE-2023-6964,0,1,62ee2c7d615f8230d7786e86f6b4b3fe7611f5b3ff7341e4c5e53f2b3ca4a14c,2025-02-06T18:53:58.280000 CVE-2023-6965,0,0,671119831e99b85712d14f962400a5f5d2c3e9505fd6f45362771f7c204cacb4,2025-01-22T17:38:52.513000 CVE-2023-6966,0,0,404b8477c36a669c3840eadcbfd58d58203be0eba6f2f11300b8a16c973bcbfc,2024-11-21T08:44:56.403000 CVE-2023-6967,0,0,71a83952da97a18e8c99c2e6cdfbba3ea47b86dcd29e00b7db96e2206ee4bb12,2025-01-22T17:36:41.760000 @@ -242439,7 +242441,7 @@ CVE-2023-7268,0,0,a007920b048244bad12b3daf0ade65763569e4511640cd0844ab63fc1ad6a1 CVE-2023-7269,0,0,808547aae37c3720945cb2e9fb822611d037a6a9f4f70083a54994b35322f068,2024-11-21T08:45:38.383000 CVE-2023-7270,0,0,2cf4371b77ac591f985f4aa4054d5c68cfc25f0a8d757e8da8652827f079b721,2024-11-21T08:45:38.553000 CVE-2023-7271,0,0,d79e2d59a4abb3e53994f65b0f06b3e13e59b6da2f0fa9255e24901196c34c07,2024-11-21T08:45:38.753000 -CVE-2023-7272,0,0,afecf9ad0182027e61caeda64bcf9c5e21f57064c4e5ec883cafd0610bd63314,2024-11-21T08:45:38.900000 +CVE-2023-7272,0,1,9e7f452cde340b910a18b4f9ee0099908ae833451aa0aac328e7be58b7313621,2025-02-06T18:07:45.847000 CVE-2023-7273,0,0,e5ba228f3b4566bef4f7cf912da390cc9652c6c8697993991cf9fef824e90d32,2024-10-04T13:51:25.567000 CVE-2023-7279,0,0,c6a086f465518f8fc20c776aeddccc8546478f7f16f61b270f15bebc0fca554d,2024-11-01T14:43:56.227000 CVE-2023-7281,0,0,2aecb2754631e609ccd0b26f382d5be29afff0def0037bd48c20eff95afd31d0,2025-01-02T17:30:38.013000 @@ -243004,7 +243006,7 @@ CVE-2024-0594,0,0,3780c91feb02e94bec74828d45d759c566a8f297ea89f091b3830ef305b248 CVE-2024-0595,0,0,7f902afc77c6d28ea6274f98e27811635fbf921773d4cf114e15624387c5266d,2024-11-21T08:46:58.040000 CVE-2024-0596,0,0,f2f323d3c877858105600322571d4a5aa05e7628ec32b3feb2e9262204464225,2024-11-21T08:46:58.167000 CVE-2024-0597,0,0,563c6d40585c23a62adc8e55a0cb92896618f6ecf9584c1281599468bdfd0e6d,2024-11-21T08:46:58.300000 -CVE-2024-0598,0,0,21671860e7a41c0998bd3d29ed41364d3a38067e4abb655fa7cf4479a455b7e1,2024-11-21T08:46:58.420000 +CVE-2024-0598,0,1,16383bc20388c9013e6383dd42a68cb0540bbe26f2eba1dc51d90e675df80f96,2025-02-06T18:51:23.643000 CVE-2024-0599,0,0,efb4f7ed9814ff58d6b909a4393882a85d57032d3fb7878e531640caef6aee2c,2024-11-21T08:46:58.533000 CVE-2024-0601,0,0,ff6209a8427e9fe1b30504d1686f42635ff37b22a4c8fe62f5c49dcf1a6c5b9a,2024-11-21T08:46:58.667000 CVE-2024-0602,0,0,0d4feccc97e84ba97757f40e264b1f918ca495cbc90c0163dec61adaa52f45da,2024-11-21T08:46:58.800000 @@ -245658,7 +245660,7 @@ CVE-2024-12574,0,0,22d90c2cfc66a6e55649293fae24817d92e89a03bfa8e0d56af714629ad6f CVE-2024-12578,0,0,9683da78c95f4de0afe4f169763bacae0c8e4e48d594e85dbc7c32bda1c6eab5,2024-12-14T05:15:12 CVE-2024-12579,0,0,6b066a632ed42755872bfe12897131044e41b00627589546ab36be31d813b6f2,2024-12-13T05:15:07.473000 CVE-2024-1258,0,0,36d421eec5fc7cce6382fad9fd3a9a8780da80fcb6e09fc8e5e480709b2e6caa,2024-11-21T08:50:10.573000 -CVE-2024-12581,0,1,17d18fc726b97760d30d61750a12c405333a5f53d81d848944da12ea8bb424ae,2025-02-06T15:36:33.913000 +CVE-2024-12581,0,0,17d18fc726b97760d30d61750a12c405333a5f53d81d848944da12ea8bb424ae,2025-02-06T15:36:33.913000 CVE-2024-12582,0,0,bbfe1aae814f308a85392c13709691d46da248e6458c80cb519b63fa483aa592,2024-12-24T04:15:05.137000 CVE-2024-12583,0,0,18b36426c2246709d6e004bec0c8a5de7c91c679c9d1416c197a6176fa3a08fa,2025-01-04T09:15:06.090000 CVE-2024-12584,0,0,adcd511bb3f4eac61fabd0c77513e0f49514ba8fec705794080ba1b5bd973bc5,2025-01-08T07:15:26.833000 @@ -246361,7 +246363,7 @@ CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce1678 CVE-2024-13472,0,0,65e4a4a6619e82e57e5988495a0befee15f1589fedb83f6d4252dc99948d7f2a,2025-01-31T10:15:07.630000 CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000 CVE-2024-13484,0,0,6e3479642b959e8d1e5606c35c1ac77b605f4f7bdc46a82d5c9487884ef33d2c,2025-01-28T19:15:13.753000 -CVE-2024-13487,0,1,f924c2c9e1fa3d6e517b7cada339cd9539d1513d0a85f8b95f05c9a79e2dd9fe,2025-02-06T15:15:12.660000 +CVE-2024-13487,0,0,f924c2c9e1fa3d6e517b7cada339cd9539d1513d0a85f8b95f05c9a79e2dd9fe,2025-02-06T15:15:12.660000 CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000 CVE-2024-13495,0,0,7a8bc062291cac2ab3dfb8a0fb7feeecd31abf131df44b7d6a18b1140227b207,2025-01-24T20:46:53.307000 CVE-2024-13496,0,0,192a8533534e044b339576d96e9cea7e19a2bbd248a7b183889cec35656a4f79,2025-01-24T20:45:57.463000 @@ -246418,6 +246420,7 @@ CVE-2024-1360,0,0,d34fec545a10bf09bb924f3a0696da0f2401b54143d8aefeb9f97ea01bb848 CVE-2024-13607,0,0,633beb2a2a6d7ae2c71ea299ed2662752f0bc22dd7047c64857b269f6e61835c,2025-02-04T07:15:12.973000 CVE-2024-1361,0,0,8a11a93152fbfa05be2934d541581f2e8e8c1350c348ceb554a6a47ec08e0e2f,2025-01-15T18:39:23.493000 CVE-2024-13612,0,0,f0c3e3f55ca6b4ca35bac236a126cd1995e073b744e2e5e3f3cdcfc3b1871559,2025-02-01T13:15:21.320000 +CVE-2024-13614,1,1,dc8ebe34b7c3367b1269701540b20724f2a0672c61152dd75d9995655e6d4294,2025-02-06T17:15:18.080000 CVE-2024-1362,0,0,ebe61894e3dd1fecb8d4711188e9d8f7e6a2ff043508a2ee93131b033a0336dd,2025-01-15T18:40:30.490000 CVE-2024-13623,0,0,2cada29a90e918414353741b6e3b8cf08dc12a83860192531fa76e51a17031e8,2025-01-31T07:15:09.830000 CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000 @@ -246455,8 +246458,8 @@ CVE-2024-13717,0,0,71a3650f5ab531cb9a1850d83e24949bbb405dc3cae790e8ec5ec60af0ddf CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000 CVE-2024-13720,0,0,b870b55deaed62451c7cb49e48fdc621ee68a35c7c8a7750776cbfa21cdbd2f2,2025-01-30T18:44:43.053000 CVE-2024-13721,0,0,3d01fd2636d19e08bbb60da04d18cfa1babbccecb03f24b5143393a600e41ccf,2025-01-25T06:15:27.860000 -CVE-2024-13722,0,1,7306fb56ed5965b44340768f0a8910eb1cab3f09db3148c500f3aaeb1bc44b3e,2025-02-06T15:15:12.867000 -CVE-2024-13723,0,1,600a5c5526201e2ff99f92af892f4feb671cccfa846ec078e384c904fd421caa,2025-02-06T15:15:13.050000 +CVE-2024-13722,0,0,7306fb56ed5965b44340768f0a8910eb1cab3f09db3148c500f3aaeb1bc44b3e,2025-02-06T15:15:12.867000 +CVE-2024-13723,0,0,600a5c5526201e2ff99f92af892f4feb671cccfa846ec078e384c904fd421caa,2025-02-06T15:15:13.050000 CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000 CVE-2024-13732,0,0,bcdeee89cdeb266ab97f726fd75be409e85077926d11675c2a570d0f94bb99ad,2025-01-31T20:22:33.503000 CVE-2024-13733,0,0,a9a8d1da3e9ca0d26485df457906e375bbd443f277cddd0693ddf9e0d40b866c,2025-02-04T10:15:08.527000 @@ -248490,14 +248493,14 @@ CVE-2024-21594,0,0,96f7ffccc5e1b95b526e0770e66b0a10aca6419927605427f2f6947a28f56 CVE-2024-21595,0,0,bd277db179ef1b9c3f18b64f4122244b30bcbe5b85c2ccd02aace5ef31bc05f5,2024-11-21T08:54:40.903000 CVE-2024-21596,0,0,26e5eacdd821c3d5221ac4678649bb61f56e30a0ea6a6829cfa1c84d00297761,2024-11-21T08:54:41.060000 CVE-2024-21597,0,0,78073c4cfe8182b452c2113d5137e3c607e5abfe1fbdbaef7747bcb7c6f99a54,2024-11-21T08:54:41.213000 -CVE-2024-21598,0,1,abd0df41a95d5dc1b125463215ff35f8428abeae399fc177c5ce62db49edf617,2025-02-06T16:46:39.747000 +CVE-2024-21598,0,0,abd0df41a95d5dc1b125463215ff35f8428abeae399fc177c5ce62db49edf617,2025-02-06T16:46:39.747000 CVE-2024-21599,0,0,aff27c93f3978f20ff7849bfb6d97050637f779ce1bd025910a586904cad94f7,2024-11-21T08:54:41.497000 CVE-2024-21600,0,0,a429b9514ce20abfc6b0576122c2764dd918cc4d2d4447eb9d5271641b91f5e2,2024-11-21T08:54:41.627000 CVE-2024-21601,0,0,f846803ebcc189d1f46095c93caaee130c509bbea4e7d53890a50d15d12f4824,2024-11-21T08:54:41.770000 CVE-2024-21602,0,0,41ac8d521f9eba4be2ad4678126a53d8e5a50bf2dc5c27c2438c646783392c1c,2024-11-21T08:54:41.910000 CVE-2024-21603,0,0,d91a6d70cdcb3594b940715477e1b8895959935a69fc19db866c0f6724a64079,2024-11-21T08:54:42.040000 CVE-2024-21604,0,0,1a7a37fc7cc36b20d7b8978537909fb8fbba39617f234155b3946889937228c0,2024-11-21T08:54:42.177000 -CVE-2024-21605,0,1,c986b538952dab105b51d22e7355fba5d593944bdff8288c4e213c6a3491d91c,2025-02-06T16:58:10.283000 +CVE-2024-21605,0,0,c986b538952dab105b51d22e7355fba5d593944bdff8288c4e213c6a3491d91c,2025-02-06T16:58:10.283000 CVE-2024-21606,0,0,96b9b5aaaa10d12d746cfced3bbe184276bbfbc212f99fb99927862a8cbcb0ca,2024-11-21T08:54:42.453000 CVE-2024-21607,0,0,f59415b22faf656477f9e7bf7a982f3f8655c7ad86e44b7900b038f38b711102,2024-11-21T08:54:42.600000 CVE-2024-21609,0,0,af1ae1833d0505ee24ae4111b4f44bef9c1ce3c5982efb9cdc7efce0447d15bd,2024-11-21T08:54:42.753000 @@ -248507,10 +248510,10 @@ CVE-2024-21611,0,0,334e98596de5cccc370c36d1b9f4ee75740cb3840f270668136be62f04aaf CVE-2024-21612,0,0,a1c64368428607152868a7719ac581eb5c0c82d11e43ace9c200d48539f7d1d6,2024-11-21T08:54:43.200000 CVE-2024-21613,0,0,1b5cc7582af8e29a485625fa0664bab35c6731001707514eb375ebe0f6bde842,2024-11-21T08:54:43.363000 CVE-2024-21614,0,0,b8cfc954d71e656b148f776a9cdce08320ee92fc1fee351de38773bc96f08832,2024-11-21T08:54:43.510000 -CVE-2024-21615,0,0,6a52fa5b7dbbc22183086ebb3a98d1e8f8fe9f3a4d3373a7fa4b3c8e364b2c87,2024-11-21T08:54:43.647000 +CVE-2024-21615,0,1,6937e878141904830ce4844911ad4d800aaeaeba22df54eb139a2f9410d31fb5,2025-02-06T18:39:32.977000 CVE-2024-21616,0,0,dae6d3cf5f996c4574feebd645f2cb4466d7284cf13155699974e1982a1269c0,2024-11-21T08:54:43.780000 CVE-2024-21617,0,0,e02746f478369a08710b2842d6ebafbdcdc6c88c5e46abb063d87e66959b628c,2024-11-21T08:54:43.923000 -CVE-2024-21618,0,0,a6bb04c9b935e5639454f719876e6c7f2a668dfbbddc150d883c6189322a7437,2024-11-21T08:54:44.067000 +CVE-2024-21618,0,1,b69061a71c35aa2e062c3aacf8ca2d7b7cc5029e8508bc10b3be7b4e300dc01d,2025-02-06T18:39:21.123000 CVE-2024-21619,0,0,962a2acb8ea0c416286b40b04f6078c6f01bd0b1338c587066e8de7d8d28c2dd,2024-11-21T08:54:44.270000 CVE-2024-2162,0,0,f341aeae09ce952cfa8e1acd1945a0549f50e443c3354f0bdf994fb4d6053e54,2024-11-21T09:09:09.727000 CVE-2024-21620,0,0,20a6571558a9873a7736ceb942ff276ea766ceffdb71a376e43b64af8dc5f4c7,2024-11-21T08:54:44.457000 @@ -248939,7 +248942,7 @@ CVE-2024-22114,0,0,b98aec6151fc366c3b669a552c78744585fb46223fe45a4b12b56beb46fb5 CVE-2024-22116,0,0,c04c3de9f5b4ead60d384f4b087010c1878ec579b099b751b4e2eb65332cdb41,2024-12-04T15:21:51.983000 CVE-2024-22117,0,0,7fc14c99bc14c7a825c70601bd00a916ed4cd735ca0a5ac830de2071ccb4345e,2024-11-26T15:15:31.510000 CVE-2024-22119,0,0,4bd6f0e5973d39a2a0656293d459ca6ef306ff5763274518b9b5aa7967be8dfa,2024-11-21T08:55:37.150000 -CVE-2024-2212,0,0,74deecb243bb9bad7196721f3fc700be603ab799072b24cba08a73e646d0c44a,2024-11-21T09:09:16.010000 +CVE-2024-2212,0,1,9ba0fd8d98fd108ad5659d434d545d08ad45c38884454618ea7faad0006ad212,2025-02-06T18:04:46.317000 CVE-2024-22120,0,0,8e56862446422e0e91455a2e1599414d6b8f9c030d42b3dcc7917f5cc5622a4c,2024-11-21T08:55:37.330000 CVE-2024-22121,0,0,04688fcf4ead04e75d87d970b502bc82bd60fd65218ebd0ae0a8a7c1417de80a,2024-12-10T16:19:19.810000 CVE-2024-22122,0,0,a69e95a695ed6b70c3002d8ba75c57f766f7300bf0a8c0b2aa8dfda24d05dfe1,2024-12-10T19:21:09.207000 @@ -248961,7 +248964,7 @@ CVE-2024-22136,0,0,8f52e774bda0b9f0b1e9c148e2068bea711435d376963412b477b6d460659 CVE-2024-22137,0,0,b4c525be0bbbbd93566fd8a107178d775b6329114037ef14c38a180d05af46e7,2024-11-21T08:55:39.583000 CVE-2024-22138,0,0,1e4b47ab56bd10667a141c7f7a86013338ccc1dfcee1fcd6e393c4b6a3c93b78,2024-11-21T08:55:39.713000 CVE-2024-22139,0,0,18a68de42e65699069263b499e3664c8d8989a572f549eba4b71234a8f6b33d5,2024-11-21T08:55:39.840000 -CVE-2024-2214,0,0,1af29cf92583d6a4b1f02e041f963b283822efaf5cece8dc2edb402da31adcb9,2024-11-21T09:09:16.287000 +CVE-2024-2214,0,1,63cd15ec62d1e98c46bc137e9820a0ea35cdffe0d8fc0890b7b5fd972d0bfc33,2025-02-06T18:05:18.013000 CVE-2024-22140,0,0,8f14281157b2c21fe890252d5618fadbc13a246f8a467905c8e3b92196b1bc2c,2024-11-21T08:55:39.970000 CVE-2024-22141,0,0,a97b04e061ecea388e3df3124bbc699c0721e87b1981e731585c28a092195b68,2024-11-21T08:55:40.097000 CVE-2024-22142,0,0,3e3351023de6f8a48af9955accf3cc3be61b2a901defcaff7a898407b2cacacd,2024-11-21T08:55:40.220000 @@ -250628,7 +250631,7 @@ CVE-2024-2451,0,0,d8f84f1a8d968d9c219f3d8ecd0dfa93e04557648710ac7bb3b4841f43d583 CVE-2024-24510,0,0,fe153ad743918c8504fe229d44cd06e63524799002da9e0641cd9e46d6b1aa82,2024-11-05T21:35:06.877000 CVE-2024-24511,0,0,da61fbb9c54501d007e31fe08563efc4167a2d8cbec1ba32dda11137b67ba717,2024-11-21T08:59:21.877000 CVE-2024-24512,0,0,019ed928477af2c76383f0dd0a60b623736726b46fa172045ba6a57358273cec,2024-11-21T08:59:22.127000 -CVE-2024-2452,0,0,1a99e105af8b400ddfc370ceb96456830d3fe3baedf7485e8cc08e9e004b90d4,2024-11-21T09:09:47.030000 +CVE-2024-2452,0,1,0a571f9b56c67c2101c6e86e3e480aeb7370286c35fe0bdc684b48d7e0a8faae,2025-02-06T18:05:49.437000 CVE-2024-24520,0,0,ace09330e8107cb68f2429ae0de5179ef4a6d633dbf4aed473a923b4cade80a6,2024-11-21T08:59:22.353000 CVE-2024-24524,0,0,dbc985fa4d017562f46de6601e7655cc2e5785ac6fbd89bbcbcc5f191b44e49f,2024-11-21T08:59:22.583000 CVE-2024-24525,0,0,3900b179dc9cf60476a9abf4c81b26fd5dc897ea1eb93e4b15aeb161b8c6a332,2024-11-21T08:59:22.813000 @@ -250639,7 +250642,7 @@ CVE-2024-2454,0,0,0529696b46064432400ecb536438bbd0c068e6096f5377190013117326aba0 CVE-2024-24543,0,0,59c3b1da73d28451a1cf1cfc188099161f9c980e5c2def4a9d3bc67372ba2315,2024-11-21T08:59:23.253000 CVE-2024-24548,0,0,66be0b6ba6ef0844ddd2a0ae230a74ca3e9c9ffcbeb06975fa2c032719d8c629,2024-11-21T08:59:23.410000 CVE-2024-24549,0,0,4ed77430af1fe22cf50322942baa69bc3dabad1352e6f759abd9a7ffc96a9448,2024-11-21T08:59:23.603000 -CVE-2024-2455,0,0,af98c89184659abfaf4fdf185b6149a30fc4131f7976b0134874dd0b82ed0e6c,2024-08-01T14:04:01.833000 +CVE-2024-2455,0,1,9421d2c98431153e8f9671ef489581dca268c7a08fe4717b3f0c09afb468fdd6,2025-02-06T17:46:37.687000 CVE-2024-24550,0,0,27cb7af9bd449f0fbdf95ef0a021af6839a34983570783985ee03919c2f67595,2024-11-21T08:59:23.793000 CVE-2024-24551,0,0,b7a1c2d46c2b177adadcae41ee83ffab2ce81a9d7f916acc3bf4554ccc8ba3f2,2024-11-21T08:59:23.940000 CVE-2024-24552,0,0,08553109cc8f803ca2660d07fd76902953e8d5b86d511086fa1825b8cb168286,2024-11-21T08:59:24.080000 @@ -251477,7 +251480,7 @@ CVE-2024-25701,0,0,4777cddc8671a4cbdf08df97793cb6fbc659f1f3848b27a12dd4728c3d3dc CVE-2024-25702,0,0,3b42a2341816cd1940ae7f2801adf99cef9cc48b11969bf629ed4e52d3d6cb3d,2024-10-16T21:03:33.347000 CVE-2024-25703,0,0,1afe4ca1ce005dadbbbe3861ac31e3fa775711912585fe3575d9e4d068c0830c,2024-04-25T19:15:49.520000 CVE-2024-25704,0,0,fb54909d350b3454c6bcc148be02f730a032c03d05d0a91141a9e8dbb6c64f5c,2024-04-25T19:15:49.597000 -CVE-2024-25705,0,0,9a2e1e8760ef10c25bc8bdd61bcca108ac124e06272934d80d0a1be5be3ebc2e,2025-01-30T16:21:48.907000 +CVE-2024-25705,0,1,68943a52d054c5c0195f75e33ae746334a378c48a854c5cbd39cfc32c5ab5b5c,2025-02-06T18:15:30.930000 CVE-2024-25706,0,0,600484eed8897ea0828c44518c90f03573bbab70d24e0af6fb3b1629c531bd2e,2025-01-08T15:42:03.523000 CVE-2024-25707,0,0,3ee4e6517fecbbb60a3555239aa46206819a90f2a089c6815089490eaf01924b,2024-10-15T14:34:43.597000 CVE-2024-25708,0,0,c169d9f12e5c83634b5ad6fd76892e5d4c412c0f5e491ade778100b826ccc3a8,2025-01-31T13:27:06.877000 @@ -252198,7 +252201,7 @@ CVE-2024-26666,0,0,f3d57571a156c221255e6ed43ce466550f0474a9e05c86712515e781d1d5d CVE-2024-26667,0,0,e5ad506f4c73ca6a1fa85cffa41c22f32b9dc8afefacf0aae7843e76fbaf00b7,2024-11-21T09:02:48.243000 CVE-2024-26668,0,0,19e99ff104cefd1cd23ad3007ee1b6d98ed06b00b2ab1e0701085c50b1f5ac6e,2024-11-21T09:02:48.360000 CVE-2024-26669,0,0,90097569a49a5176e771f573d811a05aad14be50ef5376396ed78cab8665c6e3,2024-11-21T09:02:48.477000 -CVE-2024-2667,0,0,b667faec3e658d7d84e812096fb41847bc025ac79060ce818ee10525c348af9f,2024-11-21T09:10:14.880000 +CVE-2024-2667,0,1,d282ffc5e01fe0e8e2fd621d0bc389071ac6381353033f69580a1376a7d3d05c,2025-02-06T18:05:25.020000 CVE-2024-26670,0,0,f0434dc6654cbb832b662a959d3f3c14d1ada1ad2e2fe326da6066d12f65c9f4,2024-11-21T09:02:48.597000 CVE-2024-26671,0,0,84084285a16fed952d677d5fd710644ee60fc8d9cf10cb504c7604e28c9208a6,2024-11-21T09:02:48.720000 CVE-2024-26672,0,0,c70a64110bcd68bbde0a906463b82213fcccd910d662981df3a389ebb7bea170,2024-11-21T09:02:48.840000 @@ -253136,7 +253139,7 @@ CVE-2024-27705,0,0,3233e9b763f57c6dfaf8627c6d6ec7d3ff266929e0ec29e347f4290ec6ac9 CVE-2024-27706,0,0,09be5dff0dff62897d4b671897beea1323154b3e00d34465281c351db1a9a829,2024-11-21T09:04:54.783000 CVE-2024-27707,0,0,4a3147229ae75fdd871763049e313de06f4e4ab116ff888bbcd9fcfca501d9b3,2024-11-21T09:04:55.010000 CVE-2024-27709,0,0,0dc8a00434a9bdc593d8c809bc45f53ca009c10107690ba39b988794ca398a66,2024-11-21T09:04:55.230000 -CVE-2024-2771,0,0,ed38ef6a0013963c7fac9042ee644880c920c357c4e2d447aa1dbe01d99dcac2,2024-11-21T09:10:28.887000 +CVE-2024-2771,0,1,aad3fa90a08950deafce786c821cb832ce7543d9c8b3a9d708d7c98814f8cda5,2025-02-06T18:33:57.330000 CVE-2024-27710,0,0,c8353ddb223f00eb8be323f22ae1c338a10420e1d09067b6d197578182aaeae6,2024-11-21T09:04:55.450000 CVE-2024-27711,0,0,e77b75fdc2ee9d9427d667dd496df30c03c8c25b9aab7888b9e4b92b504ef697,2024-11-21T09:04:55.667000 CVE-2024-27712,0,0,2902d6c089684557ece1a3bc166a4d74aee13eefc7e652a85152dc904b72ec22,2024-11-21T09:04:55.897000 @@ -253146,7 +253149,7 @@ CVE-2024-27716,0,0,4e33ff7b1a83f51fed4b80a3d94c6d3a9ee0c5bb94137c0b4ce8ff1d81d64 CVE-2024-27717,0,0,c7a465d57d9696ee282c5e2da6989aec7f7e2c8a7a21ea428485a6e172665524,2024-11-21T09:04:56.707000 CVE-2024-27718,0,0,6fd0ecf52683c3600c47787d4abfe093befe302da46880121fb7e6cebae4c848,2024-11-21T09:04:56.920000 CVE-2024-27719,0,0,341c9c74660e8da6c3b635ee840b9ff7db619da44f18728b3cc02c5bde0fae9d,2024-11-21T09:04:57.123000 -CVE-2024-2772,0,0,95c88bd030dfb2bd13867ecbe3f0e84c7b5a76fe33bab109aba08150201cadb3,2024-11-21T09:10:29.010000 +CVE-2024-2772,0,1,02f750b020a1c0ddcf10a0cbf86dad19edb566b57ce2911796231437ddd08a75,2025-02-06T18:38:03.913000 CVE-2024-27728,0,0,46e06ce272ce05b5accc64e25080f982ab4dc5a49c281203dbe76629733a8fd4,2024-08-20T14:35:06.747000 CVE-2024-27729,0,0,809fcc66d1703da695f3fdd07183b33a76080add392f01a1abb9d8a582f159f5,2024-09-11T20:29:52.477000 CVE-2024-2773,0,0,018fb490a9d26494d921abab57a48493b2cfc80bcef8c4ecda213f042e19cd06,2024-11-21T09:10:29.120000 @@ -253218,7 +253221,7 @@ CVE-2024-27816,0,0,d126026a0e8c09579a5f31347cc45bf3577225eb227c98451e45b114e71fb CVE-2024-27817,0,0,6dd9dd975d0fcfe58238d9ba3ba9e1921b514abadfa496cb71844ef21c201d0f,2024-11-21T09:05:08.793000 CVE-2024-27818,0,0,bf2ff5e56a5dcc0026326b877c5d2f40490029874fbc80b54df6651b77bfe1fe,2024-12-12T14:33:00.640000 CVE-2024-27819,0,0,af5349cb7fb8018051d3446391b7c541613e37fd1a57a702dbccd3af5f1ae345,2024-11-21T09:05:09.137000 -CVE-2024-2782,0,0,0fbffd09bb8d00a40b2857d7fa7951d51bd7afe07485ce80aa521012139d7b52,2024-11-21T09:10:30.413000 +CVE-2024-2782,0,1,4931fdc4df8ed3acfb0c8dd9f989cff8c77993e44758615114a33bc703f78142,2025-02-06T18:37:34.907000 CVE-2024-27820,0,0,b615b9c5d68a674c239e6993b78212fe0266a4c1058c37eeaa57e7bae0332265,2024-11-21T09:05:09.333000 CVE-2024-27821,0,0,662c0fdb4a6b9881c4e3b0e9bdefd91c75dc8c6155b30ede36ff0f65a0b09925,2024-12-12T14:33:00.640000 CVE-2024-27822,0,0,f8be55eb8bf86503cf81512385aa89b340f124c8a3f8c20fd852538813632324,2024-12-09T20:45:57.453000 @@ -253333,16 +253336,16 @@ CVE-2024-27935,0,0,a818d438fc92cb3829b80e0c20360d6755dd4a7e2d490856f973009bf50a4 CVE-2024-27936,0,0,2099c76d277ac21c38cfc54bbc485707bce8fc86e66cd1bed544e652cab80946,2025-01-03T19:27:46.510000 CVE-2024-27937,0,0,82e87c7e48ea4409826e73644eb6a015968a77c77ade52ed938f8f3395a1fbf4,2025-01-02T16:20:03.713000 CVE-2024-27938,0,0,f3fa24107d64f072de2a337377f22dc2fedd62e7046e2b3f6a494579c82cdd75,2024-11-21T09:05:27.543000 -CVE-2024-27939,0,0,5f5bf460c1e0d247ddd4a3052d67c96e98684c7803854fd41ed3196f3193dcff,2024-11-21T09:05:27.690000 +CVE-2024-27939,0,1,b667eb0a9384cfc5a2aeebee363b7da2248c153b2463d3acf87d14eca4d3795b,2025-02-06T18:16:36.110000 CVE-2024-2794,0,0,33955f4149d64b1b269ef69fbe9402b7695f6b6b91e1246e2fc086085da81caf,2024-11-21T09:10:31.997000 -CVE-2024-27940,0,0,6b88c4f4589fa30b4fcd553d0373b6564afec16bb44ad7c9b06c7f3117f4d6d5,2024-11-21T09:05:27.807000 -CVE-2024-27941,0,0,529f27e04c8785e29508f290c1f6142dd6a6a5850faa20b7191c3e5e7dafe603,2024-11-21T09:05:27.947000 -CVE-2024-27942,0,0,c528a4d1615b2717e14dc2de72d348c1dee46ba30234e8e2093f86641779fe4d,2024-11-21T09:05:28.090000 -CVE-2024-27943,0,0,3b6725714ddf6d70cf928aacc2111739a9b246ff0f51e7080e1e1850395e8090,2024-11-21T09:05:28.217000 -CVE-2024-27944,0,0,6949768a48d62aee3746a68dae075b91a51f3d45d004867d2a0b13b68e03daf9,2024-11-21T09:05:28.360000 -CVE-2024-27945,0,0,464cc50aa18efa22019350b2cae6b874bd387ca518f042f80c5f24127e3c7049,2024-11-21T09:05:28.507000 -CVE-2024-27946,0,0,a8d4260c2df7174fe7b2a639361b79e45b3739244b2863baf243d48c7b4ad98e,2024-11-21T09:05:28.653000 -CVE-2024-27947,0,0,28877515706d596fd69978407bfa702e3fa2a843507fb372066082901a6f5d7a,2024-11-21T09:05:28.797000 +CVE-2024-27940,0,1,2dd5fb975e6e449ebc295eb8f31cae07cd0aac3f9359e397fb08557ee431ff1b,2025-02-06T18:16:23.880000 +CVE-2024-27941,0,1,bbb2ae4be8ddda07e6c3f4438950f120dc72835c5644843fd6cdd83d012c8e7b,2025-02-06T18:16:12.487000 +CVE-2024-27942,0,1,8a0407dfbac5ed7f6383a0a457bcc8b9cc6bf90b5f542b3c33476c8eb306486f,2025-02-06T18:15:39.537000 +CVE-2024-27943,0,1,0fe02cdc7ea82a907fc9228596527e3ec29e6115f0ca689cc14f68e215d81cd7,2025-02-06T18:15:25.550000 +CVE-2024-27944,0,1,05ab27b23cd4c65e6018640103ddc19702d299728eb220c6782a117a1187bf53,2025-02-06T18:15:10.320000 +CVE-2024-27945,0,1,94dc03c5788951b945f52561612580dbf6389fd2990ae0ab8d0bbe20a70c318a,2025-02-06T18:14:57.147000 +CVE-2024-27946,0,1,66f384ac73b5b0b78bf2b244d51655e2f723913f54e6237bebd67311ea34e9ec,2025-02-06T18:14:26.713000 +CVE-2024-27947,0,1,3037bcb4c0e3535d9bac491e457cd5f8cda27629d0af16e036379bf52f9162dc,2025-02-06T18:13:55.330000 CVE-2024-27948,0,0,b732e099eb8d33255cbd588aca4384acf3def7c5bf75988d8fd3f639ac56c572,2024-11-21T09:05:28.937000 CVE-2024-27949,0,0,7571c2eec4740781a9a2f5965e4f7152dcfbce473dbe8ae2485667fe0e9ebffb,2024-11-21T09:05:29.090000 CVE-2024-2795,0,0,cbb3083cd20608539cd31cee2da48aa63acf65d8b787a018dc03ebe3f26d6f51,2024-11-21T09:10:32.120000 @@ -253781,7 +253784,7 @@ CVE-2024-28589,0,0,1bfa399e8667380e57d79d60e7e8112d34b500470544fbd640b99eb387afb CVE-2024-2859,0,0,dac8d21db08b510f0688c306fab175a2c2b28639dec048727d7d670e2d55c32b,2024-11-21T09:10:41.990000 CVE-2024-28593,0,0,1a079ea18745517fd72417a437989c95fe391bb286fe69494ae3e8d32ae13d70,2024-11-21T09:06:40.980000 CVE-2024-28595,0,0,66c34ce4bde45fe86231be9499209a487847155b52f1ce03ae9c3349832dd0c2,2024-11-21T09:06:41.353000 -CVE-2024-2860,0,0,f04bdfcb8b51dfdeb812550831a6e67d8768a37054487575816d8b0a3b63aa26,2024-11-21T09:10:42.120000 +CVE-2024-2860,0,1,10251222dd61f264c5573f16801b3605bbe75235d60096fd89f14c7bdd2709e8,2025-02-06T17:54:45.057000 CVE-2024-2861,0,0,c2d3624bb2be1c2521a84faa67c026ea9a14975ce99e1b76831fa573f79b5912,2024-11-21T09:10:42.250000 CVE-2024-28613,0,0,1e06981ecb1401862be92768d275fb03ab14ccde7887b574aa43591385c5bc3e,2024-11-21T09:06:41.640000 CVE-2024-2862,0,0,14a1762a6c3e20bf3034d91b1b834706f11e22304545cc9e55cbfbe0c8b435d2,2024-11-21T09:10:42.370000 @@ -255136,8 +255139,8 @@ CVE-2024-3039,0,0,f8c1134c02cb56fcdef93cfda91853c6b28b369a533ccc823dc09c5759efd6 CVE-2024-30390,0,0,9167fd18a72b63a549cb4805b98b82a068299c15839b30307421f6bc5ec0442c,2024-11-21T09:11:49.743000 CVE-2024-30391,0,0,26463ded791348d93d472c555f39d23710f07b99c228bda423ecaddde8772c30,2024-11-21T09:11:49.877000 CVE-2024-30392,0,0,b065ca165687360d84ba02e43d04835f798b47b0cd57f527ccc64d72d770e70a,2024-11-21T09:11:50.017000 -CVE-2024-30394,0,0,52addee2ef2090c5a4c90a26d1ea24441125880d46bda8363fa3518944b0b47f,2024-11-21T09:11:50.160000 -CVE-2024-30395,0,0,269beb05107c46ac31cdee7251b8c9eaab2e1a8243caa36ba94806d2c8a1b09f,2024-11-21T09:11:50.303000 +CVE-2024-30394,0,1,282a1d5b5196375d15831e6bd393cab1f623bd77958f81043f7297f549a1ea27,2025-02-06T18:39:12.470000 +CVE-2024-30395,0,1,78b53f43de2e8d4fc94e7e6cfa8d455e8d1b61416414b6cb165d9e06dbce8f2b,2025-02-06T18:39:02.430000 CVE-2024-30397,0,0,e8d26c609669b43a62044924d609ee4f86c72d9873d1901ee01000b54745a84d,2024-11-21T09:11:50.447000 CVE-2024-30398,0,0,c0128d712f61883d46f7c98ec83f67266147bc909ec4c59e416c56bd9d8e160a,2024-11-21T09:11:50.580000 CVE-2024-3040,0,0,e8c4532d809f9a8b19abfa76a9f6ebe9924a89e71110ffe1060952aafc9cc4ce,2024-11-21T09:28:44.500000 @@ -255147,9 +255150,9 @@ CVE-2024-30403,0,0,267900985710403452224865cf74913dffb6fc592e9ef6c6e3ed6bd147361 CVE-2024-30405,0,0,93ca037c766cfbea85d792ad3da86ac2017744d3b9276fae2ab082c4c193089b,2024-11-21T09:11:51.157000 CVE-2024-30406,0,0,263c121b9935ac1f0cba68507fa3ddf84f6f74b8de0b1d32637ecd0e25ab0902,2024-11-21T09:11:51.300000 CVE-2024-30407,0,0,3406d1368ddd83e61968965dc4c4570bf87e9ccfa14bdcb20ff4987c446bc626,2024-11-21T09:11:51.440000 -CVE-2024-30409,0,0,3244918aa8e573a5842e9c6cc6c198941216f7943b9b9bc7850f8f477ea0628f,2024-11-21T09:11:51.607000 +CVE-2024-30409,0,1,402f5335486175569efe57a40ebcbb8d4d027fe6871c2eb8345aecfb1a962d50,2025-02-06T18:32:50.510000 CVE-2024-3041,0,0,6f2bffc2e1a437822437c063857217532c383d64d6768a16e1a8a163af570748,2024-11-21T09:28:44.667000 -CVE-2024-30410,0,0,a909b12a46475b577428947e22bd0155dbc46a7b2ba10e40ec29308d3781e22f,2024-11-21T09:11:51.757000 +CVE-2024-30410,0,1,987c9089b9684d584832777808a90d7753e404175aa42736cc3471e077538a12,2025-02-06T18:21:04.777000 CVE-2024-30413,0,0,8b2fcb61d9248313939f7e26b7251e9fe525eb574f922f425a89ae50be45b77f,2024-12-09T18:33:13.660000 CVE-2024-30414,0,0,1cbf0e27f204f782c07469ae5f2be612236272d538f377b4392129fdcb02311a,2024-11-21T09:11:52.047000 CVE-2024-30415,0,0,fd280c5c87e2b4090f2d65136432e219d0920e7ac6771b8b662f7b008a1b9bfa,2024-11-21T09:11:52.227000 @@ -255201,7 +255204,7 @@ CVE-2024-30456,0,0,3b319bf606c266f33dce1e9365d6a96a64d0b365b070db2d43a512cff55ef CVE-2024-30457,0,0,139e634767f3e800b6975b518d9104891f1cf3cea8a5e4ff0346a1015c6f78bf,2024-11-21T09:11:57.863000 CVE-2024-30458,0,0,31ee813e32b80bec12e11d4f1053babce9599a613a4ee3e754b18321eb8ce9ce,2024-11-21T09:11:57.990000 CVE-2024-30459,0,0,07cf176cd29f78f03e7cd46d8baece3e54d45e20ef8c4dc87ca5cd03d705aac0,2024-11-21T09:11:58.107000 -CVE-2024-3046,0,0,ebdb7cdc97325e80ad63d7aa8339a63ef1aa4633c6acd9060205c77257287f3b,2024-11-21T09:28:45.457000 +CVE-2024-3046,0,1,73f463ae615db3578b107ae28e5ae667ee9e298d51b55f0233112ecd07cb8a18,2025-02-06T18:07:07.747000 CVE-2024-30460,0,0,630e5c2ffb4a95824e8e4853a7eef4c8bce151f8e1e356e31fe09b006020c589,2024-11-21T09:11:58.223000 CVE-2024-30462,0,0,de44f93354209bc72cc996bde10718ff344d11973d211ce8b1723bb75082c472,2024-11-21T09:11:58.350000 CVE-2024-30463,0,0,4649a86c5e920678dade7c66bacd35af26317d67d7bedcf696fa842f75297167,2024-11-21T09:11:58.470000 @@ -255584,7 +255587,7 @@ CVE-2024-31063,0,0,b1a298bb0ba6c4c6d6137ab2a5b0c69d571b1288ce8f85730331fa203124c CVE-2024-31064,0,0,4412d32292f4f1a606e86dde19af7fec75a1aa99b33a1873a73f9908346823b3,2024-11-21T09:12:47.083000 CVE-2024-31065,0,0,a00112f4528754b8c1afee754696d282ee5e69a60575a305b812e8485c2614ed,2024-11-21T09:12:47.320000 CVE-2024-31069,0,0,fb53502e6d7be7a5a82d5cf9033afaa2c76b005b5ac9eb9741b945f53d80a4ae,2024-11-21T09:12:47.533000 -CVE-2024-3107,0,0,57b2a2aafdaf5eefdedc6616496fc66ce64b47cdd68923d661aaeddcff85b34f,2024-11-21T09:28:54.857000 +CVE-2024-3107,0,1,c22762523eba600b4dbc1b069854272268244e515078d9e612846739a0b99f1f,2025-02-06T18:05:03.810000 CVE-2024-31070,0,0,1c611948de1365114224205017306826df6e14c3741670ceac64efb86dc1f19e,2024-11-21T09:12:47.663000 CVE-2024-31071,0,0,d588fd52b561587765d8d52346268042bc1c49cbc106c6b370e0c836853f77c7,2024-11-21T09:12:47.910000 CVE-2024-31074,0,0,01d64d0a51bf3ec3df5d6c59c3da5338deaaf4325178cfa318378ec4fdf90dad,2024-11-15T14:00:09.720000 @@ -257608,7 +257611,7 @@ CVE-2024-33698,0,0,4ea57f0cc8a312f87370897367d94743d3e8e2246a2e22a1152a2d834ffce CVE-2024-33699,0,0,458e7a7b3d1333ee5c45aaa1189ebfd93e764aed965cf8534dfc556b9d953918,2024-11-21T09:17:25.897000 CVE-2024-3370,0,0,4977c8af342ca5e43bc003b305e8d121bc66eb96b01495a3eae5208891dcba00,2024-11-18T17:11:17.393000 CVE-2024-33700,0,0,407022dfdd24550f293ac6fd28c96f8309930375ca8392caa396c0d28c47198e,2024-11-21T09:17:26.020000 -CVE-2024-3371,0,0,7a2a116524d6ad2657348ae42fd79177cbbd90a9e92630581069c9644230aa48,2024-11-21T09:29:28.960000 +CVE-2024-3371,0,1,cc589373ae662508941a855023d27fc8418d237328f0b34fc7ce1fb0345e52d1,2025-02-06T17:58:01.577000 CVE-2024-3372,0,0,9985599742d439ffa17423dc746ef69a4c46078d1a4bc85b4d1bdf33a84aad3a,2024-11-21T09:29:29.083000 CVE-2024-3373,0,0,96f798528e4f26f5f7ed620423ce0ceea8a332fb5523807f0664c03b7076ff87,2024-09-30T12:45:57.823000 CVE-2024-3374,0,0,420f73150af02275166b9c440c567922c144b0ea7f73169b89eb730ef81c3a98,2024-11-21T09:29:29.323000 @@ -258100,7 +258103,7 @@ CVE-2024-34383,0,0,368afe4ccd3bcd0c564e31b32a6354242bf4d2a1a8eb2a057367148cbc4cc CVE-2024-34384,0,0,96baee298b94f91577980ebb1ec9dd30ac39b004b4ae716c15725a34785b0218,2024-11-21T09:18:33.463000 CVE-2024-34385,0,0,db9a31aac2715305d92de29ce46df8252edb655c8c22e8169c5b06a794473108,2024-11-21T09:18:33.597000 CVE-2024-34386,0,0,9da976d24e0d5aeeb02414cc0c4aae3577ee02aa899b3c07190d502d9efc750d,2024-11-21T09:18:33.727000 -CVE-2024-34387,0,0,dfe2a4b3a4c0ad7619f8f4b546852f0a2ee09e737159e3b54af6d17a7a0f1696,2024-11-21T09:18:33.847000 +CVE-2024-34387,0,1,d700e1218edc69a5918da3f94f049752d12878e66103c3e9fce405c787443117,2025-02-06T18:00:25.190000 CVE-2024-34388,0,0,33f199fe21c651ec8f4605befcd820e055517d139bd0be99e6e03301767972e8,2024-11-21T09:18:33.967000 CVE-2024-34389,0,0,0c7ffb5d9d3d2ed613c09a1ed7a9b4f3f2574b913c36b95aecb6789f5401d15a,2024-11-21T09:18:34.083000 CVE-2024-3439,0,0,1de1ce698d975ed4a2550822063838233878d08b05c8467b61676ffa90c33ba5,2024-11-21T09:29:36.577000 @@ -259847,6 +259850,12 @@ CVE-2024-36548,0,0,01b7ce50cf0fc63201e92693d54aaa0bc9a11618ac9b6efd8349380331b85 CVE-2024-36549,0,0,224449c544d61b2ff0b40e60f64777eec95197970a9ad86d6e5188f71eceb4dc,2024-11-21T09:22:23.910000 CVE-2024-3655,0,0,22a504c089fe887876bc27ad5b7ec22ec3c09d25a44f1078ede97c4adbd0433a,2024-09-03T14:35:06.060000 CVE-2024-36550,0,0,9e2ca3c2189fe235c68b1b738e70fb08b06a861a221a4eb60674aa7d98bd37a0,2024-11-21T09:22:24.137000 +CVE-2024-36553,1,1,31b38d0ecd60673d0ddc9de2a7744d882ebc9cde7c798b79ea0483b560f5220f,2025-02-06T18:15:31.100000 +CVE-2024-36554,1,1,4384d0672eb69dee6bfee745e6e8595ac690f81db61d0db012ddc741316e7433,2025-02-06T18:15:31.273000 +CVE-2024-36555,1,1,bc124197bfba85a14e7ffc67eb97c3abe05c39acdc7dcab66789c62d37c939c5,2025-02-06T18:15:31.423000 +CVE-2024-36556,1,1,f85c5238a55ef66515887cafb8667338bd3ddb4b7bdc976f2c23eeef37febe8e,2025-02-06T18:15:31.580000 +CVE-2024-36557,1,1,0d13210db59a2d83ea083f90c2b8d9a5283c6f84eb916d8a69197217ac640157,2025-02-06T18:15:31.750000 +CVE-2024-36558,1,1,bb3adda23a629d8895c2ecb0a9312a273e1769c7815ea74281dbb8368b888913,2025-02-06T18:15:31.903000 CVE-2024-3656,0,0,cc6741c2183e9b71634bb4ef1d35a6085988e0cc98193d8f3bcaf2ac00dfb710,2024-12-23T14:15:05.553000 CVE-2024-36568,0,0,4dc3650ba5db2618f853f2d8a4fc5d941192ca1d82f4f78ca0f379bf1740efe1,2024-11-21T09:22:24.367000 CVE-2024-36569,0,0,237834c9de6e90d428bcfe4a628116c726e8895e63611649f26cb41fa5adc5f6,2024-11-21T09:22:24.610000 @@ -260331,7 +260340,7 @@ CVE-2024-37224,0,0,16af1d8f7084895f19150b776b7ea9ba3e194d1de5b36a77065680997f98e CVE-2024-37225,0,0,2632f3ce1fac81f432fab34e6e841b74462f734ca24cfa3af34d37538e8219de,2024-11-21T09:23:26.237000 CVE-2024-37226,0,0,60247aad9e98c04846eefa8d9f0ecf89d39b62cf7f72e6c340d0582a3bc33720,2024-11-01T20:24:53.730000 CVE-2024-37227,0,0,362c60ee52e342bf2b09c78c9f011c66dd2232fbece83790f869514cd88cdb37,2024-11-21T09:23:26.463000 -CVE-2024-37228,0,1,9b344fcfb9e4e427191b4a32784bb110702bd6e461c638a6da7feb6c920bee8f,2025-02-06T15:04:42.603000 +CVE-2024-37228,0,0,9b344fcfb9e4e427191b4a32784bb110702bd6e461c638a6da7feb6c920bee8f,2025-02-06T15:04:42.603000 CVE-2024-37229,0,0,66a30cb2323adeab360ac04e73514f5de4c98679fb5cb3a56eb2952b26146051,2024-11-21T09:23:26.697000 CVE-2024-3723,0,0,2efb17e4b102dffb37ba9fd34892d3de3c1e8933bb9a2d8c63f4067ba8f92f64,2024-11-21T09:30:14.883000 CVE-2024-37230,0,0,b18465819145ec877965d5469458081bf6f8432055a087b7ee8c551db2ba9814,2024-11-21T09:23:26.823000 @@ -261878,6 +261887,7 @@ CVE-2024-39027,0,0,9c0579dae898d595139f332264c60946a6305463079e5e828b96e35983d71 CVE-2024-39028,0,0,655f86c8b3e4e1291e9d2943922a75fa2fc9393ff19cad0b2a5dbdcb29dc16b3,2024-11-21T09:27:09.863000 CVE-2024-3903,0,0,3abc3093808cbf33494e777ab78a2a1f0d0a381b5e414e8aae50b0d04cda30b0,2024-11-21T09:30:39.727000 CVE-2024-39031,0,0,31600cbde8bea78bc56e4a9598adfa8ee74fe57d43a5d0365ca0ab764476d743,2024-11-21T09:27:10.103000 +CVE-2024-39033,1,1,1fddfbaab85a7b30af84db5590fcc697b3b4cc4be0ba70982579180eeb4da62d,2025-02-06T17:15:18.553000 CVE-2024-39036,0,0,b4bfbf7ae964d272ab5cded04fc4273edac34005bdb2e82fca5b7e2e2aae34a3,2024-11-21T09:27:10.370000 CVE-2024-3904,0,0,ad761d288d957d794b31c5702f59b35dfd5c44b747d0c7e16f2e403dae30a0d0,2024-11-21T09:30:39.910000 CVE-2024-3905,0,0,9aec538ba78b45e146b8f6c24f3c93fb5bc07cae6875cd9278304145b8c7d491,2025-01-21T18:39:28.047000 @@ -261966,6 +261976,7 @@ CVE-2024-39250,0,0,21b05446dfdc54cf0c98fe165562927c7c8516143bc3a042c68b6df4fcb55 CVE-2024-39251,0,0,436e36fb029e96f3eeb340649f39e7025990c183f0b0096b87a3f46c8d1727ae,2024-11-21T09:27:22.573000 CVE-2024-3926,0,0,fa19456efa357b066885387799b645bd8aa9371a065efe590ac8cd9be31edae6,2024-11-21T09:30:42.947000 CVE-2024-3927,0,0,c5a7a83540dd0108e0c95456e196911f953d1c089ad9153186ac7abf5eac21fd,2024-11-21T09:30:43.063000 +CVE-2024-39272,1,1,d2b56cd2bf724722ff345ac093b9ef2dac96c14503b7b0016b361c27968d6409,2025-02-06T17:15:18.647000 CVE-2024-39273,0,0,5181699ccf93ef18ef6af16c2c5b39bedb60a9d8446642e1b83f04b362725f80,2025-01-14T16:15:30.227000 CVE-2024-39274,0,0,6e7d1a33b0e5d020249e1265d5c2fe803a054c23d02db7f7ac41bcc85d95ece2,2024-08-23T14:39:29.247000 CVE-2024-39275,0,0,3a30aa64f40c900af2046a32b51bca26459d15ed56339ef5c87dcb823873ae2a,2024-10-07T15:25:17.050000 @@ -262874,8 +262885,8 @@ CVE-2024-40671,0,0,4520d06fdb2a855ee77cf9a82325fd4ddc6fdfedc3ecf68cb89582eb0d5cc CVE-2024-40672,0,0,ac7c54609a54adb80cb16ed101c5208cd17609dfb76effcf180af3d24b4b3c96,2025-01-28T21:15:17.657000 CVE-2024-40673,0,0,61aee541d995cf8875e7b90e4c206465bb0d1ad41d048828fb91dee9cd5c5faa,2025-02-03T16:15:32.823000 CVE-2024-40674,0,0,9a576d1eb402c4db6f887e21d92db032d5bf8f2aec8c63e0fb5e714adb30b3c7,2025-02-03T16:15:32.973000 -CVE-2024-40675,0,1,5bec528791067eccc366030007588d62c2c1b6fc87d3d97b3732654f0cde4f91,2025-02-06T16:15:37.277000 -CVE-2024-40676,0,1,aa39240468f12d502b2546fab7558a23ff58e4a4af3dfb23b30aa474f0aeff81,2025-02-06T16:15:37.443000 +CVE-2024-40675,0,0,5bec528791067eccc366030007588d62c2c1b6fc87d3d97b3732654f0cde4f91,2025-02-06T16:15:37.277000 +CVE-2024-40676,0,0,aa39240468f12d502b2546fab7558a23ff58e4a4af3dfb23b30aa474f0aeff81,2025-02-06T16:15:37.443000 CVE-2024-40677,0,0,90386d684186b06e6fb98b69610b823a3328b6d3479e93091da65faba15711ae,2025-01-28T21:15:17.797000 CVE-2024-40679,0,0,ab37f5e30f32673081958808596357f8a003dc4d5169bfc16913d632a4e3eccc,2025-01-31T17:14:12.627000 CVE-2024-4068,0,0,6064b7191c4bfe6385dfb9559ff0d900f6a3c128ca3c30b46fda682863dc73a3,2024-11-21T09:42:07.710000 @@ -263514,7 +263525,7 @@ CVE-2024-41551,0,0,e1d018116726b59a859c54c726d033d68adc85dd274a77d026bca8345fe43 CVE-2024-4156,0,0,6f9b01015adaa4ff0ac52ad6f60aa60b33aca22e2236ec15beacb1162f132472,2025-01-15T18:04:58.607000 CVE-2024-41564,0,0,24f60296f7995573baa861824a54d1622bd6248d719f1fa88e107bb7ee60a876,2024-09-19T14:40:32.270000 CVE-2024-41565,0,0,e90f9d0bec65bf131f69559e330499ee7d867ffa90ce21c920c44c5a44079338,2024-09-19T16:19:59.317000 -CVE-2024-4157,0,0,3b4a953e70ebb437de1ad14041aea1d4ddb40efd03289f86d3c89dadae0ffc8c,2024-11-21T09:42:17.900000 +CVE-2024-4157,0,1,29d22a0a757cca99ea487ddaea2d2e53381fd88b5244509866bd98027aec7fca,2025-02-06T18:36:20.893000 CVE-2024-41570,0,0,bc7c6440b2a67efc5463bb4c39b989d97eed435dea63e8e6c437acf558913c6d,2024-08-29T13:32:21.020000 CVE-2024-41572,0,0,a9f0d828cc4e2bc36792fc456a6a868ace184f72abe54a0c002137b56b623f16,2024-09-11T14:15:13.380000 CVE-2024-41577,0,0,b1f882437231c85f732c91780240de4516b5d2682e39952346ec72953d56207b,2024-11-05T22:35:07.160000 @@ -263527,7 +263538,7 @@ CVE-2024-41586,0,0,1dfe0a57832209bcd6e050fea5d10d9e2cc77b9729ee84c61dfed10c20884 CVE-2024-41587,0,0,8ec618c35df2d6b6c47f939e884fc8f9f85c116799f47d62322ced2da972c24f,2024-10-08T15:32:18.313000 CVE-2024-41588,0,0,fd3ce7f7855398e35ab5f6ddf4c9ca224e9b39f193258ed7cd185f9bbcbce78f,2024-10-07T19:37:15.063000 CVE-2024-41589,0,0,933f60891b4d710c7b37c18705d8a2738d871d9d2c4ed1642f1e707d191ac66c,2024-10-04T13:50:43.727000 -CVE-2024-4159,0,0,33532baf754df2b5143071adcac3c803c579f7f9680c047b248e1dbfcd7921c5,2024-11-21T09:42:18.133000 +CVE-2024-4159,0,1,79fc1543f1260705e74b8deeae175c555b129f183a9014a6e4288a6f9681a384,2025-02-06T17:49:55.727000 CVE-2024-41590,0,0,1e2ec45258e7c07e175972d8811464c9173bad3d822ce356ae18fa7f32371b1c,2024-10-07T19:37:16.150000 CVE-2024-41591,0,0,9767b51f50983ef943152726983cd0f16f4c2ed85dfc575b8f6635c8aedb6c03,2024-10-08T15:34:46.453000 CVE-2024-41592,0,0,6cafebc6f0d6fbb4004a1dfb277a5338bfce167123047c3517ae584872bca55c,2024-10-04T13:50:43.727000 @@ -263543,7 +263554,7 @@ CVE-2024-41601,0,0,24d5874bc7cb95d07f742d5d1793554eddb41d336e6f486826186b821534e CVE-2024-41602,0,0,e468936d57b3a3622bfd9d63c4330d90ec2e1727d154efe9fd4cd7b9544c36e1,2024-11-21T09:32:49.867000 CVE-2024-41603,0,0,9a670a1274f5fda7a31aaaab662ed5464115536c9a59c98d4aa278930a602bd7,2024-11-21T09:32:50.083000 CVE-2024-41605,0,0,2ee5b1df8b80351aa42bd277a05ebe6cfd3eeadae217388add65bc02cfd62e6f,2024-09-30T12:46:20.237000 -CVE-2024-4161,0,0,4d78897ac80933cd171f3f0034f0adad3b50b8a382c9743c994550349265e94f,2024-11-21T09:42:18.370000 +CVE-2024-4161,0,1,1b6be13aebf10d87c0f4597f26cf874ea32ec0118ac42fcf6ef1f439dc2d672b,2025-02-06T17:50:45.147000 CVE-2024-41610,0,0,ee52e88443b2f617e3925db264d751b2bb4fbceebf67245eca9aa7aa17900d82,2024-11-21T09:32:50.507000 CVE-2024-41611,0,0,d336e31da2e56f9dc99927877cda9dece32880476434433bac7111aed24f4268,2024-11-21T09:32:50.723000 CVE-2024-41613,0,0,b5839e9cf5e2defa3647c67fdf9f50fc087e41d0dad936c67d39705f8d63a28c,2024-08-14T18:13:25.017000 @@ -263651,7 +263662,7 @@ CVE-2024-41726,0,0,1634589ac3ac4ec4129067b4ba8087d1381f27ca1092297eaee5f918681fe CVE-2024-41727,0,0,415c4c6276b486188d6e6914f90931e80153458b758b99e57617b7ad6d32b486,2024-08-20T19:25:12.490000 CVE-2024-41728,0,0,da066a33d0f0d2dfaa585ea4e3472de9187a4f59e3c0192c0243458b46de0f68,2024-09-16T14:14:52.840000 CVE-2024-41729,0,0,96dc04676b815e555a804314dc8047d39c132aa5becf84a2c900894243d11d5b,2024-09-10T12:09:50.377000 -CVE-2024-4173,0,0,c74e598c37e99fd510f42e1f5cc707854d4d9a1737c7799575c9e437d2ae7add,2024-11-21T09:42:19.913000 +CVE-2024-4173,0,1,9e89f7b398b0c012488f349bc037f0cf65ddc15b2a33e8514b27cd2dd5ce161f,2025-02-06T17:53:25.287000 CVE-2024-41730,0,0,ce7277ad2a7258c483d2e415f893f21fd08dcb4e3029ec3b962ae7e1408020ed,2024-09-12T13:56:51.237000 CVE-2024-41731,0,0,d0eb550e39ae0d81931b4ecd6064892f550794d739af705cd7bb0cc8cfca45d2,2024-12-10T07:15:06.187000 CVE-2024-41732,0,0,8bfe4c2fcb6c965e1260a4713476ae411b9ce3b0a3f11da9ea27c89aada979ab,2024-09-11T17:52:39.477000 @@ -264860,8 +264871,8 @@ CVE-2024-43284,0,0,6750e3410b47d0a62cf30e42a256afedf95cbc8eac307ad647642eb181dc6 CVE-2024-43285,0,0,fb373918e776d744404fd70c5a773fba11b22250707469d84d51c3f8bcda5aa0,2024-11-01T20:24:53.730000 CVE-2024-43286,0,0,3a1e79886391c35195e0edfa4bc3e37de563f7ba18f8336fc1d62a4110757016,2024-08-19T12:59:59.177000 CVE-2024-43287,0,0,1403263a70a623aa46ce8cc6cf78254a39b6b8fc85c8e82aef37c3e8fef8feac,2024-09-12T21:19:51.183000 -CVE-2024-43288,0,1,f717d3427a0c0cf241c7104bcb2dec353b1f22faf073e6d8f4b7080b289b1b28,2025-02-06T15:40:32.307000 -CVE-2024-43289,0,1,c2f22f683cae31e628630c6f37cc33cd82a127c6d8117d1deb25b946147a4ae1,2025-02-06T15:50:41.907000 +CVE-2024-43288,0,0,f717d3427a0c0cf241c7104bcb2dec353b1f22faf073e6d8f4b7080b289b1b28,2025-02-06T15:40:32.307000 +CVE-2024-43289,0,0,c2f22f683cae31e628630c6f37cc33cd82a127c6d8117d1deb25b946147a4ae1,2025-02-06T15:50:41.907000 CVE-2024-4329,0,0,e6b8069a5e983b91520fda2de6cc101ecd499fdfa644e7ddea3fd43d16576c4d,2024-11-21T09:42:38.283000 CVE-2024-43290,0,0,aadbec5a5ad4a64e579a5e00cc442715fd6b805de0add0298fa795b77ecbdd94,2024-11-01T20:24:53.730000 CVE-2024-43291,0,0,c0b0d0c2dc076163a61951abd6a856fc48e1c45878c51057318ede8714ab7cda,2024-08-19T12:59:59.177000 @@ -265337,6 +265348,7 @@ CVE-2024-43774,0,0,267603d5dcdafd9bbb030b267307fb5b633f3e8c3df39d738d42af146bd76 CVE-2024-43775,0,0,895151aa205f09b9fadb348edccc220463b0287de3568477154d6fffb476bf97,2024-09-04T12:27:22.670000 CVE-2024-43776,0,0,0e7377c058f9e86c53a9fbcebac62784c97230bd50dee78fb2efa5dfee29a277,2024-09-04T12:27:40.113000 CVE-2024-43778,0,0,93d68d17e0a2e000a95bbf7644af02e0b191bd578d600aa43c2fc854145868d0,2024-09-20T12:30:51.220000 +CVE-2024-43779,1,1,5d6b9330a0784c1f922610451abcf56d46e7f6b71bc7785934b7332cd6dc5a03,2025-02-06T17:15:19.160000 CVE-2024-4378,0,0,d4319ee5339d2a9817c61070bfcf510c89afd3406f28aa380fe0de9169b486dc,2025-01-08T20:07:57.800000 CVE-2024-43780,0,0,46050aabd5861673e59431ba81794de47ac0366f2a10d4dfb8ab15f44f094284,2024-10-16T20:07:50.637000 CVE-2024-43781,0,0,169ded40ca31dbd1f0dfd97b5659e936ba8664c1c6e73ed600899e39b741292b,2024-09-10T12:09:50.377000 @@ -265370,7 +265382,7 @@ CVE-2024-43808,0,0,048676ae28beeecfa459c95f3b615dd8c9ee7bd93afc5482718303181ce61 CVE-2024-43809,0,0,8423b553089ce61b4d1aa0c612972c9fbbe05ff2675d1036f999543309811a2c,2024-08-19T21:11:28.327000 CVE-2024-4381,0,0,806b8e65234275bc092e706cff2497f53f063956c6a91a6fb12b05d2d474a1c4,2024-11-21T09:42:44.190000 CVE-2024-43810,0,0,7e38661a6aad7d089eadf0392fd08ad95bf063859ad81b6a308e853340557822,2024-08-19T21:11:45.823000 -CVE-2024-43811,1,1,645c3df687c4979dd29201a4a80530137aa15a8502fb88d587cea6ea14d432ba,2025-02-06T16:15:37.600000 +CVE-2024-43811,0,0,645c3df687c4979dd29201a4a80530137aa15a8502fb88d587cea6ea14d432ba,2025-02-06T16:15:37.600000 CVE-2024-43812,0,0,d0cfe8c0d56df89eceba40affa48582d70e2c55016b5c71742c8178799b0ebfe,2024-10-23T15:12:34.673000 CVE-2024-43813,0,0,362f2b880ad07d28c3be2c47e86445c7fc203b68d7211ca7761384f11b566eee,2024-08-23T15:35:12.617000 CVE-2024-43814,0,0,b5032c8b0e6ddf8d44a29d16b5549dac69e7c65ef5eb36aec81a0ed47a9d5aca,2024-10-17T18:15:04.773000 @@ -266462,7 +266474,7 @@ CVE-2024-45345,0,0,4e5002e5dc81035c1af4e238f5f319df35e1e7454ff3bb9f51dea50624303 CVE-2024-45346,0,0,7e5d27b5e0bb35d703afc2aa4711ce7de5023d11e83b251a6cc5a4802c05e84f,2025-01-09T18:15:28.703000 CVE-2024-45348,0,0,1e1db77a5a16312aa537fb47b5ac485ad4a9ec1edf7b08e9d1addf2cc98471e9,2024-11-25T17:14:11.713000 CVE-2024-4535,0,0,09bcb906ab5065886bd16710eccdce15006e447ef07dbc5cac7e797ac8618de8,2024-11-21T09:43:03.457000 -CVE-2024-4536,0,0,3fb92d07548451cf370a2be917025605b953042b057858c7e791071bd2661a87,2024-11-21T09:43:03.563000 +CVE-2024-4536,0,1,d554a9fba63153c422b87ae2d4b0219537ca1cbc00fd943074006c5d6a843426,2025-02-06T17:32:48.777000 CVE-2024-45366,0,0,d13f4b03dcbe654ea752888fe69e44580333b063ff67391732408feaba64beb9,2024-11-05T22:35:10.920000 CVE-2024-45367,0,0,52ee3f66db69a964bee9b68a4b313e658b9e6142ecc7bffcdc98b979c0bac4a4,2024-10-04T13:50:43.727000 CVE-2024-45368,0,0,0df313c0124da271d2ee1491e7393fda4b02992ab2b9f7115e22ddbea19c65a2,2024-09-14T11:47:14.677000 @@ -266710,7 +266722,7 @@ CVE-2024-45711,0,0,22c1ac5b6f0da26129aa7e9e3ba97f2e8dcb4bd8ce735f9d8d4ba8f17c970 CVE-2024-45713,0,0,666522689d545773fb4d393ba17dd5329ddd1a19e8fc068f6a0a4d4daa205b75,2024-10-18T12:52:33.507000 CVE-2024-45714,0,0,c21a61c96d9ad07289ac1311a92c3e561bfa126cb238bbc3e6ffd66427ef24a4,2024-10-30T20:33:59.393000 CVE-2024-45715,0,0,d3fb9264b9b6b17a27e9bf802a32d0a997e0ee9ae039d618bf7318b8cba5cd8a,2024-10-30T20:59:19.737000 -CVE-2024-45717,0,1,b575beb45bb97ad466302a3dccc5d8dcfa46f4979fd443a555c6f8535e51957f,2025-02-06T16:23:40.557000 +CVE-2024-45717,0,0,b575beb45bb97ad466302a3dccc5d8dcfa46f4979fd443a555c6f8535e51957f,2025-02-06T16:23:40.557000 CVE-2024-45719,0,0,6ca7636d4f46abcbe25b85f74f485dd396329e29ed902891ee416ba7b0049fcb,2024-11-22T21:15:18.130000 CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000 CVE-2024-45720,0,0,ab26e4a66e708abfafd5a0e7f8395b5431ac8a5c3efe1cec42e73393318df61a,2024-11-21T09:38:01.030000 @@ -267557,7 +267569,7 @@ CVE-2024-47086,0,0,63473724fc366f58b877dfed9456a75923cb2dca0b63de6fc657bfea2fb6c CVE-2024-47087,0,0,aadede43cd6982b03d609814fe13168dfb2ee6915d193c1af719e757a292b001,2024-09-26T15:25:51.467000 CVE-2024-47088,0,0,efc4d9edbe3ddab005f2b2845098209fc6282389589b324ea91fcecf3010d130,2024-09-26T19:12:58.083000 CVE-2024-47089,0,0,7c817288360e94794b37bdc1706058a816cc69e4972a94427a49b22937a99014,2024-09-26T19:09:44.377000 -CVE-2024-4709,0,0,613e57ae1ceb02dcd7cd23d2e724aec8eab6480f5f138696ad2d1f217ee1ae65,2024-11-21T09:43:25.490000 +CVE-2024-4709,0,1,fb8e04b1891ec411dac50f73dd21b9dddab9f77110643379d3cb27db5c3b5a21,2025-02-06T18:37:12.683000 CVE-2024-47093,0,0,254373901b8fc660464b2e2de4e7fbfe56fe2ef0b4d8cc4ab6e7d7491a830b6b,2024-12-19T15:15:07.250000 CVE-2024-47094,0,0,d24e1f292f7d19d40d32d967d3e72cc931ea886edc80358cb771de69f5f1ca5a,2024-12-03T20:01:52.610000 CVE-2024-47095,0,0,ab3ae5fb8cc2610821c1dec2e1fa7073f06cbe80c80fa571d8c05d61db95648f,2024-10-10T12:56:30.817000 @@ -268151,7 +268163,7 @@ CVE-2024-47754,0,0,15efe46b5acd24e6a048863fe4e659f9670882dda2e519b1e7e7ce2228e3b CVE-2024-47755,0,0,8cf25d07e196e075734f98083f38dbef19fd8e91fd1c66d640e943585b9e2f41,2024-10-23T06:15:09.873000 CVE-2024-47756,0,0,1de05fda503d02fa87bd65fed649de9909414f3433775c910b61f18ec7e108ff,2024-11-08T16:15:28.193000 CVE-2024-47757,0,0,4e322af9265d57e4063793da36297e2e8e33c72df9516cf2e3471642eb8d6f80,2024-11-08T16:15:28.343000 -CVE-2024-47758,0,1,ec669c5c35510c55b8a5540b1ffe523262102919146d39b6d52a51d21e0efd8f,2025-02-06T15:21:12.747000 +CVE-2024-47758,0,0,ec669c5c35510c55b8a5540b1ffe523262102919146d39b6d52a51d21e0efd8f,2025-02-06T15:21:12.747000 CVE-2024-47759,0,0,49c8a4cad894257a128c6784b8845f9bef305051388308b136f8c46f5319c99b,2025-01-23T14:25:02.953000 CVE-2024-4776,0,0,2a2b40e79143dfc9f450d4468b54f62c55f3f15452736cde9c1621738d0e995d,2024-11-21T09:43:35.370000 CVE-2024-47760,0,0,b1d82abf7cbfb4a36a9e56c9185c527de45be0ff0775464183e8d54d69ab73b8,2025-01-23T20:23:59.513000 @@ -268525,7 +268537,7 @@ CVE-2024-4837,0,0,bf6369bee9a6dfac96ce0733693f5a63eb4e5fe5734ee8dad577fcabd78256 CVE-2024-4838,0,0,c0d63d16282dd18c836e8aa545fdb45b66bb486d6db7456648ee8a63dd42b02f,2024-11-21T09:43:42.687000 CVE-2024-4839,0,0,a7d79def0ddf9d653428a5a591ff65b460cad2e8b5231f743494cd8efe4a3d5a,2024-11-21T09:43:42.800000 CVE-2024-48392,0,0,1c11dce693d0ee4995c004b60cd37a77352c7b39b9fd83c1c36edbec976ad14d,2025-01-22T22:15:09.283000 -CVE-2024-48394,0,1,99cbb0dc2afe2b9c23e20d05289d801556755b19b67b72fa590439f8187ba4cd,2025-02-06T16:15:37.697000 +CVE-2024-48394,0,0,99cbb0dc2afe2b9c23e20d05289d801556755b19b67b72fa590439f8187ba4cd,2025-02-06T16:15:37.697000 CVE-2024-48396,0,0,02200ea69824b1ea09777c3c3c73e74f2ba131f00cf994b110bfdb34b8d358bb,2024-10-30T20:35:31.167000 CVE-2024-4840,0,0,55ccd5cd93de647439d058661ef78145ac46b40735b9afde6747455bb308fd17,2024-11-25T05:15:11.437000 CVE-2024-48406,0,0,29efd63958fab2009ed4fc9683ab93a6a59efd85a7c3925c93c76285d2372909,2024-12-04T17:15:14.693000 @@ -268550,7 +268562,7 @@ CVE-2024-4844,0,0,e58a1488c0c0593272657966464e317ce8795e1fe0f905dd08d4a2064b2cc0 CVE-2024-48440,0,0,b12e8f498b4696e14421c46fd8136a99002c348d0bb6cd00947a8f2b0d282013,2024-10-25T20:35:11.890000 CVE-2024-48441,0,0,e18fc6f4de2b212db2b7205e1d5eeff25b33b83c871c639edef8600af54d0283,2024-10-25T20:35:12.680000 CVE-2024-48442,0,0,2d256703959d5674c7059d0fc373d70703c32fa535ede7e1382722511cb6ae8e,2024-10-25T20:35:13.447000 -CVE-2024-48445,0,1,06b04c8eac23dd0587253e126013e66013d0d2b584c72a5190da80109b3d6053,2025-02-06T15:15:13.440000 +CVE-2024-48445,0,0,06b04c8eac23dd0587253e126013e66013d0d2b584c72a5190da80109b3d6053,2025-02-06T15:15:13.440000 CVE-2024-48448,0,0,a99f12680e27f2aa26c82e15e379e1be001a083141c2de9e36bbeee9d3fd22db,2024-10-29T21:35:22.540000 CVE-2024-4845,0,0,e1e461ef60509dabf0e7e2dde808d36cb958becba4b5c88bdf30fa8f1c23ed01,2024-11-21T09:43:43.393000 CVE-2024-48450,0,0,2ad4bca80a954b5a64850267d64cde36a0cc73a58476afe8de69f997e4304a47,2024-10-29T21:35:23.350000 @@ -269245,9 +269257,9 @@ CVE-2024-49528,0,0,0689ce0d066659539549c0d5fe4e5762c988f22c283394e11cdcc7c4af333 CVE-2024-49529,0,0,bc912441c1467e88d09c1eebc868707893b19843941c8a4da84053631d70d7a6,2024-12-03T14:37:05.960000 CVE-2024-49530,0,0,aa4a763319d4ffe383b3fab4fe13cddb4a4f1e7c8d88eed78a77597afad1c810,2025-01-21T17:07:34.653000 CVE-2024-49531,0,0,84e1a976e59bc70359e7049b20a3a9336812728e43a6ad2bd05ccb3e7904e21d,2025-01-21T17:07:51.873000 -CVE-2024-49532,0,0,cabb7d628c45a7a3751eb851d9a37dcb0dee5d325edeaad66bc4f4b2866949d3,2024-12-11T12:15:20.753000 -CVE-2024-49533,0,0,2810856bd75248205690772208ec800f6fe4ce7fc996956e4a6e6446a723d041,2024-12-11T12:48:18.580000 -CVE-2024-49534,0,0,91a4013066a325ea34e6a4847385d92f7ca030956a33318227acbcce3d67f1ce,2024-12-11T12:48:19.230000 +CVE-2024-49532,0,1,b58a786c210eadcdd0f95586bfbaec552cc1450c1f6a0658869a66f2a7404c62,2025-02-06T18:28:13.123000 +CVE-2024-49533,0,1,91babea33dd718352e3230bc38ab26f7d4a0d88aed6567e7d2be3d239217cec2,2025-02-06T18:28:01.443000 +CVE-2024-49534,0,1,4c9e398622f4f8d4cb321012fd5d9d84788de269c80e396167a5720a1da7b0b9,2025-02-06T18:27:41.457000 CVE-2024-49535,0,0,69fa5777a789e67947841f1371dc70cef3aeec888dccb58050d6113a7f5c3648,2025-01-23T18:36:07.750000 CVE-2024-49536,0,0,3226abc075af5af9440f5cdc9a3a66360f030ce3d405055960c0bca748fe4e92,2024-11-19T21:21:45.640000 CVE-2024-49537,0,0,ba882a99cef27c89f9b2e8ef04d1eabb52008f24920d39f5c7da20d6b3c16d7b,2024-12-18T15:21:52.587000 @@ -269414,7 +269426,7 @@ CVE-2024-49736,0,0,27824dd9d2ea2e1d6b6c0698e076e4921aa534d7478a119fbd62cd04551fc CVE-2024-49737,0,0,471846391ec1276ebecf5b9a1f7a6bcd968da433a39a8b7e36647c6217d6187d,2025-01-22T15:15:13.150000 CVE-2024-49738,0,0,d313b71a89808187a6f044b9b2d8417504970cb0a631e642bef9da559eab0a9a,2025-01-22T15:15:13.280000 CVE-2024-4974,0,0,d16672721f53b136de1b80de87435b925886996f97e506cdb2d6dc9e6ef8a3f1,2024-11-21T09:43:59.157000 -CVE-2024-49742,0,1,6a74f5edab050210b51e228389fc2d915bf71adac5d8b52f4d66829ed59a9e42,2025-02-06T15:15:13.597000 +CVE-2024-49742,0,0,6a74f5edab050210b51e228389fc2d915bf71adac5d8b52f4d66829ed59a9e42,2025-02-06T15:15:13.597000 CVE-2024-49744,0,0,d9149b626b0551bdda033e6c3e5fd7e77a236d3e100e0971825e6b3f10894dc0,2025-01-22T15:15:13.557000 CVE-2024-49745,0,0,3f919f7aa199c54c2341d3074c8c5b46e0ba6fcf2550fbd12aba17e82162ffb2,2025-01-22T15:15:13.707000 CVE-2024-49747,0,0,acb3452eca834436ea1a62003adaf88e40e233842d86f28389761b776989bc13,2025-01-22T15:15:13.840000 @@ -270318,7 +270330,7 @@ CVE-2024-50672,0,0,a506f4d2b4e62571040ff3dd4b935bbaea397a7aabe2668687c8152c3cc15 CVE-2024-50677,0,0,41d5addef3c1d4fcaf4d23ee7f34aa0575b53eb368f3af05bd4b5c5da2166101,2024-12-06T17:15:10.180000 CVE-2024-5069,0,0,ad719aec2191fa4733004e376bcb495f235c4247fa2915a6912d571066c414e6,2024-11-21T09:46:53.973000 CVE-2024-50690,0,0,a1e4aaa91e6a0406a406f4b4f0b873d04e5babf6d3e42c6dbab61414b81919b5,2025-01-24T23:15:08.227000 -CVE-2024-50692,0,0,3219a57f6cd418586622e8e305a9310f4d31b8967fba76b48787a4c6b89d758e,2025-01-24T23:15:08.893000 +CVE-2024-50692,0,1,b4b232b8fd20cfc83ca910c8b78001cb2d8096ac3932e97d2b610a65820b9588,2025-02-06T17:15:19.313000 CVE-2024-50694,0,0,b192cf8569bb942756ad1070033fb5b23a0338a219f3f58bb390a97c9a59335f,2025-02-05T15:15:20.463000 CVE-2024-50695,0,0,9bf1b957244a59b772ead8b2f70e41a1650386c01d6d5befeea804e2a8547f40,2025-02-05T15:15:20.633000 CVE-2024-50697,0,0,c2b3d7cf93175f8b68f23abd86de617bca86742f6a72538d4881c90354fc14f6,2025-01-27T16:15:31.423000 @@ -271148,7 +271160,7 @@ CVE-2024-52008,0,0,7281563e51f3b39d532519e8a2681001e782e7c2a3e897881477e254e32f3 CVE-2024-52009,0,0,c9066cf7155cd04eacfb31719dd1a8a72528bd2bf8524793c7b6ae503cedfb78,2024-11-12T13:56:54.483000 CVE-2024-5201,0,0,70f2a62b026d2275481fc1646adce1cc60a8e3612df3f1a182e7d38251323855,2024-11-21T09:47:10.680000 CVE-2024-52010,0,0,f693d8dc10fe381f1d93e5d9728758e9faa90c7556c1ec2062d04b5a4b414594,2024-11-21T17:15:23.350000 -CVE-2024-52012,0,0,ce9e159ea8e50da93d7b93c494004981fac5d7e1d57d38d29f44f14da904e3f4,2025-01-27T09:15:14.693000 +CVE-2024-52012,0,1,dc7726d6f55976e17a58afd87c23683cc6ade0bd6d67f5575e49490169267c33,2025-02-06T17:15:19.480000 CVE-2024-52013,0,0,8b6296da77cd7ff5ac33141091f42af5f9ad4a6b318bbf04ba5caf894b9dec57,2024-11-05T16:35:36.337000 CVE-2024-52014,0,0,95c63fbe0d36cf5f1402099d30f68bd084b42e8fece77b8a43cf34d740aab22d,2024-11-05T16:35:37.113000 CVE-2024-52015,0,0,84d00cdc9a202bb00e097769512e415450a582ad27ea697fe4aabe7efef8bade,2024-11-05T16:35:37.890000 @@ -272135,7 +272147,7 @@ CVE-2024-53604,0,0,19e77dbbd22cf0c536f2182ed04fcfa937399395f3ae572f74b753c8357c9 CVE-2024-53605,0,0,8ecdd923e7f721b070d2ccfb4ecaf0eaa48031e234017ed413d81c0a92c94d84,2024-12-04T18:15:15.810000 CVE-2024-5361,0,0,ad73d990c4bd9b694be52243b80a81244f1190d0986e7eec73b93a7337fd4e1e,2024-11-21T09:47:29.953000 CVE-2024-53614,0,0,e0f021daad18a863a0efc93b4705ca0ebff1779316d0f9947e46818dacd2e7b5,2024-12-04T17:15:15.310000 -CVE-2024-53615,0,1,826b150a45003af8ee4c2b07765a8bd01ea4d6e79c525b1590d67c5050792e09,2025-02-06T15:15:14.707000 +CVE-2024-53615,0,0,826b150a45003af8ee4c2b07765a8bd01ea4d6e79c525b1590d67c5050792e09,2025-02-06T15:15:14.707000 CVE-2024-53617,0,0,dd2ee5869a76723244988f189f5e4e219fcd77588c7888e87da2897c111b37d9,2024-12-02T20:15:07.710000 CVE-2024-53619,0,0,7e8e9692dc22af705d23ae8b792483811e548f5452e797f9099331427eac5db0,2024-11-26T20:15:33.880000 CVE-2024-5362,0,0,ad218d3bc95842e117fa458c49bff7d460d472a119fc1f559f5852b4e012b5a8,2024-11-21T09:47:30.090000 @@ -272871,7 +272883,7 @@ CVE-2024-54518,0,0,7a38e22038aeb7be612ecab9809efec16de7547dea2675297852eea4d4788 CVE-2024-54519,0,0,a2d7e4325c7cc6e4b1f41b5f5dbd8b804a1888ca49f38f1232adb57ece7ff9bb,2025-01-28T15:15:12.050000 CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000 CVE-2024-54520,0,0,7a571c6e7b6161d850d15808835c6ab21b6506c1e35c9db1ff402865c5a3fe27,2025-01-28T17:15:25.187000 -CVE-2024-54522,0,1,80fb36ed2a4a59a992326abc248d0ec330053d9d33dbfa34981ed62e5e38966c,2025-02-06T16:15:38.563000 +CVE-2024-54522,0,0,80fb36ed2a4a59a992326abc248d0ec330053d9d33dbfa34981ed62e5e38966c,2025-02-06T16:15:38.563000 CVE-2024-54523,0,0,0155da17dd45eb46f59a34af33d3d9dca19539b7cc1d7ed919dc688ff4a61f33,2025-01-28T15:15:12.190000 CVE-2024-54524,0,0,f1841b79a984dc339395e420615a7246f02aaa993793861427c269ef59ff9324,2024-12-18T13:59:47.450000 CVE-2024-54526,0,0,aefe7086f2d764fc872d00eaa2f2173838af254c5b93971d556108953f443875,2024-12-16T22:15:07.320000 @@ -272969,7 +272981,7 @@ CVE-2024-54849,0,0,ecb2618b47660945a630d6edeb58e480eb8019d05c1f299b012bdc19f7f45 CVE-2024-5485,0,0,f687486069d8da51bc217d8f3c1b4f2cb223a1d0f0b0390694d1cbb1988c70fb,2024-11-21T09:47:46.253000 CVE-2024-54851,0,0,d7885353e775e9c99d1dc919070d791fc6607741a3c016a34ac8fa9ee5a638aa,2025-01-30T17:15:17.957000 CVE-2024-54852,0,0,e8c7f3a49653ec6dc3f1cc5dde6a821b70eb6fb2bf4c46178b115f3db85957a6,2025-01-29T22:15:29.723000 -CVE-2024-54853,0,1,d3e83722ee1cca91e686daf4a8be9a73e0c715b87c9d674006b26be75a74850f,2025-02-06T16:15:38.767000 +CVE-2024-54853,0,0,d3e83722ee1cca91e686daf4a8be9a73e0c715b87c9d674006b26be75a74850f,2025-02-06T16:15:38.767000 CVE-2024-5486,0,0,6dfb8e6d8cb1d8bab5afe16e5d1d045c354e9fc780a2307ae97dd3f4b30153b6,2024-11-21T09:47:46.367000 CVE-2024-5487,0,0,9fbfbc79e6dff8c3b550139a3c2eecf9b7c4bdde8704bc6cfe1f3d5f4415c8a9,2024-08-16T20:22:51.930000 CVE-2024-54879,0,0,b29885c9d1f972b1a85e410837486f9a5cbdaaa5454176171e37cc430fed9212,2025-01-07T21:15:12.170000 @@ -273072,8 +273084,8 @@ CVE-2024-5522,0,0,df1bc4811acd8877854299da044a99554378b9c2498586ce956f30305786dd CVE-2024-55224,0,0,4f8d131824b20fb869af69c38a084a00b535a965cb641c1dcc385c5e0ee6c49f,2025-01-10T18:15:24.053000 CVE-2024-55225,0,0,65ed599876ed6d6a32d724946af47b3c7b45688e546c4270a7c0aa2b7e07dd80,2025-01-10T18:15:24.530000 CVE-2024-55226,0,0,33de94a32577e3a21e3bfd2bd3c203596c6338516324a9df6e2cd8fabe427868,2025-01-10T17:15:17.393000 -CVE-2024-55227,0,1,eb20a4f274494373d2531679b0711f148713e34e454237e4f524a5262b7d3ebf,2025-02-06T16:08:03.917000 -CVE-2024-55228,0,1,2197d09c6165a4fd7e9eed87744d66b6d0a99b2ff11cc1cca85f358f880d4cb1,2025-02-06T16:06:10.093000 +CVE-2024-55227,0,0,eb20a4f274494373d2531679b0711f148713e34e454237e4f524a5262b7d3ebf,2025-02-06T16:08:03.917000 +CVE-2024-55228,0,0,2197d09c6165a4fd7e9eed87744d66b6d0a99b2ff11cc1cca85f358f880d4cb1,2025-02-06T16:06:10.093000 CVE-2024-5523,0,0,0b2c43ef384781b0113b9be6f2b000f9de2199a81d337c7e51164ef3b409e6ae,2024-11-21T09:47:51.940000 CVE-2024-55231,0,0,bc333f6409b44ab3c99000a12bad2fde8a29ce447ecd07b39a700d49ee237739,2024-12-26T20:15:22.363000 CVE-2024-55232,0,0,1864ac97778845b0c2006d5c17dbf59eb90aad80a835e2f552f3f64f26c6392b,2024-12-26T20:15:22.673000 @@ -273105,8 +273117,8 @@ CVE-2024-55411,0,0,e79315ed14538192b3442e269ae3df7163b086fe6589e73b0be27cd11820e CVE-2024-55412,0,0,6e1875e4d94fbec9f5b13096fd8188b74519aaec7a91136cabb4f52c00245964,2025-01-08T16:15:35.527000 CVE-2024-55413,0,0,eef50e9e636ae6bc827b08d7c7eec17970a99ab50a51fccd44bf2d480fff7156,2025-01-08T16:15:35.717000 CVE-2024-55414,0,0,0d97009591fcf6c0b34e60fb7a805f4c6f9d80da2e217dde940ef3fa78396336,2025-01-08T16:15:35.883000 -CVE-2024-55415,0,1,087d0d3c44dac4999f79a1b6f27b86eda7dadff756801f1772105cd7fd9a9fa0,2025-02-06T15:15:14.850000 -CVE-2024-55416,0,1,864b7c536816b3c84c04a0674cb1e808c009025036c0951af47709c8c7a39f69,2025-02-06T15:15:15 +CVE-2024-55415,0,0,087d0d3c44dac4999f79a1b6f27b86eda7dadff756801f1772105cd7fd9a9fa0,2025-02-06T15:15:14.850000 +CVE-2024-55416,0,0,864b7c536816b3c84c04a0674cb1e808c009025036c0951af47709c8c7a39f69,2025-02-06T15:15:15 CVE-2024-55417,0,0,7112f2e86e4b407e3cff6c6b3782141d7a1320d3243965a5042f9153f6635c5b,2025-02-06T14:15:29.703000 CVE-2024-5542,0,0,6f204123d7eb6582297f3ed2f1f9284859b42e6e6e67e32f4ec293ca8971e5c4,2024-11-21T09:47:53.577000 CVE-2024-5543,0,0,a26f2d14789d49017a49269cf3e4b4468656a016d744676df971b6df226be4f0,2024-11-21T09:47:53.697000 @@ -274069,28 +274081,28 @@ CVE-2024-57036,0,0,55b7f3d5f4d5a99be083f64a92e65d0a6b625216d85565aff3a03ccb780b5 CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000 CVE-2024-57041,0,0,e9d5d6fed9694112063568252f730d4f4bf67fc11323125dff3066e4510cf854,2025-01-24T20:15:33.353000 CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51181,2025-01-28T20:15:54.727000 -CVE-2024-57063,0,1,2fecbc2103ea200f5ba13c9f12d080428615d31e0d3b984b53c8f139b1182638,2025-02-06T16:15:39.023000 -CVE-2024-57064,0,1,da6a0f9dc3cc6a91fe129a3eaadee2f18485150e3540d7efb81bc8a48a440a73,2025-02-06T16:15:39.347000 -CVE-2024-57065,0,1,5853bd5a0cfac3911d89a9239f95e27c817cdcf0a6b4e14425712a7bc77ac79c,2025-02-06T16:15:39.603000 -CVE-2024-57066,0,1,4756d883d6d97a12c7fe683bf21981f578b74dab49898ee28414da8237ad4516,2025-02-06T16:15:39.803000 -CVE-2024-57067,0,1,4394f9e32c024d8a3d10d2f11622ba82bb25acd4c682842453cc9cfd79267ebe,2025-02-06T16:15:39.980000 -CVE-2024-57068,0,1,6cbddddd900614e2f3a0924414cb60a804a1dcba3fd390608d93afe8db659787,2025-02-06T16:15:40.150000 -CVE-2024-57069,0,0,c157aa398d6a3f4f97bd52459e1519065376ef1c4b1490522677b5468cba173e,2025-02-05T22:15:31.353000 -CVE-2024-57071,0,0,d873efb753e7f378b4708a7234419911606b42040356f80b5d7ae4c1a5e0fcd0,2025-02-05T22:15:31.477000 -CVE-2024-57072,0,1,5ffa872ededabdb0739a5d0405a390fff41c788fb3613d132bbb706c968c40f2,2025-02-06T16:15:40.310000 -CVE-2024-57074,0,1,2ab2e028fa5d834db13ae60448602456812e0885ccb3626ff8affd4719b73616,2025-02-06T15:15:15.347000 -CVE-2024-57075,0,1,970568121a59cc35ea6582e0d23d90946c2caaf344af4e3af0a34eb61c5861ea,2025-02-06T15:15:15.500000 -CVE-2024-57076,0,1,a90d97f8e41e25ee7fdc4138eb2d14e42111717e863c59e4710f345ea8c2e21f,2025-02-06T15:15:15.643000 -CVE-2024-57077,0,1,0fd5457281886f8ef8ff1e57793f38e12666464c86810fe2e03063742fc7aa39,2025-02-06T15:15:15.797000 -CVE-2024-57078,0,1,ad1da0644d0ebb1d77f3f782cd38741010af2e2697e047a9b09abf14e4667141,2025-02-06T16:15:40.497000 -CVE-2024-57079,0,1,24c4041620fe4eb666480c9134c43daa9029b729bdfa84922c2c31ea99d7c95e,2025-02-06T15:15:15.950000 +CVE-2024-57063,0,0,2fecbc2103ea200f5ba13c9f12d080428615d31e0d3b984b53c8f139b1182638,2025-02-06T16:15:39.023000 +CVE-2024-57064,0,0,da6a0f9dc3cc6a91fe129a3eaadee2f18485150e3540d7efb81bc8a48a440a73,2025-02-06T16:15:39.347000 +CVE-2024-57065,0,0,5853bd5a0cfac3911d89a9239f95e27c817cdcf0a6b4e14425712a7bc77ac79c,2025-02-06T16:15:39.603000 +CVE-2024-57066,0,0,4756d883d6d97a12c7fe683bf21981f578b74dab49898ee28414da8237ad4516,2025-02-06T16:15:39.803000 +CVE-2024-57067,0,0,4394f9e32c024d8a3d10d2f11622ba82bb25acd4c682842453cc9cfd79267ebe,2025-02-06T16:15:39.980000 +CVE-2024-57068,0,0,6cbddddd900614e2f3a0924414cb60a804a1dcba3fd390608d93afe8db659787,2025-02-06T16:15:40.150000 +CVE-2024-57069,0,1,5833874420a5b55d33b4ba199729e3dc6d3cc8cbe23b5e3c7ecf3d1fd2607b1d,2025-02-06T17:15:19.647000 +CVE-2024-57071,0,1,2d256581cf4b947033630c13b7529b8f367bb35cb5bc03ff5c6e7e7ccffdfd4f,2025-02-06T17:15:19.793000 +CVE-2024-57072,0,0,5ffa872ededabdb0739a5d0405a390fff41c788fb3613d132bbb706c968c40f2,2025-02-06T16:15:40.310000 +CVE-2024-57074,0,0,2ab2e028fa5d834db13ae60448602456812e0885ccb3626ff8affd4719b73616,2025-02-06T15:15:15.347000 +CVE-2024-57075,0,0,970568121a59cc35ea6582e0d23d90946c2caaf344af4e3af0a34eb61c5861ea,2025-02-06T15:15:15.500000 +CVE-2024-57076,0,0,a90d97f8e41e25ee7fdc4138eb2d14e42111717e863c59e4710f345ea8c2e21f,2025-02-06T15:15:15.643000 +CVE-2024-57077,0,0,0fd5457281886f8ef8ff1e57793f38e12666464c86810fe2e03063742fc7aa39,2025-02-06T15:15:15.797000 +CVE-2024-57078,0,0,ad1da0644d0ebb1d77f3f782cd38741010af2e2697e047a9b09abf14e4667141,2025-02-06T16:15:40.497000 +CVE-2024-57079,0,0,24c4041620fe4eb666480c9134c43daa9029b729bdfa84922c2c31ea99d7c95e,2025-02-06T15:15:15.950000 CVE-2024-5708,0,0,f68252af81d3d9fd48c33f6db887b706921f7e4e9ec883679703f59930376646,2024-08-06T16:30:24.547000 -CVE-2024-57080,0,0,2009526b107d52edc60976243734f34e393e81755fc384b6be20fc5a14b7fe50,2025-02-05T22:15:32.300000 -CVE-2024-57081,0,1,7cac20819fadca6fc4259ab8bc88daff5fdd9d3e1ff95215ab57c09708d35617,2025-02-06T15:15:16.100000 -CVE-2024-57082,0,1,197407c0de09474d05f334c12207fc39d0d46c4fc5e8c0007c65360a32ec8d15,2025-02-06T15:15:16.247000 +CVE-2024-57080,0,1,c27a3693dc10c1913b168b61f0caf829d1e7fb1490217b7be2daa22dca9603d8,2025-02-06T17:15:19.933000 +CVE-2024-57081,0,0,7cac20819fadca6fc4259ab8bc88daff5fdd9d3e1ff95215ab57c09708d35617,2025-02-06T15:15:16.100000 +CVE-2024-57082,0,0,197407c0de09474d05f334c12207fc39d0d46c4fc5e8c0007c65360a32ec8d15,2025-02-06T15:15:16.247000 CVE-2024-57084,0,0,4092dc4cc9dea9569ffdafbb2596ed1f9ccf781214455a44da37c2ced3b0dc7e,2025-02-05T22:15:32.613000 -CVE-2024-57085,0,1,6c933162c254c702d391cb2d1984a69e8dee7f0c4841adb9392ab8f81c6da474,2025-02-06T15:15:16.390000 -CVE-2024-57086,0,0,860db027a5ca1cef6f4e4ca8797de3bb0c740754e77ffa6a69818d34bf4cac88,2025-02-05T22:15:32.810000 +CVE-2024-57085,0,0,6c933162c254c702d391cb2d1984a69e8dee7f0c4841adb9392ab8f81c6da474,2025-02-06T15:15:16.390000 +CVE-2024-57086,0,1,35fb361e0bf59457b906a3f99dedd4143894ad38875963914f72babb151071fe,2025-02-06T17:15:20.073000 CVE-2024-5709,0,0,9e7f02d16313ead7a68864ca2ed2dc29106d9085227941350b2847c3e4c2a85b,2024-08-06T16:30:24.547000 CVE-2024-57095,0,0,feaabc133222d755bb64c81b7f48c86d504504845f631c6909ee10ad4152eadc,2025-02-05T17:15:21.720000 CVE-2024-57097,0,0,72178de57ebc65af2f3143ffe454f119040395fbc17e427dcd5315ca4490337e,2025-02-03T21:15:14.450000 @@ -274155,21 +274167,25 @@ CVE-2024-57369,0,0,0beeb3a945370495c7fab19794a2bd15bf04ce80c00d4b38b5b7c779de679 CVE-2024-5737,0,0,fb7afad0bdcad96b29de7c5519f73ad0e5af614975f3cc39b56e0ff717aa63e5,2024-11-21T09:48:15.713000 CVE-2024-57370,0,0,dba61003ac0742f925ea5ff1cc95bfbaed4369615ca108aeba895cf60279fedb,2025-01-23T21:15:14.663000 CVE-2024-57372,0,0,359f6085d50456f0eac4043a58ce1cc9b440df64af0e5401b40a68976c846ffa,2025-01-17T22:15:28.957000 -CVE-2024-57373,0,0,ebd94ef1c6d3b27b7f53e99e624aea5e94bc983445fc813a0224f34086227d4f,2025-01-28T20:15:55.040000 +CVE-2024-57373,0,1,55b5a66e1a93744a164d63416378de309c1b9a5faab6102e8edbf1875b843e8d,2025-02-06T17:15:20.213000 CVE-2024-57376,0,0,9564a5a5f1c678a5ed27c086bacc6d63834708967615de401284e6c6ddc391ef,2025-01-29T16:15:43.367000 CVE-2024-57386,0,0,ad9377994dc2b991f013b227dbedd5251f54c47616d12069f6305d876047b1bb,2025-01-31T16:13:06.540000 CVE-2024-5739,0,0,0e4f510b66deb8d2a70ee4b32b2e47de655e3949e52e35934a40b7f5adddcb57,2024-11-21T09:48:15.850000 CVE-2024-57395,0,0,2c6b9838d8d0a9b17c18c2b5c319e27ac8a0ab4c8fbbb39ded3167ef6bff33f1,2025-01-31T21:15:11.383000 CVE-2024-5741,0,0,055094e9aabecf080e8eb2a3d882a04f3fba90f18ee04ead7d8cff271ac3f02a,2024-11-21T09:48:15.963000 CVE-2024-5742,0,0,3d67a98aab4ea452eccb3180d74817d102c8dc01405b893ad9d75b571593ba72,2024-11-21T09:48:16.117000 +CVE-2024-57427,1,1,d285cd880f7a853b464e25a346510f02f9182642e9eabe14981f37a228436678,2025-02-06T17:15:20.357000 +CVE-2024-57428,1,1,e0bb07e10a2cff961e075df840a152247b32fa243f7d820119ca118e2b972c86,2025-02-06T17:15:20.527000 +CVE-2024-57429,1,1,45cb205c9d03aa148bbab11b5b421d874e3fa32787cdc4a91f1f3a8ac4a1ccd9,2025-02-06T17:15:20.627000 CVE-2024-5743,0,0,8df1bf94ad8183aa6e1d1e737442c566d99a7f0b2a8ad07fdc7acab75f5a831f,2025-01-13T18:15:19.517000 +CVE-2024-57430,1,1,dd23719e7e5d0c81473d565f9d1aba8bc813f9efb0a4a379a8c41321d2bcad8c,2025-02-06T17:15:20.717000 CVE-2024-57432,0,0,919d02e0a1b59673a162a8bd045a890978b7d93d202a67f79b5bbe75f3b09109,2025-02-03T17:15:21.883000 CVE-2024-57433,0,0,601b1b01df0eb69ac29e9606a7271bf2e47013cd403f277bf878079604fcd3c8,2025-02-03T17:15:22.020000 CVE-2024-57434,0,0,4cb782d653dc97e32efd3c538fcda0d8ae1d5de2464c175da5ed00584e2c5b3b,2025-02-03T21:15:14.600000 CVE-2024-57435,0,0,134ca1f67bc68a11fbb69f0a724e0c3096b5963737c85b95313876fa3bad9ab7,2025-02-03T21:15:14.747000 CVE-2024-57436,0,0,282eb6e7074212031e9dd5ef81b2445bf8af0720ec49623ad39893ccbcfafed8,2025-01-29T17:15:28.480000 CVE-2024-57437,0,0,55a481f741905a7b3529d8872203a5e96d5aa22ae442a522f6171609f0f649aa,2025-02-05T17:15:22.003000 -CVE-2024-57438,0,1,292c153a266ebc62026bffb3e4c8820913e5e3d5c932130e53e50995b3f3b186,2025-02-06T16:15:40.660000 +CVE-2024-57438,0,0,292c153a266ebc62026bffb3e4c8820913e5e3d5c932130e53e50995b3f3b186,2025-02-06T16:15:40.660000 CVE-2024-57439,0,0,4cb58a3938fc882d4399a493b10fd8366d3d4345b283844490118a46a57a5249,2025-01-29T17:15:28.650000 CVE-2024-5744,0,0,f08529b05aa9992ca46f071419027f83a7c3d97cd6c27e854ef9ed714ed839f1,2024-11-21T09:48:16.267000 CVE-2024-5745,0,0,f5c2e0226ff1c47168df0c237981cdbe9e1838dc0b6144c20848884be5dc91bf,2024-11-21T09:48:16.423000 @@ -274194,7 +274210,7 @@ CVE-2024-57510,0,0,05c43472b6cc9f12c734ec2d67ce047121a09b92b06280e273448f8c35d44 CVE-2024-57513,0,0,d9e89f7fd386462137067205c175126bd9ba80cb69a686ee45d8c4ed6a916b8c,2025-01-31T20:15:31.880000 CVE-2024-57514,0,0,13fe20ec02c985be4c4a4af0379f9e9b23030591a55f13ac002a7fb596a5977e,2025-01-29T16:15:43.533000 CVE-2024-57519,0,0,f6dcaa2139e878d99c2f1ee25c0738631af5afa261e3598c7b8dd197ab7d57b0,2025-02-05T17:15:22.157000 -CVE-2024-57520,0,1,8bbae23e7762cd227ca8e5301b6d653dba1991f6d1d7d76c7dea92b784a46e73,2025-02-06T16:15:40.833000 +CVE-2024-57520,0,0,8bbae23e7762cd227ca8e5301b6d653dba1991f6d1d7d76c7dea92b784a46e73,2025-02-06T16:15:40.833000 CVE-2024-57522,0,0,6827e8e059e3a15cee0dfb1b5aff915559d0509dea45093a502583c52a098ef1,2025-02-03T19:15:13.513000 CVE-2024-5753,0,0,35e5857965ec4fb8ff4da87da0ad57743fc77f757356d105b68f8e07a9b9291a,2024-11-21T09:48:16.923000 CVE-2024-57536,0,0,02e8c7373d9548e0be6ef2dd6f50d54d1dae50f3849a42bda8fca1e700f8b5b0,2025-01-22T21:15:10.100000 @@ -274229,9 +274245,11 @@ CVE-2024-57587,0,0,eb949770c2ea18c03b7dc379fa594f10d0dd35fc8b72257d36ec25b4059b7 CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000 CVE-2024-57590,0,0,468c69413bd6e8b154542bd7668e59449dcd31e5c13459bc4d0598be16b164ab,2025-01-28T20:15:55.973000 CVE-2024-57595,0,0,d5693a2fe10b4abac0b79780793b0dd88de974ed3b2d52993c0faf6b5032403c,2025-01-27T16:15:31.613000 -CVE-2024-57598,0,1,145a87ddac35d0fab6c2b623e0b0d68a323a745f638d00fa2e3ace232ac680ec,2025-02-06T16:15:41 +CVE-2024-57598,0,0,145a87ddac35d0fab6c2b623e0b0d68a323a745f638d00fa2e3ace232ac680ec,2025-02-06T16:15:41 +CVE-2024-57599,1,1,f7031f3b84d0652b034acfca2a972d23eb3533aaf618ac5f216f84a3f490c3c6,2025-02-06T17:15:20.820000 CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 +CVE-2024-57610,1,1,244d693947d7282b05e405de57c37865b94df40f7de66b0572bef4af7ca2d494,2025-02-06T18:15:32.133000 CVE-2024-57611,0,0,5a6260621739d59dcd08f111a764de6bcadc66f193b1b7892272336da3d323c2,2025-02-03T19:15:13.717000 CVE-2024-57615,0,0,29d723949a23cc6bc26d66fa548c118c8909a244d6e9df34eacae9812cc8a92d,2025-01-17T18:15:29.320000 CVE-2024-57616,0,0,afeb4ed5820ffe4cd117c4bd6013d3dbe80f28e3ffb828fcb905abd5d47b56e4,2025-01-17T18:15:29.573000 @@ -274304,7 +274322,7 @@ CVE-2024-57684,0,0,bb9784b081b8abb57890ab5a23ebb4f4e85b9b747d00a9882042baa37a4ca CVE-2024-57686,0,0,bff67f4870fa1a425dfb954d4d6446624978b67b9e08d7ce0318060f20535c1f,2025-01-10T15:15:16.003000 CVE-2024-57687,0,0,3f591284140d188a0181694e131e95eee1c6490731d9aebb4db57934394e9a88,2025-01-10T16:15:29.670000 CVE-2024-5769,0,0,abfeb18ae91d2e4533cdbeb4bf7ad73d20beb760222f23226220c40a5c6d9f91,2025-01-09T11:15:16.127000 -CVE-2024-57699,0,1,95aa0271d79d169e14100b0846c65938487183ab57f8ac667ec6badc2623e05c,2025-02-06T16:15:41.170000 +CVE-2024-57699,0,0,95aa0271d79d169e14100b0846c65938487183ab57f8ac667ec6badc2623e05c,2025-02-06T16:15:41.170000 CVE-2024-5770,0,0,918380eecb24f860d41c083e6e9a778682d01ec1efa0eb8b0287a3dccfe91d0a,2024-11-21T09:48:18.730000 CVE-2024-57703,0,0,d743eff85f5c1f058398ac2e48beaddc31cc085b96c135580c81255c71093660,2025-02-04T15:15:18.763000 CVE-2024-57704,0,0,388d13d725b2d6b848e05df34aea7c5a2dcb3a5641239200e2639502ff2e9d9d,2025-02-03T21:15:14.990000 @@ -274475,7 +274493,7 @@ CVE-2024-57962,0,0,aa02adc9a628f0a58ddefcc0a44bc2813378806d45112cb634abff123b940 CVE-2024-57965,0,0,beca1a5c4241b8a17f2dc2e6caf9cfcb35d784b0c331b6bcd655a61453686e3e,2025-01-29T10:15:08.113000 CVE-2024-57966,0,0,40e2f22cb22a31ff1abb28cf2e7cdb6b2203c6459f1e312f0ed24484eb3b3c7c,2025-02-03T05:15:10.080000 CVE-2024-57967,0,0,91eb1bfd2e20a3b6504519270fe1735c3bd2ee8a6236093524acc33a3a4157f6,2025-02-03T18:15:37.853000 -CVE-2024-57968,0,0,bd4f5a3636572fc02776014d13068e8c1326b225cc640c80d722596667392e5d,2025-02-03T20:15:36.550000 +CVE-2024-57968,0,1,df2d26687f6eb03cc4ebdae430a2d63e09872c2f76ae608d0c55e2648f4f6e40,2025-02-06T18:15:32.287000 CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000 CVE-2024-5799,0,0,23def4a6c23961b05e747f80024dd1bb17c6a1bb6930d36587790a1981c0653f,2024-09-26T20:39:09.127000 CVE-2024-5800,0,0,0f1ba4e6921bceda8aa9f69d4954ff1ca271a0069f260f484c22f7b777658fee,2024-08-12T13:41:36.517000 @@ -275239,7 +275257,7 @@ CVE-2024-6621,0,0,df7308a44678068e926e4c44c4ed4f05c26c938c3ef568a5161090dd66bcd2 CVE-2024-6624,0,0,552d36257e8bfaa4330013290315eab120066dcc2d886a9d94d7a9269b76a470,2024-11-21T09:50:01.337000 CVE-2024-6625,0,0,1b1c39349f634a560833a8b14095d12391f881dda66986404d732704553d9c8a,2024-11-21T09:50:01.480000 CVE-2024-6626,0,0,249866bf2ce6f0742e7ebbb55a39f819e02fa1bb5ce90e67c70e877b0a80889f,2024-11-08T21:18:44.400000 -CVE-2024-6627,0,0,aad6424ada2a35474166fdb95c6367716ef26b682435be8e3962d546d2564547,2024-11-21T09:50:01.757000 +CVE-2024-6627,0,1,46c1b50f2f4fc4f4915a5d60c7232a25ef2d8e7212d2215183cdea5ab45a44d0,2025-02-06T17:40:50.280000 CVE-2024-6628,0,0,6aa0bc00ea08b9aef593c460a4a806b0f9f48500a8836f10b79693acacaf2498,2024-11-18T17:11:17.393000 CVE-2024-6629,0,0,a527624ccafa4d4e16277a177029cdaa056a5fd7eb7a8772535daaafb91b33a4,2024-11-21T09:50:01.973000 CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000 @@ -275633,7 +275651,7 @@ CVE-2024-7094,0,0,b22ce77ffacf979339f568296208b1cc49b896d3f1ddb1fcde0ad4f63f1273 CVE-2024-7095,0,0,8022420a39cbfcd3372a34a53680c91a4d262f7eb4cb2666208fca7996ad0343,2025-01-14T15:15:27.263000 CVE-2024-7098,0,0,6d3f84e80cfe29d233429433ab17908fcb372f3ed014d96486b0feeee4cd8197,2024-09-20T17:14:53.063000 CVE-2024-7099,0,0,bda544dd9e76b13f20607b0db9189f48ec9b784ebdc1cb4c7f2f85bee57631ea,2024-10-15T12:57:46.880000 -CVE-2024-7100,0,0,eb359c221bc21a5def4138cb3d549ae221c77419cecbb0e71e8715e010209ebf,2024-11-21T09:50:52.687000 +CVE-2024-7100,0,1,99b418bd0fa2b35d671dd7874a6f6d5de7ddcdf351d66e487703289243d154d4,2025-02-06T17:45:05.493000 CVE-2024-7101,0,0,9cff880016a5f9e0ed8231c55bcfaaf90d7d1f0c57ac153566c6db7e59555606,2024-11-21T09:50:52.813000 CVE-2024-7104,0,0,d151c6e16e88a5882a2b03171a169ade8cff74d82ddb88ba3882405b7b893113,2024-09-20T14:44:18.010000 CVE-2024-7105,0,0,fffd7ab0d02896c184458c588856c1c84d9793c8f1ac9f8069eda1b041dde46a,2024-11-21T09:50:53.067000 @@ -276086,8 +276104,8 @@ CVE-2024-7591,0,0,6acedbc9c4fc9143dc69c6763f675f903ea94c54c7b69e2e118e2d6e5e20e6 CVE-2024-7592,0,0,f506a3341b4fbba83ac6e211c07afc6e4724cb2928db9d2406bc99c446bd1c95,2025-02-05T21:13:47.837000 CVE-2024-7593,0,0,f2d05ff860ab3aa3b763311f1f5d13b00758cca4a3232cf35d1c0d7a53d425d8,2024-09-25T01:00:03.110000 CVE-2024-7594,0,0,995a792dc1a727d1e80b76bbb236d5f218a77e1a6b8b9724198f4319ca380735,2025-01-10T13:15:10.303000 -CVE-2024-7595,0,1,e0cb145c1c310034ee4a8577be6b7c17483fb3be87ea2c6ee116fa9f7b0031b5,2025-02-06T15:56:46.093000 -CVE-2024-7596,0,1,da52d7a2a66b3ebf27b93d6f790ebd09caac9f0d5c9bfb2c763f0ffb2d44e84f,2025-02-06T15:56:49.947000 +CVE-2024-7595,0,1,078772cb53bd57fc6b0594ec7d8fbab39e32846c764737eb7066dae0d8872e9a,2025-02-06T18:14:41.017000 +CVE-2024-7596,0,1,60d4b173633fab13dc99e93e7fd9635eb0ef7a88acf3edb365dac3546fe63ffb,2025-02-06T18:14:55.137000 CVE-2024-7599,0,0,72cd50d41050beabf75c41eb70dc5180e8f76ad0927504bdf008f5b3f70870db,2024-09-26T16:45:58.507000 CVE-2024-7600,0,0,34b4914eedc647ff0a0d5a284f0b5d05eddd5cf8a511f0ca9df95820d310e297,2024-08-23T16:35:31.137000 CVE-2024-7601,0,0,3abc93709b908f4d7ee1f44c6b4ea7404a5a295ad0d93da10509fdc9a72448e0,2024-08-23T16:35:52.383000 @@ -276337,7 +276355,7 @@ CVE-2024-7876,0,0,3fa210c454e1479da57bd044cc92245618d1df797eb59430f1d236834861ac CVE-2024-7877,0,0,6229d0686b2135c115931a8adb7bb599ba3c9fa39dd41de2235cac4eac25c2bc,2024-11-06T15:42:19.343000 CVE-2024-7878,0,0,f3aacb78819bf5257796dd52707f03191f35499ea76d867711e5a5bb4db2045a,2024-10-02T17:41:44.133000 CVE-2024-7879,0,0,e70a28f428035ac900263e3578341f19769c09bd9b5a6d26a2fa46e14daf4866,2024-11-06T18:17:17.287000 -CVE-2024-7881,0,1,525d58e417dceb66a5b0f9f13838544357ad87e5c8db2e7101bdc31c522326ca,2025-02-06T16:15:41.340000 +CVE-2024-7881,0,0,525d58e417dceb66a5b0f9f13838544357ad87e5c8db2e7101bdc31c522326ca,2025-02-06T16:15:41.340000 CVE-2024-7882,0,0,b5c42de5e52c278ea04660fcca138342ebdc5cf6a193722d2d8e37faac1f4a56,2024-11-26T13:15:16.430000 CVE-2024-7883,0,0,0fe05f5c235184a9378943a8ba395bb993464cf40f0c149f508c0664d21adb87,2024-11-01T12:57:03.417000 CVE-2024-7884,0,0,b7fc6693cf34d63278a8b8aeec24a1860c381de4a1b67124c745f170d4444fd2,2024-09-12T20:47:13.387000 @@ -277689,7 +277707,7 @@ CVE-2024-9520,0,0,2204db2ed999130ed8146384857546e10c1ae13991a3509590a6f4522bf1f8 CVE-2024-9521,0,0,d3d9a6be6f9014aa41c5ad870c2defc71925b1ae41265bb2b72fa894954634f8,2024-10-16T16:38:14.557000 CVE-2024-9522,0,0,81a7015961146d67081255db9702f745971d5b01a572ccb06cd379a82785f7bd,2024-10-15T14:27:41.553000 CVE-2024-9526,0,0,e1cf51fb6a9699a47e781e65c57b10dbb1d3b240a6e4fc3accb74fa92609f4b9,2024-11-18T17:11:17.393000 -CVE-2024-9528,0,0,56380a12cd28925cdbc460a8ed293ba7bf973d622a448da8a49d4bc7d7bf961f,2024-10-07T17:48:28.117000 +CVE-2024-9528,0,1,324f5a9bfc4a37c1aeda9587a3d9c2b641c0fbccff333ce06df06554eda75394,2025-02-06T18:35:28.637000 CVE-2024-9529,0,0,cb4ddb314320de34a9d5304d06919a3c6fe7964a30fb164d33d4e703fbbc716f,2024-11-15T19:35:19.160000 CVE-2024-9530,0,0,d9770d6d9d81aca35282dd37cad0ec897a8e52cf92a99657df0b6283cc63f82d,2024-10-25T18:52:10.810000 CVE-2024-9531,0,0,791d1eeb40bab30335935df5c98b61329258a298e09b86a5a90c9cf22bd496a9,2024-10-25T12:56:07.750000 @@ -278125,7 +278143,7 @@ CVE-2025-0145,0,0,28ee7e561de93183c93e401461aae18fc5e7781a99b7d17adf2d093cd1d451 CVE-2025-0146,0,0,6438ce0638747f6ca050888f3107951da47bb6401493f676925ffb116b3c32e2,2025-01-30T20:15:34.907000 CVE-2025-0147,0,0,8c92b2cc0b68d62750059e60e5148ad1d0f377790d3e41ba90b67e3fbc0b77d0,2025-01-30T20:15:35.253000 CVE-2025-0148,0,0,4c566a07981d6932f948acedd669b91bd452c318e12651b3f921a875fde4dd6a,2025-02-03T23:15:08.217000 -CVE-2025-0167,0,1,a6303bec4538ef2c2f9e58c8919322ba1c91dc5c035d64dbb738451450264ab2,2025-02-06T15:15:16.967000 +CVE-2025-0167,0,0,a6303bec4538ef2c2f9e58c8919322ba1c91dc5c035d64dbb738451450264ab2,2025-02-06T15:15:16.967000 CVE-2025-0168,0,0,e84dfab945ef13382a421d35864ab91df44d461052950e6960f163ecb3ef0659,2025-01-01T14:15:23.590000 CVE-2025-0170,0,0,189d0bf364a93d57ec260c3b6216a914d346455ba37daa3da83434c071198308,2025-01-16T02:15:27.043000 CVE-2025-0171,0,0,794beb23430fc32560ad8b14e91c70f576fc5b74a30bc3307d04a635424cf206,2025-01-02T18:15:21.173000 @@ -278323,7 +278341,7 @@ CVE-2025-0509,0,0,059ea7538d7423c151804c49d96b92101e4a5153898fdf76407db4b1aeb8fe CVE-2025-0510,0,0,7651af521ace0b71fb60f58dd06598bee055dd55c568a05c6e23cf1b03e2c603,2025-02-04T14:15:31.550000 CVE-2025-0515,0,0,5ac36c3cf0188576defc5041e4d2f1cb1b09ae44d7e3c5256fa040d2f88a4731,2025-01-18T07:15:09.903000 CVE-2025-0518,0,0,6d3c5b8ffb150f75c389bd7e05b7aa905d22be4fb895631f5a9526d167be6180,2025-01-16T17:15:12.577000 -CVE-2025-0522,0,1,3ba5f92b2bbe968086c463b5b1bea4c0e867d76710c8214f1e5bfb022a5d52d0,2025-02-06T15:15:17.127000 +CVE-2025-0522,0,0,3ba5f92b2bbe968086c463b5b1bea4c0e867d76710c8214f1e5bfb022a5d52d0,2025-02-06T15:15:17.127000 CVE-2025-0527,0,0,290a49b972de635b98003404e947a6429993db3c6731bc1fc678a3824730e7d5,2025-01-17T14:15:32.840000 CVE-2025-0528,0,0,e3f7a40f975e109bf5214cfef482edb88f65284729988309787cc2f9ee957859,2025-01-17T15:15:12.430000 CVE-2025-0529,0,0,b7599e714e3df556905823f6cbc3ee4b0615bbfc883d87e213cfa26e9ecdbabb,2025-01-17T15:15:12.670000 @@ -278509,7 +278527,7 @@ CVE-2025-0972,0,0,3993ac5cb544f96eddd4ea382f0cae390a0048486c03ea18bb36ab062e41c6 CVE-2025-0973,0,0,37f661449c5d41bc7d595495ef0c9ea92e0effb9bc1925009def0bc433286647,2025-02-03T01:15:07.263000 CVE-2025-0974,0,0,8c546eff83dbe5240d979de322859dbce3e0f40803afa459c807306a06c0fe25,2025-02-03T02:15:26.433000 CVE-2025-0982,0,0,3e753dfbc563c4ce8b6b3fa8334843ace7fd76f79278394611157b2e2098a86e,2025-02-06T12:15:27.267000 -CVE-2025-0994,1,1,1276450764406ef4d48f2c14a380ac7fcec8660c59c3431f32d5bafa4b596e71,2025-02-06T16:15:41.493000 +CVE-2025-0994,0,1,967998ad6c7bd709dc6f1c3c1bb954c66b407740b0891517168a76f0f64ebd37,2025-02-06T17:15:20.917000 CVE-2025-1003,0,0,28c07c3915c653630648b64a7cbd4a7c616ace8285e5d0c3a3c404659b6f5188,2025-02-04T00:15:33.940000 CVE-2025-1009,0,0,2dfce1a6ef3a5258a1ead4cc70f7690cef7c227c3f80a57d2d9913ffcc23af3e,2025-02-05T19:15:44.887000 CVE-2025-1010,0,0,03e8b449c171fa78173030080d8bb8a5a467a9a0474962b20870b954fbc5c75d,2025-02-05T19:15:45.040000 @@ -278527,9 +278545,10 @@ CVE-2025-1022,0,0,c6f927693382feefd3496fa1fab29d0d3220169dd409cf06d2e60bb8c3a871 CVE-2025-1025,0,0,47807b8e82e17527c7201ea4708ddff28a865df6bf51354013b48cefc410618d,2025-02-05T20:15:45.593000 CVE-2025-1026,0,0,934680430568ee4f9133f3caf4202e9f856a4d1cce3fe9e6aa36c7f381dad077,2025-02-05T05:15:10.687000 CVE-2025-1028,0,0,e2d695e5f743c52691e2706279de4015f0c0e2d5f7e673aad15fe64754f22233,2025-02-05T04:15:06.543000 -CVE-2025-1066,0,1,7e4b41993fef3213d8d368f9758fd930158ec457354ccd8458eb28a70931a69f,2025-02-06T15:15:17.330000 +CVE-2025-1066,0,0,7e4b41993fef3213d8d368f9758fd930158ec457354ccd8458eb28a70931a69f,2025-02-06T15:15:17.330000 CVE-2025-1074,0,0,8c051b3034ec925098d2cc149a99487b209750af6f897c8ae0e6246aeecd5382,2025-02-06T14:15:30.050000 CVE-2025-1076,0,0,f8bd6961c3afe7e83bd1f50700b9a7057842b534d28d95685ee3dedd4ec97dab,2025-02-06T14:15:30.287000 +CVE-2025-1078,1,1,675c76ff9074af3b88b9bc037c57b0400427cdd389569c0c6f4bd86392660931,2025-02-06T17:15:21.040000 CVE-2025-20014,0,0,c7b03c8de0f1a02652afc1076707a5c9ed340500d3cc7fc3a1a2840db59d647f,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,7beae6544fac5da36b705aa7bd201e5432df1e59d09b16381fbe97a847fc40ed,2025-02-05T18:15:29.573000 @@ -279339,6 +279358,8 @@ CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8 CVE-2025-22828,0,0,327d4fbb4775debb7974f74b72faad2a6d9350ed385605b18892cfc7691fc3c9,2025-01-13T19:15:11.373000 CVE-2025-22846,0,0,ee57cd54683e50c0c5c24a8ae084d7ddc148895112414cbbd702fe57e89ac3b8,2025-02-05T18:15:31 CVE-2025-22865,0,0,19a89c82649ad3129bff7c393f18a8aa29547854e8bed3a25f76183fca3a3ccc,2025-01-28T16:15:40.540000 +CVE-2025-22866,1,1,8a69cf035707480fa8b55ae3b56481f3b164e8e2233ecdcde79769a96cb0341b,2025-02-06T17:15:21.410000 +CVE-2025-22867,1,1,d7efab2ec5f14ec5690e3f2ba26db7c75d1b086d6babee372f0bc13afcbd39af,2025-02-06T18:15:32.543000 CVE-2025-22890,0,0,3935608c48eed0124a24f4ac9682008606b353294adac3ba9c028788e4197e09,2025-02-06T07:15:17.113000 CVE-2025-22891,0,0,fb75dbb6b742099414608ac1d0bf94bf5176258c88fc5ec7ea32c7f757b15007,2025-02-05T18:15:31.190000 CVE-2025-22894,0,0,54c97e3407aecdb41a2affb888c157b3c8b229c55e8dc632210c6aebf5bd070e,2025-02-06T08:15:30.027000 @@ -279416,7 +279437,7 @@ CVE-2025-23079,0,0,78406696c95877d502c4c9b4607328548f20c8246eeff924786f7d9228881 CVE-2025-23080,0,0,165d07f7f3ac467de5017c0ed6cba0e28a556747a1eb136b531ca8b1a8ca92c9,2025-01-14T18:16:06.110000 CVE-2025-23081,0,0,8e8adb61025ad816e7ca7d3f543c46c43aae9a6ff6f38d8ecfef81ad769cb146,2025-01-16T16:15:36.090000 CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9a7c,2025-01-14T16:15:36.200000 -CVE-2025-23083,0,1,6a501c0dcff9af34582fe35c519636d37da8f27378c2381b47781c6cb71c5067,2025-02-06T15:15:17.597000 +CVE-2025-23083,0,0,6a501c0dcff9af34582fe35c519636d37da8f27378c2381b47781c6cb71c5067,2025-02-06T15:15:17.597000 CVE-2025-23084,0,0,66590369971d77e93d3e89e756431c61a64701ffca1861b58e6771ed8d358e6e,2025-01-28T16:15:40.827000 CVE-2025-23086,0,0,8c64985aeb33aba8982533ad038d52f283116181730bf252db15e74dc52799fa,2025-01-21T15:15:14.833000 CVE-2025-23087,0,0,c09e00448cf3f3ebc786843b0cc82ad81bcd87d56a57ec6e0048a7e42908b3f3,2025-02-05T02:15:28.267000 @@ -279457,6 +279478,7 @@ CVE-2025-23213,0,0,aff38eabb9bd04672d3ed96bb05c973962632a9b4695af8a2793f4269fb88 CVE-2025-23214,0,0,c6114b08fe21248133ade50d2d6a2ac869f323455d1c9d1cedbe7eb7fbc50600,2025-01-20T18:15:14.127000 CVE-2025-23215,0,0,1be3e1e70887085b832a175835ac8c19d2ed34db6ec280eeb8b05725c44ff973,2025-01-31T17:15:16.957000 CVE-2025-23216,0,0,57c9f4e5248af1158ac304c02ca8e245dfc7dae4b1223c5ca29bb9fa305846cd,2025-01-30T16:15:31.473000 +CVE-2025-23217,1,1,f0e4b01ffa08e710b33b6c16139b45944b2150c6435547f5b8df2b30a93c1b62,2025-02-06T18:15:32.667000 CVE-2025-23218,0,0,b3958878a7e50b75603e021f29b22e3f870c93039e9cd62b904ad60b93ab16c6,2025-01-21T15:15:15.053000 CVE-2025-23219,0,0,eeb1dd5028561d867342a9c6fb76f8efd39aecc175cf3f46b428158d47aff93a,2025-01-21T15:15:15.247000 CVE-2025-23220,0,0,fba5d8369804436294572c6b5fbca3b0330d59661922d6ab94c95c9d1c63bd2b,2025-01-21T15:15:15.430000 @@ -280204,7 +280226,7 @@ CVE-2025-24803,0,0,de7717b1bc14ce6f1b3f038b39f2e47b9865c8602f8c41659dc7eda4ca79e CVE-2025-24804,0,0,269ac8beebedeaf1af53ec49a1f4504e9b9c57cfaa6da251d77286e8e57c4204,2025-02-05T19:15:46.350000 CVE-2025-24805,0,0,5e14d248959d02784bc55a6ef4112f51ba0993abe851f9d7013d793d736d3305,2025-02-05T19:15:46.487000 CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000 -CVE-2025-24814,0,1,1b10dda5124b3bfaeb12e8f18946745b422e9436cc8b4fcf1ac235d412226254,2025-02-06T16:15:41.653000 +CVE-2025-24814,0,0,1b10dda5124b3bfaeb12e8f18946745b422e9436cc8b4fcf1ac235d412226254,2025-02-06T16:15:41.653000 CVE-2025-24826,0,0,f083cf3b22a371b3b312cdd4d91f8ea577aaa86377c783f40f19f65978454748,2025-01-28T21:15:18.817000 CVE-2025-24827,0,0,bb36298885685983df9812ccc52147c885a01eebf31a515233d45fff69c971c2,2025-01-31T15:15:14.390000 CVE-2025-24828,0,0,5525ce023c25f3208ff0cdf27e9dd286ee501d20f684f36aba9dce5b81e23653,2025-01-31T13:15:27.727000 @@ -280238,6 +280260,7 @@ CVE-2025-24966,0,0,49a3618cab816f9138955b8f398faab47c04aba012ba2a72ab4c537cd3634 CVE-2025-24967,0,0,2a5cf74e9be945087dca5d1a5e92d20eacb899a614e83afa6af2c59c792a14ec,2025-02-04T20:15:50.813000 CVE-2025-24968,0,0,7c824db034a9e65d8ac07998a73c9c5f3a4b6b7dd3a82be9e185ee36c0355d9c,2025-02-04T20:15:50.997000 CVE-2025-24971,0,0,08629629792a8a718ed179e81d7d3b3e1b069ac4a0637432ba1beed111ce7bd7,2025-02-04T20:15:51.150000 +CVE-2025-24981,1,1,435bf251d9bd2230a8314bb11ee3589e8174dee1836d7426c3ff268c4aa56a00,2025-02-06T18:15:32.847000 CVE-2025-24982,0,0,1f0ad84d8e07e22dc45a54eb7fe535ab050ad44dbd615392de494766094c54dc,2025-02-04T05:15:10.543000 CVE-2025-25039,0,0,9ce3f40f951dc829fdbba843978d2e74c3d12eed6211ccfdca91d5ee67b90524,2025-02-04T19:15:33.977000 CVE-2025-25062,0,0,d7cd47140e90c99ff5d70fbea50bb5a39373533859e38c36979aba1d23137e6e,2025-02-03T04:15:09.587000 @@ -280245,5 +280268,5 @@ CVE-2025-25063,0,0,8c34659c6a257a89c707c83868a8b18d34ee010ab7504a5a7479117985ac7 CVE-2025-25064,0,0,c295057976fdc8a8b609d6de80c4b0c6e625906133a6082f47b681501fd47a33,2025-02-04T16:15:43.670000 CVE-2025-25065,0,0,598af3d544a73dc058197b8a6b4d451883a362d398e6a9f9f23664e6dc813c35,2025-02-04T16:15:43.830000 CVE-2025-25066,0,0,d0c17153a53bf4d9b0d515b1e1a73dc9d8d2f57a6959d34f7f617b813c748218,2025-02-03T06:15:11.373000 -CVE-2025-25181,0,0,b1a5d099fefd65381302f10267736121bee37bd430eba8a29818b7cd4e804603,2025-02-04T16:15:43.990000 +CVE-2025-25181,0,1,4d67ec539e847fe84660f43fd38b8d53f4b38c60fadbe4831b0e67bce31509f3,2025-02-06T18:15:33.030000 CVE-2025-25246,0,0,cb6947636cb85304ead4d85dc395f3b8fb47e34388660246ae5e59ea50f5dc41,2025-02-05T05:15:11.663000